Mock Version: 1.2.17 ENTER ['do'](['bash', '--login', '-c', '/usr/bin/rpmbuild -bs --target aarch64 --nodeps /builddir/build/SPECS/nss.spec'], chrootPath='/var/lib/mock/nss-3.79.0-4.el7_9-20220927190753-6977/root'shell=FalseprintOutput=Falseenv={'LANG': 'en_GB.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'}gid=135user='mockbuild'timeout=0logger=uid=1005) Executing command: ['bash', '--login', '-c', '/usr/bin/rpmbuild -bs --target aarch64 --nodeps /builddir/build/SPECS/nss.spec'] with env {'LANG': 'en_GB.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'} and shell False Building target platforms: aarch64 Building for target aarch64 Wrote: /builddir/build/SRPMS/nss-3.79.0-4.el7_9.src.rpm Child return code was: 0 ENTER ['do'](['bash', '--login', '-c', u'/usr/bin/rpmbuild -bb --target aarch64 --nodeps /builddir/build/SPECS/nss.spec'], chrootPath='/var/lib/mock/nss-3.79.0-4.el7_9-20220927190753-6977/root'shell=Falseuid=1005env={'LANG': 'en_GB.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'}gid=135user='mockbuild'timeout=0private_network=Truelogger=printOutput=False) Executing command: ['bash', '--login', '-c', u'/usr/bin/rpmbuild -bb --target aarch64 --nodeps /builddir/build/SPECS/nss.spec'] with env {'LANG': 'en_GB.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'} and shell False Building target platforms: aarch64 Building for target aarch64 Executing(%prep): /bin/sh -e /var/tmp/rpm-tmp.cylCgU + umask 022 + cd /builddir/build/BUILD + cd /builddir/build/BUILD + rm -rf nss-3.79 + /usr/bin/gzip -dc /builddir/build/SOURCES/nss-3.79.tar.gz + /usr/bin/tar -xf - + STATUS=0 + '[' 0 -ne 0 ']' + cd nss-3.79 + /usr/bin/chmod -Rf a+rX,u+w,g-w,o-w . + echo 'Patch #2 (add-relro-linker-option.patch):' Patch #2 (add-relro-linker-option.patch): + /usr/bin/cat /builddir/build/SOURCES/add-relro-linker-option.patch + /usr/bin/patch -p0 -b --suffix .relro --fuzz=0 patching file nss/coreconf/Linux.mk Hunk #1 succeeded at 188 (offset 14 lines). Patch #3 (renegotiate-transitional.patch): + echo 'Patch #3 (renegotiate-transitional.patch):' + /usr/bin/cat /builddir/build/SOURCES/renegotiate-transitional.patch + /usr/bin/patch -p0 -b --suffix .transitional --fuzz=0 patching file nss/lib/ssl/sslsock.c Hunk #1 succeeded at 72 (offset 5 lines). Patch #40 (nss-3.14.0.0-disble-ocsp-test.patch): + echo 'Patch #40 (nss-3.14.0.0-disble-ocsp-test.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.14.0.0-disble-ocsp-test.patch + /usr/bin/patch -p0 -b --suffix .noocsptest --fuzz=0 patching file nss/tests/chains/scenarios/scenarios Hunk #1 succeeded at 18 (offset -32 lines). Patch #47 (utilwrap-include-templates.patch): + echo 'Patch #47 (utilwrap-include-templates.patch):' + /usr/bin/cat /builddir/build/SOURCES/utilwrap-include-templates.patch + /usr/bin/patch -p0 -b --suffix .templates --fuzz=0 patching file nss/lib/nss/config.mk Patch #50 (iquote.patch): + echo 'Patch #50 (iquote.patch):' + /usr/bin/cat /builddir/build/SOURCES/iquote.patch + /usr/bin/patch -p0 -b --suffix .iquote --fuzz=0 patching file ./nss/cmd/certutil/Makefile patching file ./nss/cmd/httpserv/Makefile patching file ./nss/cmd/lib/Makefile patching file ./nss/cmd/modutil/Makefile patching file ./nss/cmd/pk12util/Makefile patching file ./nss/cmd/selfserv/Makefile patching file ./nss/cmd/ssltap/Makefile patching file ./nss/cmd/strsclnt/Makefile patching file ./nss/cmd/tstclnt/Makefile patching file ./nss/cmd/vfyserv/Makefile patching file ./nss/coreconf/location.mk Hunk #1 succeeded at 42 (offset -3 lines). patching file ./nss/gtests/ssl_gtest/Makefile Hunk #1 succeeded at 52 (offset -1 lines). patching file ./nss/lib/certhigh/Makefile Hunk #1 succeeded at 36 (offset -2 lines). patching file ./nss/lib/cryptohi/Makefile Hunk #1 succeeded at 36 (offset -2 lines). patching file ./nss/lib/libpkix/pkix/checker/Makefile Hunk #1 succeeded at 37 (offset -1 lines). patching file ./nss/lib/nss/Makefile patching file ./nss/lib/pkcs12/Makefile Hunk #1 succeeded at 37 (offset -2 lines). patching file ./nss/lib/ssl/Makefile + pushd nss ~/build/BUILD/nss-3.79/nss ~/build/BUILD/nss-3.79 Patch #49 (nss-skip-bltest-and-fipstest.patch): + echo 'Patch #49 (nss-skip-bltest-and-fipstest.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-skip-bltest-and-fipstest.patch + /usr/bin/patch -p0 -b --suffix .skipthem --fuzz=0 patching file ./cmd/Makefile patching file ./cmd/shlibsign/Makefile Patch #52 (Bug-1001841-disable-sslv2-libssl.patch): + echo 'Patch #52 (Bug-1001841-disable-sslv2-libssl.patch):' + /usr/bin/cat /builddir/build/SOURCES/Bug-1001841-disable-sslv2-libssl.patch + /usr/bin/patch -p1 -b --suffix .disableSSL2libssl --fuzz=0 patching file lib/ssl/config.mk patching file lib/ssl/sslsock.c Hunk #1 succeeded at 1435 (offset 30 lines). Patch #53 (Bug-1001841-disable-sslv2-tests.patch): + echo 'Patch #53 (Bug-1001841-disable-sslv2-tests.patch):' + /usr/bin/cat /builddir/build/SOURCES/Bug-1001841-disable-sslv2-tests.patch + /usr/bin/patch -p1 -b --suffix .disableSSL2tests --fuzz=0 patching file tests/ssl/ssl.sh + echo 'Patch #56 (p-ignore-setpolicy.patch):' Patch #56 (p-ignore-setpolicy.patch): + /usr/bin/cat /builddir/build/SOURCES/p-ignore-setpolicy.patch + /usr/bin/patch -p1 -b --suffix .1026677_ignore_set_policy --fuzz=0 patching file lib/ssl/sslsock.c Hunk #1 succeeded at 1721 (offset 330 lines). Hunk #2 succeeded at 1732 (offset 330 lines). Patch #62 (nss-fix-deadlock-squash.patch): + echo 'Patch #62 (nss-fix-deadlock-squash.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-fix-deadlock-squash.patch + /usr/bin/patch -p1 -b --suffix .fix_deadlock --fuzz=0 patching file lib/pki/tdcache.c Hunk #5 succeeded at 1110 (offset 8 lines). + echo 'Patch #100 (nss-3.79-version-range.patch):' Patch #100 (nss-3.79-version-range.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-3.79-version-range.patch + /usr/bin/patch -p1 -b --suffix .version-range --fuzz=0 patching file lib/ssl/sslsock.c + popd ~/build/BUILD/nss-3.79 Patch #108 (nss-sni-c-v-fix.patch): + echo 'Patch #108 (nss-sni-c-v-fix.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-sni-c-v-fix.patch + /usr/bin/patch -p0 -b --suffix .sni_c_v_fix --fuzz=0 patching file nss/tests/ssl/sslauth.txt Hunk #1 succeeded at 72 (offset 8 lines). + pushd nss ~/build/BUILD/nss-3.79/nss ~/build/BUILD/nss-3.79 Patch #123 (nss-skip-util-gtest.patch): + echo 'Patch #123 (nss-skip-util-gtest.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-skip-util-gtest.patch + /usr/bin/patch -p1 -b --suffix .skip-util-gtests --fuzz=0 patching file gtests/manifest.mn Hunk #1 succeeded at 55 (offset 20 lines). patching file gtests/ssl_gtest/manifest.mn Hunk #1 succeeded at 72 (offset 5 lines). Patch #126 (nss-reorder-cipher-suites.patch): + echo 'Patch #126 (nss-reorder-cipher-suites.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-reorder-cipher-suites.patch + /usr/bin/patch -p1 -b --suffix .reorder-cipher-suites --fuzz=0 patching file lib/ssl/ssl3con.c Hunk #1 succeeded at 100 (offset 10 lines). Hunk #2 succeeded at 146 (offset 10 lines). patching file lib/ssl/sslenum.c + echo 'Patch #127 (nss-disable-cipher-suites.patch):' Patch #127 (nss-disable-cipher-suites.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-disable-cipher-suites.patch + /usr/bin/patch -p1 -b --suffix .disable-cipher-suites --fuzz=0 patching file lib/ssl/ssl3con.c Hunk #1 succeeded at 106 (offset 10 lines). Hunk #2 succeeded at 118 (offset 10 lines). + echo 'Patch #130 (nss-reorder-cipher-suites-gtests.patch):' Patch #130 (nss-reorder-cipher-suites-gtests.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-reorder-cipher-suites-gtests.patch + /usr/bin/patch -p1 -b --suffix .reorder-cipher-suites-gtests --fuzz=0 patching file gtests/ssl_gtest/ssl_auth_unittest.cc Hunk #1 succeeded at 1156 (offset 120 lines). Hunk #2 succeeded at 2112 (offset 279 lines). Hunk #3 succeeded at 2145 (offset 279 lines). patching file gtests/ssl_gtest/ssl_recordsize_unittest.cc patching file gtests/ssl_gtest/ssl_staticrsa_unittest.cc patching file gtests/ssl_gtest/tls_agent.cc Hunk #1 succeeded at 605 (offset 2 lines). + echo 'Patch #136 (nss-sql-default.patch):' Patch #136 (nss-sql-default.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-sql-default.patch + /usr/bin/patch -p1 -b --suffix .sql-default --fuzz=0 patching file tests/all.sh Hunk #1 succeeded at 118 (offset 4 lines). Hunk #2 succeeded at 175 (offset 4 lines). patching file tests/merge/merge.sh + echo 'Patch #139 (nss-modutil-skip-changepw-fips.patch):' Patch #139 (nss-modutil-skip-changepw-fips.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-modutil-skip-changepw-fips.patch + /usr/bin/patch -p1 -b --suffix .modutil-skip-changepw-fips --fuzz=0 patching file cmd/modutil/pk11.c Hunk #1 succeeded at 813 (offset 49 lines). + echo 'Patch #148 (nss-sysinit-userdb.patch):' Patch #148 (nss-sysinit-userdb.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-sysinit-userdb.patch + /usr/bin/patch -p1 -b --suffix .sysinit-userdb --fuzz=0 -R patching file lib/sysinit/nsssysinit.c Hunk #1 succeeded at 36 (offset -1 lines). Hunk #2 succeeded at 49 (offset -1 lines). + echo 'Patch #141 (nss-sysinit-getenv.patch):' Patch #141 (nss-sysinit-getenv.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-sysinit-getenv.patch + /usr/bin/patch -p1 -b --suffix .sysinit-getenv --fuzz=0 patching file lib/sysinit/nsssysinit.c Hunk #3 succeeded at 100 (offset 1 line). + echo 'Patch #149 (nss-skip-sysinit-gtests.patch):' Patch #149 (nss-skip-sysinit-gtests.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-skip-sysinit-gtests.patch + /usr/bin/patch -p1 -b --suffix .skip-sysinit-gtests --fuzz=0 patching file gtests/manifest.mn Hunk #1 succeeded at 33 (offset 2 lines). Patch #150 (nss-3.79-ssl2-compatible-client-hello.patch): + echo 'Patch #150 (nss-3.79-ssl2-compatible-client-hello.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.79-ssl2-compatible-client-hello.patch + /usr/bin/patch -p1 -b --suffix .ssl2hello --fuzz=0 patching file lib/ssl/sslsock.c Patch #152 (nss-version-range-set.patch): + echo 'Patch #152 (nss-version-range-set.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-version-range-set.patch + /usr/bin/patch -p1 -b --suffix .version-range-set --fuzz=0 patching file gtests/ssl_gtest/ssl_versionpolicy_unittest.cc patching file lib/ssl/sslsock.c Hunk #1 succeeded at 2798 (offset 256 lines). Hunk #2 succeeded at 2806 (offset 256 lines). + echo 'Patch #156 (nss-skip-cavs-tests.patch):' Patch #156 (nss-skip-cavs-tests.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-skip-cavs-tests.patch + /usr/bin/patch -p1 -b --suffix .skip-cavs --fuzz=0 patching file tests/fips/fips.sh + echo 'Patch #128 (nss-3.67-revert-sql-manage-change.patch):' Patch #128 (nss-3.67-revert-sql-manage-change.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-3.67-revert-sql-manage-change.patch + /usr/bin/patch -p1 -b --suffix .sql-man-page --fuzz=0 -R patching file doc/certutil.xml patching file doc/html/certutil.html patching file doc/html/derdump.html patching file doc/html/modutil.html patching file doc/html/pk12util.html patching file doc/html/pp.html patching file doc/html/signver.html patching file doc/html/ssltap.html patching file doc/modutil.xml patching file doc/nroff/certutil.1 patching file doc/nroff/crlutil.1 patching file doc/nroff/derdump.1 patching file doc/nroff/modutil.1 patching file doc/nroff/pk12util.1 patching file doc/nroff/pp.1 patching file doc/nroff/signtool.1 patching file doc/nroff/signver.1 patching file doc/nroff/ssltap.1 patching file doc/nroff/vfychain.1 patching file doc/nroff/vfyserv.1 patching file doc/pk12util.xml patching file doc/signver.xml + echo 'Patch #158 (nss-sql-default-tests.patch):' Patch #158 (nss-sql-default-tests.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-sql-default-tests.patch + /usr/bin/patch -p1 -b --suffix .sql-default-tests --fuzz=0 patching file tests/all.sh patching file tests/common/init.sh Hunk #1 succeeded at 722 (offset 71 lines). patching file tests/remote/Makefile + echo 'Patch #159 (nss-disable-dc.patch):' Patch #159 (nss-disable-dc.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-disable-dc.patch + /usr/bin/patch -p1 -b --suffix .dc --fuzz=0 patching file gtests/ssl_gtest/manifest.mn patching file lib/ssl/sslsock.c Hunk #1 succeeded at 828 (offset 9 lines). Hunk #2 succeeded at 1346 (offset 9 lines). + echo 'Patch #160 (nss-3.66-restore-old-pkcs12-default.patch):' Patch #160 (nss-3.66-restore-old-pkcs12-default.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-3.66-restore-old-pkcs12-default.patch + /usr/bin/patch -p1 -b --suffix .restore-pkcs12-defaults --fuzz=0 patching file cmd/pk12util/pk12util.c Hunk #1 succeeded at 1042 (offset 11 lines). Hunk #2 succeeded at 1160 (offset 11 lines). patching file tests/tools/tools.sh + echo 'Patch #161 (nss-3.66-disable-external-host-test.patch):' Patch #161 (nss-3.66-disable-external-host-test.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-3.66-disable-external-host-test.patch + /usr/bin/patch -p1 -b --suffix .brew --fuzz=0 patching file tests/ssl/ssl.sh Hunk #1 succeeded at 1654 (offset 13 lines). + echo 'Patch #162 (nss-3.79-distrusted-certs.patch):' Patch #162 (nss-3.79-distrusted-certs.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-3.79-distrusted-certs.patch + /usr/bin/patch -p1 -b --suffix .distrusted-certs --fuzz=0 -R patching file lib/ckfw/builtins/certdata.txt + echo 'Patch #200 (nss-3.79-skip-pwdecrypt-time.patch):' Patch #200 (nss-3.79-skip-pwdecrypt-time.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-3.79-skip-pwdecrypt-time.patch + /usr/bin/patch -p1 -b --suffix .skip-pwdecrypt-time --fuzz=0 patching file tests/sdr/sdr.sh Patch #300 (nss-3.79-r7-remove-explicit-ipv4.patch): + echo 'Patch #300 (nss-3.79-r7-remove-explicit-ipv4.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.79-r7-remove-explicit-ipv4.patch + /usr/bin/patch -p1 -b --suffix .remove-explicit-ipv4 --fuzz=0 patching file tests/ssl/ssl.sh + echo 'Patch #301 (nss-3.79-fix-client-cert-crash.patch):' Patch #301 (nss-3.79-fix-client-cert-crash.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-3.79-fix-client-cert-crash.patch + /usr/bin/patch -p1 -b --suffix .client-cert-crash --fuzz=0 patching file lib/ssl/authcert.c + echo 'Patch #302 (nss-3.79-pkcs12-fix-null-password.patch):' Patch #302 (nss-3.79-pkcs12-fix-null-password.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-3.79-pkcs12-fix-null-password.patch + /usr/bin/patch -p1 -b --suffix .fix-pkcs12-null --fuzz=0 patching file lib/pkcs12/p12local.c + popd ~/build/BUILD/nss-3.79 + /usr/bin/cp ./nss/lib/softoken/lowkeyi.h ./nss/cmd/rsaperf + /usr/bin/cp ./nss/lib/softoken/lowkeyti.h ./nss/cmd/rsaperf + /usr/bin/mv ./nss/lib/util/verref.h ./nss/verref.h + /usr/bin/rm -rf ./nss/lib/freebl + /usr/bin/rm -rf ./nss/lib/softoken + /usr/bin/rm -rf ./nss/lib/util + /usr/bin/rm -rf ./nss/cmd/bltest + /usr/bin/rm -rf ./nss/cmd/fipstest + /usr/bin/rm -rf ./nss/cmd/rsaperf_low + pushd nss/tests/ssl ~/build/BUILD/nss-3.79/nss/tests/ssl ~/build/BUILD/nss-3.79 + cat sslcov.txt + sed -r 's/^([^#].*EXPORT|^[^#].*SSL2)/#disabled \1/' + cat sslstress.txt + sed -r 's/^([^#].*EXPORT|^[^#].*SSL2)/#disabled \1/' + popd ~/build/BUILD/nss-3.79 + exit 0 Executing(%build): /bin/sh -e /var/tmp/rpm-tmp.29TkZZ + umask 022 + cd /builddir/build/BUILD + cd nss-3.79 + export NSS_NO_SSL2=1 + NSS_NO_SSL2=1 + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + export BUILD_OPT=1 + BUILD_OPT=1 + XCFLAGS='-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches ' + export XCFLAGS + PKG_CONFIG_ALLOW_SYSTEM_LIBS=1 + PKG_CONFIG_ALLOW_SYSTEM_CFLAGS=1 + export PKG_CONFIG_ALLOW_SYSTEM_LIBS + export PKG_CONFIG_ALLOW_SYSTEM_CFLAGS ++ /usr/bin/pkg-config --cflags-only-I nspr ++ sed s/-I// + NSPR_INCLUDE_DIR='/usr/include/nspr4 ' + NSPR_LIB_DIR=/usr/lib64 + export NSPR_INCLUDE_DIR + export NSPR_LIB_DIR ++ /usr/bin/pkg-config --cflags-only-I nss-util ++ sed s/-I// + export 'NSSUTIL_INCLUDE_DIR=/usr/include/nss3 -I/usr/include/nspr4 ' + NSSUTIL_INCLUDE_DIR='/usr/include/nss3 -I/usr/include/nspr4 ' + export NSSUTIL_LIB_DIR=/usr/lib64 + NSSUTIL_LIB_DIR=/usr/lib64 ++ /usr/bin/pkg-config --cflags-only-I nss-softokn ++ sed s/-I// + export 'FREEBL_INCLUDE_DIR=/usr/include/nss3 -I/usr/include/nspr4 ' + FREEBL_INCLUDE_DIR='/usr/include/nss3 -I/usr/include/nspr4 ' + export FREEBL_LIB_DIR=/usr/lib64 + FREEBL_LIB_DIR=/usr/lib64 + export USE_SYSTEM_FREEBL=1 + USE_SYSTEM_FREEBL=1 + export NSS_USE_SYSTEM_FREEBL=1 + NSS_USE_SYSTEM_FREEBL=1 ++ /usr/bin/pkg-config --libs nss-softokn + export 'FREEBL_LIBS=-L/usr/lib64 -lfreebl3 -lnssdbm3 -lsoftokn3 -lnssutil3 -lplds4 -lplc4 -lnspr4 -lpthread -ldl ' + FREEBL_LIBS='-L/usr/lib64 -lfreebl3 -lnssdbm3 -lsoftokn3 -lnssutil3 -lplds4 -lplc4 -lnspr4 -lpthread -ldl ' + export SOFTOKEN_LIB_DIR=/usr/lib64 + SOFTOKEN_LIB_DIR=/usr/lib64 + export USE_SYSTEM_NSSUTIL=1 + USE_SYSTEM_NSSUTIL=1 + export USE_SYSTEM_SOFTOKEN=1 + USE_SYSTEM_SOFTOKEN=1 + export NSS_BUILD_WITHOUT_SOFTOKEN=1 + NSS_BUILD_WITHOUT_SOFTOKEN=1 + NSS_USE_SYSTEM_SQLITE=1 + export NSS_USE_SYSTEM_SQLITE + export NSS_ALLOW_SSLKEYLOGFILE=1 + NSS_ALLOW_SSLKEYLOGFILE=1 + USE_64=1 + export USE_64 + export IN_TREE_FREEBL_HEADERS_FIRST=1 + IN_TREE_FREEBL_HEADERS_FIRST=1 + export NSS_BLTEST_NOT_AVAILABLE=1 + NSS_BLTEST_NOT_AVAILABLE=1 + export NSS_FORCE_FIPS=1 + NSS_FORCE_FIPS=1 + export POLICY_FILE=nss-rhel7.config + POLICY_FILE=nss-rhel7.config + export POLICY_PATH=/etc/pki/nss-legacy + POLICY_PATH=/etc/pki/nss-legacy + /usr/bin/mkdir -p ./dist/private/nss + /usr/bin/mv ./nss/verref.h ./dist/private/nss/verref.h + export NSS_DISABLE_GTESTS=1 + NSS_DISABLE_GTESTS=1 + /usr/bin/make -C ./nss all make: Entering directory `/builddir/build/BUILD/nss-3.79/nss' coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 # no real way to encode these in any sensible way /usr/bin/make -C coreconf/nsinstall program make[1]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/coreconf/nsinstall' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches nsinstall.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pathsub.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pathsub.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pathsub.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro -lpthread -ldl -lc true -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[1]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/coreconf/nsinstall' /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.79/nss' coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[2]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/coreconf' ../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/coreconf/nsinstall' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/coreconf/nsinstall' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/coreconf' make[2]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib' ../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/base' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 baset.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 base.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssbaset.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssbase.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/base' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/certdb' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 genname.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 xconst.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 certxutl.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 certi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cert.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 certt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 certdb.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/certdb' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/certhigh' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ocspti.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ocspi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ocsp.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ocspt.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/certhigh' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/cryptohi' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 keyi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cryptohi.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cryptoht.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 key.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 keyhi.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 keyt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 keythi.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 sechash.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/cryptohi' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/dev' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ckhelper.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 devm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 devtm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 devt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 dev.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssdevt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssdev.h ../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/dev' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/include' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_crlsel.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_errorstrings.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_results.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkixt.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_certsel.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_params.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_revchecker.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_certstore.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_pki.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_sample_modules.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_checker.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_system.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_util.h ../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/include' make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_comcertselparams.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/certsel' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_crlselector.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/crlsel' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/checker' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_certchainchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_crlchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_ekuchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_expirationchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_namechainingchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_nameconstraintschecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_ocspchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_policychecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_revocationmethod.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_revocationchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_signaturechecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_targetcertchecker.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/checker' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/params' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_trustanchor.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_valparams.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_resourcelimits.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/params' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/results' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_policynode.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_valresult.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_verifynode.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/results' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/store' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/store' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/top' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_build.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_lifecycle.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_validate.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/top' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/util' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_error.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_logger.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_list.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/util' make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix' make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_cert.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_certpolicyinfo.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_certpolicymap.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_certpolicyqualifier.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_crl.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_crldp.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_crlentry.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_date.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_generalname.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_infoaccess.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_nameconstraints.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ocsprequest.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ocspresponse.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_publickey.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_x500name.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ocspcertid.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/pki' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_mem.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_object.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_string.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_primhash.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_bigint.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_mutex.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_bytearray.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_lifecycle.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_oid.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_hashtable.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_rwlock.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_monitorlock.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/system' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_colcertstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_httpcertstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_httpdefaultclient.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapt.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapcertstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapresponse.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldaprequest.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapdefaultclient.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_nsscontext.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_pk11certstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_socket.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/module' make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/pk11wrap' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmodi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmodti.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 dev3hack.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmod.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmodt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secpkcs5.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pk11func.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pk11hpke.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pk11pub.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pk11priv.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pk11sdr.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pk11pqg.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/pk11wrap' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/pki' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pki.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nsspkit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nsspki.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkistore.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pki3hack.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkitm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkim.h ../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/pki' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/nss' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssrenam.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssoptions.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nss.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/nss' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ck.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ckfw.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ckfwm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ckfwtm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ckmd.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ckt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssck.api ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckepv.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckft.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckfw.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckfwc.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckfwt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckg.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckmdt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckt.h ../../../dist/public/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw' make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckbi.h ../../../../dist/public/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins/testlib' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Nothing to be done for `export'. make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins/testlib' make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/crmf' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 crmfi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 crmfit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cmmfi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cmmfit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 crmf.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 crmft.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cmmf.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cmmft.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/crmf' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/jar' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 jar.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 jar-ds.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 jarfile.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/jar' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/pkcs12' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkcs12.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 p12plcy.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 p12.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 p12t.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/pkcs12' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/pkcs7' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 p7local.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmime.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secpkcs7.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkcs7t.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/pkcs7' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/smime' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cmslocal.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cms.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cmst.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 smime.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cmsreclist.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/smime' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ssl' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ssl.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 sslt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 sslerr.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 sslexp.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 sslproto.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 preenc.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ssl' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/sysinit' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/sysinit' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm/include' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 hsearch.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 page.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 extern.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 queue.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 hash.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 search.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 mcom_db.h ../../../../dist/public/dbm ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ncompat.h ../../../../dist/public/dbm ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 winfile.h ../../../../dist/public/dbm make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm/include' make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm/src' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Nothing to be done for `export'. make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm/src' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib' make[2]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd' ../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/lib' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 basicutil.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secutil.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pk11table.h ../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/lib' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/shlibsign' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/shlibsign/mangle' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Nothing to be done for `export'. make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/shlibsign/mangle' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/shlibsign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/addbuiltin' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/addbuiltin' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/atob' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/atob' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/btoa' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/btoa' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/certutil' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/certutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/chktest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/chktest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/crlutil' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/crlutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/crmftest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/crmftest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/dbtest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/dbtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/derdump' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/derdump' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/digest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/digest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/httpserv' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/httpserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/listsuites' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/listsuites' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/makepqg' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/makepqg' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/multinit' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/multinit' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/nss-policy-check' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/nss-policy-check' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ocspclnt' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ocspclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ocspresp' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ocspresp' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/oidcalc' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/oidcalc' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7content' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7content' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7env' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7env' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7sign' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7sign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7verify' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7verify' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk12util' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk12util' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11importtest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11importtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11ectest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11ectest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11gcmtest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11gcmtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11mode' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11mode' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk1sign' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk1sign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pp' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pp' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pwdecrypt' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pwdecrypt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/rsaperf' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/rsaperf' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/rsapoptst' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/rsapoptst' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/sdbthreadtst' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/sdbthreadtst' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/sdrtest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/sdrtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/selfserv' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/selfserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/signtool' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/signtool' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/signver' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/signver' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/smimetools' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 rules.mk:7: warning: overriding recipe for target `install' ../../coreconf/rules.mk:73: warning: ignoring old recipe for target `install' make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/smimetools' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ssltap' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ssltap' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/strsclnt' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/strsclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/symkeyutil' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/symkeyutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/tests' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/tests' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/tstclnt' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/tstclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/validation' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/validation' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/vfychain' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/vfychain' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/vfyserv' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/vfyserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/modutil' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/modutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pkix-errcodes' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pkix-errcodes' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss' /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.79/nss' coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[2]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/coreconf' ../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/coreconf/nsinstall' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 true -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/coreconf/nsinstall' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/coreconf' make[2]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib' ../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/base' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/arena.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches arena.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/error.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches error.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/errorval.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches errorval.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/hashops.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches hashops.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libc.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches libc.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tracker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches tracker.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/item.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches item.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/utf8.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches utf8.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/list.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches list.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/hash.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches hash.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssb.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssb.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/arena.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/error.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/errorval.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/hashops.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libc.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tracker.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/item.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/utf8.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/list.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/hash.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssb.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssb.a ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssb.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/base' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/certdb' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/alg1485.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches alg1485.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certdb.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches certdb.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certv3.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches certv3.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certxutl.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches certxutl.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crl.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches crl.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/genname.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches genname.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/stanpcertdb.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches stanpcertdb.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/polcyxtn.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches polcyxtn.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/secname.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches secname.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/xauthkid.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches xauthkid.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/xbsconst.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches xbsconst.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/xconst.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches xconst.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libcertdb.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libcertdb.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/alg1485.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certdb.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certv3.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certxutl.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crl.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/genname.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/stanpcertdb.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/polcyxtn.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/secname.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/xauthkid.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/xbsconst.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/xconst.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libcertdb.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libcertdb.a ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libcertdb.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/certdb' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/certhigh' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certhtml.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches certhtml.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certreq.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches certreq.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crlv2.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches crlv2.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ocsp.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches ocsp.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ocspsig.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches ocspsig.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certhigh.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches certhigh.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certvfy.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches certvfy.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certvfypkix.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches certvfypkix.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/xcrldist.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches xcrldist.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libcerthi.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libcerthi.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certhtml.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certreq.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crlv2.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ocsp.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ocspsig.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certhigh.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certvfy.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certvfypkix.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/xcrldist.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libcerthi.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libcerthi.a ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libcerthi.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/certhigh' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/cryptohi' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sechash.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sechash.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/seckey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches seckey.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/secsign.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches secsign.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/secvfy.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches secvfy.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dsautil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches dsautil.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libcryptohi.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libcryptohi.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sechash.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/seckey.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/secsign.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/secvfy.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dsautil.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libcryptohi.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libcryptohi.a ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libcryptohi.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/cryptohi' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/dev' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/devslot.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches devslot.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/devtoken.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches devtoken.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/devutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches devutil.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ckhelper.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches ckhelper.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssdev.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssdev.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/devslot.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/devtoken.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/devutil.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ckhelper.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssdev.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssdev.a ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssdev.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/dev' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/include' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Nothing to be done for `libs'. make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/include' make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_certselector.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_certselector.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_comcertselparams.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_comcertselparams.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_certselector.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_comcertselparams.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/certsel' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_crlselector.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_crlselector.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_comcrlselparams.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_comcrlselparams.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_crlselector.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_comcrlselparams.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/crlsel' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/checker' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_basicconstraintschecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_basicconstraintschecker.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_certchainchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_certchainchecker.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_crlchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_crlchecker.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_ekuchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_ekuchecker.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_expirationchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_expirationchecker.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_namechainingchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_namechainingchecker.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_nameconstraintschecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_nameconstraintschecker.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_ocspchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_ocspchecker.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_revocationmethod.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_revocationmethod.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_revocationchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_revocationchecker.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_policychecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_policychecker.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_signaturechecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_signaturechecker.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_targetcertchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_targetcertchecker.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixchecker.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixchecker.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_basicconstraintschecker.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_certchainchecker.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_crlchecker.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_ekuchecker.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_expirationchecker.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_namechainingchecker.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_nameconstraintschecker.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_ocspchecker.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_revocationmethod.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_revocationchecker.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_policychecker.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_signaturechecker.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_targetcertchecker.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixchecker.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixchecker.a ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixchecker.a ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/checker' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/params' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_trustanchor.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_trustanchor.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_procparams.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_procparams.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_valparams.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_valparams.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_resourcelimits.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_resourcelimits.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixparams.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixparams.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_trustanchor.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_procparams.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_valparams.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_resourcelimits.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixparams.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixparams.a ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixparams.a ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/params' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/results' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_buildresult.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_buildresult.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_policynode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_policynode.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_valresult.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_valresult.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_verifynode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_verifynode.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixresults.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixresults.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_buildresult.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_policynode.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_valresult.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_verifynode.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixresults.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixresults.a ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixresults.a ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/results' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/store' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_store.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_store.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixstore.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixstore.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_store.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixstore.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixstore.a ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixstore.a ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/store' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/top' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_validate.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_validate.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_lifecycle.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_lifecycle.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_build.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_build.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixtop.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixtop.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_validate.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_lifecycle.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_build.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixtop.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixtop.a ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixtop.a ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/top' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/util' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_tools.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_tools.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_error.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_error.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_logger.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_logger.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_list.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_list.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_errpaths.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_errpaths.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixutil.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixutil.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_tools.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_error.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_logger.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_list.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_errpaths.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixutil.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixutil.a ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixutil.a ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix/util' make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix' make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_basicconstraints.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_basicconstraints.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_cert.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_cert.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyinfo.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_certpolicyinfo.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicymap.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_certpolicymap.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyqualifier.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_certpolicyqualifier.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_crl.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_crl.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_crldp.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_crldp.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_crlentry.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_crlentry.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_date.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_date.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_generalname.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_generalname.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_infoaccess.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_infoaccess.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_nameconstraints.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_nameconstraints.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocsprequest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_ocsprequest.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspresponse.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_ocspresponse.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_publickey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_publickey.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_x500name.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_x500name.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspcertid.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_ocspcertid.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixpki.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixpki.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_basicconstraints.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_cert.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicymap.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_crl.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_crldp.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_crlentry.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_date.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_generalname.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_infoaccess.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_nameconstraints.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocsprequest.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspresponse.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_publickey.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_x500name.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspcertid.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixpki.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixpki.a ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixpki.a ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/pki' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_bigint.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_bigint.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_bytearray.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_bytearray.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_common.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_common.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_error.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_error.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_hashtable.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_hashtable.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_lifecycle.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_lifecycle.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_mem.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_mem.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_monitorlock.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_monitorlock.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_mutex.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_mutex.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_object.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_object.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_oid.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_oid.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_primhash.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_primhash.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_rwlock.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_rwlock.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_string.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_string.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixsystem.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixsystem.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_bigint.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_bytearray.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_common.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_error.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_hashtable.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_lifecycle.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_mem.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_monitorlock.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_mutex.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_object.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_oid.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_primhash.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_rwlock.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_string.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixsystem.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixsystem.a ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixsystem.a ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/system' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_aiamgr.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_aiamgr.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_colcertstore.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_colcertstore.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpcertstore.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_httpcertstore.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpdefaultclient.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_httpdefaultclient.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaptemplates.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_ldaptemplates.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapcertstore.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_ldapcertstore.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapresponse.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_ldapresponse.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaprequest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_ldaprequest.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapdefaultclient.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_ldapdefaultclient.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_nsscontext.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_nsscontext.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_pk11certstore.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_pk11certstore.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_socket.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix_pl_socket.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixmodule.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixmodule.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_aiamgr.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_colcertstore.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpcertstore.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaptemplates.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapcertstore.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapresponse.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaprequest.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_nsscontext.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_pk11certstore.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_socket.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixmodule.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixmodule.a ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkixmodule.a ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss/module' make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix/pkix_pl_nss' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/libpkix' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/pk11wrap' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dev3hack.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches dev3hack.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11akey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11akey.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11auth.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11auth.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11cert.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11cert.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11cxt.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11cxt.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11err.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11err.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11hpke.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11hpke.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11kea.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11kea.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11list.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11list.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11load.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11load.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11mech.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11mech.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11merge.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11merge.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11nobj.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11nobj.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11obj.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11obj.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11pars.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11pars.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11pbe.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11pbe.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11pk12.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11pk12.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11pqg.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11pqg.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11sdr.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11sdr.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11skey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11skey.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11slot.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11slot.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11util.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11util.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpk11wrap.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpk11wrap.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dev3hack.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11akey.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11auth.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11cert.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11cxt.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11err.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11hpke.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11kea.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11list.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11load.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11mech.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11merge.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11nobj.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11obj.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11pars.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11pbe.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11pk12.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11pqg.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11sdr.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11skey.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11slot.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11util.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpk11wrap.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpk11wrap.a ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpk11wrap.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/pk11wrap' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/pki' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/asymmkey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches asymmkey.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certificate.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches certificate.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cryptocontext.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cryptocontext.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/symmkey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches symmkey.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/trustdomain.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches trustdomain.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tdcache.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches tdcache.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certdecode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches certdecode.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkistore.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkistore.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkibase.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkibase.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pki3hack.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pki3hack.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnsspki.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnsspki.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/asymmkey.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certificate.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cryptocontext.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/symmkey.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/trustdomain.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tdcache.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certdecode.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkistore.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkibase.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pki3hack.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnsspki.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnsspki.a ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnsspki.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/pki' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/nss' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nssinit.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss-rhel7.config\" -DPOLICY_PATH=\"/etc/pki/nss-legacy\" -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches nssinit.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nssoptions.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss-rhel7.config\" -DPOLICY_PATH=\"/etc/pki/nss-legacy\" -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches nssoptions.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nssver.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss-rhel7.config\" -DPOLICY_PATH=\"/etc/pki/nss-legacy\" -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches nssver.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/utilwrap.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss-rhel7.config\" -DPOLICY_PATH=\"/etc/pki/nss-legacy\" -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches utilwrap.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnss.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnss.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nssinit.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nssoptions.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nssver.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/utilwrap.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnss.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnss.a grep -v ';-' nss.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nss.def ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnss3.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnss3.so -Wl,--version-script,Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nss.def -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnss3.so Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nssinit.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nssoptions.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nssver.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/utilwrap.o ../certhigh/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certhtml.o ../certhigh/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certreq.o ../certhigh/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crlv2.o ../certhigh/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ocsp.o ../certhigh/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ocspsig.o ../certhigh/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certhigh.o ../certhigh/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certvfy.o ../certhigh/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certvfypkix.o ../certhigh/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/xcrldist.o ../cryptohi/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sechash.o ../cryptohi/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/seckey.o ../cryptohi/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/secsign.o ../cryptohi/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/secvfy.o ../cryptohi/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dsautil.o ../pk11wrap/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dev3hack.o ../pk11wrap/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11akey.o ../pk11wrap/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11auth.o ../pk11wrap/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11cert.o ../pk11wrap/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11cxt.o ../pk11wrap/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11err.o ../pk11wrap/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11hpke.o ../pk11wrap/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11kea.o ../pk11wrap/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11list.o ../pk11wrap/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11load.o ../pk11wrap/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11mech.o ../pk11wrap/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11merge.o ../pk11wrap/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11nobj.o ../pk11wrap/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11obj.o ../pk11wrap/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11pars.o ../pk11wrap/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11pbe.o ../pk11wrap/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11pk12.o ../pk11wrap/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11pqg.o ../pk11wrap/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11sdr.o ../pk11wrap/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11skey.o ../pk11wrap/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11slot.o ../pk11wrap/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11util.o ../certdb/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/alg1485.o ../certdb/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certdb.o ../certdb/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certv3.o ../certdb/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certxutl.o ../certdb/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crl.o ../certdb/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/genname.o ../certdb/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/stanpcertdb.o ../certdb/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/polcyxtn.o ../certdb/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/secname.o ../certdb/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/xauthkid.o ../certdb/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/xbsconst.o ../certdb/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/xconst.o ../pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/asymmkey.o ../pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certificate.o ../pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cryptocontext.o ../pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/symmkey.o ../pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/trustdomain.o ../pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tdcache.o ../pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certdecode.o ../pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkistore.o ../pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkibase.o ../pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pki3hack.o ../dev/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/devslot.o ../dev/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/devtoken.o ../dev/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/devutil.o ../dev/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ckhelper.o ../base/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/arena.o ../base/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/error.o ../base/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/errorval.o ../base/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/hashops.o ../base/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libc.o ../base/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tracker.o ../base/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/item.o ../base/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/utf8.o ../base/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/list.o ../base/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/hash.o ../libpkix/pkix/certsel/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_certselector.o ../libpkix/pkix/certsel/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_comcertselparams.o ../libpkix/pkix/checker/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_basicconstraintschecker.o ../libpkix/pkix/checker/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_certchainchecker.o ../libpkix/pkix/checker/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_crlchecker.o ../libpkix/pkix/checker/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_ekuchecker.o ../libpkix/pkix/checker/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_expirationchecker.o ../libpkix/pkix/checker/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_namechainingchecker.o ../libpkix/pkix/checker/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_nameconstraintschecker.o ../libpkix/pkix/checker/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_ocspchecker.o ../libpkix/pkix/checker/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_revocationmethod.o ../libpkix/pkix/checker/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_revocationchecker.o ../libpkix/pkix/checker/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_policychecker.o ../libpkix/pkix/checker/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_signaturechecker.o ../libpkix/pkix/checker/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_targetcertchecker.o ../libpkix/pkix/params/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_trustanchor.o ../libpkix/pkix/params/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_procparams.o ../libpkix/pkix/params/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_valparams.o ../libpkix/pkix/params/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_resourcelimits.o ../libpkix/pkix/results/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_buildresult.o ../libpkix/pkix/results/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_policynode.o ../libpkix/pkix/results/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_valresult.o ../libpkix/pkix/results/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_verifynode.o ../libpkix/pkix/top/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_validate.o ../libpkix/pkix/top/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_lifecycle.o ../libpkix/pkix/top/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_build.o ../libpkix/pkix/util/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_tools.o ../libpkix/pkix/util/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_error.o ../libpkix/pkix/util/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_logger.o ../libpkix/pkix/util/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_list.o ../libpkix/pkix/util/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_errpaths.o ../libpkix/pkix/crlsel/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_crlselector.o ../libpkix/pkix/crlsel/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_comcrlselparams.o ../libpkix/pkix/store/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_store.o ../libpkix/pkix_pl_nss/pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_basicconstraints.o ../libpkix/pkix_pl_nss/pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_cert.o ../libpkix/pkix_pl_nss/pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyinfo.o ../libpkix/pkix_pl_nss/pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicymap.o ../libpkix/pkix_pl_nss/pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyqualifier.o ../libpkix/pkix_pl_nss/pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_crl.o ../libpkix/pkix_pl_nss/pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_crldp.o ../libpkix/pkix_pl_nss/pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_crlentry.o ../libpkix/pkix_pl_nss/pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_date.o ../libpkix/pkix_pl_nss/pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_generalname.o ../libpkix/pkix_pl_nss/pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_infoaccess.o ../libpkix/pkix_pl_nss/pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_nameconstraints.o ../libpkix/pkix_pl_nss/pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocsprequest.o ../libpkix/pkix_pl_nss/pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspresponse.o ../libpkix/pkix_pl_nss/pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_publickey.o ../libpkix/pkix_pl_nss/pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_x500name.o ../libpkix/pkix_pl_nss/pki/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspcertid.o ../libpkix/pkix_pl_nss/system/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_bigint.o ../libpkix/pkix_pl_nss/system/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_bytearray.o ../libpkix/pkix_pl_nss/system/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_common.o ../libpkix/pkix_pl_nss/system/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_error.o ../libpkix/pkix_pl_nss/system/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_hashtable.o ../libpkix/pkix_pl_nss/system/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_lifecycle.o ../libpkix/pkix_pl_nss/system/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_mem.o ../libpkix/pkix_pl_nss/system/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_monitorlock.o ../libpkix/pkix_pl_nss/system/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_mutex.o ../libpkix/pkix_pl_nss/system/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_object.o ../libpkix/pkix_pl_nss/system/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_oid.o ../libpkix/pkix_pl_nss/system/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_primhash.o ../libpkix/pkix_pl_nss/system/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_rwlock.o ../libpkix/pkix_pl_nss/system/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_string.o ../libpkix/pkix_pl_nss/module/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_aiamgr.o ../libpkix/pkix_pl_nss/module/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_colcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaptemplates.o ../libpkix/pkix_pl_nss/module/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapresponse.o ../libpkix/pkix_pl_nss/module/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaprequest.o ../libpkix/pkix_pl_nss/module/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_nsscontext.o ../libpkix/pkix_pl_nss/module/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_pk11certstore.o ../libpkix/pkix_pl_nss/module/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_socket.o -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnss3.so ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnss.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnss3.so ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/nss' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crypto.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches crypto.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/find.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches find.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/hash.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches hash.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/instance.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches instance.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/mutex.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches mutex.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/object.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches object.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/session.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches session.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sessobj.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sessobj.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/slot.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches slot.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/token.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches token.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/wrap.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches wrap.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/mechanism.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches mechanism.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssckfw.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssckfw.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crypto.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/find.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/hash.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/instance.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/mutex.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/object.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/session.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sessobj.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/slot.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/token.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/wrap.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/mechanism.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssckfw.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssckfw.a ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssckfw.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw' make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/anchor.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches anchor.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/constants.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches constants.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bfind.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches bfind.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/binst.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches binst.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bobject.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches bobject.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bsession.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches bsession.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bslot.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches bslot.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/btoken.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches btoken.c perl certdata.perl certdata.txt Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certdata.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certdata.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certdata.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ckbiver.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches ckbiver.c grep -v ';-' nssckbi.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nssckbi.def rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssckbi.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnssckbi.so -Wl,--version-script,Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nssckbi.def -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssckbi.so Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/anchor.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/constants.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bfind.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/binst.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bobject.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bsession.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bslot.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/btoken.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certdata.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ckbiver.o ../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a ../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssckbi.so ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssckbi.so ../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins' make[5]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins/testlib' ../../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/anchor.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -I../../../../lib/ckfw/builtins ../anchor.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bfind.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -I../../../../lib/ckfw/builtins ../bfind.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/binst.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -I../../../../lib/ckfw/builtins ../binst.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bobject.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -I../../../../lib/ckfw/builtins ../bobject.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bsession.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -I../../../../lib/ckfw/builtins ../bsession.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bslot.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -I../../../../lib/ckfw/builtins ../bslot.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/btoken.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -I../../../../lib/ckfw/builtins ../btoken.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ckbiver.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -I../../../../lib/ckfw/builtins ../ckbiver.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/constants.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -I../../../../lib/ckfw/builtins ../constants.c perl ../certdata.perl certdata-testlib.txt Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certdata-testlib.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certdata-testlib.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -I../../../../lib/ckfw/builtins Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certdata-testlib.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssckbi-testlib.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnssckbi-testlib.so -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssckbi-testlib.so Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/anchor.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bfind.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/binst.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bobject.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bsession.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bslot.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/btoken.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ckbiver.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/constants.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certdata-testlib.o ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssckbi-testlib.so ../../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssckbi-testlib.so ../../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins/testlib' ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssckbi.so ../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw/builtins' ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnssckfw.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ckfw' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/crmf' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crmfenc.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches crmfenc.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crmftmpl.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches crmftmpl.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crmfreq.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches crmfreq.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crmfpop.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches crmfpop.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crmfdec.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches crmfdec.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crmfget.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches crmfget.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crmfcont.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches crmfcont.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmmfasn1.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmmfasn1.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmmfresp.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmmfresp.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmmfrec.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmmfrec.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmmfchal.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmmfchal.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/servget.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches servget.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/encutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches encutil.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/respcli.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches respcli.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/respcmn.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches respcmn.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/challcli.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches challcli.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/asn1cmn.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches asn1cmn.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libcrmf.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libcrmf.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crmfenc.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crmftmpl.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crmfreq.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crmfpop.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crmfdec.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crmfget.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crmfcont.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmmfasn1.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmmfresp.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmmfrec.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmmfchal.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/servget.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/encutil.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/respcli.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/respcmn.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/challcli.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/asn1cmn.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libcrmf.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libcrmf.a ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libcrmf.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/crmf' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/jar' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/jarver.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches jarver.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/jarsign.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches jarsign.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/jar.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches jar.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/jar-ds.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches jar-ds.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/jarfile.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches jarfile.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/jarint.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches jarint.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libjar.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libjar.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/jarver.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/jarsign.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/jar.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/jar-ds.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/jarfile.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/jarint.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libjar.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libjar.a ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libjar.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/jar' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/pkcs12' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p12local.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches p12local.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p12creat.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches p12creat.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p12dec.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches p12dec.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p12plcy.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches p12plcy.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p12tmpl.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches p12tmpl.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p12e.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches p12e.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p12d.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches p12d.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkcs12.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkcs12.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p12local.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p12creat.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p12dec.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p12plcy.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p12tmpl.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p12e.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p12d.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkcs12.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkcs12.a ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkcs12.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/pkcs12' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/pkcs7' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certread.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches certread.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7common.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches p7common.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7create.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches p7create.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7decode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches p7decode.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7encode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches p7encode.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7local.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches p7local.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/secmime.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches secmime.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkcs7.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkcs7.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certread.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7common.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7create.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7decode.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7encode.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7local.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/secmime.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkcs7.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkcs7.a ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libpkcs7.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/pkcs7' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/smime' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsarray.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmsarray.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsasn1.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmsasn1.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsattr.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmsattr.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmscinfo.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmscinfo.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmscipher.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmscipher.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsdecode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmsdecode.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsdigdata.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmsdigdata.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsdigest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmsdigest.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsencdata.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmsencdata.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsencode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmsencode.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsenvdata.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmsenvdata.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsmessage.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmsmessage.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmspubkey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmspubkey.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsrecinfo.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmsrecinfo.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsreclist.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmsreclist.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmssigdata.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmssigdata.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmssiginfo.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmssiginfo.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsudf.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmsudf.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmsutil.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/smimemessage.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches smimemessage.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/smimeutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches smimeutil.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/smimever.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches smimever.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libsmime.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libsmime.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsarray.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsasn1.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsattr.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmscinfo.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmscipher.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsdecode.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsdigdata.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsdigest.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsencdata.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsencode.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsenvdata.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsmessage.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmspubkey.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsrecinfo.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsreclist.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmssigdata.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmssiginfo.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsudf.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsutil.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/smimemessage.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/smimeutil.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/smimever.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libsmime.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libsmime.a grep -v ';-' smime.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/smime.def ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libsmime3.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libsmime3.so -Wl,--version-script,Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/smime.def -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libsmime3.so Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsarray.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsasn1.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsattr.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmscinfo.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmscipher.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsdecode.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsdigdata.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsdigest.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsencdata.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsencode.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsenvdata.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsmessage.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmspubkey.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsrecinfo.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsreclist.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmssigdata.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmssiginfo.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsudf.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsutil.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/smimemessage.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/smimeutil.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/smimever.o ../pkcs12/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p12local.o ../pkcs12/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p12creat.o ../pkcs12/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p12dec.o ../pkcs12/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p12plcy.o ../pkcs12/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p12tmpl.o ../pkcs12/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p12e.o ../pkcs12/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p12d.o ../pkcs7/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certread.o ../pkcs7/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7common.o ../pkcs7/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7create.o ../pkcs7/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7decode.o ../pkcs7/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7encode.o ../pkcs7/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7local.o ../pkcs7/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/secmime.o -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -lnss3 -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libsmime3.so ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libsmime.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libsmime3.so ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/smime' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/ssl' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/authcert.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches authcert.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmpcert.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmpcert.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dtls13con.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches dtls13con.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dtlscon.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches dtlscon.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/prelib.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches prelib.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/selfencrypt.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches selfencrypt.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssl3con.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches ssl3con.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssl3ecc.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches ssl3ecc.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssl3ext.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches ssl3ext.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssl3exthandle.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches ssl3exthandle.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssl3gthr.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches ssl3gthr.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslauth.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sslauth.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslbloom.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sslbloom.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslcert.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sslcert.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslcon.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sslcon.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssldef.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches ssldef.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslencode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sslencode.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslenum.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sslenum.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslerr.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sslerr.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslerrstrs.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sslerrstrs.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslgrp.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sslgrp.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslinfo.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sslinfo.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslinit.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sslinit.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslmutex.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sslmutex.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslnonce.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sslnonce.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslprimitive.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sslprimitive.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslreveal.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sslreveal.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslsecur.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sslsecur.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslsnce.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sslsnce.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslsock.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sslsock.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslspec.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sslspec.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssltrace.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches ssltrace.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslver.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sslver.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13con.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches tls13con.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13ech.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches tls13ech.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13echv.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches tls13echv.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13exthandle.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches tls13exthandle.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13hashstate.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches tls13hashstate.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13hkdf.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches tls13hkdf.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13psk.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches tls13psk.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13replay.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches tls13replay.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13subcerts.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches tls13subcerts.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/unix_err.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches unix_err.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libssl.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libssl.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/authcert.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmpcert.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dtls13con.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dtlscon.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/prelib.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/selfencrypt.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssl3con.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssl3ecc.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssl3ext.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssl3exthandle.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssl3gthr.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslauth.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslbloom.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslcert.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslcon.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssldef.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslencode.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslenum.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslerr.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslerrstrs.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslgrp.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslinfo.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslinit.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslmutex.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslnonce.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslprimitive.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslreveal.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslsecur.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslsnce.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslsock.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslspec.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssltrace.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslver.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13con.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13ech.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13echv.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13exthandle.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13hashstate.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13hkdf.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13psk.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13replay.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13subcerts.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/unix_err.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libssl.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libssl.a grep -v ';-' ssl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssl.def rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libssl3.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libssl3.so -Wl,--version-script,Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssl.def -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libssl3.so Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/authcert.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmpcert.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dtls13con.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dtlscon.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/prelib.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/selfencrypt.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssl3con.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssl3ecc.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssl3ext.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssl3exthandle.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssl3gthr.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslauth.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslbloom.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslcert.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslcon.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssldef.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslencode.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslenum.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslerr.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslerrstrs.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslgrp.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslinfo.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslinit.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslmutex.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslnonce.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslprimitive.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslreveal.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslsecur.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslsnce.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslsock.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslspec.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssltrace.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sslver.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13con.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13ech.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13echv.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13exthandle.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13hashstate.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13hkdf.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13psk.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13replay.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tls13subcerts.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/unix_err.o -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -lnss3 -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libssl3.so ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libssl.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libssl3.so ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/ssl' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/sysinit' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsssysinit.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches nsssysinit.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnsssysinit.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnsssysinit.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsssysinit.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnsssysinit.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnsssysinit.a grep -v ';-' nsssysinit.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsssysinit.def rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnsssysinit.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnsssysinit.so -Wl,--version-script,Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsssysinit.def -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnsssysinit.so Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsssysinit.o -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnsssysinit.so ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnsssysinit.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libnsssysinit.so ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/sysinit' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm/include' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Nothing to be done for `libs'. make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm/include' make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm/src' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/db.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches db.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/h_bigkey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches h_bigkey.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/h_func.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches h_func.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/h_log2.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches h_log2.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/h_page.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches h_page.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/hash.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches hash.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/hash_buf.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches hash_buf.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/mktemp.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches mktemp.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dirent.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches dirent.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libdbm.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libdbm.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/db.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/h_bigkey.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/h_func.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/h_log2.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/h_page.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/hash.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/hash_buf.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/mktemp.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dirent.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libdbm.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libdbm.a ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libdbm.a ../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm/src' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib/dbm' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/lib' make[2]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd' ../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/lib' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/basicutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches basicutil.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/secutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches secutil.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/secpwd.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches secpwd.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/derprint.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches derprint.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/moreoids.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches moreoids.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pppolicy.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pppolicy.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ffs.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches ffs.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11table.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11table.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libsectool.a ar cr Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libsectool.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/basicutil.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/secutil.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/secpwd.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/derprint.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/moreoids.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pppolicy.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ffs.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11table.o echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libsectool.a Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libsectool.a ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/libsectool.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/lib' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/shlibsign' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/shlibsign/mangle' ../../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/mangle.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches mangle.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/mangle cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/mangle -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/mangle.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/mangle ../../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[4]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/shlibsign/mangle' cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/shlibsign.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches shlibsign.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/shlibsign cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/shlibsign -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/shlibsign.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/shlibsign ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/shlibsign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/addbuiltin' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/addbuiltin.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches addbuiltin.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/addbuiltin cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/addbuiltin -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/addbuiltin.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/addbuiltin ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/addbuiltin' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/atob' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/atob.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches atob.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/atob cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/atob -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/atob.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/atob ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/atob' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/btoa' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/btoa.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches btoa.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/btoa cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/btoa -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/btoa.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/btoa ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/btoa' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/certutil' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certext.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches certext.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches certutil.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/keystuff.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches keystuff.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certutil cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certutil -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certext.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certutil.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/keystuff.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certutil ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/certutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/chktest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/chktest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches chktest.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/chktest cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/chktest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/chktest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /usr/lib64/libfreebl.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libdbm.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a /usr/lib64/libfreebl.a -L/usr/lib64 -lsoftokn3 -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/chktest ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/chktest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/crlutil' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crlgen_lex.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches crlgen_lex.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crlgen.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches crlgen.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crlutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches crlutil.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crlutil cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crlutil -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crlgen_lex.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crlgen.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crlutil.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crlutil ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/crlutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/crmftest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/testcrmf.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches testcrmf.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crmftest cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crmftest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/testcrmf.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/crmftest ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/crmftest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/dbtest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dbtest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches dbtest.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dbtest cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dbtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dbtest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dbtest ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/dbtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/derdump' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/derdump.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches derdump.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/derdump cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/derdump -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/derdump.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/derdump ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/derdump' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/digest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/digest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches digest.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/digest cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/digest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/digest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/digest ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/digest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/httpserv' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/httpserv.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches httpserv.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/httpserv cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/httpserv -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/httpserv.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/httpserv ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/httpserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/listsuites' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/listsuites.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches listsuites.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/listsuites cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/listsuites -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/listsuites.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/listsuites ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/listsuites' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/makepqg' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/makepqg.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches makepqg.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/makepqg cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/makepqg -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/makepqg.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/makepqg ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/makepqg' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/multinit' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/multinit.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches multinit.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/multinit cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/multinit -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/multinit.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/multinit ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/multinit' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/nss-policy-check' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nss-policy-check.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches nss-policy-check.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nss-policy-check cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nss-policy-check -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nss-policy-check.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nss-policy-check ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/nss-policy-check' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ocspclnt' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ocspclnt.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches ocspclnt.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ocspclnt cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ocspclnt -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ocspclnt.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ocspclnt ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ocspclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ocspresp' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ocspresp.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches ocspresp.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ocspresp cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ocspresp -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ocspresp.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ocspresp ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ocspresp' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/oidcalc' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/oidcalc.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches oidcalc.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/oidcalc cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/oidcalc -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/oidcalc.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/oidcalc ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/oidcalc' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7content' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7content.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches p7content.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7content cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7content -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7content.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7content ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7content' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7env' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7env.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches p7env.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7env cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7env -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7env.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7env ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7env' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7sign' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7sign.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches p7sign.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7sign cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7sign -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7sign.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7sign ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7sign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7verify' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7verify.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches p7verify.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7verify cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7verify -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7verify.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/p7verify ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/p7verify' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk12util' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk12util.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk12util.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk12util cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk12util -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk12util.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk12util ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk12util' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11importtest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11importtest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11importtest.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11importtest cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11importtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11importtest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11importtest ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11importtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11ectest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11ectest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11ectest.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11ectest cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11ectest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11ectest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /usr/lib64/libfreebl.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libdbm.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a /usr/lib64/libfreebl.a -L/usr/lib64 -lsoftokn3 -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11ectest ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11ectest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11gcmtest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11gcmtest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11gcmtest.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11gcmtest cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11gcmtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11gcmtest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11gcmtest ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11gcmtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11mode' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11mode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11mode.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11mode cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11mode -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11mode.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11mode ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk11mode' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk1sign' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk1sign.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk1sign.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk1sign cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk1sign -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk1sign.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk1sign ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pk1sign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pp' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pp.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pp.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pp cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pp -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pp.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pp ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pp' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pwdecrypt' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pwdecrypt.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pwdecrypt.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pwdecrypt cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pwdecrypt -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pwdecrypt.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pwdecrypt ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pwdecrypt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/rsaperf' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/rsaperf.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches rsaperf.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/defkey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches defkey.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/rsaperf cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/rsaperf -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/rsaperf.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/defkey.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /usr/lib64/libfreebl.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libdbm.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a /usr/lib64/libfreebl.a -L/usr/lib64 -lsoftokn3 -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/rsaperf ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/rsaperf' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/rsapoptst' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/rsapoptst.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -I../../../dist/public/softoken -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches rsapoptst.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/rsapoptst cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/rsapoptst -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -I../../../dist/public/softoken -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/rsapoptst.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/rsapoptst ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/rsapoptst' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/sdbthreadtst' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sdbthreadtst.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sdbthreadtst.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sdbthreadtst cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sdbthreadtst -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sdbthreadtst.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sdbthreadtst ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/sdbthreadtst' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/sdrtest' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sdrtest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sdrtest.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sdrtest cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sdrtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sdrtest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sdrtest ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/sdrtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/selfserv' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/selfserv.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches selfserv.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/selfserv cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/selfserv -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/selfserv.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/selfserv ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/selfserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/signtool' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/signtool.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches signtool.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certgen.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches certgen.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/javascript.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches javascript.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/list.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches list.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sign.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches sign.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/util.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches util.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/verify.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches verify.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/zip.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches zip.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/signtool cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/signtool -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/signtool.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/certgen.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/javascript.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/list.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/sign.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/util.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/verify.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/zip.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libjar.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/signtool ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/signtool' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/signver' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/signver.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches signver.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk7print.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk7print.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/signver cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/signver -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/signver.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk7print.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/signver ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/signver' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/smimetools' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 rules.mk:7: warning: overriding recipe for target `install' ../../coreconf/rules.mk:73: warning: ignoring old recipe for target `install' cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches cmsutil.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsutil cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsutil -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsutil.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/cmsutil ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/smimetools' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ssltap' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssltap.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches ssltap.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssltap cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssltap -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssltap.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/ssltap ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/ssltap' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/strsclnt' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/strsclnt.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches strsclnt.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/strsclnt cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/strsclnt -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/strsclnt.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/strsclnt ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/strsclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/symkeyutil' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/symkeyutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches symkeyutil.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/symkeyutil cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/symkeyutil -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/symkeyutil.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/symkeyutil ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/symkeyutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/tests' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/baddbdir.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches baddbdir.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/baddbdir cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/baddbdir -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/baddbdir.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/conflict.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches conflict.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/conflict cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/conflict -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/conflict.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dertimetest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches dertimetest.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dertimetest cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dertimetest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dertimetest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/encodeinttest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches encodeinttest.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/encodeinttest cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/encodeinttest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/encodeinttest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nonspr10.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches nonspr10.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nonspr10 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nonspr10 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nonspr10.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/remtest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches remtest.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/remtest cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/remtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/remtest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/secmodtest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches secmodtest.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/secmodtest cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/secmodtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/secmodtest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/baddbdir Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/conflict Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/dertimetest Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/encodeinttest Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nonspr10 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/remtest Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/secmodtest ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/tests' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/tstclnt' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tstclnt.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches tstclnt.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tstclnt cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tstclnt -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tstclnt.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/tstclnt ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/tstclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/validation' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/validation.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches validation.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/validation cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/validation -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/validation.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/validation ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/validation' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/vfychain' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/vfychain.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches vfychain.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/vfychain cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/vfychain -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/vfychain.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/vfychain ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/vfychain' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/vfyserv' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/vfyserv.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches vfyserv.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/vfyutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches vfyutil.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/vfyserv cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/vfyserv -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/vfyserv.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/vfyutil.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/vfyserv ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/vfyserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/modutil' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/modutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches modutil.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pk11.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/instsec.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches instsec.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/install.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches install.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/installparse.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches installparse.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/install-ds.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches install-ds.c cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lex.Pk11Install_yy.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches lex.Pk11Install_yy.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/modutil cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/modutil -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/modutil.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pk11.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/instsec.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/install.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/installparse.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/install-ds.o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lex.Pk11Install_yy.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libjar.a ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/modutil ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/modutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pkix-errcodes' ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix-errcodes.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches pkix-errcodes.c rm -f Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix-errcodes cc -o Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix-errcodes -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix-errcodes.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/pkix-errcodes ../../../dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd/pkix-errcodes' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss/cmd' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.79/nss' make: Leaving directory `/builddir/build/BUILD/nss-3.79/nss' + /usr/bin/make -C ./nss latest make: Entering directory `/builddir/build/BUILD/nss-3.79/nss' coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 echo Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ > ./../dist/latest make: Leaving directory `/builddir/build/BUILD/nss-3.79/nss' ~/build/BUILD/nss-3.79/nss/doc ~/build/BUILD/nss-3.79 + unset NSS_BLTEST_NOT_AVAILABLE + pushd ./nss/doc + rm -rf ./nroff + /usr/bin/make clean rm -f date.xml version.xml *.tar.bz2 rm -f html/*.proc rm -fr nss-man ascii + echo -n 'Nov 13 2013' + echo -n 3.79.0 + /usr/bin/make mkdir -p html mkdir -p nroff xmlto -o nroff man certutil.xml Note: Writing certutil.1 xmlto -o nroff man cmsutil.xml Note: Writing cmsutil.1 xmlto -o nroff man crlutil.xml Note: Writing crlutil.1 xmlto -o nroff man pk12util.xml Note: Writing pk12util.1 xmlto -o nroff man modutil.xml Note: Writing modutil.1 xmlto -o nroff man ssltap.xml Note: Writing ssltap.1 xmlto -o nroff man derdump.xml Note: Writing derdump.1 xmlto -o nroff man signtool.xml Note: Writing signtool.1 xmlto -o nroff man signver.xml Note: Writing signver.1 xmlto -o nroff man pp.xml Note: Writing pp.1 xmlto -o nroff man vfychain.xml Note: Writing vfychain.1 xmlto -o nroff man vfyserv.xml Note: Writing vfyserv.1 xmlto -o nroff man nss-policy-check.xml Note: Writing nss-policy-check.1 xmlto -o html html pk12util.xml Writing index.html for refentry(pk12util) mv html/index.html html/pk12util.html xmlto -o html html modutil.xml Writing index.html for refentry(modutil) mv html/index.html html/modutil.html xmlto -o html html signver.xml Writing index.html for refentry(signver) mv html/index.html html/signver.html xmlto -o html html nss-policy-check.xml Writing index.html for refentry(nss-policy-check) mv html/index.html html/nss-policy-check.html + popd ~/build/BUILD/nss-3.79 + /usr/bin/mkdir -p ./dist/doc/nroff + /usr/bin/cp ./nss/doc/nroff/certutil.1 ./nss/doc/nroff/cmsutil.1 ./nss/doc/nroff/crlutil.1 ./nss/doc/nroff/derdump.1 ./nss/doc/nroff/modutil.1 ./nss/doc/nroff/nss-policy-check.1 ./nss/doc/nroff/pk12util.1 ./nss/doc/nroff/pp.1 ./nss/doc/nroff/signtool.1 ./nss/doc/nroff/signver.1 ./nss/doc/nroff/ssltap.1 ./nss/doc/nroff/vfychain.1 ./nss/doc/nroff/vfyserv.1 ./dist/doc/nroff + /usr/bin/mkdir -p ./dist/pkgconfig + /usr/bin/cat /builddir/build/SOURCES/nss.pc.in + sed -e s,%libdir%,/usr/lib64,g -e s,%prefix%,/usr,g -e s,%exec_prefix%,/usr,g -e s,%includedir%,/usr/include/nss3,g -e s,%NSS_VERSION%,3.79.0,g -e s,%NSPR_VERSION%,4.34.0,g -e s,%NSSUTIL_VERSION%,3.79.0,g -e s,%SOFTOKEN_VERSION%,3.79.0,g ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VMAJOR' ++ awk '{print $3}' + NSS_VMAJOR=3 ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VMINOR' ++ awk '{print $3}' + NSS_VMINOR=79 ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VPATCH' ++ awk '{print $3}' + NSS_VPATCH=0 + export NSS_VMAJOR + export NSS_VMINOR + export NSS_VPATCH + /usr/bin/cat /builddir/build/SOURCES/nss-config.in + sed -e s,@libdir@,/usr/lib64,g -e s,@prefix@,/usr,g -e s,@exec_prefix@,/usr,g -e s,@includedir@,/usr/include/nss3,g -e s,@MOD_MAJOR_VERSION@,3,g -e s,@MOD_MINOR_VERSION@,79,g -e s,@MOD_PATCH_VERSION@,0,g + chmod 755 ./dist/pkgconfig/nss-config + /usr/bin/cat /builddir/build/SOURCES/setup-nsssysinit.sh + chmod 755 ./dist/pkgconfig/setup-nsssysinit.sh + /usr/bin/cp ./nss/lib/ckfw/nssck.api ./dist/private/nss/ + echo -n 'Nov 13 2013' + echo -n 3.79.0 + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/nss-config.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/setup-nsssysinit.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/pkcs11.txt.xml . + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man nss-config.xml Note: Writing nss-config.1 + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man setup-nsssysinit.xml Note: Writing setup-nsssysinit.1 + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man pkcs11.txt.xml Note: Writing pkcs11.txt.5 + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/cert8.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/cert9.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/key3.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/key4.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/secmod.db.xml . + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man cert8.db.xml Note: Writing cert8.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man cert9.db.xml Note: Writing cert9.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man key3.db.xml Note: Writing key3.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man key4.db.xml Note: Writing key4.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man secmod.db.xml Note: Writing secmod.db.5 + exit 0 Executing(%install): /bin/sh -e /var/tmp/rpm-tmp.7G8HCr + umask 022 + cd /builddir/build/BUILD + '[' /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64 '!=' / ']' + rm -rf /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64 ++ dirname /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64 + mkdir -p /builddir/build/BUILDROOT + mkdir /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64 + cd nss-3.79 + /usr/bin/rm -rf /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64 + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3/templates + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/bin + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64 + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64/nss/unsupported-tools + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64/pkgconfig + mkdir -p /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/share/man/man1 + mkdir -p /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/share/man/man5 + touch /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/lib64/libnssckbi.so + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64/nss/libnssckbi.so + for file in libnss3.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnss3.so /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64 + for file in libnss3.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64 + for file in libnss3.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64 + for file in libnss3.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libssl3.so /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64 + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//etc/pki/nssdb + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert8.db /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//etc/pki/nssdb/cert8.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key3.db /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//etc/pki/nssdb/key3.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-secmod.db /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//etc/pki/nssdb/secmod.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert9.db /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//etc/pki/nssdb/cert9.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key4.db /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//etc/pki/nssdb/key4.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/system-pkcs11.txt /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//etc/pki/nssdb/pkcs11.txt + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64 + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64 + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64 + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/certutil /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/cmsutil /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/crlutil /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/modutil /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/nss-policy-check /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/signver /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/ssltap /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/bin + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/atob /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/btoa /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/derdump /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/listsuites /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/ocspclnt /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pp /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/selfserv /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/signtool /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/strsclnt /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/symkeyutil /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/tstclnt /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/vfyserv /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/vfychain /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/validation /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64/nss/unsupported-tools + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cert.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/certdb.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/certt.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmmf.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmmft.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cms.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmsreclist.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmst.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/crmf.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/crmft.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cryptohi.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cryptoht.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jar-ds.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jar.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jarfile.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/key.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keyhi.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keyt.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keythi.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nss.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssbase.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssbaset.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckbi.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckepv.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckft.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfw.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfwc.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfwt.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckg.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckmdt.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckt.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ocsp.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ocspt.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12plcy.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12t.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11func.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11hpke.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11pqg.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11priv.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11pub.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11sdr.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs12.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs12t.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs7t.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/preenc.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sechash.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmime.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmod.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmodt.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secpkcs5.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secpkcs7.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/smime.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ssl.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslerr.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslexp.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslproto.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslt.h /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3 + for file in dist/private/nss/nssck.api + /usr/bin/install -p -m 644 dist/private/nss/nssck.api /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/include/nss3/templates + /usr/bin/install -p -m 644 ./dist/pkgconfig/nss.pc /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/lib64/pkgconfig/nss.pc + /usr/bin/install -p -m 755 ./dist/pkgconfig/nss-config /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/bin/nss-config + /usr/bin/install -p -m 755 ./dist/pkgconfig/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/bin/setup-nsssysinit.sh + ln -r -s -f /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/bin/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64//usr/bin/setup-nsssysinit + for f in nss-config setup-nsssysinit + install -c -m 644 nss-config.1 /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/share/man/man1/nss-config.1 + for f in nss-config setup-nsssysinit + install -c -m 644 setup-nsssysinit.1 /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/share/man/man1/setup-nsssysinit.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/certutil.1 /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/share/man/man1/certutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/cmsutil.1 /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/share/man/man1/cmsutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/crlutil.1 /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/share/man/man1/crlutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/derdump.1 /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/share/man/man1/derdump.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/modutil.1 /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/share/man/man1/modutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/nss-policy-check.1 /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/share/man/man1/nss-policy-check.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/pk12util.1 /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/share/man/man1/pk12util.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/pp.1 /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/share/man/man1/pp.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/signtool.1 /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/share/man/man1/signtool.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/signver.1 /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/share/man/man1/signver.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/ssltap.1 /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/share/man/man1/ssltap.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/vfychain.1 /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/share/man/man1/vfychain.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/vfyserv.1 /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/share/man/man1/vfyserv.1 + for f in pkcs11.txt + install -c -m 644 pkcs11.txt.5 /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/share/man/man5/pkcs11.txt.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 cert8.db.5 /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/share/man/man5/cert8.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 cert9.db.5 /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/share/man/man5/cert9.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 key3.db.5 /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/share/man/man5/key3.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 key4.db.5 /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/share/man/man5/key4.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 secmod.db.5 /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/share/man/man5/secmod.db.5 + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/etc/pki/nss-legacy + /usr/bin/install -p -m 644 /builddir/build/SOURCES/nss-rhel7.config /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/etc/pki/nss-legacy/nss-rhel7.config + /usr/lib/rpm/find-debuginfo.sh --strict-build-id -m --run-dwz --dwz-low-mem-die-limit 10000000 --dwz-max-die-limit 50000000 /builddir/build/BUILD/nss-3.79 extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/bin/signver extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/bin/certutil extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/bin/nss-policy-check extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/bin/cmsutil extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/bin/ssltap extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/bin/crlutil extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/bin/modutil extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/bin/pk12util extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/lib64/libsmime3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/lib64/libssl3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/lib64/libnss3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/lib64/libnsssysinit.so extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/lib64/nss/unsupported-tools/atob extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/lib64/nss/unsupported-tools/ocspclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/lib64/nss/unsupported-tools/vfychain extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/lib64/nss/unsupported-tools/symkeyutil extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/lib64/nss/unsupported-tools/selfserv extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/lib64/nss/unsupported-tools/btoa extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/lib64/nss/unsupported-tools/signtool extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/lib64/nss/unsupported-tools/pp extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/lib64/nss/unsupported-tools/listsuites extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/lib64/nss/unsupported-tools/vfyserv extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/lib64/nss/unsupported-tools/validation extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/lib64/nss/unsupported-tools/strsclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/lib64/nss/unsupported-tools/derdump extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/lib64/nss/unsupported-tools/tstclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64/usr/lib64/nss/libnssckbi.so /usr/lib/rpm/sepdebugcrcfix: Updated 27 CRC32s, 0 CRC32s did match. cpio: nss-3.79/nss/cmd/modutil/lex.Pk11Install_yy.cpp: Cannot stat: No such file or directory cpio: nss-3.79/nss/cmd/modutil/ytab.c: Cannot stat: No such file or directory 26521 blocks + /usr/lib/rpm/check-buildroot + /usr/lib/rpm/redhat/brp-compress + /usr/lib/rpm/redhat/brp-strip-static-archive /usr/bin/strip + /usr/lib/rpm/brp-python-bytecompile /usr/bin/python 1 + /usr/lib/rpm/redhat/brp-python-hardlink + /usr/lib/rpm/redhat/brp-java-repack-jars Executing(%check): /bin/sh -e /var/tmp/rpm-tmp.BU5kVB + umask 022 + cd /builddir/build/BUILD + cd nss-3.79 + '[' 0 -eq 1 ']' + export NSS_NO_SSL2=1 + NSS_NO_SSL2=1 + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + export BUILD_OPT=1 + BUILD_OPT=1 + USE_64=1 + export USE_64 + export NSS_BLTEST_NOT_AVAILABLE=1 + NSS_BLTEST_NOT_AVAILABLE=1 + export NSS_FORCE_FIPS=1 + NSS_FORCE_FIPS=1 + export 'NSS_FIPS_VERSION=nss\ 3.79.0-%{srpmhash}' + NSS_FIPS_VERSION='nss\ 3.79.0-%{srpmhash}' ++ sed -n 's/^\(\(NAME\|VERSION_ID\)=.*\)/OS_\1/p' /etc/os-release ++ sed -e 's/ /\\ /g' + eval 'OS_NAME="CentOS\' 'Linux"' 'OS_VERSION_ID="7"' ++ OS_NAME='CentOS\ Linux' ++ OS_VERSION_ID=7 + export 'FIPS_MODULE_OS=CentOS\ Linux\ 7' + FIPS_MODULE_OS='CentOS\ Linux\ 7' + export 'NSS_FIPS_MODULE_ID=CentOS\ Linux\ 7\ nss\ 3.79.0-%{srpmhash}' + NSS_FIPS_MODULE_ID='CentOS\ Linux\ 7\ nss\ 3.79.0-%{srpmhash}' + export SOFTOKEN_LIB_DIR=/usr/lib64 + SOFTOKEN_LIB_DIR=/usr/lib64 + export 'GTESTS=certhigh_gtest certdb_gtest der_gtest pk11_gtest softoken_gtest smime_gtest' + GTESTS='certhigh_gtest certdb_gtest der_gtest pk11_gtest softoken_gtest smime_gtest' + export GTESTFILTER=-TlsConnectTest.DisallowSSLv3HelloWithTLSv13Enabled + GTESTFILTER=-TlsConnectTest.DisallowSSLv3HelloWithTLSv13Enabled + export NSS_IGNORE_SYSTEM_POLICY=1 + NSS_IGNORE_SYSTEM_POLICY=1 + export NSS_SKIP_PWDECRYPT_TIME=true + NSS_SKIP_PWDECRYPT_TIME=true ++ find ./nss/tests ++ grep -c ' ' + SPACEISBAD=0 + : + '[' 0 -ne 0 ']' ++ perl -e 'print 9000 + int rand 1000' + MYRAND=9223 + echo 9223 9223 selfserv_9223 + RANDSERV=selfserv_9223 + echo selfserv_9223 ++ ls -d ./dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin + DISTBINDIR=./dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin + echo ./dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin ./dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin ++ pwd + pushd /builddir/build/BUILD/nss-3.79 + cd ./dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin + ln -s selfserv selfserv_9223 ~/build/BUILD/nss-3.79 ~/build/BUILD/nss-3.79 ~/build/BUILD/nss-3.79 + popd + find ./nss/tests -type f + grep -v '\.db$' + grep -v '\.crl$' + grep -v '\.crt$' + grep -vw CVS + xargs grep -lw selfserv + xargs -l perl -pi -e 's/\bselfserv\b/selfserv_9223/g' + killall selfserv_9223 selfserv_9223: no process found + : + rm -rf ./tests_results + pushd ./nss/tests/ ~/build/BUILD/nss-3.79/nss/tests ~/build/BUILD/nss-3.79 + export NSS_DEFAULT_DB_TYPE=dbm + NSS_DEFAULT_DB_TYPE=dbm ++ rpm -q nss-softokn + soft=nss-softokn-3.79.0-4.el7_9.aarch64 + soft_minor=79 + nss_soft=3.79.0 + nss_soft_minor=79 + export 'NSS_CYCLES=standard pkix upgradedb sharedb threadunsafe' + NSS_CYCLES='standard pkix upgradedb sharedb threadunsafe' + export 'NSS_TESTS=libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec' + NSS_TESTS='libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec' + export NSS_SSL_RUN= + NSS_SSL_RUN= + export NSS_SSL_TESTS= + NSS_SSL_TESTS= + '[' 79 -lt 79 ']' + HOST=localhost + DOMSUF=localdomain + PORT=9223 + ./all.sh ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 testdir is /builddir/build/BUILD/nss-3.79/tests_results/security init.sh init: Creating /builddir/build/BUILD/nss-3.79/tests_results/security ******************************************** Platform: Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ Results: localhost.1 ******************************************** init.sh init: Testing PATH .:/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/sbin:/usr/local/sbin:/builddir/.local/bin:/builddir/bin against LIB /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib: Running tests for cert TIMESTAMP cert BEGIN: Tue Sep 27 19:15:22 UTC 2022 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #79: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #80: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #81: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #82: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #83: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #84: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #85: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #86: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #87: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -f ../tests.pw cert.sh: #88: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #89: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #90: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #91: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #92: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #93: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #94: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #95: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #96: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #97: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #98: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #99: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #101: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #102: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #104: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #105: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #106: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #107: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #108: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #109: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #110: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #111: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #112: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #113: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #114: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #116: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw cert.sh: #117: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #118: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -i ../CA/TestCA.ca.cert cert.sh: #119: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #120: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -i ../CA/TestCA-ec.ca.cert cert.sh: #121: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #123: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #126: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #128: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #129: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #130: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #131: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #132: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #133: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #134: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #135: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #136: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #137: Generate RSA-PSS Cert Request for TestUser - PASSED cert.sh: Sign TestUser's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30070 -v 60 -d ../CA -i req -o TestUser-rsa-pss.cert -f ../tests.pw cert.sh: #138: Sign TestUser's RSA-PSS Request - PASSED cert.sh: Import TestUser's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #139: Import TestUser's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #140: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #141: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -i ../CA/TestCA.ca.cert cert.sh: #142: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #143: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -i ../CA/TestCA-ec.ca.cert cert.sh: #144: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #149: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #152: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #155: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #158: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #160: Generate RSA-PSS Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30100 -v 60 -d ../CA -i req -o localhost.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #161: Sign localhost.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost.localdomain's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #163: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #164: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #165: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #166: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #167: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #168: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #169: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #170: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #171: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #172: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #173: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #174: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #176: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #177: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost-sni.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #178: Generate RSA-PSS Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #179: Sign localhost-sni.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost-sni.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #180: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost-sni.localdomain's RSA-PSS Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #181: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #182: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #183: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating database for strsclnt no login tests =============== cp -r /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/nologin cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -W -d ../nologin -f ../tests.pw -@ ../tests_empty Password changed successfully. cert.sh: #184: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -k ec -q nistp256 -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server Generating key. This may take a few moments... cert.sh: #185: Create orphan key in serverdir - PASSED cert.sh: Delete orphan key -------------------------- certutil -F -f ../tests.pw -k 437a81c47786b55963ac6593ce82a2d2f7559e94 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server cert.sh: #186: Delete orphan key - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server Generating key. This may take a few moments... cert.sh: #187: Create orphan key in serverdir - PASSED cert.sh: Create cert request for orphan key -------------------------- certutil -R -f ../tests.pw -k ad155488c8fb0c8c2451bf7324160af365cb8b96 -s CN=orphan -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/orphan.req cert.sh: #188: Create cert request for orphan key - PASSED Certificate Request: Data: Version: 0 (0x0) Subject: "CN=orphan" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:24:5e:fa:9c:8c:20:c1:2b:18:48:a9:48:b7:3b:0b: 8a:da:a3:15:a8:a5:35:69:f9:83:15:d9:7b:4b:d7:28: cc:ca:71:a5:5d:56:29:fb:31:53:d9:5b:31:cd:20:f7: 09:9d:e6:97:aa:a3:52:10:d9:01:1c:7c:7f:28:46:ce: 21:cf:24:fa:12:e3:09:74:c8:82:6a:cf:a7:ab:0f:9c: d3:3f:7b:38:d0:fb:7b:53:ee:59:1a:f5:c4:a2:2f:e4: 51:d4:d9:ef:4e:f4:0e:06:25:9a:76:2f:ad:56:d6:b4: 1d:af:04:3b:68:a0:30:33:28:69:bd:cf:fc:bb:01:a4: c5:4f:35:92:ec:95:90:c4:cb:6c:70:0f:f3:12:bb:e6: 2d:1c:43:24:9b:16:ce:ce:e1:4a:a3:d9:cc:1f:a7:37: 48:32:94:03:c2:9f:de:b6:28:66:0e:e1:b6:e8:2b:81: 47:e5:e2:70:04:be:36:e5:e8:7a:de:e6:be:8c:38:0e: 5c:b6:32:bb:8a:be:32:d0:92:a7:a4:e8:1e:ef:c1:ce: 44:95:0e:3c:f8:35:75:aa:52:48:ba:50:73:60:ff:8b: d5:a4:b4:6c:98:6c:a1:a6:c6:f6:cc:ff:c0:a7:22:44: 19:33:04:ba:11:3d:67:b7:6c:e8:fa:ff:df:44:0e:8f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:3d:ac:f1:5d:23:61:19:b6:a2:69:78:7e:ac:9c:ce: c3:70:b6:ef:20:d9:50:f3:29:c7:ec:f4:71:06:2e:c3: 14:44:dc:44:73:6f:6c:a9:83:e0:b5:ae:0b:b4:5d:e7: 60:5a:5e:8b:7d:5c:71:86:b8:6a:a7:d7:b2:37:5f:ff: 6c:b7:2f:75:86:31:ef:6d:04:97:a3:bf:26:38:55:df: 74:4e:41:18:c4:33:fa:1d:a3:ab:41:f5:22:d0:ed:33: 12:f2:6d:31:45:66:dd:f1:61:f6:c8:5e:bc:76:6a:45: b0:7e:df:72:43:70:df:cf:96:fd:9a:75:43:8a:64:d5: 58:16:8e:39:47:e8:a3:ce:35:73:5a:5e:69:76:1d:dd: e9:e4:20:25:5d:21:95:11:f0:15:f4:67:31:57:25:e5: 2c:af:59:ef:af:69:82:71:7c:cd:df:16:6c:64:80:86: c2:6f:3c:d4:46:d2:ec:3b:b6:8a:82:10:38:95:83:a1: bd:64:18:80:0c:0b:74:c8:91:f9:b6:2d:c1:ab:94:8e: 00:e8:23:b3:20:1a:78:de:f8:1a:dd:37:50:58:8f:fb: 8a:ba:6a:3e:20:1d:74:74:27:02:72:9c:62:09:9f:c7: f3:6d:db:8a:b3:f4:cf:c4:de:1c:76:9a:45:37:ce:4e Fingerprint (SHA-256): DE:79:1D:52:84:50:82:88:1C:76:EF:45:97:82:49:AA:92:B2:83:48:E6:D5:54:32:45:F5:2C:B3:42:CD:18:C0 Fingerprint (SHA1): 78:24:68:D7:CA:E1:B6:3F:02:FC:B5:BE:C9:15:CA:DD:15:83:BC:55 cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw cert.sh: #189: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #195: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #198: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #204: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created Importing RSA-PSS server certificate Import Alice's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #209: Generate RSA-PSS Cert Request for Alice - PASSED cert.sh: Sign Alice's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30030 -v 60 -d ../CA -i req -o Alice-rsa-pss.cert -f ../tests.pw cert.sh: #210: Sign Alice's RSA-PSS Request - PASSED cert.sh: Import Alice's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Alice-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #211: Import Alice's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Alice's RSA-PSS Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw cert.sh: #212: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #213: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -i ../CA/TestCA.ca.cert cert.sh: #214: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #215: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #216: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #218: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #221: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #224: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #227: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #229: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #230: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #231: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created Importing RSA-PSS server certificate Import Bob's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #232: Generate RSA-PSS Cert Request for Bob - PASSED cert.sh: Sign Bob's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o Bob-rsa-pss.cert -f ../tests.pw cert.sh: #233: Sign Bob's RSA-PSS Request - PASSED cert.sh: Import Bob's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Bob-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #234: Import Bob's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Bob's RSA-PSS Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw cert.sh: #235: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #236: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -i ../CA/TestCA.ca.cert cert.sh: #237: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #238: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #239: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #241: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #244: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #247: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #249: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #250: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #251: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #252: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #253: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #254: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created Importing RSA-PSS server certificate Import Dave's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #255: Generate RSA-PSS Cert Request for Dave - PASSED cert.sh: Sign Dave's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o Dave-rsa-pss.cert -f ../tests.pw cert.sh: #256: Sign Dave's RSA-PSS Request - PASSED cert.sh: Import Dave's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Dave-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Import Dave's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Dave's RSA-PSS Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw cert.sh: #258: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -i ../CA/TestCA.ca.cert cert.sh: #260: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #261: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #262: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #263: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #264: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #265: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #266: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #267: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #268: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #269: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #270: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #271: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #272: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #273: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #274: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #276: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created Importing RSA-PSS server certificate Import Eve's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #278: Generate RSA-PSS Cert Request for Eve - PASSED cert.sh: Sign Eve's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30060 -v 60 -d ../CA -i req -o Eve-rsa-pss.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #279: Sign Eve's RSA-PSS Request - PASSED cert.sh: Import Eve's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Eve-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import Eve's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Eve's RSA-PSS Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #281: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #282: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #283: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #284: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #285: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #286: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #287: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #288: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips -f ../tests.fipspw cert.sh: #289: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #290: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #291: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Setting invalid database password in FIPS mode -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips -f ../tests.fipspw -@ ../tests.fipsbadpw Failed to change password. certutil: Could not set password for the slot: SEC_ERROR_INVALID_PASSWORD: Password entered is invalid. Please pick a different one. cert.sh: #292: Setting invalid database password in FIPS mode - PASSED cert.sh: Attempt to generate a key with exponent of 3 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 3 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #293: Attempt to generate a key with exponent of 3 (too small) - PASSED cert.sh: Attempt to generate a key with exponent of 17 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 17 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #294: Attempt to generate a key with exponent of 17 (too small) - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@example.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #295: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eccurves -f ../tests.pw cert.sh: #296: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #297: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #298: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #299: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #300: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #301: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #302: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #303: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #304: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #305: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #306: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #307: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw cert.sh: #308: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #309: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #310: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #311: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #312: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #313: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #314: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #315: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #316: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #317: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #318: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #319: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #320: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #321: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #322: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #323: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #324: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #325: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #326: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #327: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created Importing RSA-PSS server certificate Import TestExt's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #328: Generate RSA-PSS Cert Request for TestExt - PASSED cert.sh: Sign TestExt's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30090 -v 60 -d ../CA -i req -o TestExt-rsa-pss.cert -f ../tests.pw cert.sh: #329: Sign TestExt's RSA-PSS Request - PASSED cert.sh: Import TestExt's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestExt-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #330: Import TestExt's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestExt's RSA-PSS Cert Created certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:af:bd Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Sep 27 19:17:15 2022 Not After : Tue Dec 27 19:17:15 2022 Subject: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:b1:42:b2:9a:8d:cc:cb:3c:aa:98:4e:89:b6:6c:dc: 56:97:ee:ae:3c:30:dd:78:28:8a:92:a7:eb:9c:98:3c: e5:ed:94:b0:51:27:92:8a:c2:e6:c3:ca:9d:60:4d:9b: dc:51:93:a4:7a:f6:d5:98:5e:03:2b:5a:87:2e:d6:28: 2d:22:a7:93:99:62:e7:27:84:26:f8:14:03:e3:9d:96: fd:f1:4f:a5:82:41:1d:3d:15:af:8f:09:ac:ab:db:3e: 81:bc:89:d4:0c:67:d2:85:bb:6d:6b:b3:ab:4f:dc:cf: 04:f5:e3:44:d9:85:c9:19:5f:87:98:bc:6d:32:09:a0: 52:a0:ca:23:5b:c7:0e:3d:89:ed:84:a6:44:ca:6e:43: db:86:be:06:88:ca:10:41:49:3d:d1:50:01:93:4d:24: 5d:a6:b2:b5:aa:13:46:d4:6e:9d:06:0d:e6:b9:83:bd: 43:f2:51:c5:16:92:91:01:96:62:1a:19:0d:e7:ca:1d: 1c:b7:f5:05:f8:84:74:17:d7:1f:97:14:b2:8a:ef:41: 17:bb:26:f4:72:9e:28:a2:ee:e2:12:7d:08:fd:60:5f: eb:f4:bb:32:1d:6b:4a:d6:51:e4:04:05:ca:fe:4b:56: 18:83:03:57:4a:de:fa:43:5c:f7:ad:e1:d7:4b:ea:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:54:77:27:2a:62:c6:ea:19:c7:eb:f8:ea:36:ae:86: 71:21:e5:75:99:28:4d:51:e2:51:b2:46:53:42:d7:28: 13:49:28:23:b5:7a:6f:67:a4:32:69:d1:45:37:b7:db: 6e:f8:1f:0c:91:ab:01:69:9d:7c:fe:58:ed:29:e7:a9: b7:f5:9c:25:09:9a:d7:09:b3:c7:8e:e9:1b:13:20:83: a0:d2:90:b5:31:39:f7:ab:dd:5c:71:03:94:4c:eb:dd: f5:c1:80:19:27:d5:8c:c7:35:90:d1:2c:fa:6e:9d:f7: 46:cd:05:ae:a0:a5:d6:ea:fd:f1:3d:e4:fe:93:84:c1: 9f:b1:f2:e2:29:55:f5:75:3c:60:c9:70:7b:a8:f2:cf: db:2c:22:28:dc:18:c7:e6:69:a6:f8:37:13:7a:06:a1: 0c:ba:20:53:7c:d8:23:65:62:fb:93:39:81:45:f5:19: 88:c4:88:67:58:15:de:35:d0:81:38:0a:6b:a5:24:2d: d8:d0:20:ea:c2:21:5e:bb:b1:69:37:c5:1e:88:08:ce: 7e:1c:69:58:1d:7c:9b:56:d5:7f:6b:f8:b7:28:5b:57: bd:96:2f:02:23:f7:9e:86:34:bf:75:f8:26:85:a5:59: 45:46:08:69:c9:e6:be:78:24:6a:c6:ef:52:9d:ce:c0 Fingerprint (SHA-256): 49:9E:61:64:BF:B9:A8:5D:FA:32:0E:A8:92:9B:97:23:4F:B1:91:87:AF:A1:F2:0E:6B:78:5F:2A:CF:BF:EC:57 Fingerprint (SHA1): C8:C3:98:19:EB:C7:25:F4:BD:0D:2D:61:86:FF:86:98:E3:B6:96:0A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #331: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:af:bf Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Sep 27 19:17:16 2022 Not After : Tue Dec 27 19:17:16 2022 Subject: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:db:94:17:e9:7e:7c:1f:d9:c2:85:1d:0d:49:7f:de: 34:00:0f:06:b8:06:54:c0:59:9c:b9:c9:a9:d6:2e:4c: 14:d0:c3:75:6f:4e:60:aa:00:e1:42:51:cb:d4:62:31: 6e:f2:af:cc:94:de:75:7d:73:67:8e:0d:9e:3e:85:8e: 84:01:e1:a7:02:48:84:c4:85:0f:de:24:69:1b:a5:e3: 34:d6:70:90:bd:fc:ce:9a:43:29:d3:2f:13:b2:fd:93: 3a:c7:66:a1:82:3e:fa:ce:ed:f7:86:30:7b:04:a5:e0: 7b:97:3c:4a:43:9a:1b:07:67:a3:54:fd:b8:b0:44:e0: 7e:6b:55:77:da:8f:6a:00:c6:a4:dd:13:d4:3d:c7:ba: 1b:32:ca:b3:40:19:bc:2e:b7:75:6d:b0:a7:8c:24:d1: c3:df:11:fb:66:27:87:34:fa:6f:08:63:c5:40:3a:38: 40:d0:c3:98:5c:7b:a2:e6:96:64:44:93:5c:93:25:4a: a5:7f:dc:5e:1f:0d:f1:71:55:e3:dc:0e:1e:fc:4c:88: a7:b3:24:7e:95:fb:85:ac:3d:b7:63:ed:26:94:de:ba: 96:aa:c2:95:61:46:2f:c9:21:35:c9:68:37:b5:39:b8: b5:69:0c:97:74:6f:aa:23:79:99:bb:20:97:4c:bc:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:e4:3a:9a:dc:64:04:d4:a7:c9:91:f3:7a:b4:37:1a: ca:94:92:2e:72:bc:a0:fa:2c:0f:19:89:ec:90:64:00: 5a:88:b7:4d:dd:83:1a:a4:97:fd:2d:28:42:f6:4b:05: 99:23:b6:70:59:31:38:66:da:80:9d:ca:67:56:42:4c: 66:3f:9f:4a:07:30:2e:8e:8e:ff:39:57:0b:08:96:34: bc:fb:3c:8c:89:81:1a:08:0c:99:d9:4c:aa:dd:b2:c1: b0:d3:3e:f8:0d:61:ee:a3:4b:41:70:76:64:80:6e:9c: ab:d2:39:04:a8:b3:4a:fa:3c:5c:47:c1:7c:d4:b2:cb: d6:58:8d:fb:e4:99:1c:8c:5d:8f:e0:d8:50:db:59:f7: 53:57:2c:3d:f8:26:1a:77:8d:67:4f:bf:26:a3:64:f1: 5c:78:a0:3d:6d:bd:e6:63:7e:e8:f2:e6:f1:7a:da:f4: 82:77:69:4b:e5:eb:98:8a:26:5e:bc:4a:bf:4e:af:2b: ac:df:35:ac:c6:f9:4a:40:48:e3:79:12:39:49:d3:d2: 0f:03:6a:c9:64:98:c5:9a:8b:c4:23:07:46:35:04:84: db:ad:c3:7d:85:14:f9:c1:66:07:be:4e:06:06:22:00: 3b:00:92:a7:c6:ff:c8:5f:dc:cd:74:a9:7d:ea:ed:c6 Fingerprint (SHA-256): 0C:50:A8:43:7D:1E:29:4E:DB:BB:FD:57:03:66:4C:AA:1A:8E:FE:B5:59:FC:EC:C5:9C:E8:45:B4:37:61:EC:4A Fingerprint (SHA1): 2A:72:48:33:68:05:B6:BE:95:C0:16:74:CD:71:39:FC:A9:EA:E8:12 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #332: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:af:c2 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Sep 27 19:17:18 2022 Not After : Tue Dec 27 19:17:18 2022 Subject: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:e8:8a:a9:f2:98:5d:53:a1:96:bb:f0:2f:ab:59:5b: 5c:9e:88:19:28:db:b3:d8:db:94:49:1b:b9:a4:10:ee: d8:c9:45:94:30:aa:dd:79:c5:58:24:bc:e7:ea:7e:d8: df:3e:dd:92:23:de:29:a8:e9:56:a8:c0:96:49:14:6d: d4:2e:55:37:cc:50:70:16:21:06:7c:88:17:b8:b1:ad: eb:b7:4a:81:2e:83:9e:82:c7:bd:ff:1b:14:f0:68:30: 4b:7a:32:59:71:5f:eb:b9:7c:37:48:53:e5:b2:a0:6b: 5b:aa:de:62:dc:9a:3a:f9:cb:55:75:92:cc:68:a1:f8: 7c:4c:b2:16:6b:fa:56:4c:b9:50:b9:cc:ce:68:c6:85: c0:c1:fe:b3:e9:06:2f:83:bc:9e:14:1b:ee:2f:d6:ed: fd:65:ed:03:85:d0:8d:01:fe:61:51:86:df:0e:79:91: f8:b7:6f:19:91:16:e7:f7:25:8a:77:30:d1:52:98:52: cb:d6:bb:cd:66:77:49:47:6e:a3:bc:e7:b6:1a:5c:b2: 50:a9:1e:ae:d4:21:c2:bb:92:65:01:da:71:73:d1:3d: 9f:20:d2:2f:74:85:77:6f:32:7c:12:0d:98:69:d2:24: db:24:fd:54:fa:ae:64:33:86:0a:19:2a:d9:40:48:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:08:e9:cd:93:18:b9:1b:11:c1:31:a1:6a:41:60:02: 3f:68:cb:c2:3b:38:5e:62:a6:3f:95:fc:0d:8a:50:7e: fb:c0:7a:67:34:f7:16:c7:8e:07:7b:4b:5f:00:cb:b3: 01:ea:7e:8f:e1:5e:5c:95:83:a5:e3:12:ef:63:79:e0: 09:a1:9d:c2:19:c3:ac:d0:d2:08:ca:57:15:88:6b:49: ab:68:cf:07:e2:40:2a:8d:29:8c:33:06:9e:eb:9c:66: aa:a6:3b:26:54:fa:18:71:08:da:0a:9d:52:f4:77:06: af:09:c3:17:ec:47:af:ce:06:53:a6:a7:63:df:6d:7f: 44:fa:94:30:c7:46:68:66:92:2c:03:6f:a3:00:9e:e0: 85:35:c6:6d:a4:49:3a:c7:0e:b2:5e:cf:e8:9b:84:c8: 47:82:ad:e2:76:37:e5:e5:6c:39:77:b4:e1:c4:af:e4: 69:1a:55:1c:6f:f0:d0:3c:66:73:52:66:72:2e:58:39: 83:74:1f:7c:64:f7:6d:f3:c5:b7:12:14:3a:38:86:f8: c7:39:0f:fe:f2:59:3c:e9:0c:ce:fd:a1:55:eb:ae:ba: f1:4d:6d:49:ee:9d:ec:5c:9f:d0:8c:8d:2e:13:59:5c: 7d:e2:1a:94:0d:75:d6:8f:c8:49:62:15:71:70:0b:db Fingerprint (SHA-256): 11:5D:2F:AC:40:C9:C7:F3:47:4E:79:9D:B3:C7:5F:71:69:9C:47:CC:1E:C4:8E:F0:B7:9B:19:61:F9:D4:AF:CD Fingerprint (SHA1): 87:19:00:53:02:03:B5:B8:29:5E:0A:90:38:73:5C:00:8B:FA:70:D5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #333: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:af:c4 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Sep 27 19:17:19 2022 Not After : Tue Dec 27 19:17:19 2022 Subject: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:39:38:20:48:00:5d:1e:1f:65:38:71:6f:1c:cf:24: 8c:7a:ac:48:fb:d0:9a:76:bd:b4:ec:d9:c1:1e:58:bb: 16:b5:53:cc:6c:39:c8:80:54:b4:32:54:03:58:c9:c3: c9:3d:65:10:3a:7a:4d:2c:3b:8d:d6:34:5a:a8:6f:27: 50:72:f1:64:10:3c:ad:9d:b5:2b:7b:28:59:ba:d1:38: 11:d4:69:54:e5:07:0c:d0:23:2d:f3:25:37:27:9a:11: ea:43:b7:06:5a:81:b3:0f:e7:d7:99:5f:ce:5e:3a:c1: 23:d6:85:49:73:10:87:3b:a4:a8:cb:10:8d:12:64:e2: e1:79:4a:3e:e5:25:92:3b:db:b1:ec:49:f6:6e:a5:78: e9:87:ba:b3:74:99:8e:68:41:e6:ac:cd:65:de:70:a0: 5e:d9:cc:43:52:a5:a4:9e:d4:69:14:20:d1:80:f6:e1: 99:bf:5e:4a:c5:3f:24:c4:e2:43:1f:0b:dc:c7:2a:21: a9:e7:a9:9c:45:be:13:cd:1b:c7:bf:14:d3:94:fa:0f: 04:7b:5e:7c:4c:2b:cb:59:9c:08:1c:bf:ea:7f:c7:06: 33:84:b7:6b:df:95:06:62:9c:c4:bb:c2:b6:6b:79:6e: fd:2d:6b:9a:fd:a8:38:aa:2f:6e:c0:53:c6:18:b4:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:c4:97:c8:b7:00:b2:60:d0:0e:fa:ea:02:b5:22:09: 32:58:48:0d:86:2c:39:13:9d:0c:63:a2:fc:76:89:e3: bf:26:cc:38:00:2b:d4:a2:c7:c4:3c:c5:21:6a:4e:13: 56:f7:89:3d:53:a1:c0:9e:6e:3f:85:e6:a8:e8:b7:50: 64:7a:17:35:df:1c:80:28:80:06:e5:28:b1:28:74:08: cd:7a:39:14:82:b4:4e:f8:1e:48:9e:5a:74:9b:2d:95: da:5c:3a:12:26:7a:27:e6:b1:f5:e6:59:ce:28:c2:5c: 54:77:df:25:cc:ed:f6:46:3d:db:fc:58:49:3b:fc:e3: e2:af:51:5b:04:bc:37:63:34:d8:05:35:c2:56:08:d8: 1b:71:71:bc:cc:b6:ea:90:48:08:84:30:ea:d5:69:57: cd:f8:44:c7:1c:1a:e7:2a:d5:27:34:59:64:f7:58:ff: 15:3d:b3:23:12:0d:d0:2b:7c:25:46:25:a3:13:d3:c2: bb:1f:7e:4a:67:3b:6a:39:9e:c9:b6:2e:ca:03:ba:63: 61:5a:71:d1:b6:5c:48:29:bf:9f:41:f2:8c:77:b3:7f: 44:ff:0e:c0:b4:a2:80:a5:57:85:a0:2d:4f:55:6e:5e: 57:e3:cf:97:21:9c:c0:29:ad:03:2e:79:5a:30:07:fc Fingerprint (SHA-256): 7A:AB:78:41:CD:D9:CA:85:40:1A:5A:FB:15:B0:81:00:4E:B7:B3:F8:BB:AA:75:89:49:7A:3C:E2:4E:B9:2F:61 Fingerprint (SHA1): 87:B7:DF:93:FF:BC:2A:1F:22:21:21:2D:CD:C0:FD:EA:12:59:8F:A5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #334: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:af:c6 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Sep 27 19:17:21 2022 Not After : Tue Dec 27 19:17:21 2022 Subject: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:1f:56:d7:92:d7:50:7b:6f:f7:cc:4d:56:e8:62:44: 6a:d0:0f:62:42:cd:84:fa:4d:e9:ee:8b:72:44:95:10: c1:42:47:1d:a9:61:ae:f8:77:5a:16:4e:5b:a1:e8:0f: 6f:02:63:07:b8:d1:9e:21:e3:46:73:75:26:2c:47:95: ef:57:c4:77:61:14:45:92:b7:72:99:b4:87:28:90:ab: 1d:67:ea:4b:ee:78:9d:ae:89:03:7d:50:d3:1d:8e:80: 25:74:a9:67:9f:ad:06:1c:e5:bf:f8:9f:a0:a6:62:43: a9:57:74:90:36:cc:6d:bc:6f:4f:89:8e:c1:64:02:15: 9f:0f:91:f7:6c:aa:c6:cd:36:a4:b2:66:39:44:b4:11: cc:71:64:dd:c6:b1:6c:90:4a:47:6a:fb:6b:17:a8:fc: 8a:f0:42:7e:00:c3:59:1d:f0:40:62:6a:46:a5:1d:93: f4:fd:40:ee:45:91:e2:94:39:5d:19:e1:2a:1d:d3:2a: 1f:7a:b4:cc:a9:a8:c9:c8:2b:93:97:64:90:89:14:05: 8b:60:e4:b8:64:35:2c:68:20:71:a0:0c:4a:67:ee:d2: 9e:5e:75:08:f1:d4:9a:f7:8f:00:e5:99:38:d3:ce:84: 65:8a:59:c1:10:d4:2a:e5:11:aa:d4:93:64:96:0e:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:b0:c9:ba:cb:cb:a3:15:67:2d:e0:27:06:f2:a0:4a: e1:2c:90:e6:de:35:bc:52:07:39:4b:0f:cc:1c:e9:7c: 3a:b1:ec:f2:d3:ed:a4:44:d7:91:86:7b:b2:7d:62:ed: f7:28:b4:d1:f7:5f:18:5d:60:92:0f:c3:04:49:53:6d: 45:cb:a8:a3:f8:3e:5e:c1:8b:e4:78:0b:60:9d:72:6f: 81:de:e5:7a:91:02:fe:c6:62:39:01:c2:c7:ab:8e:23: 85:8d:40:43:ed:0f:9f:6f:f4:5b:40:e1:18:c8:65:43: 4d:0c:9b:64:11:3a:9f:c3:6d:27:cc:ae:c2:10:80:d2: 84:e5:3a:0c:19:4a:e6:90:bd:68:8a:be:11:e7:65:0a: cd:3e:1f:97:7b:cd:87:04:ee:73:3b:9d:42:96:5a:0c: 78:d1:1c:e2:b3:e0:d1:f3:88:f8:77:4c:23:46:a2:1d: d1:a2:ab:81:de:ab:08:c8:da:03:52:69:bf:ee:85:2b: 61:d4:01:c2:85:ce:96:0b:1b:40:42:d6:20:d5:ed:e0: e1:1f:bb:13:3e:c0:0c:be:38:c8:9c:bc:06:95:08:3e: 80:9c:f2:95:ed:04:60:aa:4f:44:a2:26:fe:92:07:16: 23:38:9a:f8:b8:ba:8f:5c:b0:42:31:53:2c:50:06:e4 Fingerprint (SHA-256): 59:7C:37:A7:D0:8A:8A:FB:C0:C1:21:8B:8B:C6:BD:AE:4D:22:64:E0:6A:F7:BF:F6:0E:D2:C0:FC:F7:7D:0F:0A Fingerprint (SHA1): F1:FD:1C:D5:18:85:58:FC:3F:2C:88:11:9E:BD:5B:B3:7F:65:19:5A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #335: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:af:ca Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Sep 27 19:17:22 2022 Not After : Tue Dec 27 19:17:22 2022 Subject: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:fb:af:8a:05:e2:ca:ec:5f:25:2f:0a:3f:cd:77:d3: 0c:7d:43:00:70:1a:7d:18:20:db:62:9d:ad:7d:45:c5: ad:57:e8:70:8f:00:1a:e7:88:33:1f:c1:63:1c:92:9d: 89:91:6f:85:ef:15:83:ad:87:35:21:2f:c8:6f:d0:fc: 6f:52:dd:04:64:b1:ae:ff:ad:e6:dc:d4:b6:45:74:ad: 2d:e0:52:cb:24:b1:d3:9c:7b:57:9d:a4:dc:0e:c9:45: 79:c6:e1:a4:b7:3f:a8:a3:54:d6:33:41:d8:16:e5:69: db:6c:80:a9:34:0c:8f:30:84:6f:13:cf:ab:01:30:25: 5d:54:2d:b3:a7:43:ec:4a:65:c8:49:0f:4f:ca:81:14: fe:60:31:e5:61:30:37:8a:c4:b1:21:b4:7b:91:fb:f0: f8:d6:00:f6:31:05:66:3a:85:c2:d3:2f:21:59:34:09: ec:b4:dc:18:e5:28:e7:97:1a:1a:da:31:95:25:be:24: 2b:ee:00:55:a9:60:36:a9:f9:8e:cd:83:01:af:c9:f2: 9c:ad:ac:d9:77:2c:5c:73:79:30:e6:9b:89:49:b6:a5: aa:ab:77:09:16:68:f6:a6:01:cc:bd:f0:cd:2c:b0:eb: 15:7f:11:27:ce:74:4b:29:bd:d4:21:5e:e1:8c:ae:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:0f:42:a6:3c:a4:2e:cd:62:ea:a0:4f:db:bd:27:76: d3:df:6c:6f:ff:ea:fb:7b:28:eb:57:04:74:91:c9:5f: 61:b7:f9:a9:a3:3a:fe:9f:4b:96:3c:a7:3a:fe:83:79: c7:72:57:66:9a:18:be:40:b0:88:95:5a:c7:a6:43:66: 78:17:6e:fd:1f:9f:d6:36:3e:8c:2b:48:d0:16:b6:46: 99:c5:f2:ff:49:13:74:76:65:28:68:48:10:0f:02:00: ff:db:e6:08:e6:db:30:f6:14:51:30:3f:e7:49:10:ee: 50:bf:b4:75:59:8e:4a:56:ad:ab:9d:98:3d:2f:5d:d1: 5c:be:6f:0e:73:79:68:b5:fc:cc:6e:bd:91:60:19:45: eb:0f:b8:fe:d3:e7:52:94:f3:18:35:2e:86:a6:0e:fb: 5e:7d:86:aa:81:e5:7b:7d:57:5f:80:c6:bf:22:b7:de: 72:4f:6d:e0:32:b9:f9:2a:8d:68:37:ae:88:cb:e2:80: 2e:3f:2c:dd:1d:57:4b:c9:df:68:15:e1:25:ba:f7:ac: 59:e0:7d:72:a6:7e:4f:f1:59:8d:8d:c0:af:cc:9d:d3: 06:ed:7f:52:2b:cb:47:10:77:29:c9:af:44:ee:7a:bd: 68:e9:54:b1:df:cf:fc:1e:97:ae:82:7d:09:de:88:f4 Fingerprint (SHA-256): 72:68:61:82:68:FE:02:6F:AB:9A:75:19:BE:1A:41:15:F4:51:73:C0:88:08:AF:E6:E1:C8:23:AC:E4:C4:8C:25 Fingerprint (SHA1): C3:3F:DD:B5:77:B4:8D:DB:D8:AB:39:63:83:EC:59:51:7F:3A:FF:DA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #336: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:af:cd Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Sep 27 19:17:24 2022 Not After : Tue Dec 27 19:17:24 2022 Subject: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:c5:28:f3:cf:20:69:dc:b4:e8:45:d5:b2:76:19:58: 2d:e1:a8:8f:d4:45:61:1a:1b:fd:1d:14:f5:a5:38:fd: e0:04:dc:72:6b:1d:22:0d:1b:8b:93:5a:77:d4:2e:ce: 29:f6:53:1a:9d:b3:cf:b5:eb:1d:59:32:96:6a:7e:ac: ae:67:a8:00:4c:3d:6c:95:fa:a0:e9:6c:45:d8:83:77: fd:45:c6:71:f2:b2:c4:05:ed:fe:6e:f8:a5:86:03:3f: 02:84:f7:08:04:8a:a7:aa:2a:b9:fe:3e:8a:ad:87:40: 1b:45:c3:d0:39:62:c8:56:d1:a5:cb:f3:c3:43:6c:c1: 89:df:10:48:aa:7e:40:b6:9a:10:13:b7:12:7e:fa:ac: 1d:25:07:a5:09:3c:49:7a:37:f7:e3:ec:e9:50:77:a2: 0f:a3:1f:74:b9:2e:be:9f:07:c4:b6:1b:f3:54:3e:b2: 7c:ca:e6:ca:b8:3a:2d:26:81:d5:49:08:5a:81:a2:51: 24:27:3b:bb:8c:ba:f3:e8:b6:46:92:c7:bd:79:34:56: f7:b6:31:65:81:10:52:9d:37:3b:27:97:46:fc:b5:f5: 22:e1:e8:6e:06:e7:9d:ad:91:18:1a:9b:84:ca:1c:53: da:c2:d5:31:47:7d:b7:42:0b:d3:d0:84:67:89:c0:69 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 64:b6:2a:34:07:84:01:0b:95:7e:bc:f5:e8:fa:f0:93: 95:56:01:3a:94:3d:d9:1d:1f:c2:66:dc:82:bc:6d:2f: 66:fa:9c:6f:ba:a3:90:aa:6e:4b:50:90:cf:a4:e4:ff: 93:8d:f1:42:08:8a:53:8a:3f:01:d8:39:28:75:e5:0b: 6a:23:d0:92:83:90:16:c8:21:83:e6:12:a2:bc:d5:05: 22:48:68:7d:10:08:f3:bf:da:80:7b:4e:a3:88:d9:ea: f6:b2:44:40:61:b7:66:8b:5f:b2:ae:e2:b6:4a:74:b9: de:e3:f4:b0:fc:4e:da:37:7e:6f:06:1d:0f:61:7f:18: 65:c9:d6:21:00:2f:5b:78:02:94:21:89:6f:b3:77:b7: 72:0b:18:aa:07:4d:2a:9e:7e:e3:8f:21:0f:9c:b2:19: cb:84:e9:5c:15:42:a1:14:c0:e8:e0:6c:31:8b:1a:9b: 37:c1:d8:13:93:64:46:5e:44:96:ca:5a:4a:c0:a4:2e: 34:31:82:f2:7c:4d:21:9e:83:86:2e:24:fc:1a:76:3d: 88:13:e5:0e:6d:b2:1a:b0:fd:a9:e2:ae:52:f4:80:a0: e6:3a:14:ee:b9:48:45:27:b0:0d:2f:b6:a0:62:ae:54: 4e:4a:49:7b:c7:8a:a1:15:7d:95:a7:46:25:fd:4f:a7 Fingerprint (SHA-256): 6A:C8:02:06:37:50:EC:50:1F:9B:31:3D:DD:8D:80:A0:CB:BC:85:E4:09:86:F3:79:7F:72:37:36:5D:C0:65:D6 Fingerprint (SHA1): A6:20:7C:38:DA:1E:AE:E1:29:92:D8:D5:A1:86:8E:17:C0:BB:F7:B4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #337: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:af:d0 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Sep 27 19:17:25 2022 Not After : Tue Dec 27 19:17:25 2022 Subject: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:bd:26:8d:a2:de:fc:89:3c:c2:ae:78:0d:30:dc:74: 4c:ac:03:cf:7f:8d:10:0a:0c:69:49:22:0a:08:7c:27: e1:2b:b6:d2:07:4a:76:2c:9c:af:2a:1c:1a:24:d7:fe: a3:6e:25:2a:a0:8a:de:f4:2f:cf:93:fa:5b:6c:16:2a: 4f:66:67:cd:51:b9:53:b7:d0:9e:a2:a3:b9:9e:74:57: 66:fb:d4:3d:71:08:0f:2f:07:98:3b:26:6e:b8:30:ce: c1:dc:df:1e:83:f4:b5:e0:8a:b3:b0:05:55:51:f6:0b: a8:77:6b:bf:e2:6a:3e:ed:76:c6:09:43:f9:a7:2e:d9: 02:32:cc:fa:c7:48:0b:00:90:c2:14:f4:7b:21:d0:b6: 45:c3:8b:a1:fe:6e:89:ef:46:99:74:e7:da:f5:ed:4d: b1:1a:12:e3:63:e1:23:0a:ec:ec:c2:f5:3c:f1:97:f4: 21:e8:5a:e3:e1:b0:ad:d4:c2:e3:be:c6:91:c6:2c:75: 35:9f:17:03:01:03:33:b6:51:b3:63:13:99:c0:36:0e: f0:2b:25:64:99:1e:d4:53:2e:b1:e8:f2:d1:5c:22:42: 84:2c:92:1b:72:6c:20:e4:ca:f0:ed:51:96:c1:91:c7: 16:8b:65:04:79:0b:ef:f1:58:d8:2b:4c:d6:24:e0:3f Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 86:eb:87:18:51:b0:88:1f:78:d1:60:8d:ad:b0:19:5c: b1:70:39:99:ce:a5:f5:4f:2a:2a:48:b8:b8:c9:ad:1d: c0:66:6c:81:30:e5:26:ec:90:9f:d6:0c:15:b3:35:00: ff:32:16:4c:74:29:44:2e:1e:b1:61:6b:19:81:44:53: b1:ca:e2:d4:85:d2:0f:4e:c9:3f:40:70:fa:c4:7c:f5: e5:e1:04:05:10:f3:8a:0a:df:28:31:60:07:65:25:2f: 9b:e5:72:ac:20:dd:8b:b9:19:44:a7:02:7a:aa:c8:73: 1e:b7:e2:cf:88:0d:69:93:b1:5a:36:17:77:0c:e4:27: 56:04:08:b5:52:1b:d4:14:94:64:9d:57:13:90:e9:c4: 3a:fc:7d:23:60:3f:03:63:e0:e8:e4:bb:ac:cf:63:fb: e0:43:b1:9f:b7:42:ce:4e:7b:2e:91:7d:cd:31:52:cb: de:a1:3c:51:a9:76:21:c7:a9:cc:04:7d:94:6e:44:36: 8d:94:7c:aa:77:94:8c:84:b5:ad:3d:e0:71:56:48:e4: 46:2b:9e:fb:0f:05:25:41:ba:a7:e3:41:70:03:1e:0d: 88:f7:0e:79:fa:13:d8:f1:2d:be:1d:50:e1:23:41:d7: db:fa:e3:27:d3:b4:54:b2:97:7c:f8:c5:3c:57:61:29 Fingerprint (SHA-256): F9:5C:C2:A9:BC:B5:7B:4D:89:C9:28:14:8E:52:69:84:BD:77:D3:B7:BB:40:8F:ED:F7:21:1D:3B:00:E8:2D:03 Fingerprint (SHA1): D9:43:6B:0E:DB:68:E9:64:F5:D9:2F:8E:84:1A:76:5C:46:14:83:C7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #338: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:af:d3 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Sep 27 19:17:27 2022 Not After : Tue Dec 27 19:17:27 2022 Subject: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:be:28:e6:ee:f4:eb:58:2b:0b:bb:af:35:81:d5:c3: 65:73:7a:b9:58:03:2f:82:42:4f:1b:db:7c:a1:46:7a: 12:6e:b4:72:67:fc:df:65:fd:19:3e:63:0c:9b:10:57: 3e:24:39:d1:7d:7e:95:24:39:51:f9:c5:e4:09:59:59: a7:dc:5e:9a:fc:ba:ec:aa:f0:09:f9:1f:ce:7d:2f:70: 12:b6:82:7e:e5:c8:57:ea:ef:9b:b3:90:c3:d3:b8:25: ed:52:26:f3:e9:67:d9:e4:ff:2f:5a:e1:f4:c9:d3:6a: 66:52:b8:4b:8c:16:ed:02:bb:cd:ab:f0:0e:59:f0:2c: 79:20:8d:e7:3a:04:a0:65:e5:d3:84:72:7a:77:fb:c2: 84:df:51:13:d8:82:be:f7:a1:8b:1f:57:8b:ed:c1:49: b0:e8:1c:ec:68:9a:d3:89:6b:a1:22:2a:e0:1f:ea:8b: 6d:13:1c:ff:5c:a8:e7:cb:56:bf:dc:61:52:1f:3e:81: 7a:bd:35:69:c5:0c:a4:29:4a:3f:b3:1d:eb:19:a3:df: c4:bb:7c:f6:8c:d3:9e:41:d0:7d:11:88:cc:10:18:5c: ec:85:b9:c0:05:8e:25:df:90:fd:09:36:31:55:7f:e2: 8f:90:c0:d4:b2:3e:56:62:43:f4:91:1a:bb:cd:0b:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:0c:74:f2:b7:ed:fa:36:70:f6:38:68:ad:c8:98:28: 63:ac:df:33:9d:1d:74:ea:5a:d2:3d:49:cf:01:c7:4a: 2a:fe:0b:af:43:07:b1:78:d3:2e:86:ec:c0:7d:5a:b1: 3b:7b:cb:8a:b7:6c:84:4e:ff:9f:ac:9c:b8:78:5b:af: a3:2b:eb:5b:24:05:21:72:12:a5:75:38:63:00:7a:fd: 64:32:10:21:39:d6:59:c2:55:45:d8:2a:13:a2:61:cb: c2:03:2a:2d:69:5f:d4:e6:a5:8f:db:5d:05:34:46:72: 78:64:9c:10:08:17:dc:4a:e5:40:d8:f9:a0:eb:f7:26: 2e:35:71:c7:1b:01:04:35:e3:4d:e7:16:80:10:cc:8a: 5f:74:1c:41:16:b0:ac:56:71:7b:dc:55:7f:e1:02:f0: f3:ff:fd:71:95:64:73:fd:3c:56:6f:52:bc:b4:6a:c6: bc:bb:8e:18:66:14:d5:fd:6e:28:bd:67:5f:91:dd:59: 10:ff:c2:28:59:35:bf:c5:70:f7:10:10:08:74:72:9a: 8a:5a:a0:0c:5a:3d:a6:35:39:1f:b6:b7:e7:06:e0:de: e1:f6:9f:4d:89:7a:25:cb:0c:36:51:df:ee:16:06:2e: 8d:d2:1c:55:7b:a8:96:d3:af:93:17:1a:9a:ee:b8:b9 Fingerprint (SHA-256): 3E:4A:98:6B:22:6F:82:1C:02:08:96:C5:12:A8:80:54:1C:D9:99:D1:82:E4:AF:2B:A4:1E:D4:88:E9:58:E6:06 Fingerprint (SHA1): 99:CD:CA:68:AD:AB:57:BE:BB:B8:AA:94:3B:80:DA:BA:33:2F:66:9E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #339: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:af:d5 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Tue Sep 27 19:17:29 2022 Not After : Tue Dec 27 19:17:29 2022 Subject: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:c7:8b:0e:c2:ef:40:99:5c:3c:c8:d5:17:06:00:3b: 80:99:1a:73:da:59:db:3a:76:2e:39:09:d4:16:f5:5b: 6a:40:96:dd:e2:75:1e:72:fc:12:b9:1e:c7:e8:71:e4: 39:2c:b2:da:70:b6:12:df:4a:98:69:85:f7:b7:09:aa: 50:bd:ef:6f:64:f5:07:4e:5e:8c:5f:8e:9a:41:18:f0: 4b:4a:c0:a6:ac:ba:9c:61:95:1c:9b:17:93:20:33:5a: 65:a8:63:db:70:eb:e2:4e:a8:30:ee:e0:92:62:ba:47: 00:64:e0:ca:a9:8f:8e:4e:41:06:91:5b:eb:dd:61:dc: 7f:ba:b2:a5:d1:49:04:8f:6f:55:ce:09:67:ff:70:a8: c8:46:28:75:fd:5a:7a:36:53:c7:21:02:d2:6d:41:1a: 72:de:49:52:a3:e3:4a:1c:48:6d:06:57:3d:38:03:6c: 72:cc:80:f7:2b:72:ce:6b:2c:54:b1:be:b9:05:dc:e7: 13:54:f9:f9:fd:78:cf:42:37:2e:f9:ad:a0:3d:a4:7f: 65:e4:78:93:d8:2e:55:d1:65:a4:79:eb:f8:74:6a:73: c8:bd:8b:1f:55:3d:bf:bd:3c:25:94:7e:0e:d0:b4:91: d0:ee:b6:34:9b:5b:df:c0:0d:83:df:a4:fe:b3:77:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 86:42:50:36:61:c8:35:92:9c:f1:15:37:50:22:03:9a: 07:f4:f0:1e:73:b4:9c:bf:34:00:fb:5e:7e:45:14:13: 0a:2f:cc:07:c8:c8:14:e6:e6:a3:d1:07:b7:b7:f6:6f: b5:a8:01:91:6a:73:d9:87:51:75:56:2c:97:b8:82:d9: 27:42:07:69:a9:bf:67:0d:b4:16:9b:04:fe:f7:8d:68: 0f:c3:eb:3d:fa:52:e4:26:5f:28:ed:4c:eb:31:cc:63: ac:2f:75:30:60:4b:f9:00:6c:05:cf:43:2c:00:f7:ca: 8d:7a:8f:e9:9c:7f:c4:76:a7:f8:f2:73:0d:a0:93:a1: ab:02:e9:b4:b2:d3:a9:64:2f:a0:84:17:93:b9:5b:b3: 86:1f:82:40:fb:a8:a2:6f:86:c9:1e:ff:f2:60:38:e8: 1a:53:cc:7e:35:a3:4b:59:d9:56:a5:98:c3:c2:39:a5: e9:5e:ab:34:5d:f9:f0:05:8d:aa:e4:9d:ae:ea:91:98: 76:85:31:8f:2a:c2:fd:05:3f:a1:91:b9:ba:94:c4:67: 46:b7:37:e6:bb:09:43:a7:a6:9c:39:00:1c:be:f3:24: 1a:b4:0a:2d:e3:ea:be:9b:84:81:be:de:e1:cc:17:69: ee:db:5c:4c:2e:dd:ee:47:cf:f5:f4:75:b0:b0:cc:aa Fingerprint (SHA-256): A8:9E:80:3C:F9:A0:D2:8F:79:69:54:DC:5E:49:F4:68:E9:CE:E6:C0:73:56:CB:49:0E:0B:C3:B4:E1:EF:76:7A Fingerprint (SHA1): 26:51:FE:99:7B:33:D0:71:4F:A1:47:A2:2B:C6:C5:6D:BF:A7:A5:DB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #340: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:af:d9 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Tue Sep 27 19:17:30 2022 Not After : Tue Dec 27 19:17:30 2022 Subject: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:f9:d2:dc:e3:8a:c2:55:10:32:10:9f:42:9a:70:67: cf:14:f7:6d:57:c4:e8:1f:c6:e9:4b:9a:c8:37:47:2b: 2c:4e:c6:ac:5a:35:4c:2e:0c:e8:ca:95:03:56:ec:8e: d4:cb:03:62:ce:b4:76:97:68:f2:3a:03:20:43:14:2e: 64:ab:0c:05:45:b1:2a:06:f2:55:b2:a5:e7:fe:4a:79: 95:1b:f5:8a:fc:6a:ba:f8:22:f3:05:8c:f0:55:e0:f3: b1:f2:70:7a:d8:17:3a:71:25:37:bc:c4:ec:68:54:5a: bd:c4:74:74:68:e0:37:a2:15:ad:4b:d0:30:5b:d4:b0: 8f:00:4d:f3:08:60:52:47:ed:5e:ff:98:1c:a0:c0:17: 7d:7e:02:24:c4:50:80:e5:85:70:70:69:2f:4d:dc:d2: 44:b9:90:3d:1d:45:1a:83:91:bc:a4:97:1c:5b:05:30: fb:38:fd:ce:d8:40:5e:6e:39:63:93:e0:68:d0:b9:94: 6b:69:b9:eb:14:66:1a:cf:6d:bf:90:95:a1:ad:5f:45: 8e:87:55:4b:5c:ed:b2:3a:cb:ef:62:fe:30:e3:42:61: b4:6a:8c:31:05:65:9e:87:dc:11:4b:c4:0f:c6:27:2c: 9e:77:5f:37:69:70:01:e4:15:c9:bb:1d:81:eb:dc:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:87:8f:fb:39:97:be:f3:5d:8f:74:f4:09:05:e7:9a: 6e:2f:13:31:73:b0:40:d3:d1:a4:3f:10:db:28:86:42: 8b:9d:0f:1e:1c:15:88:1f:2f:55:a4:63:9a:dd:93:95: 54:f2:d9:75:db:0a:88:0b:d3:65:9c:e8:bb:0b:74:22: 28:df:b3:f6:69:d9:eb:9a:fa:23:04:4e:85:ab:a7:d3: e0:d0:41:b8:c3:67:6e:96:42:53:00:b6:b7:63:59:0a: 51:4e:72:7e:e9:ba:e4:3b:1a:5e:27:ad:ae:ab:aa:0a: c0:51:7f:47:64:60:3e:12:cf:6f:f0:ba:01:81:42:99: e3:a2:67:d1:54:ed:2d:74:53:ee:7d:4d:e0:7f:04:47: c7:d4:79:4d:09:fa:1b:92:65:d2:bc:55:66:bf:08:06: 53:67:9e:f9:71:6b:d2:d7:83:8f:8f:fd:3b:84:b7:15: 9a:37:92:6e:41:73:15:a0:5d:4e:ce:20:cb:e8:c6:10: 71:4b:9f:f5:b8:fa:ad:ce:bc:f4:e1:70:53:57:30:52: 3e:99:61:49:4a:ee:12:04:93:cb:3d:5e:04:6f:a0:f2: 88:fd:27:e8:b2:69:92:6d:fc:71:f4:42:a5:9a:96:69: 9e:69:56:6c:91:7b:63:9d:bb:21:e1:44:8b:47:0b:c6 Fingerprint (SHA-256): 61:89:92:1D:F4:7F:AE:D5:6F:B0:2F:FC:7A:57:CD:3A:4C:44:23:D1:D0:1B:4E:5E:5F:B7:D7:13:4C:86:F8:AE Fingerprint (SHA1): 21:77:9C:EF:C3:AE:43:89:29:63:74:4F:C8:71:86:ED:0E:33:52:BD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #341: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #342: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #343: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #344: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:af:de Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Tue Sep 27 19:17:32 2022 Not After : Tue Dec 27 19:17:32 2022 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:a4:6b:80:be:9e:e5:3e:b6:3d:c9:a6:1c:ce:dd:fd: 21:90:74:5a:42:d2:31:29:1e:eb:57:ac:92:7c:7f:ad: 61:d9:d0:4c:89:da:43:27:f6:b2:e7:20:81:2a:15:7c: cf:a4:87:e6:dc:f3:7a:83:26:ff:0f:9e:c4:5b:4c:78: 9a:ef:b4:e7:7f:cf:ae:ae:5d:0c:fc:a5:a0:54:4a:40: f2:ec:2e:76:76:5b:d1:f7:8f:c0:98:7a:26:da:af:4e: f5:d7:66:b2:0f:d3:13:99:6c:7a:94:09:b4:86:7f:f4: 91:90:fe:0f:78:77:c8:e3:f4:be:3d:b4:18:6a:24:ff: 90:56:c3:ca:b5:92:01:89:ee:41:cd:b7:79:bb:76:b5: 9a:af:78:b4:98:8c:13:f8:38:88:6e:ed:59:08:cc:4a: 0c:4a:8b:8c:cb:55:51:40:da:a5:e4:24:b1:90:91:a1: 67:ed:1c:bd:8d:e2:8b:8b:5e:8f:89:5f:97:5f:e5:75: c5:bb:c5:bd:25:68:9b:f5:1d:05:7a:69:f5:a3:02:9c: 2e:8e:6f:85:0a:f2:d9:64:19:06:52:d6:67:e0:2b:bf: 94:51:b0:2e:e4:b9:f9:03:04:72:36:07:5d:17:84:2d: 42:2b:6b:17:7a:d8:0f:91:cf:8f:d8:4d:f9:03:fe:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:4c:b9:6b:94:0f:31:c6:4f:76:42:b8:bb:1b:0c:9b: cd:09:0d:27:a7:b5:80:71:cc:8d:35:15:f6:b0:65:84: a8:b9:d5:48:1c:2b:93:22:6a:3a:18:99:3a:c1:23:a7: 9f:57:ba:e8:d4:f1:4f:83:d2:0a:b0:4a:70:19:cf:d0: 0d:6c:a1:62:43:c9:a9:2a:5f:dc:45:1e:71:65:0a:f0: 80:3f:ed:ed:f9:ad:5f:31:c9:ad:4d:56:44:b1:cb:94: bd:c7:d3:80:58:6b:35:4d:5d:ea:aa:95:ab:63:3a:5a: 38:98:ee:72:8b:c3:c2:fe:c5:c4:3f:03:cf:c5:e2:1d: 40:28:20:62:a6:cf:c5:ad:0e:17:46:79:e8:b7:09:09: 10:b2:7f:d5:9d:66:8f:57:73:27:e9:5a:6a:7e:c3:de: 19:de:8e:9b:cc:87:8b:d6:b7:58:5d:69:c5:d9:5c:f0: 0b:32:18:6a:4f:24:6b:51:69:64:2d:d6:62:28:90:98: 91:ca:a9:53:b1:4f:42:2d:4a:5a:07:3b:e1:3a:b8:b9: f6:d1:4c:40:25:28:8f:01:3c:c6:65:80:f6:dc:60:8e: 5a:6d:72:1e:4d:69:64:7f:c5:88:3c:a7:ce:cc:93:e9: 22:ae:5c:88:22:fc:b8:32:62:a5:d4:bb:5a:3f:ac:0d Fingerprint (SHA-256): B2:15:36:24:EA:4B:AF:79:42:E1:69:1E:EE:61:21:9E:0A:DA:2E:B7:57:8F:FD:1D:1D:6C:D6:AF:E6:D9:E8:36 Fingerprint (SHA1): F8:C9:0E:3C:8C:D3:C8:48:79:60:84:C6:D6:C9:F6:3B:52:72:F9:45 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #345: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/sanext.der cert.sh: #346: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #347: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #348: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #349: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #350: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #351: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #352: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:af:e7 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Tue Sep 27 19:17:37 2022 Not After : Tue Dec 27 19:17:37 2022 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:76:93:70:ef:2a:33:56:43:f6:83:f0:ec:3e:0e:d0: a3:5e:fc:69:9e:7e:9f:2e:07:33:85:f0:b7:f6:2f:86: 28:2d:49:d1:e1:08:ef:c6:75:b2:3d:3b:0e:0b:00:fb: 4c:8a:6e:3b:52:66:d6:f9:ac:a2:de:b9:8c:a5:1f:93: 0d:72:24:d2:71:d0:55:7f:cf:f1:d1:73:87:5d:f5:d7: 87:7f:5d:b8:41:a8:32:fc:f8:76:ee:6f:16:9a:56:7a: e5:36:3f:9e:2c:51:a0:e8:5d:bb:0c:90:83:52:e6:75: ed:0e:e6:20:89:6a:a9:f6:80:0c:03:79:c1:6b:6a:00: 4c:04:7a:f7:4e:98:05:fb:b6:70:31:d2:4e:50:61:18: d4:7f:6b:13:55:5b:6d:51:7f:bc:b6:6b:73:a0:49:3d: bb:a4:11:5c:32:2c:a5:43:0f:b2:e2:23:13:a7:ca:5a: 3a:eb:ef:3b:f3:e9:0e:1f:c1:99:92:d0:94:b2:20:9d: 6a:4d:1c:95:ac:92:47:a5:03:0a:d6:ad:bc:b7:2b:74: c2:c6:39:e9:36:81:1a:d3:f0:7f:5a:4c:3d:51:a3:93: 5f:5f:60:5e:89:2d:f8:5d:39:c6:82:93:a5:52:e5:9b: a9:11:25:67:fa:53:df:0a:20:cb:29:a8:7f:0e:d9:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:05:d8:6b:12:45:b1:06:59:d0:ed:0a:5f:fe:68:08: ee:53:9e:59:f2:9d:24:d1:78:aa:08:8a:a6:e7:b0:8e: 22:3f:ff:9b:c2:66:4b:91:88:14:f9:1d:e7:d9:28:7e: bc:30:db:f2:c6:dd:76:0b:4a:d5:e4:67:0e:c4:03:5f: f6:6c:26:dc:9f:13:df:4f:e1:3e:88:a5:f9:2a:0d:5a: 62:32:cf:86:a6:cf:79:70:be:3f:3e:17:e8:4b:c7:35: 1a:d8:59:54:44:af:0d:be:ca:62:0d:e9:f9:2f:61:5b: 6d:60:08:4b:71:9f:30:b1:42:46:58:03:4d:e6:f6:51: 6e:c2:cc:ff:9c:cc:c7:a3:6d:af:66:fb:b0:67:bd:72: 37:79:c6:c3:8e:cf:2d:95:bd:82:1e:5e:c7:f7:4c:8e: 13:09:75:54:e7:1b:c6:55:fa:0f:2a:c2:03:a0:35:ca: 02:16:f6:e6:76:3e:c4:4a:e5:bb:a8:56:70:6a:63:a6: 6e:1e:e4:2f:c4:cc:e3:76:78:20:c8:18:94:6e:e3:ce: c0:8e:27:93:b8:11:f5:ad:e2:33:3e:22:01:77:a4:07: 12:7f:cb:c2:e4:42:66:4d:93:4a:be:cb:2a:9b:da:6d: b5:30:8a:43:eb:a8:4f:d5:1d:31:48:58:e0:cb:7c:7f Fingerprint (SHA-256): 67:79:F9:57:1E:6C:B7:00:82:42:87:A3:C7:F9:43:32:41:D9:57:91:8B:64:05:B2:08:8B:DD:2F:46:B0:F7:9B Fingerprint (SHA1): C2:A3:DE:09:DE:B7:A1:68:F4:28:3A:61:62:04:17:17:80:85:2F:01 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #353: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #354: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #355: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dbpass -f ../tests.pw cert.sh: #356: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #357: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #358: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dbpass -o root.cert cert.sh: #359: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #360: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #361: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #362: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #363: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #364: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -i ../CA/TestCA.ca.cert cert.sh: #365: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #366: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #367: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #369: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #372: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #375: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #378: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #381: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created Importing RSA-PSS server certificate Import Distrusted's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #383: Generate RSA-PSS Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 32000 -v 60 -d ../CA -i req -o Distrusted-rsa-pss.cert -f ../tests.pw cert.sh: #384: Sign Distrusted's RSA-PSS Request - PASSED cert.sh: Import Distrusted's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Distrusted-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import Distrusted's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Distrusted's RSA-PSS Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #386: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #387: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -o root.cert cert.sh: #388: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #389: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #390: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #391: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #392: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #393: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #394: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #395: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #396: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #397: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #398: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #399: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #400: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #401: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #402: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #403: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #404: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #405: perform selftest - PASSED cert.sh: Initialize Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw cert.sh: #406: Initialize Cert DB - PASSED cert.sh: Import RSA CA Cert -------------------------- certutil -A -n TestCA -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i ../CA/TestCA.ca.cert cert.sh: #407: Import RSA CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert -------------------------- certutil -A -n TestCA-rsa-pss -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss.ca.cert cert.sh: #408: Import RSA-PSS CA Cert - PASSED cert.sh: Verify RSA-PSS CA Cert -------------------------- certutil -V -u L -e -n TestCA-rsa-pss -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #409: Verify RSA-PSS CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert (SHA1) -------------------------- certutil -A -n TestCA-rsa-pss-sha1 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss-sha1.ca.cert cert.sh: #410: Import RSA-PSS CA Cert (SHA1) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -A -n TestCA-bogus-rsa-pss1 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestCA-bogus-rsa-pss1.crt cert.sh: #411: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss1 -u L -e -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #412: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -A -n TestCA-bogus-rsa-pss2 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestCA-bogus-rsa-pss2.crt cert.sh: #413: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss2 -u L -e -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #414: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss1 -------------------------- certutil -s "CN=TestUser-rsa-pss1, E=TestUser-rsa-pss1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #415: Generate Cert Request for TestUser-rsa-pss1 - PASSED cert.sh: Sign TestUser-rsa-pss1's Request -------------------------- certutil -C -c TestCA --pss-sign -m 200 -v 60 -d ../CA -i req -o TestUser-rsa-pss1.cert -f ../tests.pw cert.sh: #416: Sign TestUser-rsa-pss1's Request - PASSED cert.sh: Import TestUser-rsa-pss1's Cert -------------------------- certutil -A -n TestUser-rsa-pss1 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss1.cert cert.sh: #417: Import TestUser-rsa-pss1's Cert - PASSED cert.sh: Verify TestUser-rsa-pss1's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #418: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: #419: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss2 -------------------------- certutil -s "CN=TestUser-rsa-pss2, E=TestUser-rsa-pss2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #420: Generate Cert Request for TestUser-rsa-pss2 - PASSED cert.sh: Sign TestUser-rsa-pss2's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA512 -m 201 -v 60 -d ../CA -i req -o TestUser-rsa-pss2.cert -f ../tests.pw cert.sh: #421: Sign TestUser-rsa-pss2's Request - PASSED cert.sh: Import TestUser-rsa-pss2's Cert -------------------------- certutil -A -n TestUser-rsa-pss2 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss2.cert cert.sh: #422: Import TestUser-rsa-pss2's Cert - PASSED cert.sh: Verify TestUser-rsa-pss2's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss2 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #423: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: #424: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss3 -------------------------- certutil -s "CN=TestUser-rsa-pss3, E=TestUser-rsa-pss3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser-rsa-pss3 - PASSED cert.sh: Sign TestUser-rsa-pss3's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 202 -v 60 -d ../CA -i req -o TestUser-rsa-pss3.cert -f ../tests.pw cert.sh: #426: Sign TestUser-rsa-pss3's Request - PASSED cert.sh: Import TestUser-rsa-pss3's Cert -------------------------- certutil -A -n TestUser-rsa-pss3 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss3.cert cert.sh: #427: Import TestUser-rsa-pss3's Cert - PASSED cert.sh: Verify TestUser-rsa-pss3's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss3 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #428: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: #429: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss4 -------------------------- certutil -s "CN=TestUser-rsa-pss4, E=TestUser-rsa-pss4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #430: Generate Cert Request for TestUser-rsa-pss4 - PASSED cert.sh: Sign TestUser-rsa-pss4's Request -------------------------- certutil -C -c TestCA --pss-sign -m 203 -v 60 -d ../CA -i req -o TestUser-rsa-pss4.cert -f ../tests.pw cert.sh: #431: Sign TestUser-rsa-pss4's Request - PASSED cert.sh: Import TestUser-rsa-pss4's Cert -------------------------- certutil -A -n TestUser-rsa-pss4 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss4.cert cert.sh: #432: Import TestUser-rsa-pss4's Cert - PASSED cert.sh: Verify TestUser-rsa-pss4's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss4 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #433: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: #434: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss5 -------------------------- certutil -s "CN=TestUser-rsa-pss5, E=TestUser-rsa-pss5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #435: Generate Cert Request for TestUser-rsa-pss5 - PASSED cert.sh: Sign TestUser-rsa-pss5's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -m 204 -v 60 -d ../CA -i req -o TestUser-rsa-pss5.cert -f ../tests.pw cert.sh: #436: Sign TestUser-rsa-pss5's Request - PASSED cert.sh: Import TestUser-rsa-pss5's Cert -------------------------- certutil -A -n TestUser-rsa-pss5 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss5.cert cert.sh: #437: Import TestUser-rsa-pss5's Cert - PASSED cert.sh: Verify TestUser-rsa-pss5's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss5 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #438: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: #439: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss6 -------------------------- certutil -s "CN=TestUser-rsa-pss6, E=TestUser-rsa-pss6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser-rsa-pss6 - PASSED cert.sh: Sign TestUser-rsa-pss6's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 205 -v 60 -d ../CA -i req -o TestUser-rsa-pss6.cert -f ../tests.pw cert.sh: #441: Sign TestUser-rsa-pss6's Request - PASSED cert.sh: Import TestUser-rsa-pss6's Cert -------------------------- certutil -A -n TestUser-rsa-pss6 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss6.cert cert.sh: #442: Import TestUser-rsa-pss6's Cert - PASSED cert.sh: Verify TestUser-rsa-pss6's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss6 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #443: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: #444: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss7 -------------------------- certutil -s "CN=TestUser-rsa-pss7, E=TestUser-rsa-pss7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #445: Generate Cert Request for TestUser-rsa-pss7 - PASSED cert.sh: Sign TestUser-rsa-pss7's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA512 -m 206 -v 60 -d ../CA -i req -o TestUser-rsa-pss7.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #446: Sign TestUser-rsa-pss7's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss8 -------------------------- certutil -s "CN=TestUser-rsa-pss8, E=TestUser-rsa-pss8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #447: Generate Cert Request for TestUser-rsa-pss8 - PASSED cert.sh: Sign TestUser-rsa-pss8's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA256 -m 207 -v 60 -d ../CA -i req -o TestUser-rsa-pss8.cert -f ../tests.pw cert.sh: #448: Sign TestUser-rsa-pss8's Request - PASSED cert.sh: Import TestUser-rsa-pss8's Cert -------------------------- certutil -A -n TestUser-rsa-pss8 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss8.cert cert.sh: #449: Import TestUser-rsa-pss8's Cert - PASSED cert.sh: Verify TestUser-rsa-pss8's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss8 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #450: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: #451: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss9 -------------------------- certutil -s "CN=TestUser-rsa-pss9, E=TestUser-rsa-pss9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser-rsa-pss9 - PASSED cert.sh: Sign TestUser-rsa-pss9's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 208 -v 60 -d ../CA -i req -o TestUser-rsa-pss9.cert -f ../tests.pw cert.sh: #453: Sign TestUser-rsa-pss9's Request - PASSED cert.sh: Import TestUser-rsa-pss9's Cert -------------------------- certutil -A -n TestUser-rsa-pss9 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss9.cert cert.sh: #454: Import TestUser-rsa-pss9's Cert - PASSED cert.sh: Verify TestUser-rsa-pss9's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss9 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #455: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: #456: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss10 -------------------------- certutil -s "CN=TestUser-rsa-pss10, E=TestUser-rsa-pss10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #457: Generate Cert Request for TestUser-rsa-pss10 - PASSED cert.sh: Sign TestUser-rsa-pss10's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 -m 209 -v 60 -d ../CA -i req -o TestUser-rsa-pss10.cert -f ../tests.pw cert.sh: #458: Sign TestUser-rsa-pss10's Request - PASSED cert.sh: Import TestUser-rsa-pss10's Cert -------------------------- certutil -A -n TestUser-rsa-pss10 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss10.cert cert.sh: #459: Import TestUser-rsa-pss10's Cert - PASSED cert.sh: Verify TestUser-rsa-pss10's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss10 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #460: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: #461: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss11 -------------------------- certutil -s "CN=TestUser-rsa-pss11, E=TestUser-rsa-pss11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #462: Generate Cert Request for TestUser-rsa-pss11 - PASSED cert.sh: Sign TestUser-rsa-pss11's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 --pss-sign -Z SHA256 -m 210 -v 60 -d ../CA -i req -o TestUser-rsa-pss11.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #463: Sign TestUser-rsa-pss11's Request - PASSED cert.sh: specify token with PKCS#11 URI cert.sh: List keys in NSS Certificate DB -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> dsa 754b79ebdc572ebc79943a436aa7a922730ed45f NSS Certificate DB:localhost-sni.localdomain-dsamixed < 1> ec 9fa7065b03d5f203afa5549704f4ce8261699a7f NSS Certificate DB:localhost-sni.localdomain-ec < 2> ec 678d9fcfe8f946933d397c24f4cfc21e7943b76d NSS Certificate DB:localhost-sni.localdomain-ecmixed < 3> ec e8ed9a60013477a66fa05496a0fad9597dcde1ab NSS Certificate DB:localhost.localdomain-ec < 4> rsa ca75df9632637f07486b5f1b31e55d03e1d449cf TestUser-rsa-pss-interop < 5> rsa ad155488c8fb0c8c2451bf7324160af365cb8b96 (orphan) < 6> dsa ee82d6a5ea1b5122e1d2fdbc2b22aac7e53cea55 NSS Certificate DB:localhost.localdomain-dsa < 7> dsa 61c75cce356250ca7682b6dbbc13867bcfd2c7ef NSS Certificate DB:localhost.localdomain-dsamixed < 8> rsa 0128f5c878de316b23fa7fec16fb37cbe88c1cc4 NSS Certificate DB:localhost.localdomain < 9> ec 9395731392035868c5c09084e05737e2131ce225 NSS Certificate DB:localhost.localdomain-ecmixed <10> rsa e299e2788697c89ed65b5cbba09346cc191699ae NSS Certificate DB:localhost-sni.localdomain <11> dsa 50902b7a083c8c4f285edfc9e2d645ee81adeb6b NSS Certificate DB:localhost-sni.localdomain-dsa cert.sh: #464: List keys in NSS Certificate DB - PASSED cert.sh: List keys in NSS Builtin Objects -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects" certutil: no keys found cert.sh: #465: List keys in NSS Builtin Objects - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #466: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #467: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #468: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #469: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #470: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #471: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #472: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #473: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #474: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #475: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #476: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #477: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #478: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #479: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #480: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser40's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #481: Generate RSA-PSS Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o TestUser40-rsa-pss.cert -f ../tests.pw cert.sh: #482: Sign TestUser40's RSA-PSS Request - PASSED cert.sh: Import TestUser40's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser40-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #483: Import TestUser40's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser40's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #484: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #485: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #486: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #487: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #488: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #489: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #490: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #491: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #492: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #493: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #494: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #495: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #496: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #497: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #498: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser41's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #499: Generate RSA-PSS Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30041 -v 60 -d ../CA -i req -o TestUser41-rsa-pss.cert -f ../tests.pw cert.sh: #500: Sign TestUser41's RSA-PSS Request - PASSED cert.sh: Import TestUser41's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser41-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #501: Import TestUser41's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser41's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #502: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #503: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #504: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #505: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #506: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #507: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #508: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #509: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #510: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #511: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #512: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #513: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #514: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #515: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #516: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser42's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #517: Generate RSA-PSS Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30042 -v 60 -d ../CA -i req -o TestUser42-rsa-pss.cert -f ../tests.pw cert.sh: #518: Sign TestUser42's RSA-PSS Request - PASSED cert.sh: Import TestUser42's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser42-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #519: Import TestUser42's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser42's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #520: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #521: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #522: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #523: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #524: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #525: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #526: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #527: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #528: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #529: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #530: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #531: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #532: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #533: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #534: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser43's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #535: Generate RSA-PSS Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30043 -v 60 -d ../CA -i req -o TestUser43-rsa-pss.cert -f ../tests.pw cert.sh: #536: Sign TestUser43's RSA-PSS Request - PASSED cert.sh: Import TestUser43's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser43-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #537: Import TestUser43's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser43's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #538: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #539: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #540: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #541: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #542: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #543: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #544: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #545: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #546: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #547: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #548: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #549: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #550: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #551: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #552: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser44's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #553: Generate RSA-PSS Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30044 -v 60 -d ../CA -i req -o TestUser44-rsa-pss.cert -f ../tests.pw cert.sh: #554: Sign TestUser44's RSA-PSS Request - PASSED cert.sh: Import TestUser44's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser44-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #555: Import TestUser44's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser44's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #556: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #557: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #558: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #559: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #560: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #561: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #562: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #563: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #564: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #565: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #566: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #567: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #568: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #569: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #570: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser45's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #571: Generate RSA-PSS Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30045 -v 60 -d ../CA -i req -o TestUser45-rsa-pss.cert -f ../tests.pw cert.sh: #572: Sign TestUser45's RSA-PSS Request - PASSED cert.sh: Import TestUser45's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser45-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #573: Import TestUser45's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser45's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #574: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #575: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #576: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #577: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #578: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #579: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #580: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #581: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #582: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #583: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #584: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #585: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #586: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #587: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #588: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser46's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #589: Generate RSA-PSS Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30046 -v 60 -d ../CA -i req -o TestUser46-rsa-pss.cert -f ../tests.pw cert.sh: #590: Sign TestUser46's RSA-PSS Request - PASSED cert.sh: Import TestUser46's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser46-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #591: Import TestUser46's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser46's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #592: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #593: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #594: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #595: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #596: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #597: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #598: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #599: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #600: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #601: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #602: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #603: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #604: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #605: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #606: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser47's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #607: Generate RSA-PSS Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30047 -v 60 -d ../CA -i req -o TestUser47-rsa-pss.cert -f ../tests.pw cert.sh: #608: Sign TestUser47's RSA-PSS Request - PASSED cert.sh: Import TestUser47's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser47-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #609: Import TestUser47's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser47's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #610: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #611: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #612: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #613: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #614: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #615: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #616: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #617: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #618: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #619: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #620: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #621: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #622: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #623: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #624: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser48's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #625: Generate RSA-PSS Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30048 -v 60 -d ../CA -i req -o TestUser48-rsa-pss.cert -f ../tests.pw cert.sh: #626: Sign TestUser48's RSA-PSS Request - PASSED cert.sh: Import TestUser48's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser48-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #627: Import TestUser48's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser48's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #628: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #629: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #630: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #631: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #632: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #633: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #634: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #635: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #636: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #637: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #638: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #639: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #640: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #641: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #642: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser49's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #643: Generate RSA-PSS Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30049 -v 60 -d ../CA -i req -o TestUser49-rsa-pss.cert -f ../tests.pw cert.sh: #644: Sign TestUser49's RSA-PSS Request - PASSED cert.sh: Import TestUser49's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser49-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #645: Import TestUser49's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser49's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #646: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #647: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #648: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #649: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #650: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #651: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #652: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #653: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #654: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #655: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #656: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #657: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #658: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #659: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #660: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser50's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #661: Generate RSA-PSS Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o TestUser50-rsa-pss.cert -f ../tests.pw cert.sh: #662: Sign TestUser50's RSA-PSS Request - PASSED cert.sh: Import TestUser50's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser50-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #663: Import TestUser50's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser50's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #664: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #665: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #666: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #667: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #668: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #669: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #670: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #671: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #672: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #673: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #674: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #675: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #676: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #677: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #678: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser51's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #679: Generate RSA-PSS Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30051 -v 60 -d ../CA -i req -o TestUser51-rsa-pss.cert -f ../tests.pw cert.sh: #680: Sign TestUser51's RSA-PSS Request - PASSED cert.sh: Import TestUser51's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser51-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #681: Import TestUser51's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser51's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #682: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #683: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #684: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #685: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #686: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #687: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #688: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #689: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #690: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #691: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #692: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #693: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #694: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #695: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #696: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser52's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #697: Generate RSA-PSS Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30052 -v 60 -d ../CA -i req -o TestUser52-rsa-pss.cert -f ../tests.pw cert.sh: #698: Sign TestUser52's RSA-PSS Request - PASSED cert.sh: Import TestUser52's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser52-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #699: Import TestUser52's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser52's RSA-PSS Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #700: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #701: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #702: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #703: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #704: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #705: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #706: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #707: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #708: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #709: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #710: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #711: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #712: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #713: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #714: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #715: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #716: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Tue Sep 27 19:19:43 UTC 2022 Running tests for dbtests TIMESTAMP dbtests BEGIN: Tue Sep 27 19:19:43 UTC 2022 dbtests.sh: CERT and Key DB Tests =============================== --------------------------------------------------------------- | test opening the database read/write in a nonexisting directory --------------------------------------------------------------- certutil: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #1: Certutil didn't work in a nonexisting dir 255 - PASSED dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #2: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED --------------------------------------------------------------- | test force opening the database in a nonexisting directory --------------------------------------------------------------- dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtests.sh: #3: Dbtest force succeeded in a nonexisting dir 0 - PASSED --------------------------------------------------------------- | test opening the database readonly in an empty directory --------------------------------------------------------------- tstclnt: unable to open cert database: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #4: Tstclnt didn't work in an empty dir 1 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #5: Dbtest readonly didn't work in an empty dir 46 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir dbtests.sh: #6: Dbtest logout after empty DB Init has key - PASSED dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir dbtests.sh: #7: Dbtest password DB Init maintains needlogin state - PASSED certutil: could not find certificate named "xxxx": SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #8: Certutil didn't work in an empty dir 255 - PASSED --------------------------------------------------------------- | test force opening the database readonly in a empty directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/emptydir/key3.db" does not exist. dbtests.sh: #9: Dbtest force readonly succeeded in an empty dir 0 - PASSED --------------------------------------------------------------- | test opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/secmod.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/cert8.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/key3.db" is not writeable. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #10: Dbtest r/w didn't work in an readonly dir 46 - PASSED certutil: could not find certificate named "TestUser": SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #11: Certutil didn't work in an readonly dir 255 - PASSED --------------------------------------------------------------- | test opening the database ronly in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/secmod.db database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/cert8.db database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/key3.db dbtests.sh: #12: Dbtest readonly succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | test force opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/secmod.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/cert8.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/key3.db" is not writeable. dbtests.sh: #13: Dbtest force succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | ls -l /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir --------------------------------------------------------------- dr-xr-xr-x. 2 mockbuild mockbuild 4096 Sep 27 19:19 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir -r--r-----. 1 mockbuild mockbuild 1227 Sep 27 19:19 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/TestUser-dsa.cert -r--r-----. 1 mockbuild mockbuild 1427 Sep 27 19:19 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/TestUser-dsamixed.cert -r--r-----. 1 mockbuild mockbuild 583 Sep 27 19:19 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/TestUser-ec.cert -r--r-----. 1 mockbuild mockbuild 707 Sep 27 19:19 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/TestUser-ecmixed.cert -r--r-----. 1 mockbuild mockbuild 881 Sep 27 19:19 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/TestUser-rsa-pss.cert -r--r-----. 1 mockbuild mockbuild 872 Sep 27 19:19 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/TestUser.cert -r--------. 1 mockbuild mockbuild 360448 Sep 27 19:19 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/cert8.db -r--------. 1 mockbuild mockbuild 180224 Sep 27 19:19 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/key3.db -r--r-----. 1 mockbuild mockbuild 728 Sep 27 19:19 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/req -r--------. 1 mockbuild mockbuild 16384 Sep 27 19:19 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ronlydir/secmod.db --------------------------------------------------------------- | test creating a new cert with a conflicting nickname --------------------------------------------------------------- /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/conflictdir certutil: could not add certificate to token or database: SEC_ERROR_ADDING_CERT: Error adding certificate to database. dbtests.sh: #14: Nicknane conflict test, could not import conflict nickname 255 - PASSED --------------------------------------------------------------- | test importing an old cert to a conflicting nickname --------------------------------------------------------------- Certificate: Data: Version: 3 (0x2) Serial Number: 40 (0x28) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:43 2022 Not After : Mon Sep 27 19:16:43 2027 Subject: "CN=Bob,E=Bob@example.com,O=BOGUS NSS,L=Mountain View,ST=Cal ifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:5d:d2:5b:2b:de:9e:10:ac:91:cb:14:66:32:f1:31: 63:59:6f:51:03:59:59:7a:74:4c:b9:10:00:78:68:b6: 7f:d7:a7:e2:d5:32:35:e6:f9:68:48:de:d7:72:31:c9: 50:a2:d6:ec:0c:92:16:e6:47:e7:d7:e7:be:f5:16:ce: fd:e8:90:f4:b9:7b:15:53:40:98:49:13:16:0b:b6:73: 9c:d7:b4:4f:f6:6a:15:d5:d8:05:35:f1:f7:4a:d2:99: 11:53:10:fa:6f:f1:e9:87:06:13:90:1d:66:ae:44:12: 38:9b:a1:0e:e3:1a:3a:87:d9:01:34:b0:d7:5f:3a:8e: d6:3a:e6:d0:54:cc:57:90:77:58:a5:f4:15:92:71:f4: ec:82:fa:9c:62:bd:4c:33:80:32:47:76:97:8a:f4:35: 95:50:4e:d3:b5:37:db:df:21:52:66:d9:ca:06:16:91: 45:4a:2e:17:16:b6:f1:74:14:2e:a9:7d:76:93:c2:cf: 66:7a:73:62:da:88:38:a9:34:aa:17:2e:e2:8d:dc:8d: 0e:42:c5:6d:e3:e9:77:88:79:e3:cf:15:2d:b3:60:59: ae:d3:42:bb:ea:01:23:30:fd:fd:60:78:74:0a:7f:ab: 8b:5a:5e:80:95:51:8f:01:d5:e2:19:9f:f5:fc:35:11 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 50:17:c9:a2:56:0c:1b:fd:3b:de:2b:1f:cd:68:88:6d: 77:66:61:c3:26:c1:8c:c0:fe:c7:b2:fc:b3:cb:00:85: be:56:2b:5d:ae:e1:e3:83:4f:57:46:18:37:f8:25:3d: b8:1b:f7:ed:90:be:38:46:d0:2a:f8:b0:b8:33:3a:bc: d5:1c:5b:9f:21:66:64:54:be:59:a6:0e:dc:c8:a3:2b: 81:35:ed:53:52:2e:1c:f4:85:6c:cb:32:54:86:3f:b9: 18:09:30:85:2f:55:1e:4b:b3:75:97:42:41:d9:da:e7: 0d:3c:d1:4a:0c:ee:c0:ae:55:43:39:20:b3:8b:e3:47: 25:59:b7:39:c5:e4:e8:a7:70:a7:58:6b:03:c4:a9:11: d0:91:64:53:0e:16:ef:9c:4e:e3:35:b6:cb:06:af:f0: 65:10:b2:ae:81:88:fb:7f:d6:c0:d0:8b:6a:93:6d:02: 9c:ef:e8:d1:2d:4d:ee:ee:6d:5e:03:d0:60:12:eb:d9: 88:32:95:b0:91:31:ed:6f:e7:a9:72:01:56:2c:70:61: 56:d6:73:b8:37:16:05:52:99:62:30:94:fe:64:26:53: ea:e2:02:46:4d:48:97:06:58:91:f4:53:fb:50:67:d3: 74:c1:4b:4e:29:78:4b:57:dd:53:81:79:62:7d:60:e9 Fingerprint (SHA-256): 02:47:8E:7C:0D:A5:D9:BF:22:C6:B1:C1:70:74:C8:55:20:5C:55:5B:AE:26:F4:DB:69:45:A2:80:54:D8:E0:FE Fingerprint (SHA1): AC:A6:6F:81:EA:1F:84:B2:51:A6:B6:30:71:4B:8F:F7:75:B3:2F:01 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: dbtests.sh: #15: Nickname conflict test-setting nickname conflict was correctly rejected - PASSED Testing RSA PrivateKeyImport *********************** RSA PrivateKeyImport PASSED *********************** Testing DSA PrivateKeyImport *********************** DSA PrivateKeyImport PASSED *********************** Testing ECC PrivateKeyImport *********************** CKA_ID does not match priv key, checking next key ECC PrivateKeyImport PASSED *********************** pubValue = [128 bytes] { d1, f8, f2, 3a, bb, e0, b5, 85, f2, a2, 9e, 0b, 3a, ca, e6, c7 ca, 29, 16, dd, ac, 51, 56, a2, 2c, 67, f3, 85, d9, 67, 0b, 1b 3f, d7, 4f, 7c, a1, 07, 57, 59, 0c, ed, 78, 19, 54, cb, 9b, b0 c2, dc, a0, ea, c7, 11, ab, a8, 76, 04, c4, a3, 7f, 5a, 51, 06 ec, b6, 2c, db, ba, 5a, 1a, 68, 3a, 35, a4, 8b, fc, b5, a8, b5 4f, 1d, 98, 96, a4, 7c, 99, 97, ca, 1a, 53, b8, 82, 30, 25, 00 3b, f9, ea, e5, 3d, 5d, c2, 86, 45, 8b, 7b, e5, 1b, d5, 3a, 8b 05, 1f, ae, e0, 6c, 03, 0f, ac, 80, 4a, df, a7, 29, 2e, 95, 33}; privKey CKA_ID = [20 bytes] { f9, 91, 10, cb, fd, 39, 62, 1f, 76, d3, 0a, 03, 19, 42, 6c, bf 05, af, cd, 78}; pubKey CKA_ID = [20 bytes] { f9, 91, 10, cb, fd, 39, 62, 1f, 76, d3, 0a, 03, 19, 42, 6c, bf 05, af, cd, 78}; matching public key found pubValue = [128 bytes] { 06, 5f, db, 82, dd, 81, 4c, 6a, 9b, ae, 19, be, 8f, b4, d8, be 15, 91, c1, 9e, b4, 03, f2, f8, 9d, 4b, 13, 7d, df, 56, 9b, c0 88, e6, 40, 51, 7b, 57, f2, 23, f0, 6d, 95, 5b, 7c, 9e, db, a3 94, 31, 67, 2c, 57, 68, 22, 5d, 5b, e5, 84, 75, 87, 54, be, 40 2e, 6a, 67, a2, bf, b5, 79, 54, fd, f6, c1, 00, ad, be, 0e, 03 b0, 58, c3, a7, e0, fe, bf, 3e, 7f, 35, 4b, c8, a6, dd, 6d, b0 a7, 0a, f5, b3, 66, 79, 42, 03, 74, 30, de, fd, 6f, 5b, 0a, 72 e4, 7b, 26, 25, 55, 3a, 60, 61, 02, 62, 86, e9, 11, 92, 28, 5a}; privKey CKA_ID = [20 bytes] { 45, e5, 51, 1e, 7f, 82, c4, 49, 14, 41, 90, e1, fa, 44, a8, 6f 64, 34, c6, 6d}; pubKey CKA_ID = [20 bytes] { 45, e5, 51, 1e, 7f, 82, c4, 49, 14, 41, 90, e1, fa, 44, a8, 6f 64, 34, c6, 6d}; matching public key found pubValue = [65 bytes] { 04, c3, 7a, f3, 23, ef, bd, 09, 67, df, 45, 46, 57, 7d, a5, 57 ac, ee, f6, 3f, ff, 6f, b9, 19, 90, d2, 16, 93, f9, 15, a0, f5 c8, 6c, d3, 77, 3d, 67, 81, 96, fb, 07, a7, 61, 3d, d8, 2e, 9c d5, 19, dd, fd, 5b, 40, c5, 39, 43, ef, e0, 19, 23, dc, 46, 58 0b}; privKey CKA_ID = [20 bytes] { 75, f3, 69, 2b, 9e, 75, 58, fd, c0, 8a, c2, 83, 33, 00, dd, b3 63, b4, 8a, ba}; pubKey CKA_ID = [20 bytes] { 45, e5, 51, 1e, 7f, 82, c4, 49, 14, 41, 90, e1, fa, 44, a8, 6f 64, 34, c6, 6d}; pubKey CKA_ID = [20 bytes] { 75, f3, 69, 2b, 9e, 75, 58, fd, c0, 8a, c2, 83, 33, 00, dd, b3 63, b4, 8a, ba}; matching public key found dbtests.sh: #16: Importing Token Private Key correctly creates the corrresponding Public Key - PASSED /bin/sqlite3 --------------------------------------------------------------- | skipping key corruption test: requires sql database --------------------------------------------------------------- TIMESTAMP dbtests END: Tue Sep 27 19:19:49 UTC 2022 Running tests for tools TIMESTAMP tools BEGIN: Tue Sep 27 19:19:49 UTC 2022 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #1: Exporting with [default:default:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #2: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 92:3c:62:9f:91:ff:00:07:a3:bb:be:24:54:aa:a3:82 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #3: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5: Exporting Alice's email EC cert & key (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #6: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3b:86:8d:a2:00:cb:f4:dd:b9:90:90:f7:ef:97:e8:1f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Tue Sep 27 19:15:39 2022 Not After : Tue Sep 27 19:15:39 2072 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:bd:85:b5:57:24:8f:2d:75:7d:ea:be:e6:fb:74: be:c3:c2:dc:df:01:ba:c9:88:87:40:a1:53:33:a1:81: bc:16:44:a3:6b:2a:76:54:bf:13:ee:63:39:fe:4b:8b: bb:33:2b:30:2d:ea:ae:2d:6b:fb:2d:aa:91:22:a0:cf: c0:12:39:01:a9:5e:f8:26:12:ca:aa:9d:a7:39:90:3c: c5:59:00:66:0d:ba:d6:15:9f:ab:29:77:ea:ab:66:a8: 95:fc:04:2e:31:d6:0c:f1:e8:b5:02:96:23:a8:6a:1b: 26:2f:88:b9:ce:2b:c6:4b:b4:0b:ab:62:6f:44:3e:86: aa:26:84:5d:01 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:87:02:41:62:92:c8:8b:1a:c7:f0:9a:2f:15:01: 37:4c:2e:de:68:7b:3d:43:be:61:07:09:e1:99:b1:33: c7:03:c1:b3:c1:74:3f:65:41:b2:42:ee:95:b3:6e:fa: 3d:01:31:a8:66:03:a8:35:7a:33:63:54:72:74:d7:b3: 00:98:13:a1:84:e4:02:42:00:bb:9a:40:d9:ef:6d:01: 31:23:86:d6:16:20:da:18:cd:e6:d8:32:9d:b1:79:1e: 8f:03:6c:80:7d:d4:53:7c:08:63:fd:03:8f:be:ca:05: 15:0a:25:1d:6c:fc:26:69:30:38:9e:55:81:1b:48:b9: ee:5f:4d:57:ce:a7:b5:fe:72:0d Fingerprint (SHA-256): F2:91:8E:AA:90:41:CE:1F:79:79:DD:8B:62:61:0D:2F:2C:DE:C5:10:22:C2:5A:73:76:9C:01:79:4C:E5:DF:FA Fingerprint (SHA1): 29:36:DB:1E:91:74:30:ED:65:67:77:93:E3:7A:DA:28:7C:AF:8A:36 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Tue Sep 27 19:16:38 2022 Not After : Mon Sep 27 19:16:38 2027 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:0c:52:a0:92:3c:7d:b2:64:b2:4c:9d:ec:8a:6f:c5: b1:8d:2c:74:49:f0:82:04:35:50:e4:24:fb:cc:cc:9e: 62:0b:bd:d3:7c:91:b4:6b:75:d0:fd:cb:42:65:f1:ea: ec:a2:71:5e:31:9f:a7:f5:6e:1f:04:4b:bb:6d:66:f0: bc:f5:b8:b2:f7:1c:09:35:71:46:ac:d5:7f:50:e3:d9: be:62:54:f9:81:f3:3e:f8:c1:9d:45:e3:bb:85:52:31: 9b Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:87:02:41:3c:55:08:84:f2:1c:3d:52:8b:ee:bb: 63:07:76:db:d2:47:c4:c7:7c:e9:65:28:3c:61:e7:dd: 44:ce:ae:38:4c:11:ca:12:c9:9c:f2:7c:1c:f2:8a:8e: 27:91:1e:05:a7:1e:dc:c7:c2:b2:df:da:4a:2f:8c:27: c0:21:8a:2a:dc:eb:02:42:01:f3:0c:3b:5c:5f:42:18: c7:79:01:28:91:63:cf:45:a6:16:6a:18:ae:00:ae:68: 6c:ac:dd:f5:59:c2:3d:b5:ba:6b:77:b2:eb:fb:68:a9: 9f:3a:44:cb:eb:e1:69:82:9b:21:02:29:f9:54:64:97: 21:58:a6:26:69:1e:1a:b8:4f:17 Fingerprint (SHA-256): 6C:26:69:48:8F:B5:E9:81:33:D9:A6:44:C1:A1:95:C5:32:EF:CD:01:51:A8:0A:DA:D5:B9:E9:65:06:CB:C0:77 Fingerprint (SHA1): B2:E2:B1:BD:26:71:73:8F:6C:BF:C2:C7:3F:21:34:DF:35:5E:E1:C6 Friendly Name: Alice-ec tools.sh: #8: Listing Alice's pk12 EC file (pk12util -l) - PASSED tools.sh: Exporting Alice's email EC cert & key with long pw------ pk12util -o Alice-ec-long.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.longpw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9: Exporting Alice's email EC cert & key with long pw (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #10: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key with long pw----- pk12util -i Alice-ec-long.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.longpw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #11: Importing Alice's email EC cert & key with long pw (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file with long pw ------------ pk12util -l Alice-ec-long.p12 -w ../tests.longpw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 24:bd:5f:f4:b2:13:89:03:38:77:94:ba:0a:10:42:0c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Tue Sep 27 19:15:39 2022 Not After : Tue Sep 27 19:15:39 2072 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:bd:85:b5:57:24:8f:2d:75:7d:ea:be:e6:fb:74: be:c3:c2:dc:df:01:ba:c9:88:87:40:a1:53:33:a1:81: bc:16:44:a3:6b:2a:76:54:bf:13:ee:63:39:fe:4b:8b: bb:33:2b:30:2d:ea:ae:2d:6b:fb:2d:aa:91:22:a0:cf: c0:12:39:01:a9:5e:f8:26:12:ca:aa:9d:a7:39:90:3c: c5:59:00:66:0d:ba:d6:15:9f:ab:29:77:ea:ab:66:a8: 95:fc:04:2e:31:d6:0c:f1:e8:b5:02:96:23:a8:6a:1b: 26:2f:88:b9:ce:2b:c6:4b:b4:0b:ab:62:6f:44:3e:86: aa:26:84:5d:01 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:87:02:41:62:92:c8:8b:1a:c7:f0:9a:2f:15:01: 37:4c:2e:de:68:7b:3d:43:be:61:07:09:e1:99:b1:33: c7:03:c1:b3:c1:74:3f:65:41:b2:42:ee:95:b3:6e:fa: 3d:01:31:a8:66:03:a8:35:7a:33:63:54:72:74:d7:b3: 00:98:13:a1:84:e4:02:42:00:bb:9a:40:d9:ef:6d:01: 31:23:86:d6:16:20:da:18:cd:e6:d8:32:9d:b1:79:1e: 8f:03:6c:80:7d:d4:53:7c:08:63:fd:03:8f:be:ca:05: 15:0a:25:1d:6c:fc:26:69:30:38:9e:55:81:1b:48:b9: ee:5f:4d:57:ce:a7:b5:fe:72:0d Fingerprint (SHA-256): F2:91:8E:AA:90:41:CE:1F:79:79:DD:8B:62:61:0D:2F:2C:DE:C5:10:22:C2:5A:73:76:9C:01:79:4C:E5:DF:FA Fingerprint (SHA1): 29:36:DB:1E:91:74:30:ED:65:67:77:93:E3:7A:DA:28:7C:AF:8A:36 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Tue Sep 27 19:16:38 2022 Not After : Mon Sep 27 19:16:38 2027 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:0c:52:a0:92:3c:7d:b2:64:b2:4c:9d:ec:8a:6f:c5: b1:8d:2c:74:49:f0:82:04:35:50:e4:24:fb:cc:cc:9e: 62:0b:bd:d3:7c:91:b4:6b:75:d0:fd:cb:42:65:f1:ea: ec:a2:71:5e:31:9f:a7:f5:6e:1f:04:4b:bb:6d:66:f0: bc:f5:b8:b2:f7:1c:09:35:71:46:ac:d5:7f:50:e3:d9: be:62:54:f9:81:f3:3e:f8:c1:9d:45:e3:bb:85:52:31: 9b Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:87:02:41:3c:55:08:84:f2:1c:3d:52:8b:ee:bb: 63:07:76:db:d2:47:c4:c7:7c:e9:65:28:3c:61:e7:dd: 44:ce:ae:38:4c:11:ca:12:c9:9c:f2:7c:1c:f2:8a:8e: 27:91:1e:05:a7:1e:dc:c7:c2:b2:df:da:4a:2f:8c:27: c0:21:8a:2a:dc:eb:02:42:01:f3:0c:3b:5c:5f:42:18: c7:79:01:28:91:63:cf:45:a6:16:6a:18:ae:00:ae:68: 6c:ac:dd:f5:59:c2:3d:b5:ba:6b:77:b2:eb:fb:68:a9: 9f:3a:44:cb:eb:e1:69:82:9b:21:02:29:f9:54:64:97: 21:58:a6:26:69:1e:1a:b8:4f:17 Fingerprint (SHA-256): 6C:26:69:48:8F:B5:E9:81:33:D9:A6:44:C1:A1:95:C5:32:EF:CD:01:51:A8:0A:DA:D5:B9:E9:65:06:CB:C0:77 Fingerprint (SHA1): B2:E2:B1:BD:26:71:73:8F:6C:BF:C2:C7:3F:21:34:DF:35:5E:E1:C6 Friendly Name: Alice-ec tools.sh: #12: Listing Alice's pk12 EC file with long pw (pk12util -l) - PASSED Iteration count=600000 pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #13: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #14: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 57:22:6b:3f:f4:c4:2b:e8:c4:2a:b0:f8:0f:c0:60:5e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #15: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #16: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #17: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #18: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: a8:7e:cf:8b:6e:2e:ee:9c:4e:91:23:ae:8d:c7:9d:b5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #19: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #20: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #21: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #22: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6e:90:f4:a7:de:73:d8:f0:99:e1:fc:f3:74:0f:b2:d8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #23: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #24: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #25: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #26: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: ed:25:55:e8:30:72:c4:f6:ca:d2:e6:b2:c7:3d:a4:79 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #27: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #28: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #29: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #30: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1e:12:f0:06:9b:9b:e2:22:fc:49:4f:bb:53:29:64:e0 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:18:30:ea:00:63:f2:59:c0:27:f0:55:8a:b5:8e: c6:6e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #31: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #32: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #33: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #34: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 9f:de:63:2c:72:bd:25:84:3f:7a:99:7c:b8:26:be:9c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #35: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #36: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #37: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #38: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 15:2d:b1:be:0c:e0:c0:90:b8:56:d9:26:d8:7e:e3:5f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #39: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #40: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #41: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #42: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: bb:7b:dd:54:b9:d8:6a:0c:8d:77:86:15:16:2a:c6:ef Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #43: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #44: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #45: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #46: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 71:81:c5:29:52:c4:bc:a9:59:19:2c:c6:fd:31:25:14 Iteration Count: 600000 (0x927c0) tools.sh: #47: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #48: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #49: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #50: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: b6:9b:36:40:80:22:a5:bc:a7:28:33:72:af:56:a6:b6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #51: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #52: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #53: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #54: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 47:cf:a4:ea:5e:41:17:23:72:10:ff:46:2a:d8:2c:52 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #55: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #56: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #57: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #58: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 71:d8:02:ce:98:ff:dc:01:c6:3b:b8:ac:35:db:d7:06 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #59: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #60: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #61: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #62: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2b:09:fc:8a:41:39:9a:9e:87:3f:1e:09:15:d2:6b:11 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #63: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #64: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #65: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #66: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 1e:84:77:f9:2a:36:61:08:2f:6e:f2:6f:54:d9:28:01 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #67: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #68: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #69: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #70: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: dc:b7:5c:65:28:30:ed:aa:30:9b:9b:cd:21:0a:0b:19 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e8:52:eb:95:95:ec:4d:c0:2e:bc:a4:95:08:de: bf:c3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #71: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #72: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #73: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #74: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 40:78:28:8a:9d:be:0a:82:79:36:88:4c:13:d7:23:ca Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #75: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #76: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #77: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #78: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cd:e8:8d:19:3d:73:3d:ad:4a:81:ce:8d:90:28:c5:85 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #79: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #80: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #81: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #82: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 0e:fe:e1:23:95:67:6c:ea:e2:4b:85:24:fd:0c:4f:a7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #83: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #84: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #85: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #86: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 7b:e5:59:f6:3c:6c:b6:54:ec:56:8c:e1:ae:a8:aa:78 Iteration Count: 600000 (0x927c0) tools.sh: #87: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #88: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #89: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #90: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 24:d4:71:47:d7:c3:b5:08:1e:ac:06:5d:2e:9f:32:c5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #91: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #92: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #93: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #94: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9b:ce:a9:bf:66:87:6b:b5:2f:93:96:49:38:1f:83:f3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #95: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #96: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #97: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #98: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: b0:e6:b7:52:c0:f0:d4:cc:8b:3d:b9:a1:c7:9e:76:66 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #99: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #100: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #101: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #102: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 38:18:5f:05:c2:b5:e5:47:92:8c:90:16:be:25:77:ec Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:f1:51:ac:bf:01:09:65:6e:5c:08:d7:f9:9d:68: 10:7d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #103: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #104: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #105: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #106: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ed:da:08:23:64:5f:cf:5c:38:b4:73:77:23:00:b3:50 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #107: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #108: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #109: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #110: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d2:e8:29:eb:c5:05:fe:ba:47:86:13:01:78:4f:a7:d5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #111: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #112: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #113: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #114: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: b8:74:23:36:a9:ae:c6:16:4c:a7:25:1c:51:ae:e8:44 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #115: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #116: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #117: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #118: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 43:af:44:4a:70:ab:25:84:15:ee:92:fd:1b:d6:cb:fd Iteration Count: 600000 (0x927c0) tools.sh: #119: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #120: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #121: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #122: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 5b:3c:15:06:ae:a5:7d:22:cc:72:16:ac:29:8a:76:07 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #123: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #124: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #125: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #126: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 2b:88:ab:5b:18:0f:f0:53:f5:83:2a:c4:d2:e0:69:2a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #127: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #128: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #129: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #130: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 9c:4a:06:d8:69:80:88:62:05:c6:37:0a:1d:f2:8b:48 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #131: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #132: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #133: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #134: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 42:87:a1:4f:32:56:7f:d5:cf:46:8e:3b:f3:36:ae:9e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #135: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #136: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #137: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #138: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: a0:67:f2:57:ce:15:a7:80:cf:f7:9d:77:ea:03:96:e5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #139: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #140: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #141: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #142: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5f:ed:71:ea:03:e4:95:95:ae:f1:eb:c6:57:60:08:e2 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:fa:87:f9:a4:be:ad:44:b0:d6:1d:cf:8b:c4:20: cb:52 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #143: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #144: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #145: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #146: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 82:c1:ae:6c:84:b0:01:af:9b:40:91:fe:e7:42:da:a0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #147: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #148: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #149: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #150: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 91:6b:35:19:37:b2:1f:d0:60:5c:6b:e8:3a:59:10:2b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #151: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #152: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #153: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #154: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 09:6e:65:6c:57:7f:40:38:91:d4:2b:eb:34:41:92:43 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #155: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #156: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #157: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #158: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 94:c0:0e:53:b8:ab:01:7b:68:db:1a:d0:22:de:6b:72 Iteration Count: 600000 (0x927c0) tools.sh: #159: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #160: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #161: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #162: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 31:47:f1:66:d8:28:f4:a3:cd:90:f6:ff:2e:68:d0:ab Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #163: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #164: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #165: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #166: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 5d:45:35:7d:3b:f4:12:41:b2:92:b5:a3:13:60:c0:f8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #167: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #168: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #169: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #170: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 54:68:ed:c5:53:50:c3:be:82:2f:86:64:8b:dc:ce:0c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #171: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #172: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #173: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #174: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 12:0f:60:ca:d4:17:23:e2:92:30:54:dd:11:bd:3d:de Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #175: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #176: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #177: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #178: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: a5:a6:d7:a5:fd:5c:49:8e:b4:19:cc:b0:2b:b6:41:3c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #179: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #180: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #181: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #182: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d3:3d:7a:d5:05:03:af:a2:5a:89:97:1a:61:9d:c4:70 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:b1:29:1b:6b:78:49:9d:6c:66:b1:cf:fe:30:1d: 8f:55 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #183: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #184: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #185: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #186: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 5b:c9:d9:b0:2b:f5:ae:2f:f0:d1:03:ad:8b:ec:c0:d1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #187: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #188: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #189: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #190: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 64:04:0a:9f:ea:5a:21:ca:d7:83:f4:0c:72:ba:ec:a7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #191: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #192: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #193: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #194: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: fa:c6:49:2e:a7:62:b1:39:39:b3:95:fa:55:2c:03:00 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #195: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #196: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #197: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #198: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: c6:d9:83:06:d8:43:5e:0f:83:33:fc:2e:42:bb:f9:9c Iteration Count: 600000 (0x927c0) tools.sh: #199: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #200: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #201: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #202: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 9b:8a:e2:81:45:26:95:56:7a:65:1f:ad:9c:be:37:a8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #203: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #204: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #205: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #206: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 81:b0:44:f0:56:90:6a:35:0d:29:76:1a:c0:33:78:41 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #207: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #208: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #209: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #210: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: da:51:61:b9:0e:cc:78:7f:86:83:f9:f8:5a:8c:29:57 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #211: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #212: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #213: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #214: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 26:79:4d:88:b3:ae:b6:60:ec:c5:50:b1:7e:34:8e:cf Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:3a:1f:d4:d6:49:03:8f:c8:43:de:8c:3d:96:c2: 2e:d0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #215: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #216: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #217: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #218: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 27:e5:96:7f:d5:ff:e8:ee:fe:c8:c1:25:37:c0:33:89 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #219: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #220: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #221: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #222: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 61:66:1a:ba:da:f8:f9:28:db:76:4e:03:55:e2:50:c4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #223: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #224: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #225: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #226: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 38:57:6a:30:e2:d3:b1:de:ea:ac:42:84:ac:c4:e5:d8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #227: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #228: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #229: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #230: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7b:de:96:6c:24:94:12:82:f9:69:21:4f:34:3f:57:6c Iteration Count: 600000 (0x927c0) tools.sh: #231: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #232: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #233: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #234: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 71:9e:58:c3:a6:fb:bb:89:df:0d:b8:b4:f8:22:78:c9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #235: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #236: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #237: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #238: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 89:ed:1e:30:8d:4c:32:fd:ca:db:ca:70:1f:ef:79:44 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #239: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #240: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #241: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #242: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 66:89:a2:6e:32:51:b5:5f:e2:93:bf:f8:45:b3:22:3f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #244: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #245: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #246: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bf:11:ca:01:be:8c:98:99:89:bc:c5:ef:47:bd:a2:f6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #247: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #248: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #249: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #250: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 28:64:04:f6:0e:58:f0:08:cf:94:af:15:f6:4a:95:b6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #251: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #252: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #253: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #254: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e5:2e:05:ee:41:48:31:2e:a9:ca:3c:93:70:68:1a:f6 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:18:d9:a0:92:20:b2:c6:5d:cc:bb:1a:13:b2:e6: 23:2d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #256: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #257: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #258: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: d7:e3:4d:a5:99:ed:f1:71:93:4d:13:b5:48:f1:5b:ee Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #259: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #260: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #261: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #262: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 40:00:a1:33:d7:8d:08:dd:65:f9:c9:d3:bf:1c:29:47 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #263: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #264: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #265: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #266: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: c5:6f:ed:47:34:3e:d5:8d:49:2e:93:32:5b:3e:6a:5b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #267: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #268: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #269: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #270: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 56:33:c0:fa:b1:ca:6f:a6:65:93:73:96:b7:17:63:95 Iteration Count: 600000 (0x927c0) tools.sh: #271: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #272: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #273: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #274: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 41:ec:73:aa:f1:b1:66:f5:4b:4e:00:15:d3:f6:45:4f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #275: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #276: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #277: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #278: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 11:df:c1:c9:bb:10:f2:09:ff:b0:99:dc:47:88:99:48 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #280: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #281: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #282: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: a7:1a:f4:47:ff:7b:9f:bb:3b:e5:2f:81:28:90:04:63 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #283: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #284: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #285: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #286: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a7:f8:d3:85:fd:e5:b6:de:d8:c0:44:3a:fd:c3:e4:3d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #287: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #288: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #289: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #290: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: c9:73:10:68:95:59:1e:75:d5:09:f6:96:36:45:d2:95 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #292: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #293: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #294: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 94:af:86:d2:68:dc:4e:9e:f5:90:9b:cb:ce:88:37:11 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:34:9d:1a:db:b8:98:8a:24:be:c0:50:75:a8:3d: 0f:4c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #295: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #296: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #297: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #298: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 8f:98:cf:ea:71:ff:ea:cf:6b:ee:9e:45:84:c7:9e:ca Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #299: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #300: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #301: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #302: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f1:c1:f0:cf:36:8f:14:b1:50:42:42:1d:53:88:15:78 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #304: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #305: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #306: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: d2:90:15:02:54:98:15:0a:e5:dd:34:54:d5:81:fb:74 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #307: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #308: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #309: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #310: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 2e:65:cb:8f:50:a1:1a:3c:ca:29:ea:68:36:7b:89:2c Iteration Count: 600000 (0x927c0) tools.sh: #311: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #312: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #313: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #314: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: b5:92:77:84:ed:62:07:d1:55:64:e4:01:10:82:ce:32 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #316: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #317: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #318: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 66:b8:85:03:09:2f:4e:8f:62:32:f5:b2:3d:7d:7c:1b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #319: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #320: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #321: Exporting with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #322: Verifying p12 file generated with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 3c:53:3c:d7:a4:f1:5e:e7:a0:f9:c8:f2:a3:5b:bc:00 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #323: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #324: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #325: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #326: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e9:d4:b0:b8:03:98:ff:ed:9e:7c:b4:4d:ff:40:e6:7a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #328: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #329: Exporting with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #330: Verifying p12 file generated with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 5a:91:bb:f2:a3:8b:78:52:ab:72:e2:e6:93:a1:51:9e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #331: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #332: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #333: Exporting with [AES-256-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #334: Verifying p12 file generated with [AES-256-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 88:b2:f8:25:2d:b5:67:7f:e0:67:9e:d8:96:89:0f:33 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:34:12:0c:67:92:22:86:df:88:b8:2c:b4:3d:33: e1:87 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #335: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #336: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #337: Exporting with [RC2-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #338: Verifying p12 file generated with [RC2-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 28:5e:b9:72:5e:de:cc:e9:56:52:8c:9c:d6:2a:a9:eb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #339: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #340: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #341: Exporting with [default:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #342: Verifying p12 file generated with [default:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 26:ed:93:88:34:b3:32:14:48:78:71:63:c1:bd:8d:77 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #343: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #344: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #345: Exporting with [RC2-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #346: Verifying p12 file generated with [RC2-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 8e:db:6d:a2:96:e0:8f:92:f1:c4:2e:25:0b:22:5a:40 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #347: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #348: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #349: Exporting with [RC2-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #350: Verifying p12 file generated with [RC2-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 2c:61:b2:cb:12:b3:f3:91:cc:56:ce:42:85:70:e2:f1 Iteration Count: 600000 (0x927c0) tools.sh: #351: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #352: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "RC2-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #353: Exporting with [RC2-CBC:RC2-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #354: Verifying p12 file generated with [RC2-CBC:RC2-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: a5:e8:29:cf:56:0d:07:c3:dc:c1:89:1f:ac:e8:a4:05 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #355: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #356: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #357: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #358: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 40:b0:34:b1:87:67:0a:da:77:01:2a:21:18:9e:28:b6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #359: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #360: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #361: Exporting with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #362: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 37:7c:87:00:3a:59:d8:b5:b0:3d:7d:9a:19:a7:fa:ab Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #364: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #365: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #366: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bf:86:4f:4a:fb:6c:e9:a7:65:ed:09:0d:b9:e5:fa:a9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #367: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #368: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #369: Exporting with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #370: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 39:d1:45:a1:99:51:57:58:df:27:cf:69:e2:5c:a7:cf Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #371: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #372: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #373: Exporting with [AES-256-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #374: Verifying p12 file generated with [AES-256-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ce:d9:46:75:a8:4d:71:d2:1e:5d:d3:a1:80:bc:1b:8e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:a9:a5:84:3e:06:f8:9e:f4:af:39:e1:52:a5:41: f6:d3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #376: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #377: Exporting with [DES-EDE3-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #378: Verifying p12 file generated with [DES-EDE3-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ca:8c:64:d3:d5:de:c8:cd:17:ab:0d:44:be:11:9f:a3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #379: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #380: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #381: Exporting with [default:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #382: Verifying p12 file generated with [default:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 69:d9:88:c3:ff:2a:ba:b6:76:63:60:33:b7:91:21:e3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #383: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #384: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #385: Exporting with [DES-EDE3-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #386: Verifying p12 file generated with [DES-EDE3-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: db:89:be:0b:d6:bd:0d:ae:82:f1:2d:a7:1a:2e:17:20 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #387: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #388: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #389: Exporting with [DES-EDE3-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #390: Verifying p12 file generated with [DES-EDE3-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b9:83:19:f8:c7:af:25:95:11:13:c4:3e:17:5c:83:4a Iteration Count: 600000 (0x927c0) tools.sh: #391: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #392: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #393: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #394: Verifying p12 file generated with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 48:5e:a0:26:7e:a5:d7:4d:8c:e5:ea:5c:4a:a3:15:d2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #395: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #396: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #397: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #398: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 8c:9c:0c:53:43:3d:6d:aa:29:63:e7:18:65:3f:ab:a0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #399: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #400: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #401: Exporting with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #402: Verifying p12 file generated with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8c:ad:05:d6:f8:74:e6:e1:74:c8:45:a5:56:d4:89:bd Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:b0:a2:f6:67:19:86:9f:84:95:60:46:f5:62:86: 11:1e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #403: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #404: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #405: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #406: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 72:b3:1e:8b:38:85:bd:47:23:0d:e2:65:4b:98:42:fb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #407: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #408: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #409: Exporting with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #410: Verifying p12 file generated with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 66:d7:f9:7b:8b:2a:dc:d7:0e:07:d9:59:56:38:56:d7 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:4b:5c:98:2f:44:91:af:27:12:ff:e0:d4:87:28: 0d:62 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #411: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #412: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #413: Exporting with [AES-256-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #414: Verifying p12 file generated with [AES-256-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7d:bf:65:6a:e2:ad:85:d8:a2:a7:7b:a8:f4:37:8f:a4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:9e:1a:ad:12:c7:7f:e7:a1:ee:c3:d5:c1:69:f9: 6d:ad Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #415: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #416: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #417: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #418: Verifying p12 file generated with [AES-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6e:0f:36:c5:8a:e2:38:0f:13:8a:2e:17:ab:96:c8:d5 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:4e:2c:d3:57:b1:26:22:6c:42:e0:3d:61:94:52: 0d:1c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #419: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #420: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #421: Exporting with [default:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #422: Verifying p12 file generated with [default:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ad:43:fb:7b:09:77:d0:63:b5:55:ee:c1:4e:3c:58:a5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #423: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #424: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #425: Exporting with [AES-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #426: Verifying p12 file generated with [AES-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 83:dd:f1:1c:4c:e4:1a:ea:41:ab:b4:39:28:a1:24:b5 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:0c:c7:01:f5:ac:aa:79:90:13:ac:35:6e:66:80: cd:f1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #427: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #428: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #429: Exporting with [AES-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #430: Verifying p12 file generated with [AES-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9d:e5:d7:44:9e:66:f5:4b:70:a7:ab:ef:3c:bc:77:43 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: AES-128-CBC Args: 04:10:2a:59:74:46:03:0c:55:fb:50:aa:43:c6:34:52: 7f:f7 tools.sh: #431: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #432: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #433: Exporting with [AES-128-CBC:AES-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #434: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ec:80:4d:04:52:36:d6:d1:6b:b8:e3:b9:a1:11:c2:22 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: AES-128-CBC Args: 04:10:42:9e:09:c3:8f:dd:ee:42:17:b3:45:7c:48:9f: db:cd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #435: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #436: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #437: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #438: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 38:29:e3:8b:e6:40:97:0f:d8:a4:fa:57:9b:1e:9f:ca Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #439: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #440: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #441: Exporting with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #442: Verifying p12 file generated with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c6:6b:1a:92:fb:7f:42:ab:d8:02:22:be:bf:14:ed:bb Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:54:da:60:0d:71:52:4c:3a:f0:2b:bf:eb:60:82: 2a:54 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #443: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #444: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #445: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #446: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0b:5a:86:37:61:df:e7:a6:7f:c8:42:25:7d:fb:bd:96 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #447: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #448: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #449: Exporting with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #450: Verifying p12 file generated with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 55:b5:f5:e4:83:bf:20:aa:fd:c4:af:17:9e:47:3e:86 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:54:87:77:91:7a:c1:d1:1e:11:aa:f4:95:af:71: 6e:93 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #451: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #452: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #453: Exporting with [AES-256-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #454: Verifying p12 file generated with [AES-256-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0f:aa:65:c3:f2:d4:da:46:42:ba:09:0b:40:c6:d5:f8 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:f7:4e:8f:a6:57:1d:71:70:0a:0a:29:43:4d:6a: c7:10 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #455: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #456: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #457: Exporting with [AES-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #458: Verifying p12 file generated with [AES-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: dc:55:1d:c1:80:9f:13:95:60:1f:fd:15:55:7e:ae:85 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:49:83:76:8f:46:5f:1f:b6:64:b8:02:67:d8:86: 45:cd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #459: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #460: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #461: Exporting with [default:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #462: Verifying p12 file generated with [default:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 27:a2:43:4b:9e:b5:76:ca:dd:4b:89:ce:14:f8:91:51 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #463: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #464: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #465: Exporting with [AES-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #466: Verifying p12 file generated with [AES-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 13:77:7a:d0:d9:7b:20:57:85:8a:35:a1:00:0c:f4:71 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:38:06:0c:30:68:c9:10:28:ec:c2:be:be:41:c5: b6:1d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #467: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #468: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #469: Exporting with [AES-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #470: Verifying p12 file generated with [AES-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 08:d9:e1:cc:79:8e:36:bb:1a:2d:d9:58:fd:95:ef:d3 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: AES-192-CBC Args: 04:10:e8:14:a7:94:03:82:96:72:ba:97:ca:02:ad:3a: b8:bb tools.sh: #471: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #472: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #473: Exporting with [AES-192-CBC:AES-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #474: Verifying p12 file generated with [AES-192-CBC:AES-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 38:9e:83:94:9f:94:aa:6c:52:e3:8e:6e:c6:3c:ff:5a Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: AES-192-CBC Args: 04:10:45:4a:f7:5d:b5:20:1e:b3:a0:49:8c:e8:58:80: 1c:48 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #475: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #476: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #477: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #478: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 94:b8:1f:f4:fb:a0:66:9f:4c:80:9e:a5:8d:dd:b8:c7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #479: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #480: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #481: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #482: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: bc:c4:a0:63:bb:e8:90:1d:65:15:27:2e:8f:b3:b9:6b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:43:fe:46:48:a7:23:00:9a:19:dd:fb:3b:7b:ed: f5:84 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #483: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #484: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #485: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #486: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bc:76:82:26:4a:ac:50:cd:1b:39:c0:0f:b5:0d:c7:b1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #487: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #488: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #489: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #490: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a2:76:a9:4f:95:a4:b3:e7:16:72:96:df:7a:8d:01:83 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:9b:50:f5:7c:bc:6b:39:ca:da:26:e0:65:45:81: 83:ec Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #491: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #492: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #493: Exporting with [default:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #494: Verifying p12 file generated with [default:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3d:6a:a9:9d:fb:17:fc:23:91:78:3c:df:57:57:5a:81 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #495: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #496: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #497: Exporting with [AES-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #498: Verifying p12 file generated with [AES-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 65:02:20:6d:15:9d:25:5b:f9:7c:c6:87:02:94:4b:b2 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:9c:46:72:1b:e4:df:00:09:02:d7:a0:27:a8:82: a0:43 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #499: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #500: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #501: Exporting with [AES-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #502: Verifying p12 file generated with [AES-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 52:1e:31:7d:ef:1f:94:ae:e9:da:c8:4b:26:19:3f:d3 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:08:5e:5b:ea:e2:16:ef:ea:5a:f4:d0:b4:6a:9b: a3:11 tools.sh: #503: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #504: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #505: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #506: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 37:d8:43:a0:95:55:e5:be:97:3f:be:5b:23:1c:a5:ec Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:7f:b9:18:87:93:d9:f9:81:99:08:c8:6b:51:b1: a6:08 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #507: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #508: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #509: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #510: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 69:7d:7b:bc:c9:16:6b:c1:a4:3f:01:27:81:a6:e1:3f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #511: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #512: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #513: Exporting with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #514: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 46:ca:e8:c2:59:e9:09:3b:8e:f1:37:bd:83:d4:92:be Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:f0:98:e5:3f:d4:e0:b4:71:73:bd:f6:ff:aa:a2: d1:e0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #515: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #516: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #517: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #518: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8a:9a:d3:7d:87:5b:00:32:bc:70:f2:ed:67:bd:53:62 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #519: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #520: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #521: Exporting with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #522: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ca:2e:81:01:05:22:37:f1:68:4e:ac:29:5a:e1:29:f6 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:05:bc:f9:aa:17:64:bc:3c:97:6d:5f:7e:94:a7: 7a:0d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #523: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #524: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #525: Exporting with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #526: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5b:aa:f3:fc:6c:a3:8a:d4:de:d7:b5:de:f7:ec:d7:26 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:eb:cc:eb:0a:07:32:41:27:b0:f3:6c:2b:97:4c: 21:6a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #527: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #528: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #529: Exporting with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #530: Verifying p12 file generated with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 85:51:26:bd:08:1a:5a:0a:89:67:3b:8d:e2:8c:23:ac Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:47:95:7c:ad:38:81:3f:bc:86:3e:af:04:f9:43: cc:4e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #531: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #532: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #533: Exporting with [default:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #534: Verifying p12 file generated with [default:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 40:ce:4f:61:91:7f:b5:6a:d4:7d:30:ac:73:2f:f2:6e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #535: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #536: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #537: Exporting with [CAMELLIA-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #538: Verifying p12 file generated with [CAMELLIA-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f7:27:7e:6d:26:b4:15:9e:0b:df:25:77:fe:26:a7:d2 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:cd:97:54:e0:0c:1f:b7:c3:c3:0d:1d:c7:bc:1a: b2:ee Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #539: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #540: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #541: Exporting with [CAMELLIA-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #542: Verifying p12 file generated with [CAMELLIA-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: db:e4:0a:74:b5:50:38:53:d8:5c:43:4f:26:68:47:4a Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-128-CBC Args: 04:10:24:88:8e:2b:01:15:a1:f7:3f:38:9e:e4:a5:b4: 30:b4 tools.sh: #543: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #544: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #545: Exporting with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #546: Verifying p12 file generated with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ca:26:8a:56:18:8d:ec:44:8d:cb:dd:db:44:dc:b1:d3 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-128-CBC Args: 04:10:68:d6:0e:65:68:bc:d0:37:33:83:78:84:f9:47: 56:bf Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #547: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #548: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #549: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #550: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 17:6a:55:5f:21:91:a6:94:2a:3e:0a:22:5a:6e:e9:f7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #551: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #552: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #553: Exporting with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #554: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7d:d6:c0:ae:c3:23:b6:67:39:2f:c8:6f:6e:36:49:d8 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:6a:fe:af:84:d5:5c:a9:b1:5b:cd:c4:86:d0:98: de:c5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #555: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #556: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #557: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #558: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 39:5b:b9:70:bd:98:55:db:43:cb:f0:c1:4b:c8:c0:eb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #559: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #560: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #561: Exporting with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #562: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b0:4a:bc:88:bb:f3:0c:69:27:a7:55:f6:78:c7:7d:b8 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:45:8b:03:17:c5:b4:dc:54:9c:de:30:77:18:0b: 8a:1a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #563: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #564: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #565: Exporting with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #566: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7a:b9:56:9b:d4:8d:bd:b3:ad:b8:56:be:20:4b:e4:24 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:b7:fa:20:d0:5a:64:44:47:f4:30:47:5e:a7:51: 0b:4a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #567: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #568: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #569: Exporting with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #570: Verifying p12 file generated with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 14:d4:ff:56:0c:63:63:12:69:bc:1d:42:af:6c:c8:b0 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:33:4b:3a:43:30:f6:1a:28:5f:b8:17:77:7c:b7: 1f:f0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #571: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #572: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #573: Exporting with [default:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #574: Verifying p12 file generated with [default:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ec:14:76:d4:9a:a1:64:fa:21:ca:d7:7d:dc:b6:18:be Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #575: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #576: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #577: Exporting with [CAMELLIA-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #578: Verifying p12 file generated with [CAMELLIA-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e1:24:f0:8b:97:86:be:d1:31:73:04:4a:e7:56:db:f0 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:a2:b0:36:db:0a:87:0e:71:38:21:07:58:73:27: c9:bd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #579: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #580: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #581: Exporting with [CAMELLIA-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #582: Verifying p12 file generated with [CAMELLIA-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 51:08:57:d2:ab:a1:9e:e6:01:9f:69:af:de:88:9f:5c Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-192-CBC Args: 04:10:a3:9f:70:ce:66:d4:6e:7b:83:b4:43:85:83:76: f7:1b tools.sh: #583: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #584: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #585: Exporting with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #586: Verifying p12 file generated with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2b:cc:d3:93:06:2d:3f:25:8b:ee:eb:fb:cc:9e:f3:17 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-192-CBC Args: 04:10:ef:5f:92:ab:84:a8:1c:db:d6:dd:ff:6e:fb:22: be:98 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #587: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #588: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #589: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #590: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 40:9e:60:b2:fd:fb:c2:7b:87:3c:da:2f:8d:e2:3a:70 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #591: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #592: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #593: Exporting with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #594: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 86:9e:81:98:73:b2:24:f5:d5:c1:8f:6b:ba:18:03:7e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:6d:f4:a4:9c:50:16:f0:9a:df:c4:2b:3f:bb:65: 85:79 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #595: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #596: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #597: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #598: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 28:f6:27:e2:47:a0:0f:5d:db:29:d0:aa:50:7d:ef:c1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #602: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 29:e9:25:47:a8:8e:d2:d9:c1:af:75:90:9f:7d:5f:30 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:34:cc:5d:c2:89:e6:30:f0:47:d7:80:af:c9:d1: 5d:cd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #603: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #604: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #605: Exporting with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #606: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 91:d7:ca:7d:ba:a6:4a:ec:d1:3e:70:fb:3c:a6:a7:7f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:b4:23:b7:97:31:52:ff:e2:c6:35:c7:84:4a:5a: f9:30 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #607: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #608: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #609: Exporting with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #610: Verifying p12 file generated with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c8:7c:ef:a0:d5:21:4c:4d:50:db:62:60:f2:96:2d:b6 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:69:aa:81:a4:ce:67:f0:9d:bb:0e:9c:4e:27:e0: 88:ef Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #611: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [default:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #614: Verifying p12 file generated with [default:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0d:29:51:21:88:9d:69:97:65:19:d5:58:31:fe:da:26 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #615: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #616: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #617: Exporting with [CAMELLIA-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #618: Verifying p12 file generated with [CAMELLIA-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c4:32:6a:0b:c4:c1:24:43:04:a9:cb:02:68:d5:40:50 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:a6:d3:3e:5c:fc:60:16:88:51:37:a4:82:da:2e: 68:fe Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #619: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #620: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #621: Exporting with [CAMELLIA-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #622: Verifying p12 file generated with [CAMELLIA-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 23:16:ba:37:b3:c1:fb:b2:cf:83:2a:5a:a7:1f:11:ba Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-256-CBC Args: 04:10:12:13:c8:90:0f:0a:d2:ca:6d:57:b4:1c:40:b9: 48:11 tools.sh: #623: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #626: Verifying p12 file generated with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5b:ee:fd:79:ab:45:2b:5e:9b:af:67:91:b8:d9:53:84 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-256-CBC Args: 04:10:8d:0d:7b:6c:c0:39:6d:33:90:e6:23:20:26:3d: d7:a1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #627: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #628: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #629: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #630: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 27:0a:fe:71:a3:87:60:a9:4a:50:e9:fc:12:d9:19:42 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #631: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #632: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #633: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #634: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: fe:3a:dd:e8:1f:5a:13:7f:27:b1:ef:ff:85:cb:87:e0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #638: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: b6:4d:1e:2c:87:0e:0c:5e:ce:b4:f3:52:e6:85:2b:21 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #639: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #640: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #641: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #642: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: b3:c5:de:9c:ad:55:6f:a3:df:59:35:1d:08:dd:d2:19 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #643: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #644: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #645: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #646: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 91:87:98:d7:08:d2:2e:3d:b5:b2:d2:3b:ac:c7:52:f3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #647: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #650: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 90:64:fa:a4:c7:aa:5d:80:ce:cc:cc:29:10:5a:37:56 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #651: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #652: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #653: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #654: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f7:68:d7:76:29:40:24:0f:8b:f7:36:b5:2a:27:d8:de Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #655: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #656: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #657: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #658: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4c:ce:ce:1f:6c:a7:0f:4e:62:0d:82:2c:37:ef:48:3f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #662: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cc:0e:2f:f1:4c:bd:eb:be:e4:e5:32:5e:9b:34:4d:64 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #663: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #664: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #665: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #666: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fd:30:6b:f4:0a:ab:48:29:80:3f:d0:3e:3c:e2:6a:87 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #667: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #668: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #669: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #670: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bf:20:75:c1:18:07:d6:d6:c6:04:6e:06:cd:a8:39:fd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #674: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 34:40:b1:10:fc:a3:e3:89:19:ae:6e:49:19:1a:1c:e3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #675: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #676: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #677: Exporting with [AES-256-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #678: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7e:9a:2d:9f:87:40:4e:37:c7:b2:a4:07:f2:e8:0e:75 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:8d:d3:49:c9:42:c2:53:da:68:ca:85:a5:f0:02: 04:70 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #679: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #680: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #681: Exporting with [AES-256-CBC:AES-256-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #682: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: dc:5c:66:fb:b8:e2:f2:48:6d:e3:17:e6:26:8d:1b:a0 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:bf:fd:5c:17:bd:a8:f1:65:2c:9a:7f:83:2f:3c: f0:5b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #683: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [AES-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #686: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cd:5c:b7:f0:6f:87:7a:59:85:dd:97:fe:9a:3f:f3:43 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:48:43:af:09:8b:84:35:10:dc:29:b6:01:9a:df: 60:71 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #687: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #688: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #689: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #690: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 87:9a:b9:e3:05:58:e8:a1:f2:40:c8:2d:3d:d9:88:98 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:7e:d7:75:3f:86:40:c7:db:bd:5b:b8:ba:4b:cd: 27:7a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #691: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #692: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #693: Exporting with [AES-256-CBC:AES-256-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #694: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 29:5b:36:b3:cc:62:ea:15:64:d0:02:3a:18:43:b1:d7 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: AES-256-CBC Args: 04:10:a2:74:11:db:26:47:14:00:39:17:5c:15:18:e5: 76:68 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [AES-256-CBC:AES-256-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #698: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 83:b4:c3:d9:e0:c0:05:04:a8:ce:73:46:28:dd:1a:b4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:41:25:40:77:a0:b4:44:3e:20:1e:26:55:b5:e7: 7e:20 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #699: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #700: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #701: Exporting with [default:default:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #702: Verifying p12 file generated with [default:default:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fe:d9:32:d5:d8:6b:97:5e:b2:b5:f2:9a:0d:d0:36:a7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #703: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #704: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #705: Exporting with [default:default:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #706: Verifying p12 file generated with [default:default:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 94:7f:f1:dd:84:e2:11:8e:f2:f6:1d:ac:f1:0a:22:74 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #709: Exporting with [default:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #710: Verifying p12 file generated with [default:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 62:0e:5f:5c:3e:be:57:9f:a6:f5:02:c5:bf:78:7c:6a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #711: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #712: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #713: Exporting with [default:default:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #714: Verifying p12 file generated with [default:default:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a4:fb:54:c7:ea:6c:ed:21:50:04:1b:08:c4:44:24:46 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #715: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #716: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #717: Exporting with [default:default:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #718: Verifying p12 file generated with [default:default:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bd:91:76:e7:c8:67:0c:bf:55:d5:9d:3e:3c:02:b1:b9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #719: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #721: Exporting with [default:default:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #722: Verifying p12 file generated with [default:default:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 34:b7:30:57:b2:f8:45:03:33:80:a8:33:da:f8:08:9a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #723: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #724: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c none pk12util: Algorithm: "none": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #725: Exporting with [none:default:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C none pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #726: Exporting with [default:none:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #727: Verifying p12 file generated with [default:none:default] - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #728: Exporting with [INVALID_CIPHER:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #729: Exporting with [default:INVALID_CIPHER] (pk12util -o) - PASSED tools.sh: Importing PKCS#12 files created with older NSS -------------- pk12util -i TestOldCA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #730: Importing PKCS#12 file created with NSS 3.21 (PBES2 with BMPString password) - PASSED pk12util -i TestOldAES128CA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #731: Importing PKCS#12 file created with NSS 3.29.5 (PBES2 with incorrect AES-128-CBC algorithm ID) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #732: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #733: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #734: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #735: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #736: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #737: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #738: Show who signed xpi (signtool -w) - PASSED tools.sh: Test if DB created by modutil -create is initialized WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Generating key. This may take a few moments... tools.sh: #739: Test if DB created by modutil -create is initialized - PASSED TIMESTAMP tools END: Tue Sep 27 20:08:11 UTC 2022 Running tests for fips TIMESTAMP fips BEGIN: Tue Sep 27 20:08:11 UTC 2022 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Internal%20Crypto%20Services;library-version=3.79 slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB uri: pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 2. RootCerts library name: /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Builtin%20Object%20Cryptoki%20Modu;library-version=2.54 slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token uri: pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 ----------------------------------------------------------- FIPS mode enabled. fips.sh: #1: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 8f528182bf231e402ca7748f3fdabda39b05b1da NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #3: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #4: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #5: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #6: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #7: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #8: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #9: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #11: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #13: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 8f528182bf231e402ca7748f3fdabda39b05b1da FIPS_PUB_140_Test_Certificate fips.sh: #14: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #15: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #16: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #17: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #18: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 8f528182bf231e402ca7748f3fdabda39b05b1da FIPS_PUB_140_Test_Certificate fips.sh: #19: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 99. **** **** ALL TESTS PASSED **** fips.sh: #20: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 97. **** **** ALL TESTS PASSED **** fips.sh: #21: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi-testlib.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib64/libsoftokn3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle Changing byte 0x00053dc0 (343488): from 00 (0) to 20 (32) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/fips/mangle dbtest -r -d ../fips fips.sh: #22: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Tue Sep 27 20:08:53 UTC 2022 Running tests for sdr TIMESTAMP sdr BEGIN: Tue Sep 27 20:08:53 UTC 2022 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests.v1.3122 -t "Test1" -f ../tests.pw sdr.sh: #1: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests.v2.3122 -t "The quick brown fox jumped over the lazy dog" -f ../tests.pw sdr.sh: #2: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests.v3.3122 -t "1234567" -f ../tests.pw sdr.sh: #3: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests.v1.3122 -t "Test1" -f ../tests.pw sdr.sh: #4: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests.v2.3122 -t "The quick brown fox jumped over the lazy dog" -f ../tests.pw sdr.sh: #5: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests.v3.3122 -t "1234567" -f ../tests.pw sdr.sh: #6: Decrypt - Value 3 - PASSED sdr.sh: pwdecrypt - 300 Entries time pwdecrypt -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/SDR/combined.3122 -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/SDR/decoded.3122 -l /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/SDR/log.3122 -d . -f ../tests.pw ------------- result ---------------------- Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" 9800 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/SDR/decoded.3122 sdr.sh: #7: pwdecrypt success - PASSED ------------- log ---------------------- 0 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/SDR/log.3122 sdr.sh: #8: pwdecrypt no error log - PASSED ------------- time ---------------------- real 0.48 user 0.47 sys 0.01 0 seconds TIMESTAMP sdr END: Tue Sep 27 20:08:55 UTC 2022 Running tests for crmf TIMESTAMP crmf BEGIN: Tue Sep 27 20:08:55 UTC 2022 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #1: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #2: CMMF test . - PASSED TIMESTAMP crmf END: Tue Sep 27 20:08:56 UTC 2022 Running tests for smime TIMESTAMP smime BEGIN: Tue Sep 27 20:08:56 UTC 2022 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #1: Create Detached Signature Alice (1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #2: Verifying Alice's Detached Signature (1) . - PASSED smime.sh: Signing Attached Message (1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #3: Create Attached Signature Alice (1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.1 smime.sh: #4: Decode Alice's Attached Signature (1) . - PASSED diff alice.txt alice.data.1 smime.sh: #5: Compare Attached Signed Data and Original (1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #6: Create Detached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #7: Verifying Alice's Detached Signature (ECDSA w/ 1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #8: Create Attached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.1 smime.sh: #9: Decode Alice's Attached Signature (ECDSA w/ 1) . - PASSED diff alice.txt alice-ec.data.1 smime.sh: #10: Compare Attached Signed Data and Original (ECDSA w/ 1) . - PASSED smime.sh: Signing Detached Message {256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #11: Create Detached Signature Alice (256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #12: Verifying Alice's Detached Signature (256) . - PASSED smime.sh: Signing Attached Message (256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #13: Create Attached Signature Alice (256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.256 smime.sh: #14: Decode Alice's Attached Signature (256) . - PASSED diff alice.txt alice.data.256 smime.sh: #15: Compare Attached Signed Data and Original (256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #16: Create Detached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #17: Verifying Alice's Detached Signature (ECDSA w/ 256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #18: Create Attached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.256 smime.sh: #19: Decode Alice's Attached Signature (ECDSA w/ 256) . - PASSED diff alice.txt alice-ec.data.256 smime.sh: #20: Compare Attached Signed Data and Original (ECDSA w/ 256) . - PASSED smime.sh: Signing Detached Message {384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #21: Create Detached Signature Alice (384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #22: Verifying Alice's Detached Signature (384) . - PASSED smime.sh: Signing Attached Message (384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #23: Create Attached Signature Alice (384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.384 smime.sh: #24: Decode Alice's Attached Signature (384) . - PASSED diff alice.txt alice.data.384 smime.sh: #25: Compare Attached Signed Data and Original (384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #26: Create Detached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #27: Verifying Alice's Detached Signature (ECDSA w/ 384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #28: Create Attached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.384 smime.sh: #29: Decode Alice's Attached Signature (ECDSA w/ 384) . - PASSED diff alice.txt alice-ec.data.384 smime.sh: #30: Compare Attached Signed Data and Original (ECDSA w/ 384) . - PASSED smime.sh: Signing Detached Message {512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #31: Create Detached Signature Alice (512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #32: Verifying Alice's Detached Signature (512) . - PASSED smime.sh: Signing Attached Message (512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #33: Create Attached Signature Alice (512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.512 smime.sh: #34: Decode Alice's Attached Signature (512) . - PASSED diff alice.txt alice.data.512 smime.sh: #35: Compare Attached Signed Data and Original (512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #36: Create Detached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #37: Verifying Alice's Detached Signature (ECDSA w/ 512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #38: Create Attached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.512 smime.sh: #39: Decode Alice's Attached Signature (ECDSA w/ 512) . - PASSED diff alice.txt alice-ec.data.512 smime.sh: #40: Compare Attached Signed Data and Original (ECDSA w/ 512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@example.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #41: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #42: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #43: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@example.com,dave@example.com smime.sh: #44: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@example.net smime.sh: #45: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #46: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #47: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #48: Decrypt with a Multiple Email cert . - PASSED smime.sh: #49: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #50: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #51: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@example.com,dave@example.com" \ -d ../alicedir > co.der smime.sh: #52: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #53: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@example.com" > alice.enc smime.sh: #54: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #55: Decode Encrypted-Data . - PASSED smime.sh: #56: Compare Decoded and Original Data . - PASSED pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #57: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice_p7.env -o alice_p7.data smime.sh: #58: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #59: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #60: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #61: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Tue Sep 27 20:09:56 UTC 2022 Running tests for ssl TIMESTAMP ssl BEGIN: Tue Sep 27 20:09:56 UTC 2022 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:09:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:09:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16073 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16073 found at Tue Sep 27 20:09:56 UTC 2022 selfserv_9223 with PID 16073 started at Tue Sep 27 20:09:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16073 at Tue Sep 27 20:09:57 UTC 2022 kill -USR1 16073 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16073 killed at Tue Sep 27 20:09:57 UTC 2022 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:09:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:09:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16126 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16126 found at Tue Sep 27 20:09:57 UTC 2022 selfserv_9223 with PID 16126 started at Tue Sep 27 20:09:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16126 at Tue Sep 27 20:09:58 UTC 2022 kill -USR1 16126 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16126 killed at Tue Sep 27 20:09:58 UTC 2022 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:09:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:09:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16178 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16178 found at Tue Sep 27 20:09:58 UTC 2022 selfserv_9223 with PID 16178 started at Tue Sep 27 20:09:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #3: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16178 at Tue Sep 27 20:09:59 UTC 2022 kill -USR1 16178 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16178 killed at Tue Sep 27 20:09:59 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:09:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:09:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16244 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16244 found at Tue Sep 27 20:10:00 UTC 2022 selfserv_9223 with PID 16244 started at Tue Sep 27 20:10:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #4: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16244 at Tue Sep 27 20:10:00 UTC 2022 kill -USR1 16244 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16244 killed at Tue Sep 27 20:10:00 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:10:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16296 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16296 found at Tue Sep 27 20:10:01 UTC 2022 selfserv_9223 with PID 16296 started at Tue Sep 27 20:10:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16296 at Tue Sep 27 20:10:01 UTC 2022 kill -USR1 16296 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16296 killed at Tue Sep 27 20:10:01 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:10:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16348 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16348 found at Tue Sep 27 20:10:02 UTC 2022 selfserv_9223 with PID 16348 started at Tue Sep 27 20:10:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #6: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16348 at Tue Sep 27 20:10:02 UTC 2022 kill -USR1 16348 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16348 killed at Tue Sep 27 20:10:02 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16414 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16414 found at Tue Sep 27 20:10:03 UTC 2022 selfserv_9223 with PID 16414 started at Tue Sep 27 20:10:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #7: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 16414 at Tue Sep 27 20:10:03 UTC 2022 kill -USR1 16414 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16414 killed at Tue Sep 27 20:10:03 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16466 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16466 found at Tue Sep 27 20:10:04 UTC 2022 selfserv_9223 with PID 16466 started at Tue Sep 27 20:10:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16466 at Tue Sep 27 20:10:04 UTC 2022 kill -USR1 16466 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16466 killed at Tue Sep 27 20:10:04 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16518 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16518 found at Tue Sep 27 20:10:05 UTC 2022 selfserv_9223 with PID 16518 started at Tue Sep 27 20:10:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 16518 at Tue Sep 27 20:10:05 UTC 2022 kill -USR1 16518 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16518 killed at Tue Sep 27 20:10:05 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16584 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16584 found at Tue Sep 27 20:10:06 UTC 2022 selfserv_9223 with PID 16584 started at Tue Sep 27 20:10:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 16584 at Tue Sep 27 20:10:06 UTC 2022 kill -USR1 16584 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16584 killed at Tue Sep 27 20:10:06 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16636 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16636 found at Tue Sep 27 20:10:07 UTC 2022 selfserv_9223 with PID 16636 started at Tue Sep 27 20:10:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #11: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 16636 at Tue Sep 27 20:10:07 UTC 2022 kill -USR1 16636 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16636 killed at Tue Sep 27 20:10:08 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16688 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16688 found at Tue Sep 27 20:10:08 UTC 2022 selfserv_9223 with PID 16688 started at Tue Sep 27 20:10:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #12: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 16688 at Tue Sep 27 20:10:09 UTC 2022 kill -USR1 16688 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16688 killed at Tue Sep 27 20:10:09 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:10:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16754 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16754 found at Tue Sep 27 20:10:09 UTC 2022 selfserv_9223 with PID 16754 started at Tue Sep 27 20:10:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #13: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 16754 at Tue Sep 27 20:10:10 UTC 2022 kill -USR1 16754 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16754 killed at Tue Sep 27 20:10:10 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:10:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16816 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16816 found at Tue Sep 27 20:10:10 UTC 2022 selfserv_9223 with PID 16816 started at Tue Sep 27 20:10:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #14: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 16816 at Tue Sep 27 20:10:10 UTC 2022 kill -USR1 16816 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16816 killed at Tue Sep 27 20:10:11 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:10:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16868 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16868 found at Tue Sep 27 20:10:11 UTC 2022 selfserv_9223 with PID 16868 started at Tue Sep 27 20:10:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #15: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 16868 at Tue Sep 27 20:10:11 UTC 2022 kill -USR1 16868 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16868 killed at Tue Sep 27 20:10:12 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16939 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16939 found at Tue Sep 27 20:10:12 UTC 2022 selfserv_9223 with PID 16939 started at Tue Sep 27 20:10:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #16: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 16939 at Tue Sep 27 20:10:12 UTC 2022 kill -USR1 16939 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16939 killed at Tue Sep 27 20:10:13 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16991 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16991 found at Tue Sep 27 20:10:13 UTC 2022 selfserv_9223 with PID 16991 started at Tue Sep 27 20:10:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #17: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16991 at Tue Sep 27 20:10:13 UTC 2022 kill -USR1 16991 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16991 killed at Tue Sep 27 20:10:14 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17043 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17043 found at Tue Sep 27 20:10:14 UTC 2022 selfserv_9223 with PID 17043 started at Tue Sep 27 20:10:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #18: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 17043 at Tue Sep 27 20:10:14 UTC 2022 kill -USR1 17043 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17043 killed at Tue Sep 27 20:10:15 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17109 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17109 found at Tue Sep 27 20:10:15 UTC 2022 selfserv_9223 with PID 17109 started at Tue Sep 27 20:10:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #19: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17109 at Tue Sep 27 20:10:16 UTC 2022 kill -USR1 17109 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17109 killed at Tue Sep 27 20:10:16 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17161 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17161 found at Tue Sep 27 20:10:16 UTC 2022 selfserv_9223 with PID 17161 started at Tue Sep 27 20:10:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #20: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17161 at Tue Sep 27 20:10:17 UTC 2022 kill -USR1 17161 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17161 killed at Tue Sep 27 20:10:17 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17213 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17213 found at Tue Sep 27 20:10:17 UTC 2022 selfserv_9223 with PID 17213 started at Tue Sep 27 20:10:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #21: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17213 at Tue Sep 27 20:10:18 UTC 2022 kill -USR1 17213 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17213 killed at Tue Sep 27 20:10:18 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:10:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17279 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17279 found at Tue Sep 27 20:10:18 UTC 2022 selfserv_9223 with PID 17279 started at Tue Sep 27 20:10:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #22: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17279 at Tue Sep 27 20:10:19 UTC 2022 kill -USR1 17279 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17279 killed at Tue Sep 27 20:10:19 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:10:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17331 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17331 found at Tue Sep 27 20:10:19 UTC 2022 selfserv_9223 with PID 17331 started at Tue Sep 27 20:10:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #23: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17331 at Tue Sep 27 20:10:20 UTC 2022 kill -USR1 17331 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17331 killed at Tue Sep 27 20:10:20 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:10:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17383 found at Tue Sep 27 20:10:20 UTC 2022 selfserv_9223 with PID 17383 started at Tue Sep 27 20:10:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #24: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17383 at Tue Sep 27 20:10:21 UTC 2022 kill -USR1 17383 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17383 killed at Tue Sep 27 20:10:21 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17449 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17449 found at Tue Sep 27 20:10:21 UTC 2022 selfserv_9223 with PID 17449 started at Tue Sep 27 20:10:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #25: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 17449 at Tue Sep 27 20:10:22 UTC 2022 kill -USR1 17449 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17449 killed at Tue Sep 27 20:10:22 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17501 found at Tue Sep 27 20:10:22 UTC 2022 selfserv_9223 with PID 17501 started at Tue Sep 27 20:10:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #26: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17501 at Tue Sep 27 20:10:23 UTC 2022 kill -USR1 17501 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17501 killed at Tue Sep 27 20:10:23 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17553 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17553 found at Tue Sep 27 20:10:23 UTC 2022 selfserv_9223 with PID 17553 started at Tue Sep 27 20:10:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #27: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 17553 at Tue Sep 27 20:10:23 UTC 2022 kill -USR1 17553 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17553 killed at Tue Sep 27 20:10:24 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17619 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17619 found at Tue Sep 27 20:10:24 UTC 2022 selfserv_9223 with PID 17619 started at Tue Sep 27 20:10:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #28: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 17619 at Tue Sep 27 20:10:25 UTC 2022 kill -USR1 17619 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17619 killed at Tue Sep 27 20:10:25 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17672 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17672 found at Tue Sep 27 20:10:25 UTC 2022 selfserv_9223 with PID 17672 started at Tue Sep 27 20:10:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #29: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 17672 at Tue Sep 27 20:10:26 UTC 2022 kill -USR1 17672 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17672 killed at Tue Sep 27 20:10:26 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17724 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17724 found at Tue Sep 27 20:10:26 UTC 2022 selfserv_9223 with PID 17724 started at Tue Sep 27 20:10:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #30: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 17724 at Tue Sep 27 20:10:27 UTC 2022 kill -USR1 17724 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17724 killed at Tue Sep 27 20:10:27 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:10:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17790 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17790 found at Tue Sep 27 20:10:27 UTC 2022 selfserv_9223 with PID 17790 started at Tue Sep 27 20:10:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #31: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 17790 at Tue Sep 27 20:10:28 UTC 2022 kill -USR1 17790 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17790 killed at Tue Sep 27 20:10:28 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:10:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17842 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17842 found at Tue Sep 27 20:10:28 UTC 2022 selfserv_9223 with PID 17842 started at Tue Sep 27 20:10:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #32: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 17842 at Tue Sep 27 20:10:29 UTC 2022 kill -USR1 17842 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17842 killed at Tue Sep 27 20:10:29 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:10:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17894 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17894 found at Tue Sep 27 20:10:29 UTC 2022 selfserv_9223 with PID 17894 started at Tue Sep 27 20:10:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #33: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 17894 at Tue Sep 27 20:10:29 UTC 2022 kill -USR1 17894 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17894 killed at Tue Sep 27 20:10:30 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17960 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17960 found at Tue Sep 27 20:10:30 UTC 2022 selfserv_9223 with PID 17960 started at Tue Sep 27 20:10:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #34: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 17960 at Tue Sep 27 20:10:30 UTC 2022 kill -USR1 17960 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17960 killed at Tue Sep 27 20:10:31 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18012 found at Tue Sep 27 20:10:31 UTC 2022 selfserv_9223 with PID 18012 started at Tue Sep 27 20:10:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #35: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18012 at Tue Sep 27 20:10:31 UTC 2022 kill -USR1 18012 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18012 killed at Tue Sep 27 20:10:32 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18064 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18064 found at Tue Sep 27 20:10:32 UTC 2022 selfserv_9223 with PID 18064 started at Tue Sep 27 20:10:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #36: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 18064 at Tue Sep 27 20:10:32 UTC 2022 kill -USR1 18064 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18064 killed at Tue Sep 27 20:10:32 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18130 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18130 found at Tue Sep 27 20:10:33 UTC 2022 selfserv_9223 with PID 18130 started at Tue Sep 27 20:10:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #37: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18130 at Tue Sep 27 20:10:34 UTC 2022 kill -USR1 18130 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18130 killed at Tue Sep 27 20:10:34 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18182 found at Tue Sep 27 20:10:34 UTC 2022 selfserv_9223 with PID 18182 started at Tue Sep 27 20:10:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #38: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18182 at Tue Sep 27 20:10:35 UTC 2022 kill -USR1 18182 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18182 killed at Tue Sep 27 20:10:35 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18234 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18234 found at Tue Sep 27 20:10:36 UTC 2022 selfserv_9223 with PID 18234 started at Tue Sep 27 20:10:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #39: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18234 at Tue Sep 27 20:10:36 UTC 2022 kill -USR1 18234 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18234 killed at Tue Sep 27 20:10:37 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:10:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18300 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18300 found at Tue Sep 27 20:10:37 UTC 2022 selfserv_9223 with PID 18300 started at Tue Sep 27 20:10:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #40: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18300 at Tue Sep 27 20:10:37 UTC 2022 kill -USR1 18300 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18300 killed at Tue Sep 27 20:10:38 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:10:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18352 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18352 found at Tue Sep 27 20:10:38 UTC 2022 selfserv_9223 with PID 18352 started at Tue Sep 27 20:10:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #41: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18352 at Tue Sep 27 20:10:39 UTC 2022 kill -USR1 18352 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18352 killed at Tue Sep 27 20:10:39 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:10:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18404 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18404 found at Tue Sep 27 20:10:39 UTC 2022 selfserv_9223 with PID 18404 started at Tue Sep 27 20:10:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #42: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18404 at Tue Sep 27 20:10:40 UTC 2022 kill -USR1 18404 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18404 killed at Tue Sep 27 20:10:40 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18470 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18470 found at Tue Sep 27 20:10:40 UTC 2022 selfserv_9223 with PID 18470 started at Tue Sep 27 20:10:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #43: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18470 at Tue Sep 27 20:10:41 UTC 2022 kill -USR1 18470 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18470 killed at Tue Sep 27 20:10:41 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18522 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18522 found at Tue Sep 27 20:10:41 UTC 2022 selfserv_9223 with PID 18522 started at Tue Sep 27 20:10:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #44: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18522 at Tue Sep 27 20:10:42 UTC 2022 kill -USR1 18522 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18522 killed at Tue Sep 27 20:10:42 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18574 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18574 found at Tue Sep 27 20:10:42 UTC 2022 selfserv_9223 with PID 18574 started at Tue Sep 27 20:10:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #45: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18574 at Tue Sep 27 20:10:43 UTC 2022 kill -USR1 18574 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18574 killed at Tue Sep 27 20:10:43 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18640 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18640 found at Tue Sep 27 20:10:44 UTC 2022 selfserv_9223 with PID 18640 started at Tue Sep 27 20:10:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #46: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18640 at Tue Sep 27 20:10:44 UTC 2022 kill -USR1 18640 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18640 killed at Tue Sep 27 20:10:45 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18692 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18692 found at Tue Sep 27 20:10:45 UTC 2022 selfserv_9223 with PID 18692 started at Tue Sep 27 20:10:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #47: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18692 at Tue Sep 27 20:10:46 UTC 2022 kill -USR1 18692 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18692 killed at Tue Sep 27 20:10:46 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18744 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18744 found at Tue Sep 27 20:10:46 UTC 2022 selfserv_9223 with PID 18744 started at Tue Sep 27 20:10:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #48: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18744 at Tue Sep 27 20:10:47 UTC 2022 kill -USR1 18744 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18744 killed at Tue Sep 27 20:10:47 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:10:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18810 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18810 found at Tue Sep 27 20:10:48 UTC 2022 selfserv_9223 with PID 18810 started at Tue Sep 27 20:10:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #49: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18810 at Tue Sep 27 20:10:48 UTC 2022 kill -USR1 18810 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18810 killed at Tue Sep 27 20:10:48 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:10:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18862 found at Tue Sep 27 20:10:49 UTC 2022 selfserv_9223 with PID 18862 started at Tue Sep 27 20:10:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #50: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18862 at Tue Sep 27 20:10:49 UTC 2022 kill -USR1 18862 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18862 killed at Tue Sep 27 20:10:50 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:10:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18914 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18914 found at Tue Sep 27 20:10:50 UTC 2022 selfserv_9223 with PID 18914 started at Tue Sep 27 20:10:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #51: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18914 at Tue Sep 27 20:10:50 UTC 2022 kill -USR1 18914 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18914 killed at Tue Sep 27 20:10:51 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18980 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18980 found at Tue Sep 27 20:10:51 UTC 2022 selfserv_9223 with PID 18980 started at Tue Sep 27 20:10:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #52: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18980 at Tue Sep 27 20:10:52 UTC 2022 kill -USR1 18980 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18980 killed at Tue Sep 27 20:10:52 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19032 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19032 found at Tue Sep 27 20:10:52 UTC 2022 selfserv_9223 with PID 19032 started at Tue Sep 27 20:10:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #53: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19032 at Tue Sep 27 20:10:53 UTC 2022 kill -USR1 19032 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19032 killed at Tue Sep 27 20:10:53 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19084 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19084 found at Tue Sep 27 20:10:53 UTC 2022 selfserv_9223 with PID 19084 started at Tue Sep 27 20:10:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #54: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 19084 at Tue Sep 27 20:10:54 UTC 2022 kill -USR1 19084 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19084 killed at Tue Sep 27 20:10:54 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19150 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19150 found at Tue Sep 27 20:10:54 UTC 2022 selfserv_9223 with PID 19150 started at Tue Sep 27 20:10:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #55: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19150 at Tue Sep 27 20:10:55 UTC 2022 kill -USR1 19150 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19150 killed at Tue Sep 27 20:10:55 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19202 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19202 found at Tue Sep 27 20:10:56 UTC 2022 selfserv_9223 with PID 19202 started at Tue Sep 27 20:10:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #56: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19202 at Tue Sep 27 20:10:57 UTC 2022 kill -USR1 19202 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19202 killed at Tue Sep 27 20:10:57 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:10:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19254 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19254 found at Tue Sep 27 20:10:57 UTC 2022 selfserv_9223 with PID 19254 started at Tue Sep 27 20:10:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #57: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19254 at Tue Sep 27 20:10:58 UTC 2022 kill -USR1 19254 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19254 killed at Tue Sep 27 20:10:58 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:10:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19320 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19320 found at Tue Sep 27 20:10:58 UTC 2022 selfserv_9223 with PID 19320 started at Tue Sep 27 20:10:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #58: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19320 at Tue Sep 27 20:10:59 UTC 2022 kill -USR1 19320 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19320 killed at Tue Sep 27 20:10:59 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:10:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:10:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19372 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19372 found at Tue Sep 27 20:11:00 UTC 2022 selfserv_9223 with PID 19372 started at Tue Sep 27 20:11:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #59: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19372 at Tue Sep 27 20:11:00 UTC 2022 kill -USR1 19372 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19372 killed at Tue Sep 27 20:11:00 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:11:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19424 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19424 found at Tue Sep 27 20:11:01 UTC 2022 selfserv_9223 with PID 19424 started at Tue Sep 27 20:11:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #60: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19424 at Tue Sep 27 20:11:01 UTC 2022 kill -USR1 19424 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19424 killed at Tue Sep 27 20:11:01 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19490 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19490 found at Tue Sep 27 20:11:02 UTC 2022 selfserv_9223 with PID 19490 started at Tue Sep 27 20:11:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #61: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 19490 at Tue Sep 27 20:11:02 UTC 2022 kill -USR1 19490 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19490 killed at Tue Sep 27 20:11:03 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19542 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19542 found at Tue Sep 27 20:11:03 UTC 2022 selfserv_9223 with PID 19542 started at Tue Sep 27 20:11:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #62: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19542 at Tue Sep 27 20:11:04 UTC 2022 kill -USR1 19542 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19542 killed at Tue Sep 27 20:11:04 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19594 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19594 found at Tue Sep 27 20:11:04 UTC 2022 selfserv_9223 with PID 19594 started at Tue Sep 27 20:11:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #63: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 19594 at Tue Sep 27 20:11:05 UTC 2022 kill -USR1 19594 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19594 killed at Tue Sep 27 20:11:05 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19660 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19660 found at Tue Sep 27 20:11:05 UTC 2022 selfserv_9223 with PID 19660 started at Tue Sep 27 20:11:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #64: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 19660 at Tue Sep 27 20:11:06 UTC 2022 kill -USR1 19660 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19660 killed at Tue Sep 27 20:11:06 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19712 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19712 found at Tue Sep 27 20:11:07 UTC 2022 selfserv_9223 with PID 19712 started at Tue Sep 27 20:11:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #65: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 19712 at Tue Sep 27 20:11:07 UTC 2022 kill -USR1 19712 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19712 killed at Tue Sep 27 20:11:08 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19764 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19764 found at Tue Sep 27 20:11:08 UTC 2022 selfserv_9223 with PID 19764 started at Tue Sep 27 20:11:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #66: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 19764 at Tue Sep 27 20:11:09 UTC 2022 kill -USR1 19764 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19764 killed at Tue Sep 27 20:11:09 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:11:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19840 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19840 found at Tue Sep 27 20:11:09 UTC 2022 selfserv_9223 with PID 19840 started at Tue Sep 27 20:11:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #67: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 19840 at Tue Sep 27 20:11:10 UTC 2022 kill -USR1 19840 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19840 killed at Tue Sep 27 20:11:10 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:11:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19892 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19892 found at Tue Sep 27 20:11:10 UTC 2022 selfserv_9223 with PID 19892 started at Tue Sep 27 20:11:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #68: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 19892 at Tue Sep 27 20:11:11 UTC 2022 kill -USR1 19892 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19892 killed at Tue Sep 27 20:11:11 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:11:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19948 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19948 found at Tue Sep 27 20:11:11 UTC 2022 selfserv_9223 with PID 19948 started at Tue Sep 27 20:11:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #69: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 19948 at Tue Sep 27 20:11:12 UTC 2022 kill -USR1 19948 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19948 killed at Tue Sep 27 20:11:12 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20015 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20015 found at Tue Sep 27 20:11:13 UTC 2022 selfserv_9223 with PID 20015 started at Tue Sep 27 20:11:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #70: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 20015 at Tue Sep 27 20:11:13 UTC 2022 kill -USR1 20015 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20015 killed at Tue Sep 27 20:11:13 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20067 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20067 found at Tue Sep 27 20:11:14 UTC 2022 selfserv_9223 with PID 20067 started at Tue Sep 27 20:11:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #71: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20067 at Tue Sep 27 20:11:14 UTC 2022 kill -USR1 20067 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20067 killed at Tue Sep 27 20:11:14 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20119 found at Tue Sep 27 20:11:15 UTC 2022 selfserv_9223 with PID 20119 started at Tue Sep 27 20:11:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #72: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 20119 at Tue Sep 27 20:11:15 UTC 2022 kill -USR1 20119 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20119 killed at Tue Sep 27 20:11:16 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20185 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20185 found at Tue Sep 27 20:11:16 UTC 2022 selfserv_9223 with PID 20185 started at Tue Sep 27 20:11:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #73: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20185 at Tue Sep 27 20:11:17 UTC 2022 kill -USR1 20185 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20185 killed at Tue Sep 27 20:11:17 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20237 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20237 found at Tue Sep 27 20:11:17 UTC 2022 selfserv_9223 with PID 20237 started at Tue Sep 27 20:11:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #74: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20237 at Tue Sep 27 20:11:18 UTC 2022 kill -USR1 20237 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20237 killed at Tue Sep 27 20:11:18 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20289 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20289 found at Tue Sep 27 20:11:18 UTC 2022 selfserv_9223 with PID 20289 started at Tue Sep 27 20:11:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #75: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20289 at Tue Sep 27 20:11:19 UTC 2022 kill -USR1 20289 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20289 killed at Tue Sep 27 20:11:19 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:11:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20355 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20355 found at Tue Sep 27 20:11:20 UTC 2022 selfserv_9223 with PID 20355 started at Tue Sep 27 20:11:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #76: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20355 at Tue Sep 27 20:11:20 UTC 2022 kill -USR1 20355 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20355 killed at Tue Sep 27 20:11:20 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:11:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20407 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20407 found at Tue Sep 27 20:11:21 UTC 2022 selfserv_9223 with PID 20407 started at Tue Sep 27 20:11:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #77: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20407 at Tue Sep 27 20:11:21 UTC 2022 kill -USR1 20407 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20407 killed at Tue Sep 27 20:11:21 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:11:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20459 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20459 found at Tue Sep 27 20:11:22 UTC 2022 selfserv_9223 with PID 20459 started at Tue Sep 27 20:11:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #78: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20459 at Tue Sep 27 20:11:22 UTC 2022 kill -USR1 20459 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20459 killed at Tue Sep 27 20:11:22 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20525 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20525 found at Tue Sep 27 20:11:23 UTC 2022 selfserv_9223 with PID 20525 started at Tue Sep 27 20:11:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #79: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 20525 at Tue Sep 27 20:11:23 UTC 2022 kill -USR1 20525 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20525 killed at Tue Sep 27 20:11:23 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20579 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20579 found at Tue Sep 27 20:11:24 UTC 2022 selfserv_9223 with PID 20579 started at Tue Sep 27 20:11:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #80: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20579 at Tue Sep 27 20:11:24 UTC 2022 kill -USR1 20579 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20579 killed at Tue Sep 27 20:11:24 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20631 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20631 found at Tue Sep 27 20:11:25 UTC 2022 selfserv_9223 with PID 20631 started at Tue Sep 27 20:11:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #81: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 20631 at Tue Sep 27 20:11:25 UTC 2022 kill -USR1 20631 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20631 killed at Tue Sep 27 20:11:25 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20697 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20697 found at Tue Sep 27 20:11:26 UTC 2022 selfserv_9223 with PID 20697 started at Tue Sep 27 20:11:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #82: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 20697 at Tue Sep 27 20:11:26 UTC 2022 kill -USR1 20697 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20697 killed at Tue Sep 27 20:11:27 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20749 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20749 found at Tue Sep 27 20:11:27 UTC 2022 selfserv_9223 with PID 20749 started at Tue Sep 27 20:11:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #83: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 20749 at Tue Sep 27 20:11:28 UTC 2022 kill -USR1 20749 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20749 killed at Tue Sep 27 20:11:28 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20801 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20801 found at Tue Sep 27 20:11:28 UTC 2022 selfserv_9223 with PID 20801 started at Tue Sep 27 20:11:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #84: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 20801 at Tue Sep 27 20:11:29 UTC 2022 kill -USR1 20801 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20801 killed at Tue Sep 27 20:11:29 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:11:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20867 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20867 found at Tue Sep 27 20:11:29 UTC 2022 selfserv_9223 with PID 20867 started at Tue Sep 27 20:11:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #85: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 20867 at Tue Sep 27 20:11:30 UTC 2022 kill -USR1 20867 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20867 killed at Tue Sep 27 20:11:30 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:11:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20919 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20919 found at Tue Sep 27 20:11:30 UTC 2022 selfserv_9223 with PID 20919 started at Tue Sep 27 20:11:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #86: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 20919 at Tue Sep 27 20:11:31 UTC 2022 kill -USR1 20919 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20919 killed at Tue Sep 27 20:11:31 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:11:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20971 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20971 found at Tue Sep 27 20:11:31 UTC 2022 selfserv_9223 with PID 20971 started at Tue Sep 27 20:11:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #87: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 20971 at Tue Sep 27 20:11:32 UTC 2022 kill -USR1 20971 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20971 killed at Tue Sep 27 20:11:32 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21037 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21037 found at Tue Sep 27 20:11:32 UTC 2022 selfserv_9223 with PID 21037 started at Tue Sep 27 20:11:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #88: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 21037 at Tue Sep 27 20:11:33 UTC 2022 kill -USR1 21037 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21037 killed at Tue Sep 27 20:11:33 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21089 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21089 found at Tue Sep 27 20:11:33 UTC 2022 selfserv_9223 with PID 21089 started at Tue Sep 27 20:11:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #89: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21089 at Tue Sep 27 20:11:34 UTC 2022 kill -USR1 21089 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21089 killed at Tue Sep 27 20:11:34 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21141 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21141 found at Tue Sep 27 20:11:34 UTC 2022 selfserv_9223 with PID 21141 started at Tue Sep 27 20:11:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #90: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 21141 at Tue Sep 27 20:11:35 UTC 2022 kill -USR1 21141 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21141 killed at Tue Sep 27 20:11:35 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21207 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21207 found at Tue Sep 27 20:11:35 UTC 2022 selfserv_9223 with PID 21207 started at Tue Sep 27 20:11:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #91: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 21207 at Tue Sep 27 20:11:36 UTC 2022 kill -USR1 21207 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21207 killed at Tue Sep 27 20:11:36 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21259 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21259 found at Tue Sep 27 20:11:36 UTC 2022 selfserv_9223 with PID 21259 started at Tue Sep 27 20:11:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #92: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21259 at Tue Sep 27 20:11:37 UTC 2022 kill -USR1 21259 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21259 killed at Tue Sep 27 20:11:37 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21311 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21311 found at Tue Sep 27 20:11:37 UTC 2022 selfserv_9223 with PID 21311 started at Tue Sep 27 20:11:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #93: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 21311 at Tue Sep 27 20:11:38 UTC 2022 kill -USR1 21311 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21311 killed at Tue Sep 27 20:11:38 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21377 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21377 found at Tue Sep 27 20:11:38 UTC 2022 selfserv_9223 with PID 21377 started at Tue Sep 27 20:11:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #94: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 21377 at Tue Sep 27 20:11:39 UTC 2022 kill -USR1 21377 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21377 killed at Tue Sep 27 20:11:39 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21429 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21429 found at Tue Sep 27 20:11:39 UTC 2022 selfserv_9223 with PID 21429 started at Tue Sep 27 20:11:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #95: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21429 at Tue Sep 27 20:11:39 UTC 2022 kill -USR1 21429 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21429 killed at Tue Sep 27 20:11:40 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21482 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21482 found at Tue Sep 27 20:11:40 UTC 2022 selfserv_9223 with PID 21482 started at Tue Sep 27 20:11:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #96: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 21482 at Tue Sep 27 20:11:40 UTC 2022 kill -USR1 21482 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21482 killed at Tue Sep 27 20:11:41 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21548 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21548 found at Tue Sep 27 20:11:41 UTC 2022 selfserv_9223 with PID 21548 started at Tue Sep 27 20:11:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #97: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21548 at Tue Sep 27 20:11:42 UTC 2022 kill -USR1 21548 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21548 killed at Tue Sep 27 20:11:42 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21600 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21600 found at Tue Sep 27 20:11:42 UTC 2022 selfserv_9223 with PID 21600 started at Tue Sep 27 20:11:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #98: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21600 at Tue Sep 27 20:11:43 UTC 2022 kill -USR1 21600 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21600 killed at Tue Sep 27 20:11:43 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21652 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21652 found at Tue Sep 27 20:11:43 UTC 2022 selfserv_9223 with PID 21652 started at Tue Sep 27 20:11:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #99: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21652 at Tue Sep 27 20:11:44 UTC 2022 kill -USR1 21652 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21652 killed at Tue Sep 27 20:11:44 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21718 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21718 found at Tue Sep 27 20:11:44 UTC 2022 selfserv_9223 with PID 21718 started at Tue Sep 27 20:11:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #100: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 21718 at Tue Sep 27 20:11:45 UTC 2022 kill -USR1 21718 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21718 killed at Tue Sep 27 20:11:45 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21770 found at Tue Sep 27 20:11:45 UTC 2022 selfserv_9223 with PID 21770 started at Tue Sep 27 20:11:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #101: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 21770 at Tue Sep 27 20:11:46 UTC 2022 kill -USR1 21770 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21770 killed at Tue Sep 27 20:11:46 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21822 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21822 found at Tue Sep 27 20:11:47 UTC 2022 selfserv_9223 with PID 21822 started at Tue Sep 27 20:11:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #102: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 21822 at Tue Sep 27 20:11:47 UTC 2022 kill -USR1 21822 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21822 killed at Tue Sep 27 20:11:47 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21888 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21888 found at Tue Sep 27 20:11:48 UTC 2022 selfserv_9223 with PID 21888 started at Tue Sep 27 20:11:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #103: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 21888 at Tue Sep 27 20:11:48 UTC 2022 kill -USR1 21888 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21888 killed at Tue Sep 27 20:11:48 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21940 found at Tue Sep 27 20:11:49 UTC 2022 selfserv_9223 with PID 21940 started at Tue Sep 27 20:11:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #104: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21940 at Tue Sep 27 20:11:49 UTC 2022 kill -USR1 21940 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21940 killed at Tue Sep 27 20:11:49 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21992 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21992 found at Tue Sep 27 20:11:50 UTC 2022 selfserv_9223 with PID 21992 started at Tue Sep 27 20:11:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #105: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 21992 at Tue Sep 27 20:11:50 UTC 2022 kill -USR1 21992 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21992 killed at Tue Sep 27 20:11:50 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22059 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22059 found at Tue Sep 27 20:11:50 UTC 2022 selfserv_9223 with PID 22059 started at Tue Sep 27 20:11:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #106: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22059 at Tue Sep 27 20:11:51 UTC 2022 kill -USR1 22059 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22059 killed at Tue Sep 27 20:11:51 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22111 found at Tue Sep 27 20:11:52 UTC 2022 selfserv_9223 with PID 22111 started at Tue Sep 27 20:11:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #107: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22111 at Tue Sep 27 20:11:52 UTC 2022 kill -USR1 22111 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22111 killed at Tue Sep 27 20:11:52 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22164 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22164 found at Tue Sep 27 20:11:53 UTC 2022 selfserv_9223 with PID 22164 started at Tue Sep 27 20:11:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #108: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22164 at Tue Sep 27 20:11:53 UTC 2022 kill -USR1 22164 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22164 killed at Tue Sep 27 20:11:54 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:11:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22230 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22230 found at Tue Sep 27 20:11:54 UTC 2022 selfserv_9223 with PID 22230 started at Tue Sep 27 20:11:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #109: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22230 at Tue Sep 27 20:11:54 UTC 2022 kill -USR1 22230 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22230 killed at Tue Sep 27 20:11:55 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:11:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22282 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22282 found at Tue Sep 27 20:11:55 UTC 2022 selfserv_9223 with PID 22282 started at Tue Sep 27 20:11:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #110: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22282 at Tue Sep 27 20:11:55 UTC 2022 kill -USR1 22282 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22282 killed at Tue Sep 27 20:11:56 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:11:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22334 found at Tue Sep 27 20:11:56 UTC 2022 selfserv_9223 with PID 22334 started at Tue Sep 27 20:11:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #111: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22334 at Tue Sep 27 20:11:56 UTC 2022 kill -USR1 22334 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22334 killed at Tue Sep 27 20:11:57 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22400 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22400 found at Tue Sep 27 20:11:57 UTC 2022 selfserv_9223 with PID 22400 started at Tue Sep 27 20:11:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #112: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22400 at Tue Sep 27 20:11:57 UTC 2022 kill -USR1 22400 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22400 killed at Tue Sep 27 20:11:58 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22452 found at Tue Sep 27 20:11:58 UTC 2022 selfserv_9223 with PID 22452 started at Tue Sep 27 20:11:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #113: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22452 at Tue Sep 27 20:11:58 UTC 2022 kill -USR1 22452 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22452 killed at Tue Sep 27 20:11:59 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:11:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:11:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22504 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22504 found at Tue Sep 27 20:11:59 UTC 2022 selfserv_9223 with PID 22504 started at Tue Sep 27 20:11:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #114: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22504 at Tue Sep 27 20:11:59 UTC 2022 kill -USR1 22504 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22504 killed at Tue Sep 27 20:12:00 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22570 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22570 found at Tue Sep 27 20:12:00 UTC 2022 selfserv_9223 with PID 22570 started at Tue Sep 27 20:12:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #115: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22570 at Tue Sep 27 20:12:00 UTC 2022 kill -USR1 22570 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22570 killed at Tue Sep 27 20:12:00 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22623 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22623 found at Tue Sep 27 20:12:01 UTC 2022 selfserv_9223 with PID 22623 started at Tue Sep 27 20:12:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #116: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22623 at Tue Sep 27 20:12:01 UTC 2022 kill -USR1 22623 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22623 killed at Tue Sep 27 20:12:01 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22675 found at Tue Sep 27 20:12:02 UTC 2022 selfserv_9223 with PID 22675 started at Tue Sep 27 20:12:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #117: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22675 at Tue Sep 27 20:12:02 UTC 2022 kill -USR1 22675 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22675 killed at Tue Sep 27 20:12:02 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22741 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22741 found at Tue Sep 27 20:12:03 UTC 2022 selfserv_9223 with PID 22741 started at Tue Sep 27 20:12:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #118: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22741 at Tue Sep 27 20:12:03 UTC 2022 kill -USR1 22741 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22741 killed at Tue Sep 27 20:12:03 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22793 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22793 found at Tue Sep 27 20:12:04 UTC 2022 selfserv_9223 with PID 22793 started at Tue Sep 27 20:12:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #119: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22793 at Tue Sep 27 20:12:04 UTC 2022 kill -USR1 22793 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22793 killed at Tue Sep 27 20:12:04 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22845 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22845 found at Tue Sep 27 20:12:05 UTC 2022 selfserv_9223 with PID 22845 started at Tue Sep 27 20:12:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #120: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22845 at Tue Sep 27 20:12:05 UTC 2022 kill -USR1 22845 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22845 killed at Tue Sep 27 20:12:05 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22911 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22911 found at Tue Sep 27 20:12:06 UTC 2022 selfserv_9223 with PID 22911 started at Tue Sep 27 20:12:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #121: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22911 at Tue Sep 27 20:12:06 UTC 2022 kill -USR1 22911 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22911 killed at Tue Sep 27 20:12:06 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22963 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22963 found at Tue Sep 27 20:12:07 UTC 2022 selfserv_9223 with PID 22963 started at Tue Sep 27 20:12:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #122: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22963 at Tue Sep 27 20:12:07 UTC 2022 kill -USR1 22963 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22963 killed at Tue Sep 27 20:12:07 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23015 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23015 found at Tue Sep 27 20:12:08 UTC 2022 selfserv_9223 with PID 23015 started at Tue Sep 27 20:12:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #123: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23015 at Tue Sep 27 20:12:08 UTC 2022 kill -USR1 23015 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23015 killed at Tue Sep 27 20:12:08 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23081 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23081 found at Tue Sep 27 20:12:08 UTC 2022 selfserv_9223 with PID 23081 started at Tue Sep 27 20:12:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #124: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 23081 at Tue Sep 27 20:12:09 UTC 2022 kill -USR1 23081 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23081 killed at Tue Sep 27 20:12:09 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23143 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23143 found at Tue Sep 27 20:12:09 UTC 2022 selfserv_9223 with PID 23143 started at Tue Sep 27 20:12:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #125: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23143 at Tue Sep 27 20:12:10 UTC 2022 kill -USR1 23143 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23143 killed at Tue Sep 27 20:12:10 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23195 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23195 found at Tue Sep 27 20:12:10 UTC 2022 selfserv_9223 with PID 23195 started at Tue Sep 27 20:12:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #126: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 23195 at Tue Sep 27 20:12:11 UTC 2022 kill -USR1 23195 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23195 killed at Tue Sep 27 20:12:11 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23265 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23265 found at Tue Sep 27 20:12:11 UTC 2022 selfserv_9223 with PID 23265 started at Tue Sep 27 20:12:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #127: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 23265 at Tue Sep 27 20:12:12 UTC 2022 kill -USR1 23265 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23265 killed at Tue Sep 27 20:12:12 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23318 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23318 found at Tue Sep 27 20:12:12 UTC 2022 selfserv_9223 with PID 23318 started at Tue Sep 27 20:12:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #128: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 23318 at Tue Sep 27 20:12:13 UTC 2022 kill -USR1 23318 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23318 killed at Tue Sep 27 20:12:13 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23370 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23370 found at Tue Sep 27 20:12:13 UTC 2022 selfserv_9223 with PID 23370 started at Tue Sep 27 20:12:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #129: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 23370 at Tue Sep 27 20:12:13 UTC 2022 kill -USR1 23370 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23370 killed at Tue Sep 27 20:12:14 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23436 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23436 found at Tue Sep 27 20:12:14 UTC 2022 selfserv_9223 with PID 23436 started at Tue Sep 27 20:12:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #130: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 23436 at Tue Sep 27 20:12:14 UTC 2022 kill -USR1 23436 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23436 killed at Tue Sep 27 20:12:15 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23488 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23488 found at Tue Sep 27 20:12:15 UTC 2022 selfserv_9223 with PID 23488 started at Tue Sep 27 20:12:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #131: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23488 at Tue Sep 27 20:12:15 UTC 2022 kill -USR1 23488 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23488 killed at Tue Sep 27 20:12:15 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23540 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23540 found at Tue Sep 27 20:12:16 UTC 2022 selfserv_9223 with PID 23540 started at Tue Sep 27 20:12:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #132: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 23540 at Tue Sep 27 20:12:16 UTC 2022 kill -USR1 23540 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23540 killed at Tue Sep 27 20:12:16 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23606 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23606 found at Tue Sep 27 20:12:17 UTC 2022 selfserv_9223 with PID 23606 started at Tue Sep 27 20:12:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #133: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23606 at Tue Sep 27 20:12:17 UTC 2022 kill -USR1 23606 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23606 killed at Tue Sep 27 20:12:17 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23658 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23658 found at Tue Sep 27 20:12:18 UTC 2022 selfserv_9223 with PID 23658 started at Tue Sep 27 20:12:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #134: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23658 at Tue Sep 27 20:12:18 UTC 2022 kill -USR1 23658 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23658 killed at Tue Sep 27 20:12:19 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23710 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23710 found at Tue Sep 27 20:12:19 UTC 2022 selfserv_9223 with PID 23710 started at Tue Sep 27 20:12:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #135: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23710 at Tue Sep 27 20:12:20 UTC 2022 kill -USR1 23710 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23710 killed at Tue Sep 27 20:12:20 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23776 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23776 found at Tue Sep 27 20:12:20 UTC 2022 selfserv_9223 with PID 23776 started at Tue Sep 27 20:12:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #136: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23776 at Tue Sep 27 20:12:21 UTC 2022 kill -USR1 23776 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23776 killed at Tue Sep 27 20:12:21 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23830 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23830 found at Tue Sep 27 20:12:21 UTC 2022 selfserv_9223 with PID 23830 started at Tue Sep 27 20:12:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #137: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23830 at Tue Sep 27 20:12:22 UTC 2022 kill -USR1 23830 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23830 killed at Tue Sep 27 20:12:22 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23882 found at Tue Sep 27 20:12:22 UTC 2022 selfserv_9223 with PID 23882 started at Tue Sep 27 20:12:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #138: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23882 at Tue Sep 27 20:12:23 UTC 2022 kill -USR1 23882 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23882 killed at Tue Sep 27 20:12:23 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23948 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23948 found at Tue Sep 27 20:12:23 UTC 2022 selfserv_9223 with PID 23948 started at Tue Sep 27 20:12:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #139: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23948 at Tue Sep 27 20:12:24 UTC 2022 kill -USR1 23948 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23948 killed at Tue Sep 27 20:12:24 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24000 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24000 found at Tue Sep 27 20:12:25 UTC 2022 selfserv_9223 with PID 24000 started at Tue Sep 27 20:12:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #140: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24000 at Tue Sep 27 20:12:25 UTC 2022 kill -USR1 24000 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24000 killed at Tue Sep 27 20:12:25 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24052 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24052 found at Tue Sep 27 20:12:26 UTC 2022 selfserv_9223 with PID 24052 started at Tue Sep 27 20:12:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #141: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24052 at Tue Sep 27 20:12:26 UTC 2022 kill -USR1 24052 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24052 killed at Tue Sep 27 20:12:26 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24118 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24118 found at Tue Sep 27 20:12:27 UTC 2022 selfserv_9223 with PID 24118 started at Tue Sep 27 20:12:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #142: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24118 at Tue Sep 27 20:12:27 UTC 2022 kill -USR1 24118 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24118 killed at Tue Sep 27 20:12:28 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24170 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24170 found at Tue Sep 27 20:12:28 UTC 2022 selfserv_9223 with PID 24170 started at Tue Sep 27 20:12:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #143: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24170 at Tue Sep 27 20:12:29 UTC 2022 kill -USR1 24170 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24170 killed at Tue Sep 27 20:12:29 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24222 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24222 found at Tue Sep 27 20:12:29 UTC 2022 selfserv_9223 with PID 24222 started at Tue Sep 27 20:12:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #144: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24222 at Tue Sep 27 20:12:30 UTC 2022 kill -USR1 24222 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24222 killed at Tue Sep 27 20:12:30 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24288 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24288 found at Tue Sep 27 20:12:30 UTC 2022 selfserv_9223 with PID 24288 started at Tue Sep 27 20:12:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24288 at Tue Sep 27 20:12:31 UTC 2022 kill -USR1 24288 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24288 killed at Tue Sep 27 20:12:31 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24340 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24340 found at Tue Sep 27 20:12:31 UTC 2022 selfserv_9223 with PID 24340 started at Tue Sep 27 20:12:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24340 at Tue Sep 27 20:12:32 UTC 2022 kill -USR1 24340 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24340 killed at Tue Sep 27 20:12:32 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24392 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24392 found at Tue Sep 27 20:12:32 UTC 2022 selfserv_9223 with PID 24392 started at Tue Sep 27 20:12:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24392 at Tue Sep 27 20:12:33 UTC 2022 kill -USR1 24392 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24392 killed at Tue Sep 27 20:12:33 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24459 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24459 found at Tue Sep 27 20:12:34 UTC 2022 selfserv_9223 with PID 24459 started at Tue Sep 27 20:12:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24459 at Tue Sep 27 20:12:34 UTC 2022 kill -USR1 24459 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24459 killed at Tue Sep 27 20:12:34 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24511 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24511 found at Tue Sep 27 20:12:35 UTC 2022 selfserv_9223 with PID 24511 started at Tue Sep 27 20:12:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24511 at Tue Sep 27 20:12:35 UTC 2022 kill -USR1 24511 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24511 killed at Tue Sep 27 20:12:36 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24563 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24563 found at Tue Sep 27 20:12:36 UTC 2022 selfserv_9223 with PID 24563 started at Tue Sep 27 20:12:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24563 at Tue Sep 27 20:12:37 UTC 2022 kill -USR1 24563 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24563 killed at Tue Sep 27 20:12:37 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24629 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24629 found at Tue Sep 27 20:12:37 UTC 2022 selfserv_9223 with PID 24629 started at Tue Sep 27 20:12:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #151: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24629 at Tue Sep 27 20:12:38 UTC 2022 kill -USR1 24629 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24629 killed at Tue Sep 27 20:12:38 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24681 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24681 found at Tue Sep 27 20:12:38 UTC 2022 selfserv_9223 with PID 24681 started at Tue Sep 27 20:12:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #152: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24681 at Tue Sep 27 20:12:39 UTC 2022 kill -USR1 24681 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24681 killed at Tue Sep 27 20:12:39 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24733 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24733 found at Tue Sep 27 20:12:39 UTC 2022 selfserv_9223 with PID 24733 started at Tue Sep 27 20:12:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #153: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24733 at Tue Sep 27 20:12:40 UTC 2022 kill -USR1 24733 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24733 killed at Tue Sep 27 20:12:40 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24799 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24799 found at Tue Sep 27 20:12:40 UTC 2022 selfserv_9223 with PID 24799 started at Tue Sep 27 20:12:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #154: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24799 at Tue Sep 27 20:12:41 UTC 2022 kill -USR1 24799 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24799 killed at Tue Sep 27 20:12:41 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24851 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24851 found at Tue Sep 27 20:12:41 UTC 2022 selfserv_9223 with PID 24851 started at Tue Sep 27 20:12:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #155: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24851 at Tue Sep 27 20:12:42 UTC 2022 kill -USR1 24851 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24851 killed at Tue Sep 27 20:12:42 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24903 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24903 found at Tue Sep 27 20:12:43 UTC 2022 selfserv_9223 with PID 24903 started at Tue Sep 27 20:12:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #156: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24903 at Tue Sep 27 20:12:43 UTC 2022 kill -USR1 24903 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24903 killed at Tue Sep 27 20:12:43 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24969 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24969 found at Tue Sep 27 20:12:44 UTC 2022 selfserv_9223 with PID 24969 started at Tue Sep 27 20:12:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #157: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24969 at Tue Sep 27 20:12:44 UTC 2022 kill -USR1 24969 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24969 killed at Tue Sep 27 20:12:44 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25021 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25021 found at Tue Sep 27 20:12:45 UTC 2022 selfserv_9223 with PID 25021 started at Tue Sep 27 20:12:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #158: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25021 at Tue Sep 27 20:12:45 UTC 2022 kill -USR1 25021 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25021 killed at Tue Sep 27 20:12:45 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25073 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25073 found at Tue Sep 27 20:12:46 UTC 2022 selfserv_9223 with PID 25073 started at Tue Sep 27 20:12:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #159: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25073 at Tue Sep 27 20:12:46 UTC 2022 kill -USR1 25073 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25073 killed at Tue Sep 27 20:12:46 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25140 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25140 found at Tue Sep 27 20:12:47 UTC 2022 selfserv_9223 with PID 25140 started at Tue Sep 27 20:12:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #160: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25140 at Tue Sep 27 20:12:47 UTC 2022 kill -USR1 25140 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25140 killed at Tue Sep 27 20:12:47 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25192 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25192 found at Tue Sep 27 20:12:48 UTC 2022 selfserv_9223 with PID 25192 started at Tue Sep 27 20:12:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #161: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25192 at Tue Sep 27 20:12:48 UTC 2022 kill -USR1 25192 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25192 killed at Tue Sep 27 20:12:49 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25244 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25244 found at Tue Sep 27 20:12:49 UTC 2022 selfserv_9223 with PID 25244 started at Tue Sep 27 20:12:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #162: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25244 at Tue Sep 27 20:12:49 UTC 2022 kill -USR1 25244 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25244 killed at Tue Sep 27 20:12:50 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25310 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25310 found at Tue Sep 27 20:12:50 UTC 2022 selfserv_9223 with PID 25310 started at Tue Sep 27 20:12:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #163: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25310 at Tue Sep 27 20:12:50 UTC 2022 kill -USR1 25310 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25310 killed at Tue Sep 27 20:12:51 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25362 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25362 found at Tue Sep 27 20:12:51 UTC 2022 selfserv_9223 with PID 25362 started at Tue Sep 27 20:12:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #164: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25362 at Tue Sep 27 20:12:51 UTC 2022 kill -USR1 25362 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25362 killed at Tue Sep 27 20:12:52 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:12:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25414 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25414 found at Tue Sep 27 20:12:52 UTC 2022 selfserv_9223 with PID 25414 started at Tue Sep 27 20:12:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #165: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25414 at Tue Sep 27 20:12:52 UTC 2022 kill -USR1 25414 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25414 killed at Tue Sep 27 20:12:52 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25480 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25480 found at Tue Sep 27 20:12:53 UTC 2022 selfserv_9223 with PID 25480 started at Tue Sep 27 20:12:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #166: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25480 at Tue Sep 27 20:12:53 UTC 2022 kill -USR1 25480 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25480 killed at Tue Sep 27 20:12:54 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25532 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25532 found at Tue Sep 27 20:12:54 UTC 2022 selfserv_9223 with PID 25532 started at Tue Sep 27 20:12:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #167: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25532 at Tue Sep 27 20:12:54 UTC 2022 kill -USR1 25532 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25532 killed at Tue Sep 27 20:12:55 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25584 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25584 found at Tue Sep 27 20:12:55 UTC 2022 selfserv_9223 with PID 25584 started at Tue Sep 27 20:12:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #168: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25584 at Tue Sep 27 20:12:55 UTC 2022 kill -USR1 25584 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25584 killed at Tue Sep 27 20:12:56 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25650 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25650 found at Tue Sep 27 20:12:56 UTC 2022 selfserv_9223 with PID 25650 started at Tue Sep 27 20:12:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #169: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25650 at Tue Sep 27 20:12:57 UTC 2022 kill -USR1 25650 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25650 killed at Tue Sep 27 20:12:57 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25702 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25702 found at Tue Sep 27 20:12:57 UTC 2022 selfserv_9223 with PID 25702 started at Tue Sep 27 20:12:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #170: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25702 at Tue Sep 27 20:12:58 UTC 2022 kill -USR1 25702 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25702 killed at Tue Sep 27 20:12:58 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:12:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:12:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25754 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25754 found at Tue Sep 27 20:12:58 UTC 2022 selfserv_9223 with PID 25754 started at Tue Sep 27 20:12:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #171: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25754 at Tue Sep 27 20:12:59 UTC 2022 kill -USR1 25754 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25754 killed at Tue Sep 27 20:12:59 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:13:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:13:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25820 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25820 found at Tue Sep 27 20:13:00 UTC 2022 selfserv_9223 with PID 25820 started at Tue Sep 27 20:13:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #172: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25820 at Tue Sep 27 20:13:00 UTC 2022 kill -USR1 25820 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25820 killed at Tue Sep 27 20:13:01 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:13:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:13:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25872 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25872 found at Tue Sep 27 20:13:01 UTC 2022 selfserv_9223 with PID 25872 started at Tue Sep 27 20:13:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #173: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25872 at Tue Sep 27 20:13:02 UTC 2022 kill -USR1 25872 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25872 killed at Tue Sep 27 20:13:02 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:13:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:13:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25924 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25924 found at Tue Sep 27 20:13:02 UTC 2022 selfserv_9223 with PID 25924 started at Tue Sep 27 20:13:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #174: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25924 at Tue Sep 27 20:13:03 UTC 2022 kill -USR1 25924 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25924 killed at Tue Sep 27 20:13:03 UTC 2022 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/authin.tl.tmp 0 selfserv_9223 starting at Tue Sep 27 20:13:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:13:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:03 UTC 2022 selfserv_9223 with PID 25995 started at Tue Sep 27 20:13:03 UTC 2022 Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:04 UTC 2022 ssl.sh: #1: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:04 UTC 2022 ssl.sh: #2: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:05 UTC 2022 ssl.sh: #3: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:05 UTC 2022 ssl.sh: #4: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:05 UTC 2022 ssl.sh: #5: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:06 UTC 2022 ssl.sh: #6: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:06 UTC 2022 ssl.sh: #7: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:07 UTC 2022 ssl.sh: #8: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:07 UTC 2022 ssl.sh: #9: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:07 UTC 2022 ssl.sh: #10: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:08 UTC 2022 ssl.sh: #11: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:08 UTC 2022 ssl.sh: #12: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:09 UTC 2022 ssl.sh: #13: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:09 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #14: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:10 UTC 2022 ssl.sh: #15: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:10 UTC 2022 ssl.sh: #16: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:10 UTC 2022 ssl.sh: #17: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:11 UTC 2022 ssl.sh: #18: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:11 UTC 2022 ssl.sh: #19: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:12 UTC 2022 ssl.sh: #20: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:12 UTC 2022 ssl.sh: #21: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:12 UTC 2022 ssl.sh: #22: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:13 UTC 2022 ssl.sh: #23: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:13 UTC 2022 ssl.sh: #24: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:14 UTC 2022 ssl.sh: #25: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:14 UTC 2022 ssl.sh: #26: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:15 UTC 2022 ssl.sh: #27: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:15 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #28: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:15 UTC 2022 ssl.sh: #29: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:16 UTC 2022 ssl.sh: #30: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:16 UTC 2022 ssl.sh: #31: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:17 UTC 2022 ssl.sh: #32: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:17 UTC 2022 ssl.sh: #33: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:17 UTC 2022 ssl.sh: #34: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:18 UTC 2022 ssl.sh: #35: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:18 UTC 2022 ssl.sh: #36: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:19 UTC 2022 ssl.sh: #37: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:19 UTC 2022 ssl.sh: #38: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:19 UTC 2022 ssl.sh: #39: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:20 UTC 2022 ssl.sh: #40: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25995 found at Tue Sep 27 20:13:20 UTC 2022 ssl.sh: #41: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 25995 at Tue Sep 27 20:13:20 UTC 2022 kill -USR1 25995 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25995 killed at Tue Sep 27 20:13:20 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:13:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:13:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:21 UTC 2022 selfserv_9223 with PID 27274 started at Tue Sep 27 20:13:21 UTC 2022 Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:21 UTC 2022 ssl.sh: #42: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:22 UTC 2022 ssl.sh: #43: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:22 UTC 2022 ssl.sh: #44: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:22 UTC 2022 ssl.sh: #45: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:23 UTC 2022 ssl.sh: #46: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:23 UTC 2022 ssl.sh: #47: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:23 UTC 2022 ssl.sh: #48: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:24 UTC 2022 ssl.sh: #49: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:24 UTC 2022 ssl.sh: #50: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:25 UTC 2022 ssl.sh: #51: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:25 UTC 2022 ssl.sh: #52: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:25 UTC 2022 ssl.sh: #53: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:26 UTC 2022 ssl.sh: #54: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:26 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #55: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:27 UTC 2022 ssl.sh: #56: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:27 UTC 2022 ssl.sh: #57: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:27 UTC 2022 ssl.sh: #58: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:28 UTC 2022 ssl.sh: #59: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:28 UTC 2022 ssl.sh: #60: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:28 UTC 2022 ssl.sh: #61: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:29 UTC 2022 ssl.sh: #62: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:29 UTC 2022 ssl.sh: #63: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:29 UTC 2022 ssl.sh: #64: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:30 UTC 2022 ssl.sh: #65: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:30 UTC 2022 ssl.sh: #66: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:31 UTC 2022 ssl.sh: #67: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:31 UTC 2022 ssl.sh: #68: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:31 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #69: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:32 UTC 2022 ssl.sh: #70: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:32 UTC 2022 ssl.sh: #71: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:32 UTC 2022 ssl.sh: #72: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:33 UTC 2022 ssl.sh: #73: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:33 UTC 2022 ssl.sh: #74: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:33 UTC 2022 ssl.sh: #75: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:34 UTC 2022 ssl.sh: #76: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:34 UTC 2022 ssl.sh: #77: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:34 UTC 2022 ssl.sh: #78: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:35 UTC 2022 ssl.sh: #79: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:35 UTC 2022 ssl.sh: #80: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:35 UTC 2022 ssl.sh: #81: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27274 found at Tue Sep 27 20:13:36 UTC 2022 ssl.sh: #82: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 27274 at Tue Sep 27 20:13:36 UTC 2022 kill -USR1 27274 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27274 killed at Tue Sep 27 20:13:36 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:13:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:13:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:36 UTC 2022 selfserv_9223 with PID 28538 started at Tue Sep 27 20:13:36 UTC 2022 Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:37 UTC 2022 ssl.sh: #83: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:37 UTC 2022 ssl.sh: #84: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:38 UTC 2022 ssl.sh: #85: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:38 UTC 2022 ssl.sh: #86: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:39 UTC 2022 ssl.sh: #87: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:39 UTC 2022 ssl.sh: #88: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:39 UTC 2022 ssl.sh: #89: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:40 UTC 2022 ssl.sh: #90: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:40 UTC 2022 ssl.sh: #91: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:41 UTC 2022 ssl.sh: #92: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:41 UTC 2022 ssl.sh: #93: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:42 UTC 2022 ssl.sh: #94: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:42 UTC 2022 ssl.sh: #95: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:42 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #96: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:43 UTC 2022 ssl.sh: #97: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:43 UTC 2022 ssl.sh: #98: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:44 UTC 2022 ssl.sh: #99: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:44 UTC 2022 ssl.sh: #100: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:45 UTC 2022 ssl.sh: #101: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:45 UTC 2022 ssl.sh: #102: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:45 UTC 2022 ssl.sh: #103: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:46 UTC 2022 ssl.sh: #104: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:46 UTC 2022 ssl.sh: #105: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:47 UTC 2022 ssl.sh: #106: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:47 UTC 2022 ssl.sh: #107: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:47 UTC 2022 ssl.sh: #108: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:48 UTC 2022 ssl.sh: #109: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:48 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #110: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:49 UTC 2022 ssl.sh: #111: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:49 UTC 2022 ssl.sh: #112: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:50 UTC 2022 ssl.sh: #113: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:50 UTC 2022 ssl.sh: #114: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:50 UTC 2022 ssl.sh: #115: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:51 UTC 2022 ssl.sh: #116: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:51 UTC 2022 ssl.sh: #117: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:52 UTC 2022 ssl.sh: #118: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:52 UTC 2022 ssl.sh: #119: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:52 UTC 2022 ssl.sh: #120: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:53 UTC 2022 ssl.sh: #121: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:53 UTC 2022 ssl.sh: #122: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28538 found at Tue Sep 27 20:13:54 UTC 2022 ssl.sh: #123: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 28538 at Tue Sep 27 20:13:54 UTC 2022 kill -USR1 28538 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28538 killed at Tue Sep 27 20:13:54 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:13:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:13:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:13:54 UTC 2022 selfserv_9223 with PID 29798 started at Tue Sep 27 20:13:54 UTC 2022 Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:13:55 UTC 2022 ssl.sh: #124: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:13:55 UTC 2022 ssl.sh: #125: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:13:55 UTC 2022 ssl.sh: #126: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:13:56 UTC 2022 ssl.sh: #127: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:13:56 UTC 2022 ssl.sh: #128: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:13:56 UTC 2022 ssl.sh: #129: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:13:57 UTC 2022 ssl.sh: #130: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:13:57 UTC 2022 ssl.sh: #131: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:13:57 UTC 2022 ssl.sh: #132: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:13:58 UTC 2022 ssl.sh: #133: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:13:58 UTC 2022 ssl.sh: #134: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:13:59 UTC 2022 ssl.sh: #135: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:13:59 UTC 2022 ssl.sh: #136: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:13:59 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #137: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:00 UTC 2022 ssl.sh: #138: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:00 UTC 2022 ssl.sh: #139: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:00 UTC 2022 ssl.sh: #140: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:01 UTC 2022 ssl.sh: #141: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:01 UTC 2022 ssl.sh: #142: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:01 UTC 2022 ssl.sh: #143: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:02 UTC 2022 ssl.sh: #144: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:02 UTC 2022 ssl.sh: #145: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:02 UTC 2022 ssl.sh: #146: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:03 UTC 2022 ssl.sh: #147: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:03 UTC 2022 ssl.sh: #148: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:03 UTC 2022 ssl.sh: #149: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:04 UTC 2022 ssl.sh: #150: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:04 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #151: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:05 UTC 2022 ssl.sh: #152: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:05 UTC 2022 ssl.sh: #153: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:05 UTC 2022 ssl.sh: #154: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:06 UTC 2022 ssl.sh: #155: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:06 UTC 2022 ssl.sh: #156: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:06 UTC 2022 ssl.sh: #157: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:07 UTC 2022 ssl.sh: #158: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:07 UTC 2022 ssl.sh: #159: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:07 UTC 2022 ssl.sh: #160: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:08 UTC 2022 ssl.sh: #161: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:08 UTC 2022 ssl.sh: #162: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:08 UTC 2022 ssl.sh: #163: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29798 found at Tue Sep 27 20:14:09 UTC 2022 ssl.sh: #164: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 29798 at Tue Sep 27 20:14:09 UTC 2022 kill -USR1 29798 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29798 killed at Tue Sep 27 20:14:09 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:14:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:14:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31062 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31062 found at Tue Sep 27 20:14:09 UTC 2022 selfserv_9223 with PID 31062 started at Tue Sep 27 20:14:09 UTC 2022 trying to kill selfserv_9223 with PID 31062 at Tue Sep 27 20:14:09 UTC 2022 kill -USR1 31062 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 31062 killed at Tue Sep 27 20:14:09 UTC 2022 selfserv_9223 starting at Tue Sep 27 20:14:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:14:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:10 UTC 2022 selfserv_9223 with PID 31114 started at Tue Sep 27 20:14:10 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:10 UTC 2022 ssl.sh: #165: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:11 UTC 2022 ssl.sh: #166: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:11 UTC 2022 ssl.sh: #167: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:12 UTC 2022 ssl.sh: #168: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:12 UTC 2022 ssl.sh: #169: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:13 UTC 2022 ssl.sh: #170: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:14 UTC 2022 ssl.sh: #171: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:14 UTC 2022 ssl.sh: #172: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:15 UTC 2022 ssl.sh: #173: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:15 UTC 2022 ssl.sh: #174: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:16 UTC 2022 ssl.sh: #175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:16 UTC 2022 ssl.sh: #176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:17 UTC 2022 ssl.sh: #177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:17 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #178: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:18 UTC 2022 ssl.sh: #179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:18 UTC 2022 ssl.sh: #180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:19 UTC 2022 ssl.sh: #181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:19 UTC 2022 ssl.sh: #182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:20 UTC 2022 ssl.sh: #183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:20 UTC 2022 ssl.sh: #184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:21 UTC 2022 ssl.sh: #185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:22 UTC 2022 ssl.sh: #186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:22 UTC 2022 ssl.sh: #187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:23 UTC 2022 ssl.sh: #188: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:23 UTC 2022 ssl.sh: #189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:24 UTC 2022 ssl.sh: #190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:24 UTC 2022 ssl.sh: #191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:25 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #192: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:25 UTC 2022 ssl.sh: #193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:26 UTC 2022 ssl.sh: #194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:26 UTC 2022 ssl.sh: #195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:27 UTC 2022 ssl.sh: #196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:27 UTC 2022 ssl.sh: #197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:28 UTC 2022 ssl.sh: #198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:29 UTC 2022 ssl.sh: #199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:29 UTC 2022 ssl.sh: #200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:30 UTC 2022 ssl.sh: #201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:30 UTC 2022 ssl.sh: #202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:31 UTC 2022 ssl.sh: #203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:31 UTC 2022 ssl.sh: #204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31114 found at Tue Sep 27 20:14:32 UTC 2022 ssl.sh: #205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 31114 at Tue Sep 27 20:14:32 UTC 2022 kill -USR1 31114 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 31114 killed at Tue Sep 27 20:14:32 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:14:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:14:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:32 UTC 2022 selfserv_9223 with PID 32381 started at Tue Sep 27 20:14:32 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:33 UTC 2022 ssl.sh: #206: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:33 UTC 2022 ssl.sh: #207: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:34 UTC 2022 ssl.sh: #208: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:35 UTC 2022 ssl.sh: #209: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:35 UTC 2022 ssl.sh: #210: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:36 UTC 2022 ssl.sh: #211: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:36 UTC 2022 ssl.sh: #212: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:37 UTC 2022 ssl.sh: #213: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:38 UTC 2022 ssl.sh: #214: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:38 UTC 2022 ssl.sh: #215: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:39 UTC 2022 ssl.sh: #216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:39 UTC 2022 ssl.sh: #217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:40 UTC 2022 ssl.sh: #218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:40 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #219: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:41 UTC 2022 ssl.sh: #220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:42 UTC 2022 ssl.sh: #221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:42 UTC 2022 ssl.sh: #222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:43 UTC 2022 ssl.sh: #223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:43 UTC 2022 ssl.sh: #224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:44 UTC 2022 ssl.sh: #225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:44 UTC 2022 ssl.sh: #226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:45 UTC 2022 ssl.sh: #227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:46 UTC 2022 ssl.sh: #228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:46 UTC 2022 ssl.sh: #229: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:47 UTC 2022 ssl.sh: #230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:47 UTC 2022 ssl.sh: #231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:48 UTC 2022 ssl.sh: #232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:49 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #233: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:49 UTC 2022 ssl.sh: #234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:50 UTC 2022 ssl.sh: #235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:50 UTC 2022 ssl.sh: #236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:51 UTC 2022 ssl.sh: #237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:51 UTC 2022 ssl.sh: #238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:52 UTC 2022 ssl.sh: #239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:53 UTC 2022 ssl.sh: #240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:53 UTC 2022 ssl.sh: #241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:54 UTC 2022 ssl.sh: #242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:54 UTC 2022 ssl.sh: #243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:55 UTC 2022 ssl.sh: #244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:55 UTC 2022 ssl.sh: #245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Tue Sep 27 20:14:56 UTC 2022 ssl.sh: #246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 32381 at Tue Sep 27 20:14:56 UTC 2022 kill -USR1 32381 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32381 killed at Tue Sep 27 20:14:56 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:14:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:14:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:14:57 UTC 2022 selfserv_9223 with PID 33644 started at Tue Sep 27 20:14:57 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:14:57 UTC 2022 ssl.sh: #247: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:14:57 UTC 2022 ssl.sh: #248: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:14:58 UTC 2022 ssl.sh: #249: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:14:58 UTC 2022 ssl.sh: #250: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:14:59 UTC 2022 ssl.sh: #251: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:14:59 UTC 2022 ssl.sh: #252: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:00 UTC 2022 ssl.sh: #253: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:00 UTC 2022 ssl.sh: #254: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:01 UTC 2022 ssl.sh: #255: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:01 UTC 2022 ssl.sh: #256: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:02 UTC 2022 ssl.sh: #257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:02 UTC 2022 ssl.sh: #258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:02 UTC 2022 ssl.sh: #259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:03 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #260: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:03 UTC 2022 ssl.sh: #261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:04 UTC 2022 ssl.sh: #262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:04 UTC 2022 ssl.sh: #263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:05 UTC 2022 ssl.sh: #264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:05 UTC 2022 ssl.sh: #265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:06 UTC 2022 ssl.sh: #266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:06 UTC 2022 ssl.sh: #267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:06 UTC 2022 ssl.sh: #268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:07 UTC 2022 ssl.sh: #269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:07 UTC 2022 ssl.sh: #270: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:08 UTC 2022 ssl.sh: #271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:08 UTC 2022 ssl.sh: #272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:09 UTC 2022 ssl.sh: #273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:09 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #274: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:10 UTC 2022 ssl.sh: #275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:10 UTC 2022 ssl.sh: #276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:11 UTC 2022 ssl.sh: #277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:11 UTC 2022 ssl.sh: #278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:11 UTC 2022 ssl.sh: #279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:12 UTC 2022 ssl.sh: #280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:12 UTC 2022 ssl.sh: #281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:13 UTC 2022 ssl.sh: #282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:13 UTC 2022 ssl.sh: #283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:14 UTC 2022 ssl.sh: #284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:14 UTC 2022 ssl.sh: #285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:15 UTC 2022 ssl.sh: #286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33644 found at Tue Sep 27 20:15:15 UTC 2022 ssl.sh: #287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 33644 at Tue Sep 27 20:15:15 UTC 2022 kill -USR1 33644 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33644 killed at Tue Sep 27 20:15:15 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:15:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:15:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:16 UTC 2022 selfserv_9223 with PID 34940 started at Tue Sep 27 20:15:16 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:16 UTC 2022 ssl.sh: #288: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:17 UTC 2022 ssl.sh: #289: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:17 UTC 2022 ssl.sh: #290: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:18 UTC 2022 ssl.sh: #291: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:18 UTC 2022 ssl.sh: #292: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:19 UTC 2022 ssl.sh: #293: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:19 UTC 2022 ssl.sh: #294: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:20 UTC 2022 ssl.sh: #295: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:21 UTC 2022 ssl.sh: #296: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:21 UTC 2022 ssl.sh: #297: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:22 UTC 2022 ssl.sh: #298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:22 UTC 2022 ssl.sh: #299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:23 UTC 2022 ssl.sh: #300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:23 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #301: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:24 UTC 2022 ssl.sh: #302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:24 UTC 2022 ssl.sh: #303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:25 UTC 2022 ssl.sh: #304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:26 UTC 2022 ssl.sh: #305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:26 UTC 2022 ssl.sh: #306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:27 UTC 2022 ssl.sh: #307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:27 UTC 2022 ssl.sh: #308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:28 UTC 2022 ssl.sh: #309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:28 UTC 2022 ssl.sh: #310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:29 UTC 2022 ssl.sh: #311: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:29 UTC 2022 ssl.sh: #312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:30 UTC 2022 ssl.sh: #313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:30 UTC 2022 ssl.sh: #314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:31 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #315: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:31 UTC 2022 ssl.sh: #316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:32 UTC 2022 ssl.sh: #317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:33 UTC 2022 ssl.sh: #318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:33 UTC 2022 ssl.sh: #319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:34 UTC 2022 ssl.sh: #320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:34 UTC 2022 ssl.sh: #321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:35 UTC 2022 ssl.sh: #322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:35 UTC 2022 ssl.sh: #323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:36 UTC 2022 ssl.sh: #324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:36 UTC 2022 ssl.sh: #325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:37 UTC 2022 ssl.sh: #326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:37 UTC 2022 ssl.sh: #327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34940 found at Tue Sep 27 20:15:38 UTC 2022 ssl.sh: #328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 34940 at Tue Sep 27 20:15:38 UTC 2022 kill -USR1 34940 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34940 killed at Tue Sep 27 20:15:38 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:15:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:15:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:38 UTC 2022 selfserv_9223 with PID 36303 started at Tue Sep 27 20:15:38 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:39 UTC 2022 ssl.sh: #329: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:40 UTC 2022 ssl.sh: #330: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:40 UTC 2022 ssl.sh: #331: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:41 UTC 2022 ssl.sh: #332: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:41 UTC 2022 ssl.sh: #333: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:42 UTC 2022 ssl.sh: #334: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:43 UTC 2022 ssl.sh: #335: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:43 UTC 2022 ssl.sh: #336: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:44 UTC 2022 ssl.sh: #337: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:44 UTC 2022 ssl.sh: #338: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:45 UTC 2022 ssl.sh: #339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:46 UTC 2022 ssl.sh: #340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:46 UTC 2022 ssl.sh: #341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:47 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #342: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:47 UTC 2022 ssl.sh: #343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:48 UTC 2022 ssl.sh: #344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:49 UTC 2022 ssl.sh: #345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:49 UTC 2022 ssl.sh: #346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:50 UTC 2022 ssl.sh: #347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:50 UTC 2022 ssl.sh: #348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:51 UTC 2022 ssl.sh: #349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:51 UTC 2022 ssl.sh: #350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:52 UTC 2022 ssl.sh: #351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:53 UTC 2022 ssl.sh: #352: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:53 UTC 2022 ssl.sh: #353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:54 UTC 2022 ssl.sh: #354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:54 UTC 2022 ssl.sh: #355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:55 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #356: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:56 UTC 2022 ssl.sh: #357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:56 UTC 2022 ssl.sh: #358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:57 UTC 2022 ssl.sh: #359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:57 UTC 2022 ssl.sh: #360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:58 UTC 2022 ssl.sh: #361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:58 UTC 2022 ssl.sh: #362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:15:59 UTC 2022 ssl.sh: #363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:16:00 UTC 2022 ssl.sh: #364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:16:00 UTC 2022 ssl.sh: #365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:16:01 UTC 2022 ssl.sh: #366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:16:01 UTC 2022 ssl.sh: #367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:16:02 UTC 2022 ssl.sh: #368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36303 found at Tue Sep 27 20:16:02 UTC 2022 ssl.sh: #369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 36303 at Tue Sep 27 20:16:02 UTC 2022 kill -USR1 36303 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36303 killed at Tue Sep 27 20:16:03 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:16:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:16:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:03 UTC 2022 selfserv_9223 with PID 37565 started at Tue Sep 27 20:16:03 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:04 UTC 2022 ssl.sh: #370: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:04 UTC 2022 ssl.sh: #371: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:04 UTC 2022 ssl.sh: #372: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:05 UTC 2022 ssl.sh: #373: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:05 UTC 2022 ssl.sh: #374: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:06 UTC 2022 ssl.sh: #375: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:06 UTC 2022 ssl.sh: #376: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:07 UTC 2022 ssl.sh: #377: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:07 UTC 2022 ssl.sh: #378: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:08 UTC 2022 ssl.sh: #379: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:08 UTC 2022 ssl.sh: #380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:09 UTC 2022 ssl.sh: #381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:09 UTC 2022 ssl.sh: #382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:10 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #383: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:10 UTC 2022 ssl.sh: #384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:10 UTC 2022 ssl.sh: #385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:11 UTC 2022 ssl.sh: #386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:11 UTC 2022 ssl.sh: #387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:12 UTC 2022 ssl.sh: #388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:12 UTC 2022 ssl.sh: #389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:13 UTC 2022 ssl.sh: #390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:13 UTC 2022 ssl.sh: #391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:14 UTC 2022 ssl.sh: #392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:14 UTC 2022 ssl.sh: #393: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:14 UTC 2022 ssl.sh: #394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:15 UTC 2022 ssl.sh: #395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:15 UTC 2022 ssl.sh: #396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:16 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #397: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:16 UTC 2022 ssl.sh: #398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:17 UTC 2022 ssl.sh: #399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:17 UTC 2022 ssl.sh: #400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:18 UTC 2022 ssl.sh: #401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:18 UTC 2022 ssl.sh: #402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:19 UTC 2022 ssl.sh: #403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:19 UTC 2022 ssl.sh: #404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:19 UTC 2022 ssl.sh: #405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:20 UTC 2022 ssl.sh: #406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:20 UTC 2022 ssl.sh: #407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:21 UTC 2022 ssl.sh: #408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:21 UTC 2022 ssl.sh: #409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37565 found at Tue Sep 27 20:16:22 UTC 2022 ssl.sh: #410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 37565 at Tue Sep 27 20:16:22 UTC 2022 kill -USR1 37565 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37565 killed at Tue Sep 27 20:16:22 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:16:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:16:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38843 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38843 found at Tue Sep 27 20:16:22 UTC 2022 selfserv_9223 with PID 38843 started at Tue Sep 27 20:16:22 UTC 2022 trying to kill selfserv_9223 with PID 38843 at Tue Sep 27 20:16:22 UTC 2022 kill -USR1 38843 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 38843 killed at Tue Sep 27 20:16:22 UTC 2022 selfserv_9223 starting at Tue Sep 27 20:16:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:16:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:23 UTC 2022 selfserv_9223 with PID 38885 started at Tue Sep 27 20:16:23 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:23 UTC 2022 ssl.sh: #411: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:24 UTC 2022 ssl.sh: #412: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:24 UTC 2022 ssl.sh: #413: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:25 UTC 2022 ssl.sh: #414: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:25 UTC 2022 ssl.sh: #415: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:26 UTC 2022 ssl.sh: #416: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:27 UTC 2022 ssl.sh: #417: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:27 UTC 2022 ssl.sh: #418: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:28 UTC 2022 ssl.sh: #419: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:28 UTC 2022 ssl.sh: #420: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:29 UTC 2022 ssl.sh: #421: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:29 UTC 2022 ssl.sh: #422: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:30 UTC 2022 ssl.sh: #423: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:30 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #424: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:31 UTC 2022 ssl.sh: #425: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:31 UTC 2022 ssl.sh: #426: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:32 UTC 2022 ssl.sh: #427: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:33 UTC 2022 ssl.sh: #428: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:33 UTC 2022 ssl.sh: #429: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:34 UTC 2022 ssl.sh: #430: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:34 UTC 2022 ssl.sh: #431: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:35 UTC 2022 ssl.sh: #432: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:35 UTC 2022 ssl.sh: #433: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:36 UTC 2022 ssl.sh: #434: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:36 UTC 2022 ssl.sh: #435: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:37 UTC 2022 ssl.sh: #436: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:37 UTC 2022 ssl.sh: #437: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:38 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #438: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:38 UTC 2022 ssl.sh: #439: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:39 UTC 2022 ssl.sh: #440: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:39 UTC 2022 ssl.sh: #441: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:40 UTC 2022 ssl.sh: #442: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:41 UTC 2022 ssl.sh: #443: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:41 UTC 2022 ssl.sh: #444: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:42 UTC 2022 ssl.sh: #445: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:42 UTC 2022 ssl.sh: #446: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:43 UTC 2022 ssl.sh: #447: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:43 UTC 2022 ssl.sh: #448: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:44 UTC 2022 ssl.sh: #449: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:44 UTC 2022 ssl.sh: #450: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38885 found at Tue Sep 27 20:16:45 UTC 2022 ssl.sh: #451: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 38885 at Tue Sep 27 20:16:45 UTC 2022 kill -USR1 38885 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 38885 killed at Tue Sep 27 20:16:45 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:16:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:16:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:45 UTC 2022 selfserv_9223 with PID 40148 started at Tue Sep 27 20:16:45 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:46 UTC 2022 ssl.sh: #452: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:47 UTC 2022 ssl.sh: #453: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:47 UTC 2022 ssl.sh: #454: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:48 UTC 2022 ssl.sh: #455: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:48 UTC 2022 ssl.sh: #456: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:49 UTC 2022 ssl.sh: #457: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:49 UTC 2022 ssl.sh: #458: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:50 UTC 2022 ssl.sh: #459: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:51 UTC 2022 ssl.sh: #460: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:51 UTC 2022 ssl.sh: #461: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:52 UTC 2022 ssl.sh: #462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:52 UTC 2022 ssl.sh: #463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:53 UTC 2022 ssl.sh: #464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:54 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #465: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:54 UTC 2022 ssl.sh: #466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:55 UTC 2022 ssl.sh: #467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:55 UTC 2022 ssl.sh: #468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:56 UTC 2022 ssl.sh: #469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:56 UTC 2022 ssl.sh: #470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:57 UTC 2022 ssl.sh: #471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:58 UTC 2022 ssl.sh: #472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:58 UTC 2022 ssl.sh: #473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:59 UTC 2022 ssl.sh: #474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:16:59 UTC 2022 ssl.sh: #475: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:17:00 UTC 2022 ssl.sh: #476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:17:00 UTC 2022 ssl.sh: #477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:17:01 UTC 2022 ssl.sh: #478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:17:02 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #479: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:17:02 UTC 2022 ssl.sh: #480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:17:03 UTC 2022 ssl.sh: #481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:17:03 UTC 2022 ssl.sh: #482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:17:04 UTC 2022 ssl.sh: #483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:17:04 UTC 2022 ssl.sh: #484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:17:05 UTC 2022 ssl.sh: #485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:17:06 UTC 2022 ssl.sh: #486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:17:06 UTC 2022 ssl.sh: #487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:17:07 UTC 2022 ssl.sh: #488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:17:07 UTC 2022 ssl.sh: #489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:17:08 UTC 2022 ssl.sh: #490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:17:08 UTC 2022 ssl.sh: #491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40148 found at Tue Sep 27 20:17:09 UTC 2022 ssl.sh: #492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 40148 at Tue Sep 27 20:17:09 UTC 2022 kill -USR1 40148 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40148 killed at Tue Sep 27 20:17:09 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:17:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:17:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:10 UTC 2022 selfserv_9223 with PID 41421 started at Tue Sep 27 20:17:10 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:10 UTC 2022 ssl.sh: #493: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:11 UTC 2022 ssl.sh: #494: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:11 UTC 2022 ssl.sh: #495: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:11 UTC 2022 ssl.sh: #496: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:12 UTC 2022 ssl.sh: #497: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:12 UTC 2022 ssl.sh: #498: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:13 UTC 2022 ssl.sh: #499: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:13 UTC 2022 ssl.sh: #500: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:14 UTC 2022 ssl.sh: #501: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:14 UTC 2022 ssl.sh: #502: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:15 UTC 2022 ssl.sh: #503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:15 UTC 2022 ssl.sh: #504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:15 UTC 2022 ssl.sh: #505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:16 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #506: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:16 UTC 2022 ssl.sh: #507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:17 UTC 2022 ssl.sh: #508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:17 UTC 2022 ssl.sh: #509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:18 UTC 2022 ssl.sh: #510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:18 UTC 2022 ssl.sh: #511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:19 UTC 2022 ssl.sh: #512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:19 UTC 2022 ssl.sh: #513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:20 UTC 2022 ssl.sh: #514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:20 UTC 2022 ssl.sh: #515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:20 UTC 2022 ssl.sh: #516: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:21 UTC 2022 ssl.sh: #517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:21 UTC 2022 ssl.sh: #518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:22 UTC 2022 ssl.sh: #519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:22 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #520: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:23 UTC 2022 ssl.sh: #521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:23 UTC 2022 ssl.sh: #522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:24 UTC 2022 ssl.sh: #523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:24 UTC 2022 ssl.sh: #524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:24 UTC 2022 ssl.sh: #525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:25 UTC 2022 ssl.sh: #526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:25 UTC 2022 ssl.sh: #527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:26 UTC 2022 ssl.sh: #528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:26 UTC 2022 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:27 UTC 2022 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:27 UTC 2022 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:28 UTC 2022 ssl.sh: #532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41421 found at Tue Sep 27 20:17:28 UTC 2022 ssl.sh: #533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 41421 at Tue Sep 27 20:17:28 UTC 2022 kill -USR1 41421 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41421 killed at Tue Sep 27 20:17:28 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:17:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:17:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:29 UTC 2022 selfserv_9223 with PID 42704 started at Tue Sep 27 20:17:29 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:29 UTC 2022 ssl.sh: #534: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:30 UTC 2022 ssl.sh: #535: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:30 UTC 2022 ssl.sh: #536: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:31 UTC 2022 ssl.sh: #537: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:31 UTC 2022 ssl.sh: #538: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:32 UTC 2022 ssl.sh: #539: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:33 UTC 2022 ssl.sh: #540: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:33 UTC 2022 ssl.sh: #541: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:34 UTC 2022 ssl.sh: #542: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:34 UTC 2022 ssl.sh: #543: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:35 UTC 2022 ssl.sh: #544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:35 UTC 2022 ssl.sh: #545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:36 UTC 2022 ssl.sh: #546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:36 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #547: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:37 UTC 2022 ssl.sh: #548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:38 UTC 2022 ssl.sh: #549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:38 UTC 2022 ssl.sh: #550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:39 UTC 2022 ssl.sh: #551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:39 UTC 2022 ssl.sh: #552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:40 UTC 2022 ssl.sh: #553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:40 UTC 2022 ssl.sh: #554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:41 UTC 2022 ssl.sh: #555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:41 UTC 2022 ssl.sh: #556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:42 UTC 2022 ssl.sh: #557: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:42 UTC 2022 ssl.sh: #558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:43 UTC 2022 ssl.sh: #559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:43 UTC 2022 ssl.sh: #560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:44 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #561: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:45 UTC 2022 ssl.sh: #562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:45 UTC 2022 ssl.sh: #563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:46 UTC 2022 ssl.sh: #564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:46 UTC 2022 ssl.sh: #565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:47 UTC 2022 ssl.sh: #566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:47 UTC 2022 ssl.sh: #567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:48 UTC 2022 ssl.sh: #568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:48 UTC 2022 ssl.sh: #569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:49 UTC 2022 ssl.sh: #570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:49 UTC 2022 ssl.sh: #571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:50 UTC 2022 ssl.sh: #572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:50 UTC 2022 ssl.sh: #573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42704 found at Tue Sep 27 20:17:51 UTC 2022 ssl.sh: #574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 42704 at Tue Sep 27 20:17:51 UTC 2022 kill -USR1 42704 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42704 killed at Tue Sep 27 20:17:51 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:17:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:17:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:17:51 UTC 2022 selfserv_9223 with PID 43966 started at Tue Sep 27 20:17:51 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:17:52 UTC 2022 ssl.sh: #575: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:17:53 UTC 2022 ssl.sh: #576: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:17:53 UTC 2022 ssl.sh: #577: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:17:54 UTC 2022 ssl.sh: #578: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:17:54 UTC 2022 ssl.sh: #579: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:17:55 UTC 2022 ssl.sh: #580: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:17:56 UTC 2022 ssl.sh: #581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:17:56 UTC 2022 ssl.sh: #582: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:17:57 UTC 2022 ssl.sh: #583: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:17:57 UTC 2022 ssl.sh: #584: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:17:58 UTC 2022 ssl.sh: #585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:17:59 UTC 2022 ssl.sh: #586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:17:59 UTC 2022 ssl.sh: #587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:00 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #588: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:00 UTC 2022 ssl.sh: #589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:01 UTC 2022 ssl.sh: #590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:02 UTC 2022 ssl.sh: #591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:02 UTC 2022 ssl.sh: #592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:03 UTC 2022 ssl.sh: #593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:03 UTC 2022 ssl.sh: #594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:04 UTC 2022 ssl.sh: #595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:04 UTC 2022 ssl.sh: #596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:05 UTC 2022 ssl.sh: #597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:06 UTC 2022 ssl.sh: #598: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:06 UTC 2022 ssl.sh: #599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:07 UTC 2022 ssl.sh: #600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:07 UTC 2022 ssl.sh: #601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:08 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #602: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:09 UTC 2022 ssl.sh: #603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:09 UTC 2022 ssl.sh: #604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:10 UTC 2022 ssl.sh: #605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:10 UTC 2022 ssl.sh: #606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:11 UTC 2022 ssl.sh: #607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:11 UTC 2022 ssl.sh: #608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:12 UTC 2022 ssl.sh: #609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:13 UTC 2022 ssl.sh: #610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:13 UTC 2022 ssl.sh: #611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:14 UTC 2022 ssl.sh: #612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:14 UTC 2022 ssl.sh: #613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:15 UTC 2022 ssl.sh: #614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43966 found at Tue Sep 27 20:18:16 UTC 2022 ssl.sh: #615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 43966 at Tue Sep 27 20:18:16 UTC 2022 kill -USR1 43966 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 43966 killed at Tue Sep 27 20:18:16 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:18:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:18:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:16 UTC 2022 selfserv_9223 with PID 45239 started at Tue Sep 27 20:18:16 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:17 UTC 2022 ssl.sh: #616: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:17 UTC 2022 ssl.sh: #617: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:17 UTC 2022 ssl.sh: #618: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:18 UTC 2022 ssl.sh: #619: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:18 UTC 2022 ssl.sh: #620: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:19 UTC 2022 ssl.sh: #621: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:19 UTC 2022 ssl.sh: #622: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:20 UTC 2022 ssl.sh: #623: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:20 UTC 2022 ssl.sh: #624: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:21 UTC 2022 ssl.sh: #625: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:21 UTC 2022 ssl.sh: #626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:22 UTC 2022 ssl.sh: #627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:22 UTC 2022 ssl.sh: #628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:23 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #629: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:23 UTC 2022 ssl.sh: #630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:24 UTC 2022 ssl.sh: #631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:24 UTC 2022 ssl.sh: #632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:24 UTC 2022 ssl.sh: #633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:25 UTC 2022 ssl.sh: #634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:25 UTC 2022 ssl.sh: #635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:26 UTC 2022 ssl.sh: #636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:26 UTC 2022 ssl.sh: #637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:27 UTC 2022 ssl.sh: #638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:27 UTC 2022 ssl.sh: #639: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:28 UTC 2022 ssl.sh: #640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:28 UTC 2022 ssl.sh: #641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:28 UTC 2022 ssl.sh: #642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:29 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #643: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:29 UTC 2022 ssl.sh: #644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:30 UTC 2022 ssl.sh: #645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:30 UTC 2022 ssl.sh: #646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:31 UTC 2022 ssl.sh: #647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:31 UTC 2022 ssl.sh: #648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:32 UTC 2022 ssl.sh: #649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:32 UTC 2022 ssl.sh: #650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:33 UTC 2022 ssl.sh: #651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:33 UTC 2022 ssl.sh: #652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:33 UTC 2022 ssl.sh: #653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:34 UTC 2022 ssl.sh: #654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:34 UTC 2022 ssl.sh: #655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45239 found at Tue Sep 27 20:18:35 UTC 2022 ssl.sh: #656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 45239 at Tue Sep 27 20:18:35 UTC 2022 kill -USR1 45239 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45239 killed at Tue Sep 27 20:18:35 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:18:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:18:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46497 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46497 found at Tue Sep 27 20:18:35 UTC 2022 selfserv_9223 with PID 46497 started at Tue Sep 27 20:18:35 UTC 2022 trying to kill selfserv_9223 with PID 46497 at Tue Sep 27 20:18:35 UTC 2022 kill -USR1 46497 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46497 killed at Tue Sep 27 20:18:35 UTC 2022 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9223 starting at Tue Sep 27 20:18:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:18:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 46542 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46542 found at Tue Sep 27 20:18:36 UTC 2022 selfserv_9223 with PID 46542 started at Tue Sep 27 20:18:36 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #657: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #658: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #659: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #660: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #661: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #662: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #663: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #664: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #665: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #666: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #667: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #668: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #669: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #670: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #671: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #672: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #673: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #674: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #675: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #676: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #677: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #678: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #679: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #680: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #681: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #682: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #683: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #684: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #685: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #686: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #687: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #688: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #689: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #690: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #691: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #692: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #693: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #694: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #695: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #696: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #697: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #698: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #699: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #700: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #701: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #702: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #703: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #704: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #705: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #706: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #707: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 46542 at Tue Sep 27 20:18:49 UTC 2022 kill -USR1 46542 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46542 killed at Tue Sep 27 20:18:49 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Tue Sep 27 20:18:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:18:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 47091 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47091 found at Tue Sep 27 20:18:50 UTC 2022 selfserv_9223 with PID 47091 started at Tue Sep 27 20:18:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #708: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #709: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #710: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #711: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #712: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #713: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #714: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #715: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #716: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #717: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #718: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #719: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #720: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #721: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #722: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #723: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #724: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #725: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #726: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #727: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #728: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #729: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #730: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #731: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #732: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #733: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #734: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #735: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #736: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #737: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #738: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #739: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #740: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #741: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #742: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #743: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #744: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #745: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #746: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #747: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #748: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #749: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #750: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #751: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #752: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #753: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #754: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #755: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #756: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #757: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #758: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #759: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #760: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #761: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #762: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #763: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #764: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #765: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #766: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #767: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #768: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #769: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #770: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #771: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #772: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #773: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #774: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #775: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #776: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #777: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #778: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #779: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #780: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #781: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #782: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #783: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47091 at Tue Sep 27 20:19:12 UTC 2022 kill -USR1 47091 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47091 killed at Tue Sep 27 20:19:12 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9223 starting at Tue Sep 27 20:19:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47903 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47903 found at Tue Sep 27 20:19:13 UTC 2022 selfserv_9223 with PID 47903 started at Tue Sep 27 20:19:13 UTC 2022 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47903 at Tue Sep 27 20:19:13 UTC 2022 kill -USR1 47903 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47903 killed at Tue Sep 27 20:19:13 UTC 2022 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47969 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47969 found at Tue Sep 27 20:19:14 UTC 2022 selfserv_9223 with PID 47969 started at Tue Sep 27 20:19:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47969 at Tue Sep 27 20:19:14 UTC 2022 kill -USR1 47969 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47969 killed at Tue Sep 27 20:19:15 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:19:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48021 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48021 found at Tue Sep 27 20:19:15 UTC 2022 selfserv_9223 with PID 48021 started at Tue Sep 27 20:19:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48021 at Tue Sep 27 20:19:15 UTC 2022 kill -USR1 48021 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48021 killed at Tue Sep 27 20:19:16 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48073 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48073 found at Tue Sep 27 20:19:16 UTC 2022 selfserv_9223 with PID 48073 started at Tue Sep 27 20:19:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #786: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48073 at Tue Sep 27 20:19:16 UTC 2022 kill -USR1 48073 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48073 killed at Tue Sep 27 20:19:17 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48125 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48125 found at Tue Sep 27 20:19:17 UTC 2022 selfserv_9223 with PID 48125 started at Tue Sep 27 20:19:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #787: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 48125 at Tue Sep 27 20:19:18 UTC 2022 kill -USR1 48125 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48125 killed at Tue Sep 27 20:19:18 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:19:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48177 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48177 found at Tue Sep 27 20:19:18 UTC 2022 selfserv_9223 with PID 48177 started at Tue Sep 27 20:19:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #788: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 48177 at Tue Sep 27 20:19:19 UTC 2022 kill -USR1 48177 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48177 killed at Tue Sep 27 20:19:19 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48229 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48229 found at Tue Sep 27 20:19:19 UTC 2022 selfserv_9223 with PID 48229 started at Tue Sep 27 20:19:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #789: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48229 at Tue Sep 27 20:19:20 UTC 2022 kill -USR1 48229 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48229 killed at Tue Sep 27 20:19:20 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48281 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48281 found at Tue Sep 27 20:19:20 UTC 2022 selfserv_9223 with PID 48281 started at Tue Sep 27 20:19:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48281 at Tue Sep 27 20:19:21 UTC 2022 kill -USR1 48281 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48281 killed at Tue Sep 27 20:19:21 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:19:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48333 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48333 found at Tue Sep 27 20:19:21 UTC 2022 selfserv_9223 with PID 48333 started at Tue Sep 27 20:19:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48333 at Tue Sep 27 20:19:22 UTC 2022 kill -USR1 48333 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48333 killed at Tue Sep 27 20:19:22 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48385 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48385 found at Tue Sep 27 20:19:22 UTC 2022 selfserv_9223 with PID 48385 started at Tue Sep 27 20:19:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48385 at Tue Sep 27 20:19:23 UTC 2022 kill -USR1 48385 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48385 killed at Tue Sep 27 20:19:23 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48437 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48437 found at Tue Sep 27 20:19:23 UTC 2022 selfserv_9223 with PID 48437 started at Tue Sep 27 20:19:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #793: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 48437 at Tue Sep 27 20:19:24 UTC 2022 kill -USR1 48437 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48437 killed at Tue Sep 27 20:19:24 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:19:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48489 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48489 found at Tue Sep 27 20:19:24 UTC 2022 selfserv_9223 with PID 48489 started at Tue Sep 27 20:19:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #794: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 48489 at Tue Sep 27 20:19:25 UTC 2022 kill -USR1 48489 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48489 killed at Tue Sep 27 20:19:25 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48541 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48541 found at Tue Sep 27 20:19:25 UTC 2022 selfserv_9223 with PID 48541 started at Tue Sep 27 20:19:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48541 at Tue Sep 27 20:19:26 UTC 2022 kill -USR1 48541 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48541 killed at Tue Sep 27 20:19:26 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48593 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48593 found at Tue Sep 27 20:19:26 UTC 2022 selfserv_9223 with PID 48593 started at Tue Sep 27 20:19:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48593 at Tue Sep 27 20:19:27 UTC 2022 kill -USR1 48593 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48593 killed at Tue Sep 27 20:19:27 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:19:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48645 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48645 found at Tue Sep 27 20:19:27 UTC 2022 selfserv_9223 with PID 48645 started at Tue Sep 27 20:19:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48645 at Tue Sep 27 20:19:28 UTC 2022 kill -USR1 48645 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48645 killed at Tue Sep 27 20:19:28 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48697 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48697 found at Tue Sep 27 20:19:29 UTC 2022 selfserv_9223 with PID 48697 started at Tue Sep 27 20:19:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48697 at Tue Sep 27 20:19:29 UTC 2022 kill -USR1 48697 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48697 killed at Tue Sep 27 20:19:29 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48749 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48749 found at Tue Sep 27 20:19:30 UTC 2022 selfserv_9223 with PID 48749 started at Tue Sep 27 20:19:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #799: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 48749 at Tue Sep 27 20:19:31 UTC 2022 kill -USR1 48749 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48749 killed at Tue Sep 27 20:19:31 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:19:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48801 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48801 found at Tue Sep 27 20:19:31 UTC 2022 selfserv_9223 with PID 48801 started at Tue Sep 27 20:19:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 48801 at Tue Sep 27 20:19:32 UTC 2022 kill -USR1 48801 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48801 killed at Tue Sep 27 20:19:32 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48853 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48853 found at Tue Sep 27 20:19:32 UTC 2022 selfserv_9223 with PID 48853 started at Tue Sep 27 20:19:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48853 at Tue Sep 27 20:19:33 UTC 2022 kill -USR1 48853 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48853 killed at Tue Sep 27 20:19:33 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48905 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48905 found at Tue Sep 27 20:19:33 UTC 2022 selfserv_9223 with PID 48905 started at Tue Sep 27 20:19:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #802: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48905 at Tue Sep 27 20:19:34 UTC 2022 kill -USR1 48905 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48905 killed at Tue Sep 27 20:19:34 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:19:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48957 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48957 found at Tue Sep 27 20:19:35 UTC 2022 selfserv_9223 with PID 48957 started at Tue Sep 27 20:19:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48957 at Tue Sep 27 20:19:35 UTC 2022 kill -USR1 48957 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48957 killed at Tue Sep 27 20:19:35 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 49009 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 49009 found at Tue Sep 27 20:19:36 UTC 2022 selfserv_9223 with PID 49009 started at Tue Sep 27 20:19:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 49009 at Tue Sep 27 20:19:36 UTC 2022 kill -USR1 49009 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 49009 killed at Tue Sep 27 20:19:37 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 49061 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 49061 found at Tue Sep 27 20:19:37 UTC 2022 selfserv_9223 with PID 49061 started at Tue Sep 27 20:19:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #805: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 49061 at Tue Sep 27 20:19:38 UTC 2022 kill -USR1 49061 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 49061 killed at Tue Sep 27 20:19:38 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:19:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 49113 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 49113 found at Tue Sep 27 20:19:38 UTC 2022 selfserv_9223 with PID 49113 started at Tue Sep 27 20:19:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #806: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 49113 at Tue Sep 27 20:19:39 UTC 2022 kill -USR1 49113 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 49113 killed at Tue Sep 27 20:19:39 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 324 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 324 found at Tue Sep 27 20:19:39 UTC 2022 selfserv_9223 with PID 324 started at Tue Sep 27 20:19:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 324 at Tue Sep 27 20:19:40 UTC 2022 kill -USR1 324 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 324 killed at Tue Sep 27 20:19:40 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 382 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 382 found at Tue Sep 27 20:19:40 UTC 2022 selfserv_9223 with PID 382 started at Tue Sep 27 20:19:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 382 at Tue Sep 27 20:19:41 UTC 2022 kill -USR1 382 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 382 killed at Tue Sep 27 20:19:41 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:19:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 434 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 434 found at Tue Sep 27 20:19:42 UTC 2022 selfserv_9223 with PID 434 started at Tue Sep 27 20:19:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #809: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 434 at Tue Sep 27 20:19:42 UTC 2022 kill -USR1 434 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 434 killed at Tue Sep 27 20:19:42 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 487 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 487 found at Tue Sep 27 20:19:43 UTC 2022 selfserv_9223 with PID 487 started at Tue Sep 27 20:19:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 487 at Tue Sep 27 20:19:43 UTC 2022 kill -USR1 487 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 487 killed at Tue Sep 27 20:19:43 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 539 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 539 found at Tue Sep 27 20:19:44 UTC 2022 selfserv_9223 with PID 539 started at Tue Sep 27 20:19:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #811: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 539 at Tue Sep 27 20:19:44 UTC 2022 kill -USR1 539 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 539 killed at Tue Sep 27 20:19:45 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:19:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 608 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 608 found at Tue Sep 27 20:19:45 UTC 2022 selfserv_9223 with PID 608 started at Tue Sep 27 20:19:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #812: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 608 at Tue Sep 27 20:19:45 UTC 2022 kill -USR1 608 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 608 killed at Tue Sep 27 20:19:46 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 664 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 664 found at Tue Sep 27 20:19:46 UTC 2022 selfserv_9223 with PID 664 started at Tue Sep 27 20:19:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 664 at Tue Sep 27 20:19:46 UTC 2022 kill -USR1 664 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 664 killed at Tue Sep 27 20:19:47 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 717 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 717 found at Tue Sep 27 20:19:47 UTC 2022 selfserv_9223 with PID 717 started at Tue Sep 27 20:19:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #814: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 717 at Tue Sep 27 20:19:47 UTC 2022 kill -USR1 717 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 717 killed at Tue Sep 27 20:19:47 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 773 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 773 found at Tue Sep 27 20:19:48 UTC 2022 selfserv_9223 with PID 773 started at Tue Sep 27 20:19:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 773 at Tue Sep 27 20:19:48 UTC 2022 kill -USR1 773 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 773 killed at Tue Sep 27 20:19:48 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 831 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 831 found at Tue Sep 27 20:19:49 UTC 2022 selfserv_9223 with PID 831 started at Tue Sep 27 20:19:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 831 at Tue Sep 27 20:19:49 UTC 2022 kill -USR1 831 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 831 killed at Tue Sep 27 20:19:50 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 896 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 896 found at Tue Sep 27 20:19:50 UTC 2022 selfserv_9223 with PID 896 started at Tue Sep 27 20:19:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #817: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 896 at Tue Sep 27 20:19:50 UTC 2022 kill -USR1 896 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 896 killed at Tue Sep 27 20:19:51 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 956 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 956 found at Tue Sep 27 20:19:51 UTC 2022 selfserv_9223 with PID 956 started at Tue Sep 27 20:19:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #818: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 956 at Tue Sep 27 20:19:51 UTC 2022 kill -USR1 956 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 956 killed at Tue Sep 27 20:19:51 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 20:19:52 UTC 2022 selfserv_9223 with PID 1012 started at Tue Sep 27 20:19:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #819: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1012 at Tue Sep 27 20:19:52 UTC 2022 kill -USR1 1012 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1012 killed at Tue Sep 27 20:19:53 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:19:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1078 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1078 found at Tue Sep 27 20:19:53 UTC 2022 selfserv_9223 with PID 1078 started at Tue Sep 27 20:19:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1078 at Tue Sep 27 20:19:53 UTC 2022 kill -USR1 1078 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1078 killed at Tue Sep 27 20:19:54 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1136 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1136 found at Tue Sep 27 20:19:54 UTC 2022 selfserv_9223 with PID 1136 started at Tue Sep 27 20:19:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #821: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1136 at Tue Sep 27 20:19:55 UTC 2022 kill -USR1 1136 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1136 killed at Tue Sep 27 20:19:55 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:19:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1189 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1189 found at Tue Sep 27 20:19:55 UTC 2022 selfserv_9223 with PID 1189 started at Tue Sep 27 20:19:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #822: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 1189 at Tue Sep 27 20:19:55 UTC 2022 kill -USR1 1189 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1189 killed at Tue Sep 27 20:19:56 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1243 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1243 found at Tue Sep 27 20:19:56 UTC 2022 selfserv_9223 with PID 1243 started at Tue Sep 27 20:19:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #823: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1243 at Tue Sep 27 20:19:56 UTC 2022 kill -USR1 1243 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1243 killed at Tue Sep 27 20:19:57 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:19:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1314 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1314 found at Tue Sep 27 20:19:57 UTC 2022 selfserv_9223 with PID 1314 started at Tue Sep 27 20:19:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #824: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1314 at Tue Sep 27 20:19:57 UTC 2022 kill -USR1 1314 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1314 killed at Tue Sep 27 20:19:58 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1368 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1368 found at Tue Sep 27 20:19:58 UTC 2022 selfserv_9223 with PID 1368 started at Tue Sep 27 20:19:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1368 at Tue Sep 27 20:19:58 UTC 2022 kill -USR1 1368 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1368 killed at Tue Sep 27 20:19:59 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:19:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1426 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1426 found at Tue Sep 27 20:19:59 UTC 2022 selfserv_9223 with PID 1426 started at Tue Sep 27 20:19:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #826: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 1426 at Tue Sep 27 20:19:59 UTC 2022 kill -USR1 1426 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1426 killed at Tue Sep 27 20:19:59 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:19:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:19:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1486 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1486 found at Tue Sep 27 20:20:00 UTC 2022 selfserv_9223 with PID 1486 started at Tue Sep 27 20:20:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1486 at Tue Sep 27 20:20:00 UTC 2022 kill -USR1 1486 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1486 killed at Tue Sep 27 20:20:00 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:20:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1559 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1559 found at Tue Sep 27 20:20:01 UTC 2022 selfserv_9223 with PID 1559 started at Tue Sep 27 20:20:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #828: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1559 at Tue Sep 27 20:20:01 UTC 2022 kill -USR1 1559 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1559 killed at Tue Sep 27 20:20:01 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:20:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1615 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1615 found at Tue Sep 27 20:20:02 UTC 2022 selfserv_9223 with PID 1615 started at Tue Sep 27 20:20:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #829: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1615 at Tue Sep 27 20:20:02 UTC 2022 kill -USR1 1615 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1615 killed at Tue Sep 27 20:20:03 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:20:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1667 found at Tue Sep 27 20:20:03 UTC 2022 selfserv_9223 with PID 1667 started at Tue Sep 27 20:20:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #830: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 1667 at Tue Sep 27 20:20:04 UTC 2022 kill -USR1 1667 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1667 killed at Tue Sep 27 20:20:04 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:20:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1719 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1719 found at Tue Sep 27 20:20:04 UTC 2022 selfserv_9223 with PID 1719 started at Tue Sep 27 20:20:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1719 at Tue Sep 27 20:20:05 UTC 2022 kill -USR1 1719 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1719 killed at Tue Sep 27 20:20:05 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:20:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1771 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1771 found at Tue Sep 27 20:20:05 UTC 2022 selfserv_9223 with PID 1771 started at Tue Sep 27 20:20:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #832: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1771 at Tue Sep 27 20:20:06 UTC 2022 kill -USR1 1771 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1771 killed at Tue Sep 27 20:20:06 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:20:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1823 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1823 found at Tue Sep 27 20:20:06 UTC 2022 selfserv_9223 with PID 1823 started at Tue Sep 27 20:20:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #833: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1823 at Tue Sep 27 20:20:07 UTC 2022 kill -USR1 1823 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1823 killed at Tue Sep 27 20:20:07 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:20:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1888 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1888 found at Tue Sep 27 20:20:08 UTC 2022 selfserv_9223 with PID 1888 started at Tue Sep 27 20:20:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #834: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 1888 at Tue Sep 27 20:20:08 UTC 2022 kill -USR1 1888 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1888 killed at Tue Sep 27 20:20:08 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:20:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1940 found at Tue Sep 27 20:20:09 UTC 2022 selfserv_9223 with PID 1940 started at Tue Sep 27 20:20:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #835: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1940 at Tue Sep 27 20:20:09 UTC 2022 kill -USR1 1940 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1940 killed at Tue Sep 27 20:20:09 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:20:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2001 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2001 found at Tue Sep 27 20:20:10 UTC 2022 selfserv_9223 with PID 2001 started at Tue Sep 27 20:20:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #836: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2001 at Tue Sep 27 20:20:10 UTC 2022 kill -USR1 2001 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2001 killed at Tue Sep 27 20:20:10 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:20:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2056 found at Tue Sep 27 20:20:11 UTC 2022 selfserv_9223 with PID 2056 started at Tue Sep 27 20:20:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #837: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2056 at Tue Sep 27 20:20:11 UTC 2022 kill -USR1 2056 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2056 killed at Tue Sep 27 20:20:11 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:20:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2112 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2112 found at Tue Sep 27 20:20:12 UTC 2022 selfserv_9223 with PID 2112 started at Tue Sep 27 20:20:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #838: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2112 at Tue Sep 27 20:20:12 UTC 2022 kill -USR1 2112 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2112 killed at Tue Sep 27 20:20:12 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:20:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2165 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2165 found at Tue Sep 27 20:20:13 UTC 2022 selfserv_9223 with PID 2165 started at Tue Sep 27 20:20:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2165 at Tue Sep 27 20:20:13 UTC 2022 kill -USR1 2165 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2165 killed at Tue Sep 27 20:20:14 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:20:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2217 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2217 found at Tue Sep 27 20:20:14 UTC 2022 selfserv_9223 with PID 2217 started at Tue Sep 27 20:20:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #840: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2217 at Tue Sep 27 20:20:15 UTC 2022 kill -USR1 2217 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2217 killed at Tue Sep 27 20:20:15 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:20:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2269 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2269 found at Tue Sep 27 20:20:15 UTC 2022 selfserv_9223 with PID 2269 started at Tue Sep 27 20:20:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #841: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2269 at Tue Sep 27 20:20:16 UTC 2022 kill -USR1 2269 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2269 killed at Tue Sep 27 20:20:16 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Tue Sep 27 20:20:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2327 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2327 found at Tue Sep 27 20:20:16 UTC 2022 selfserv_9223 with PID 2327 started at Tue Sep 27 20:20:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #842: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2327 at Tue Sep 27 20:20:17 UTC 2022 kill -USR1 2327 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2327 killed at Tue Sep 27 20:20:17 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Tue Sep 27 20:20:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2385 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2385 found at Tue Sep 27 20:20:17 UTC 2022 selfserv_9223 with PID 2385 started at Tue Sep 27 20:20:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #843: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2385 at Tue Sep 27 20:20:18 UTC 2022 kill -USR1 2385 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2385 killed at Tue Sep 27 20:20:18 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Tue Sep 27 20:20:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2443 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2443 found at Tue Sep 27 20:20:18 UTC 2022 selfserv_9223 with PID 2443 started at Tue Sep 27 20:20:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #844: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2443 at Tue Sep 27 20:20:18 UTC 2022 kill -USR1 2443 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2443 killed at Tue Sep 27 20:20:18 UTC 2022 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9223 starting at Tue Sep 27 20:20:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2501 found at Tue Sep 27 20:20:19 UTC 2022 selfserv_9223 with PID 2501 started at Tue Sep 27 20:20:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #845: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2501 at Tue Sep 27 20:20:19 UTC 2022 kill -USR1 2501 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2501 killed at Tue Sep 27 20:20:19 UTC 2022 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9223 starting at Tue Sep 27 20:20:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2559 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2559 found at Tue Sep 27 20:20:20 UTC 2022 selfserv_9223 with PID 2559 started at Tue Sep 27 20:20:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #846: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2559 at Tue Sep 27 20:20:20 UTC 2022 kill -USR1 2559 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2559 killed at Tue Sep 27 20:20:20 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Tue Sep 27 20:20:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2617 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2617 found at Tue Sep 27 20:20:20 UTC 2022 selfserv_9223 with PID 2617 started at Tue Sep 27 20:20:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #847: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2617 at Tue Sep 27 20:20:21 UTC 2022 kill -USR1 2617 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2617 killed at Tue Sep 27 20:20:21 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Tue Sep 27 20:20:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2675 found at Tue Sep 27 20:20:21 UTC 2022 selfserv_9223 with PID 2675 started at Tue Sep 27 20:20:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #848: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2675 at Tue Sep 27 20:20:22 UTC 2022 kill -USR1 2675 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2675 killed at Tue Sep 27 20:20:22 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9223 starting at Tue Sep 27 20:20:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2733 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2733 found at Tue Sep 27 20:20:22 UTC 2022 selfserv_9223 with PID 2733 started at Tue Sep 27 20:20:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #849: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2733 at Tue Sep 27 20:20:23 UTC 2022 kill -USR1 2733 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2733 killed at Tue Sep 27 20:20:23 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9223 starting at Tue Sep 27 20:20:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2791 found at Tue Sep 27 20:20:23 UTC 2022 selfserv_9223 with PID 2791 started at Tue Sep 27 20:20:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #850: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2791 at Tue Sep 27 20:20:23 UTC 2022 kill -USR1 2791 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2791 killed at Tue Sep 27 20:20:24 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Tue Sep 27 20:20:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2849 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2849 found at Tue Sep 27 20:20:24 UTC 2022 selfserv_9223 with PID 2849 started at Tue Sep 27 20:20:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #851: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2849 at Tue Sep 27 20:20:24 UTC 2022 kill -USR1 2849 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2849 killed at Tue Sep 27 20:20:24 UTC 2022 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9223 starting at Tue Sep 27 20:20:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2892 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2892 found at Tue Sep 27 20:20:25 UTC 2022 selfserv_9223 with PID 2892 started at Tue Sep 27 20:20:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #784: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2892 at Tue Sep 27 20:20:25 UTC 2022 kill -USR1 2892 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2892 killed at Tue Sep 27 20:20:25 UTC 2022 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9223 starting at Tue Sep 27 20:20:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2934 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2934 found at Tue Sep 27 20:20:25 UTC 2022 selfserv_9223 with PID 2934 started at Tue Sep 27 20:20:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #785: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9223 with PID 2934 at Tue Sep 27 20:20:26 UTC 2022 kill -USR1 2934 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2934 killed at Tue Sep 27 20:20:26 UTC 2022 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9223 starting at Tue Sep 27 20:20:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2976 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2976 found at Tue Sep 27 20:20:26 UTC 2022 selfserv_9223 with PID 2976 started at Tue Sep 27 20:20:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #786: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 2976 at Tue Sep 27 20:20:26 UTC 2022 kill -USR1 2976 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2976 killed at Tue Sep 27 20:20:27 UTC 2022 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9223 starting at Tue Sep 27 20:20:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3018 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3018 found at Tue Sep 27 20:20:27 UTC 2022 selfserv_9223 with PID 3018 started at Tue Sep 27 20:20:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #787: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 3018 at Tue Sep 27 20:20:27 UTC 2022 kill -USR1 3018 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3018 killed at Tue Sep 27 20:20:27 UTC 2022 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9223 starting at Tue Sep 27 20:20:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3060 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3060 found at Tue Sep 27 20:20:28 UTC 2022 selfserv_9223 with PID 3060 started at Tue Sep 27 20:20:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #788: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 3060 at Tue Sep 27 20:20:28 UTC 2022 kill -USR1 3060 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3060 killed at Tue Sep 27 20:20:28 UTC 2022 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9223 starting at Tue Sep 27 20:20:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3103 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3103 found at Tue Sep 27 20:20:28 UTC 2022 selfserv_9223 with PID 3103 started at Tue Sep 27 20:20:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #789: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 3103 at Tue Sep 27 20:20:29 UTC 2022 kill -USR1 3103 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3103 killed at Tue Sep 27 20:20:29 UTC 2022 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9223 starting at Tue Sep 27 20:20:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3146 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3146 found at Tue Sep 27 20:20:29 UTC 2022 selfserv_9223 with PID 3146 started at Tue Sep 27 20:20:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #790: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 3146 at Tue Sep 27 20:20:29 UTC 2022 kill -USR1 3146 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3146 killed at Tue Sep 27 20:20:30 UTC 2022 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9223 starting at Tue Sep 27 20:20:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:20:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3189 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3189 found at Tue Sep 27 20:20:30 UTC 2022 selfserv_9223 with PID 3189 started at Tue Sep 27 20:20:30 UTC 2022 strsclnt -q -p 9223 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Tue Sep 27 20:20:30 UTC 2022 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Tue Sep 27 20:21:19 UTC 2022 ssl.sh: #791: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9223 with PID 3189 at Tue Sep 27 20:21:19 UTC 2022 kill -USR1 3189 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3189 killed at Tue Sep 27 20:21:19 UTC 2022 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Tue Sep 27 20:21:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:21:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3257 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3257 found at Tue Sep 27 20:21:19 UTC 2022 selfserv_9223 with PID 3257 started at Tue Sep 27 20:21:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3257 at Tue Sep 27 20:21:19 UTC 2022 kill -USR1 3257 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3257 killed at Tue Sep 27 20:21:20 UTC 2022 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:21:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:21:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3299 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3299 found at Tue Sep 27 20:21:20 UTC 2022 selfserv_9223 with PID 3299 started at Tue Sep 27 20:21:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #793: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3299 at Tue Sep 27 20:21:20 UTC 2022 kill -USR1 3299 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3299 killed at Tue Sep 27 20:21:20 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:21:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:21:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3338 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3338 found at Tue Sep 27 20:21:21 UTC 2022 selfserv_9223 with PID 3338 started at Tue Sep 27 20:21:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #794: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 3338 at Tue Sep 27 20:21:21 UTC 2022 kill -USR1 3338 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3338 killed at Tue Sep 27 20:21:21 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:21:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:21:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3377 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3377 found at Tue Sep 27 20:21:21 UTC 2022 selfserv_9223 with PID 3377 started at Tue Sep 27 20:21:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3377 at Tue Sep 27 20:21:22 UTC 2022 kill -USR1 3377 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3377 killed at Tue Sep 27 20:21:22 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:21:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:21:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3416 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3416 found at Tue Sep 27 20:21:22 UTC 2022 selfserv_9223 with PID 3416 started at Tue Sep 27 20:21:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #796: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 3416 at Tue Sep 27 20:21:22 UTC 2022 kill -USR1 3416 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3416 killed at Tue Sep 27 20:21:23 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:21:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:21:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3455 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3455 found at Tue Sep 27 20:21:23 UTC 2022 selfserv_9223 with PID 3455 started at Tue Sep 27 20:21:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3455 at Tue Sep 27 20:21:23 UTC 2022 kill -USR1 3455 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3455 killed at Tue Sep 27 20:21:23 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:21:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:21:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3494 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3494 found at Tue Sep 27 20:21:24 UTC 2022 selfserv_9223 with PID 3494 started at Tue Sep 27 20:21:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3494 at Tue Sep 27 20:21:24 UTC 2022 kill -USR1 3494 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3494 killed at Tue Sep 27 20:21:24 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:21:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:21:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3533 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3533 found at Tue Sep 27 20:21:24 UTC 2022 selfserv_9223 with PID 3533 started at Tue Sep 27 20:21:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3533 at Tue Sep 27 20:21:25 UTC 2022 kill -USR1 3533 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3533 killed at Tue Sep 27 20:21:25 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:21:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:21:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3572 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3572 found at Tue Sep 27 20:21:25 UTC 2022 selfserv_9223 with PID 3572 started at Tue Sep 27 20:21:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #800: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3572 at Tue Sep 27 20:21:25 UTC 2022 kill -USR1 3572 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3572 killed at Tue Sep 27 20:21:26 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:21:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:21:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3611 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3611 found at Tue Sep 27 20:21:26 UTC 2022 selfserv_9223 with PID 3611 started at Tue Sep 27 20:21:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3611 at Tue Sep 27 20:21:26 UTC 2022 kill -USR1 3611 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3611 killed at Tue Sep 27 20:21:26 UTC 2022 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:21:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:21:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3650 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3650 found at Tue Sep 27 20:21:27 UTC 2022 selfserv_9223 with PID 3650 started at Tue Sep 27 20:21:27 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #802: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3650 at Tue Sep 27 20:21:27 UTC 2022 kill -USR1 3650 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3650 killed at Tue Sep 27 20:21:27 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:21:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:21:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3690 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3690 found at Tue Sep 27 20:21:27 UTC 2022 selfserv_9223 with PID 3690 started at Tue Sep 27 20:21:27 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #803: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3690 at Tue Sep 27 20:21:28 UTC 2022 kill -USR1 3690 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3690 killed at Tue Sep 27 20:21:28 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:21:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:21:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3730 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3730 found at Tue Sep 27 20:21:28 UTC 2022 selfserv_9223 with PID 3730 started at Tue Sep 27 20:21:28 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #804: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3730 at Tue Sep 27 20:21:28 UTC 2022 kill -USR1 3730 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3730 killed at Tue Sep 27 20:21:29 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:21:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:21:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3770 found at Tue Sep 27 20:21:29 UTC 2022 selfserv_9223 with PID 3770 started at Tue Sep 27 20:21:29 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #805: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3770 at Tue Sep 27 20:21:29 UTC 2022 kill -USR1 3770 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3770 killed at Tue Sep 27 20:21:29 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:21:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:21:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3810 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3810 found at Tue Sep 27 20:21:30 UTC 2022 selfserv_9223 with PID 3810 started at Tue Sep 27 20:21:30 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #806: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3810 at Tue Sep 27 20:21:30 UTC 2022 kill -USR1 3810 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3810 killed at Tue Sep 27 20:21:30 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:21:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:21:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3850 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3850 found at Tue Sep 27 20:21:30 UTC 2022 selfserv_9223 with PID 3850 started at Tue Sep 27 20:21:30 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #807: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3850 at Tue Sep 27 20:21:31 UTC 2022 kill -USR1 3850 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3850 killed at Tue Sep 27 20:21:31 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:21:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:21:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3890 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3890 found at Tue Sep 27 20:21:31 UTC 2022 selfserv_9223 with PID 3890 started at Tue Sep 27 20:21:31 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #808: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3890 at Tue Sep 27 20:21:31 UTC 2022 kill -USR1 3890 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3890 killed at Tue Sep 27 20:21:32 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:21:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:21:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3930 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3930 found at Tue Sep 27 20:21:32 UTC 2022 selfserv_9223 with PID 3930 started at Tue Sep 27 20:21:32 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #809: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3930 at Tue Sep 27 20:21:32 UTC 2022 kill -USR1 3930 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3930 killed at Tue Sep 27 20:21:32 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:21:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:21:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3970 found at Tue Sep 27 20:21:33 UTC 2022 selfserv_9223 with PID 3970 started at Tue Sep 27 20:21:33 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #810: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3970 at Tue Sep 27 20:21:33 UTC 2022 kill -USR1 3970 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3970 killed at Tue Sep 27 20:21:33 UTC 2022 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9223 starting at Tue Sep 27 20:21:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:21:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 4010 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4010 found at Tue Sep 27 20:21:33 UTC 2022 selfserv_9223 with PID 4010 started at Tue Sep 27 20:21:33 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #811: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #812: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #813: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #814: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #815: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #816: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #817: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #821: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #822: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #827: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #828: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #833: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #834: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #839: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #840: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #844: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #846: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #849: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #850: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #851: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #852: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #853: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #854: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #855: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #856: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #857: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #858: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #859: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #860: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #861: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 4010 at Tue Sep 27 20:21:47 UTC 2022 kill -USR1 4010 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4010 killed at Tue Sep 27 20:21:47 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Tue Sep 27 20:21:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:21:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 4559 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4559 found at Tue Sep 27 20:21:48 UTC 2022 selfserv_9223 with PID 4559 started at Tue Sep 27 20:21:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #862: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #863: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #864: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #865: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #866: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #867: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #868: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #869: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #870: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #902: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #903: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #908: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #909: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #914: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #915: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #920: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #921: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #923: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #924: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #925: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #926: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #927: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #928: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #929: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #930: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #931: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #932: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #933: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #934: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #935: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #936: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4559 at Tue Sep 27 20:22:10 UTC 2022 kill -USR1 4559 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4559 killed at Tue Sep 27 20:22:10 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5381 found at Tue Sep 27 20:22:10 UTC 2022 selfserv_9223 with PID 5381 started at Tue Sep 27 20:22:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5381 at Tue Sep 27 20:22:11 UTC 2022 kill -USR1 5381 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5381 killed at Tue Sep 27 20:22:11 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:22:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5437 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5437 found at Tue Sep 27 20:22:11 UTC 2022 selfserv_9223 with PID 5437 started at Tue Sep 27 20:22:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5437 at Tue Sep 27 20:22:12 UTC 2022 kill -USR1 5437 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5437 killed at Tue Sep 27 20:22:12 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5490 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5490 found at Tue Sep 27 20:22:12 UTC 2022 selfserv_9223 with PID 5490 started at Tue Sep 27 20:22:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #940: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5490 at Tue Sep 27 20:22:13 UTC 2022 kill -USR1 5490 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5490 killed at Tue Sep 27 20:22:13 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5542 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5542 found at Tue Sep 27 20:22:13 UTC 2022 selfserv_9223 with PID 5542 started at Tue Sep 27 20:22:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #941: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5542 at Tue Sep 27 20:22:13 UTC 2022 kill -USR1 5542 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5542 killed at Tue Sep 27 20:22:14 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:22:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5594 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5594 found at Tue Sep 27 20:22:14 UTC 2022 selfserv_9223 with PID 5594 started at Tue Sep 27 20:22:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #942: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5594 at Tue Sep 27 20:22:14 UTC 2022 kill -USR1 5594 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5594 killed at Tue Sep 27 20:22:15 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5646 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5646 found at Tue Sep 27 20:22:15 UTC 2022 selfserv_9223 with PID 5646 started at Tue Sep 27 20:22:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5646 at Tue Sep 27 20:22:15 UTC 2022 kill -USR1 5646 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5646 killed at Tue Sep 27 20:22:15 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5698 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5698 found at Tue Sep 27 20:22:16 UTC 2022 selfserv_9223 with PID 5698 started at Tue Sep 27 20:22:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5698 at Tue Sep 27 20:22:16 UTC 2022 kill -USR1 5698 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5698 killed at Tue Sep 27 20:22:16 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:22:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5758 found at Tue Sep 27 20:22:17 UTC 2022 selfserv_9223 with PID 5758 started at Tue Sep 27 20:22:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5758 at Tue Sep 27 20:22:17 UTC 2022 kill -USR1 5758 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5758 killed at Tue Sep 27 20:22:17 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5810 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5810 found at Tue Sep 27 20:22:18 UTC 2022 selfserv_9223 with PID 5810 started at Tue Sep 27 20:22:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5810 at Tue Sep 27 20:22:18 UTC 2022 kill -USR1 5810 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5810 killed at Tue Sep 27 20:22:18 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5862 found at Tue Sep 27 20:22:19 UTC 2022 selfserv_9223 with PID 5862 started at Tue Sep 27 20:22:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #947: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5862 at Tue Sep 27 20:22:19 UTC 2022 kill -USR1 5862 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5862 killed at Tue Sep 27 20:22:19 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:22:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5914 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5914 found at Tue Sep 27 20:22:20 UTC 2022 selfserv_9223 with PID 5914 started at Tue Sep 27 20:22:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #948: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5914 at Tue Sep 27 20:22:20 UTC 2022 kill -USR1 5914 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5914 killed at Tue Sep 27 20:22:20 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5966 found at Tue Sep 27 20:22:21 UTC 2022 selfserv_9223 with PID 5966 started at Tue Sep 27 20:22:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5966 at Tue Sep 27 20:22:21 UTC 2022 kill -USR1 5966 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5966 killed at Tue Sep 27 20:22:21 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6018 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6018 found at Tue Sep 27 20:22:21 UTC 2022 selfserv_9223 with PID 6018 started at Tue Sep 27 20:22:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6018 at Tue Sep 27 20:22:22 UTC 2022 kill -USR1 6018 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6018 killed at Tue Sep 27 20:22:22 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:22:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6070 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6070 found at Tue Sep 27 20:22:23 UTC 2022 selfserv_9223 with PID 6070 started at Tue Sep 27 20:22:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6070 at Tue Sep 27 20:22:23 UTC 2022 kill -USR1 6070 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6070 killed at Tue Sep 27 20:22:23 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6122 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6122 found at Tue Sep 27 20:22:24 UTC 2022 selfserv_9223 with PID 6122 started at Tue Sep 27 20:22:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6122 at Tue Sep 27 20:22:24 UTC 2022 kill -USR1 6122 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6122 killed at Tue Sep 27 20:22:24 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6174 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6174 found at Tue Sep 27 20:22:25 UTC 2022 selfserv_9223 with PID 6174 started at Tue Sep 27 20:22:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #953: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6174 at Tue Sep 27 20:22:25 UTC 2022 kill -USR1 6174 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6174 killed at Tue Sep 27 20:22:25 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:22:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6226 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6226 found at Tue Sep 27 20:22:26 UTC 2022 selfserv_9223 with PID 6226 started at Tue Sep 27 20:22:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #954: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6226 at Tue Sep 27 20:22:26 UTC 2022 kill -USR1 6226 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6226 killed at Tue Sep 27 20:22:26 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6278 found at Tue Sep 27 20:22:27 UTC 2022 selfserv_9223 with PID 6278 started at Tue Sep 27 20:22:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #955: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6278 at Tue Sep 27 20:22:27 UTC 2022 kill -USR1 6278 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6278 killed at Tue Sep 27 20:22:27 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6330 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6330 found at Tue Sep 27 20:22:28 UTC 2022 selfserv_9223 with PID 6330 started at Tue Sep 27 20:22:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #956: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6330 at Tue Sep 27 20:22:28 UTC 2022 kill -USR1 6330 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6330 killed at Tue Sep 27 20:22:28 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:22:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6382 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6382 found at Tue Sep 27 20:22:29 UTC 2022 selfserv_9223 with PID 6382 started at Tue Sep 27 20:22:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #957: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6382 at Tue Sep 27 20:22:29 UTC 2022 kill -USR1 6382 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6382 killed at Tue Sep 27 20:22:29 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6434 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6434 found at Tue Sep 27 20:22:30 UTC 2022 selfserv_9223 with PID 6434 started at Tue Sep 27 20:22:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #958: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6434 at Tue Sep 27 20:22:30 UTC 2022 kill -USR1 6434 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6434 killed at Tue Sep 27 20:22:31 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6486 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6486 found at Tue Sep 27 20:22:31 UTC 2022 selfserv_9223 with PID 6486 started at Tue Sep 27 20:22:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #959: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6486 at Tue Sep 27 20:22:31 UTC 2022 kill -USR1 6486 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6486 killed at Tue Sep 27 20:22:32 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:22:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6538 found at Tue Sep 27 20:22:32 UTC 2022 selfserv_9223 with PID 6538 started at Tue Sep 27 20:22:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #960: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6538 at Tue Sep 27 20:22:32 UTC 2022 kill -USR1 6538 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6538 killed at Tue Sep 27 20:22:33 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6590 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6590 found at Tue Sep 27 20:22:33 UTC 2022 selfserv_9223 with PID 6590 started at Tue Sep 27 20:22:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #961: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6590 at Tue Sep 27 20:22:34 UTC 2022 kill -USR1 6590 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6590 killed at Tue Sep 27 20:22:34 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6644 found at Tue Sep 27 20:22:34 UTC 2022 selfserv_9223 with PID 6644 started at Tue Sep 27 20:22:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #962: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6644 at Tue Sep 27 20:22:35 UTC 2022 kill -USR1 6644 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6644 killed at Tue Sep 27 20:22:35 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:22:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6696 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6696 found at Tue Sep 27 20:22:35 UTC 2022 selfserv_9223 with PID 6696 started at Tue Sep 27 20:22:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #963: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6696 at Tue Sep 27 20:22:36 UTC 2022 kill -USR1 6696 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6696 killed at Tue Sep 27 20:22:36 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6748 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6748 found at Tue Sep 27 20:22:36 UTC 2022 selfserv_9223 with PID 6748 started at Tue Sep 27 20:22:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #964: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6748 at Tue Sep 27 20:22:37 UTC 2022 kill -USR1 6748 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6748 killed at Tue Sep 27 20:22:37 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6800 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6800 found at Tue Sep 27 20:22:37 UTC 2022 selfserv_9223 with PID 6800 started at Tue Sep 27 20:22:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #965: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6800 at Tue Sep 27 20:22:38 UTC 2022 kill -USR1 6800 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6800 killed at Tue Sep 27 20:22:38 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:22:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6852 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6852 found at Tue Sep 27 20:22:38 UTC 2022 selfserv_9223 with PID 6852 started at Tue Sep 27 20:22:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #966: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6852 at Tue Sep 27 20:22:39 UTC 2022 kill -USR1 6852 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6852 killed at Tue Sep 27 20:22:39 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6904 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6904 found at Tue Sep 27 20:22:39 UTC 2022 selfserv_9223 with PID 6904 started at Tue Sep 27 20:22:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #967: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6904 at Tue Sep 27 20:22:40 UTC 2022 kill -USR1 6904 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6904 killed at Tue Sep 27 20:22:40 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6956 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6956 found at Tue Sep 27 20:22:40 UTC 2022 selfserv_9223 with PID 6956 started at Tue Sep 27 20:22:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #968: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6956 at Tue Sep 27 20:22:41 UTC 2022 kill -USR1 6956 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6956 killed at Tue Sep 27 20:22:41 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7008 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7008 found at Tue Sep 27 20:22:41 UTC 2022 selfserv_9223 with PID 7008 started at Tue Sep 27 20:22:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #969: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7008 at Tue Sep 27 20:22:41 UTC 2022 kill -USR1 7008 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7008 killed at Tue Sep 27 20:22:42 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7060 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7060 found at Tue Sep 27 20:22:42 UTC 2022 selfserv_9223 with PID 7060 started at Tue Sep 27 20:22:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #970: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7060 at Tue Sep 27 20:22:42 UTC 2022 kill -USR1 7060 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7060 killed at Tue Sep 27 20:22:43 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7112 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7112 found at Tue Sep 27 20:22:43 UTC 2022 selfserv_9223 with PID 7112 started at Tue Sep 27 20:22:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #971: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7112 at Tue Sep 27 20:22:43 UTC 2022 kill -USR1 7112 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7112 killed at Tue Sep 27 20:22:44 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7164 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7164 found at Tue Sep 27 20:22:44 UTC 2022 selfserv_9223 with PID 7164 started at Tue Sep 27 20:22:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #972: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7164 at Tue Sep 27 20:22:44 UTC 2022 kill -USR1 7164 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7164 killed at Tue Sep 27 20:22:44 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7216 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7216 found at Tue Sep 27 20:22:45 UTC 2022 selfserv_9223 with PID 7216 started at Tue Sep 27 20:22:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #973: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7216 at Tue Sep 27 20:22:45 UTC 2022 kill -USR1 7216 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7216 killed at Tue Sep 27 20:22:45 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:22:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7268 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7268 found at Tue Sep 27 20:22:46 UTC 2022 selfserv_9223 with PID 7268 started at Tue Sep 27 20:22:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #974: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7268 at Tue Sep 27 20:22:46 UTC 2022 kill -USR1 7268 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7268 killed at Tue Sep 27 20:22:46 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7320 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7320 found at Tue Sep 27 20:22:47 UTC 2022 selfserv_9223 with PID 7320 started at Tue Sep 27 20:22:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #975: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7320 at Tue Sep 27 20:22:47 UTC 2022 kill -USR1 7320 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7320 killed at Tue Sep 27 20:22:47 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:22:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7372 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7372 found at Tue Sep 27 20:22:48 UTC 2022 selfserv_9223 with PID 7372 started at Tue Sep 27 20:22:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #976: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7372 at Tue Sep 27 20:22:48 UTC 2022 kill -USR1 7372 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7372 killed at Tue Sep 27 20:22:48 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7424 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7424 found at Tue Sep 27 20:22:48 UTC 2022 selfserv_9223 with PID 7424 started at Tue Sep 27 20:22:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #977: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7424 at Tue Sep 27 20:22:49 UTC 2022 kill -USR1 7424 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7424 killed at Tue Sep 27 20:22:49 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:22:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7476 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7476 found at Tue Sep 27 20:22:49 UTC 2022 selfserv_9223 with PID 7476 started at Tue Sep 27 20:22:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #978: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7476 at Tue Sep 27 20:22:50 UTC 2022 kill -USR1 7476 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7476 killed at Tue Sep 27 20:22:50 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7528 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7528 found at Tue Sep 27 20:22:50 UTC 2022 selfserv_9223 with PID 7528 started at Tue Sep 27 20:22:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #979: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7528 at Tue Sep 27 20:22:51 UTC 2022 kill -USR1 7528 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7528 killed at Tue Sep 27 20:22:51 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:22:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7580 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7580 found at Tue Sep 27 20:22:51 UTC 2022 selfserv_9223 with PID 7580 started at Tue Sep 27 20:22:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #980: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7580 at Tue Sep 27 20:22:52 UTC 2022 kill -USR1 7580 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7580 killed at Tue Sep 27 20:22:52 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7632 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7632 found at Tue Sep 27 20:22:52 UTC 2022 selfserv_9223 with PID 7632 started at Tue Sep 27 20:22:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #981: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7632 at Tue Sep 27 20:22:53 UTC 2022 kill -USR1 7632 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7632 killed at Tue Sep 27 20:22:53 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:22:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7684 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7684 found at Tue Sep 27 20:22:53 UTC 2022 selfserv_9223 with PID 7684 started at Tue Sep 27 20:22:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #982: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7684 at Tue Sep 27 20:22:54 UTC 2022 kill -USR1 7684 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7684 killed at Tue Sep 27 20:22:54 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7736 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7736 found at Tue Sep 27 20:22:54 UTC 2022 selfserv_9223 with PID 7736 started at Tue Sep 27 20:22:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #983: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7736 at Tue Sep 27 20:22:55 UTC 2022 kill -USR1 7736 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7736 killed at Tue Sep 27 20:22:55 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:22:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7788 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7788 found at Tue Sep 27 20:22:55 UTC 2022 selfserv_9223 with PID 7788 started at Tue Sep 27 20:22:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #984: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7788 at Tue Sep 27 20:22:56 UTC 2022 kill -USR1 7788 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7788 killed at Tue Sep 27 20:22:56 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7840 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7840 found at Tue Sep 27 20:22:56 UTC 2022 selfserv_9223 with PID 7840 started at Tue Sep 27 20:22:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #985: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7840 at Tue Sep 27 20:22:57 UTC 2022 kill -USR1 7840 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7840 killed at Tue Sep 27 20:22:57 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:22:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7892 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7892 found at Tue Sep 27 20:22:57 UTC 2022 selfserv_9223 with PID 7892 started at Tue Sep 27 20:22:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #986: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7892 at Tue Sep 27 20:22:58 UTC 2022 kill -USR1 7892 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7892 killed at Tue Sep 27 20:22:58 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:22:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7944 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7944 found at Tue Sep 27 20:22:58 UTC 2022 selfserv_9223 with PID 7944 started at Tue Sep 27 20:22:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #987: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7944 at Tue Sep 27 20:22:59 UTC 2022 kill -USR1 7944 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7944 killed at Tue Sep 27 20:22:59 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:22:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:22:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7996 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7996 found at Tue Sep 27 20:22:59 UTC 2022 selfserv_9223 with PID 7996 started at Tue Sep 27 20:22:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #988: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7996 at Tue Sep 27 20:23:00 UTC 2022 kill -USR1 7996 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7996 killed at Tue Sep 27 20:23:00 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:23:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8048 found at Tue Sep 27 20:23:00 UTC 2022 selfserv_9223 with PID 8048 started at Tue Sep 27 20:23:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #989: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8048 at Tue Sep 27 20:23:01 UTC 2022 kill -USR1 8048 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8048 killed at Tue Sep 27 20:23:01 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:23:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8100 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8100 found at Tue Sep 27 20:23:02 UTC 2022 selfserv_9223 with PID 8100 started at Tue Sep 27 20:23:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8100 at Tue Sep 27 20:23:02 UTC 2022 kill -USR1 8100 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8100 killed at Tue Sep 27 20:23:02 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:23:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8152 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8152 found at Tue Sep 27 20:23:03 UTC 2022 selfserv_9223 with PID 8152 started at Tue Sep 27 20:23:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8152 at Tue Sep 27 20:23:03 UTC 2022 kill -USR1 8152 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8152 killed at Tue Sep 27 20:23:03 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:23:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8204 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8204 found at Tue Sep 27 20:23:04 UTC 2022 selfserv_9223 with PID 8204 started at Tue Sep 27 20:23:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #992: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8204 at Tue Sep 27 20:23:04 UTC 2022 kill -USR1 8204 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8204 killed at Tue Sep 27 20:23:04 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:23:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8256 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8256 found at Tue Sep 27 20:23:05 UTC 2022 selfserv_9223 with PID 8256 started at Tue Sep 27 20:23:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #993: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8256 at Tue Sep 27 20:23:05 UTC 2022 kill -USR1 8256 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8256 killed at Tue Sep 27 20:23:05 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:23:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8308 found at Tue Sep 27 20:23:06 UTC 2022 selfserv_9223 with PID 8308 started at Tue Sep 27 20:23:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #994: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8308 at Tue Sep 27 20:23:06 UTC 2022 kill -USR1 8308 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8308 killed at Tue Sep 27 20:23:06 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:23:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8360 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8360 found at Tue Sep 27 20:23:07 UTC 2022 selfserv_9223 with PID 8360 started at Tue Sep 27 20:23:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #995: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8360 at Tue Sep 27 20:23:07 UTC 2022 kill -USR1 8360 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8360 killed at Tue Sep 27 20:23:07 UTC 2022 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Tue Sep 27 20:23:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8442 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8442 found at Tue Sep 27 20:23:08 UTC 2022 selfserv_9223 with PID 8442 started at Tue Sep 27 20:23:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8442 at Tue Sep 27 20:23:08 UTC 2022 kill -USR1 8442 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8442 killed at Tue Sep 27 20:23:08 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:23:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8484 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8484 found at Tue Sep 27 20:23:08 UTC 2022 selfserv_9223 with PID 8484 started at Tue Sep 27 20:23:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8484 at Tue Sep 27 20:23:09 UTC 2022 kill -USR1 8484 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8484 killed at Tue Sep 27 20:23:09 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:23:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8529 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8529 found at Tue Sep 27 20:23:09 UTC 2022 selfserv_9223 with PID 8529 started at Tue Sep 27 20:23:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #940: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 8529 at Tue Sep 27 20:23:09 UTC 2022 kill -USR1 8529 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8529 killed at Tue Sep 27 20:23:10 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:23:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8568 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8568 found at Tue Sep 27 20:23:10 UTC 2022 selfserv_9223 with PID 8568 started at Tue Sep 27 20:23:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #941: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8568 at Tue Sep 27 20:23:10 UTC 2022 kill -USR1 8568 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8568 killed at Tue Sep 27 20:23:10 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:23:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8611 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8611 found at Tue Sep 27 20:23:11 UTC 2022 selfserv_9223 with PID 8611 started at Tue Sep 27 20:23:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #942: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 8611 at Tue Sep 27 20:23:11 UTC 2022 kill -USR1 8611 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8611 killed at Tue Sep 27 20:23:11 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:23:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8654 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8654 found at Tue Sep 27 20:23:11 UTC 2022 selfserv_9223 with PID 8654 started at Tue Sep 27 20:23:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8654 at Tue Sep 27 20:23:12 UTC 2022 kill -USR1 8654 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8654 killed at Tue Sep 27 20:23:12 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:23:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8694 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8694 found at Tue Sep 27 20:23:12 UTC 2022 selfserv_9223 with PID 8694 started at Tue Sep 27 20:23:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8694 at Tue Sep 27 20:23:12 UTC 2022 kill -USR1 8694 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8694 killed at Tue Sep 27 20:23:13 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:23:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8733 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8733 found at Tue Sep 27 20:23:13 UTC 2022 selfserv_9223 with PID 8733 started at Tue Sep 27 20:23:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8733 at Tue Sep 27 20:23:13 UTC 2022 kill -USR1 8733 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8733 killed at Tue Sep 27 20:23:13 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:23:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8772 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8772 found at Tue Sep 27 20:23:14 UTC 2022 selfserv_9223 with PID 8772 started at Tue Sep 27 20:23:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8772 at Tue Sep 27 20:23:14 UTC 2022 kill -USR1 8772 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8772 killed at Tue Sep 27 20:23:14 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:23:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8811 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8811 found at Tue Sep 27 20:23:14 UTC 2022 selfserv_9223 with PID 8811 started at Tue Sep 27 20:23:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #947: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8811 at Tue Sep 27 20:23:15 UTC 2022 kill -USR1 8811 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8811 killed at Tue Sep 27 20:23:15 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:23:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8850 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8850 found at Tue Sep 27 20:23:15 UTC 2022 selfserv_9223 with PID 8850 started at Tue Sep 27 20:23:15 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #948: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8850 at Tue Sep 27 20:23:15 UTC 2022 kill -USR1 8850 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8850 killed at Tue Sep 27 20:23:16 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:23:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8890 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8890 found at Tue Sep 27 20:23:16 UTC 2022 selfserv_9223 with PID 8890 started at Tue Sep 27 20:23:16 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #949: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8890 at Tue Sep 27 20:23:16 UTC 2022 kill -USR1 8890 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8890 killed at Tue Sep 27 20:23:16 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:23:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8930 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8930 found at Tue Sep 27 20:23:17 UTC 2022 selfserv_9223 with PID 8930 started at Tue Sep 27 20:23:17 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #950: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8930 at Tue Sep 27 20:23:17 UTC 2022 kill -USR1 8930 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8930 killed at Tue Sep 27 20:23:17 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:23:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8970 found at Tue Sep 27 20:23:17 UTC 2022 selfserv_9223 with PID 8970 started at Tue Sep 27 20:23:17 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #951: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8970 at Tue Sep 27 20:23:18 UTC 2022 kill -USR1 8970 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8970 killed at Tue Sep 27 20:23:18 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:23:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9010 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9010 found at Tue Sep 27 20:23:18 UTC 2022 selfserv_9223 with PID 9010 started at Tue Sep 27 20:23:18 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #952: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9010 at Tue Sep 27 20:23:18 UTC 2022 kill -USR1 9010 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9010 killed at Tue Sep 27 20:23:19 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:23:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9050 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9050 found at Tue Sep 27 20:23:19 UTC 2022 selfserv_9223 with PID 9050 started at Tue Sep 27 20:23:19 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #953: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9050 at Tue Sep 27 20:23:19 UTC 2022 kill -USR1 9050 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9050 killed at Tue Sep 27 20:23:19 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:23:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9090 found at Tue Sep 27 20:23:20 UTC 2022 selfserv_9223 with PID 9090 started at Tue Sep 27 20:23:20 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #954: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9090 at Tue Sep 27 20:23:20 UTC 2022 kill -USR1 9090 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9090 killed at Tue Sep 27 20:23:20 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:23:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9130 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9130 found at Tue Sep 27 20:23:20 UTC 2022 selfserv_9223 with PID 9130 started at Tue Sep 27 20:23:20 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #955: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9130 at Tue Sep 27 20:23:21 UTC 2022 kill -USR1 9130 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9130 killed at Tue Sep 27 20:23:21 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:23:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9170 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9170 found at Tue Sep 27 20:23:21 UTC 2022 selfserv_9223 with PID 9170 started at Tue Sep 27 20:23:21 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #956: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9170 at Tue Sep 27 20:23:21 UTC 2022 kill -USR1 9170 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9170 killed at Tue Sep 27 20:23:22 UTC 2022 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -fips true -force FIPS mode enabled. ssl.sh: #957: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -list ssl.sh: #958: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #959: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -fips true -force FIPS mode enabled. ssl.sh: #960: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -list ssl.sh: #961: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #962: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9223 starting at Tue Sep 27 20:23:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 9254 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9254 found at Tue Sep 27 20:23:23 UTC 2022 selfserv_9223 with PID 9254 started at Tue Sep 27 20:23:23 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #963: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #964: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #965: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #966: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #967: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #968: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #969: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #970: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #971: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #972: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #973: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #974: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #975: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #976: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #977: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #978: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #979: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #980: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #981: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #982: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #983: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #984: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #985: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #986: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #987: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #988: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #989: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #990: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #991: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #992: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #993: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #994: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #995: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #996: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #997: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #998: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #999: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1000: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1001: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1002: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1003: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1004: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1005: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1006: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1007: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1008: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1009: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1010: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1011: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1012: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1013: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 9254 at Tue Sep 27 20:23:37 UTC 2022 kill -USR1 9254 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9254 killed at Tue Sep 27 20:23:37 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Tue Sep 27 20:23:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:23:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 9803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9803 found at Tue Sep 27 20:23:38 UTC 2022 selfserv_9223 with PID 9803 started at Tue Sep 27 20:23:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1014: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1015: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1016: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1017: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1018: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1019: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1020: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1021: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1022: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1023: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1024: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1025: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1026: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1027: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1028: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1029: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1030: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1031: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1032: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1033: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1034: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1035: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1036: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1037: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1038: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1039: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1040: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1041: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1042: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1043: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1044: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1045: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1046: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1047: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1048: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1049: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1050: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1051: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1052: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1053: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1054: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1055: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1056: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1057: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1058: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1059: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1060: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1061: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1062: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1063: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1064: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1065: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1066: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1067: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1068: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1069: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1070: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1071: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1072: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1073: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1074: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1075: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1076: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1077: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1078: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1079: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1080: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1081: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1082: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1083: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1084: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1085: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1086: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1087: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1088: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1089: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9803 at Tue Sep 27 20:24:00 UTC 2022 kill -USR1 9803 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9803 killed at Tue Sep 27 20:24:01 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9223 starting at Tue Sep 27 20:24:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10605 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10605 found at Tue Sep 27 20:24:01 UTC 2022 selfserv_9223 with PID 10605 started at Tue Sep 27 20:24:01 UTC 2022 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10605 at Tue Sep 27 20:24:02 UTC 2022 kill -USR1 10605 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10605 killed at Tue Sep 27 20:24:02 UTC 2022 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10671 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10671 found at Tue Sep 27 20:24:02 UTC 2022 selfserv_9223 with PID 10671 started at Tue Sep 27 20:24:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10671 at Tue Sep 27 20:24:03 UTC 2022 kill -USR1 10671 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10671 killed at Tue Sep 27 20:24:03 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:24:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10723 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10723 found at Tue Sep 27 20:24:03 UTC 2022 selfserv_9223 with PID 10723 started at Tue Sep 27 20:24:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10723 at Tue Sep 27 20:24:04 UTC 2022 kill -USR1 10723 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10723 killed at Tue Sep 27 20:24:04 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10775 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10775 found at Tue Sep 27 20:24:04 UTC 2022 selfserv_9223 with PID 10775 started at Tue Sep 27 20:24:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1092: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10775 at Tue Sep 27 20:24:05 UTC 2022 kill -USR1 10775 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10775 killed at Tue Sep 27 20:24:05 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10827 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10827 found at Tue Sep 27 20:24:05 UTC 2022 selfserv_9223 with PID 10827 started at Tue Sep 27 20:24:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1093: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10827 at Tue Sep 27 20:24:06 UTC 2022 kill -USR1 10827 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10827 killed at Tue Sep 27 20:24:06 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:24:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10879 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10879 found at Tue Sep 27 20:24:06 UTC 2022 selfserv_9223 with PID 10879 started at Tue Sep 27 20:24:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1094: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10879 at Tue Sep 27 20:24:07 UTC 2022 kill -USR1 10879 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10879 killed at Tue Sep 27 20:24:07 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10931 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10931 found at Tue Sep 27 20:24:07 UTC 2022 selfserv_9223 with PID 10931 started at Tue Sep 27 20:24:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1095: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10931 at Tue Sep 27 20:24:08 UTC 2022 kill -USR1 10931 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10931 killed at Tue Sep 27 20:24:08 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10983 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10983 found at Tue Sep 27 20:24:08 UTC 2022 selfserv_9223 with PID 10983 started at Tue Sep 27 20:24:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1096: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10983 at Tue Sep 27 20:24:09 UTC 2022 kill -USR1 10983 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10983 killed at Tue Sep 27 20:24:09 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:24:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11041 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11041 found at Tue Sep 27 20:24:10 UTC 2022 selfserv_9223 with PID 11041 started at Tue Sep 27 20:24:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11041 at Tue Sep 27 20:24:10 UTC 2022 kill -USR1 11041 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11041 killed at Tue Sep 27 20:24:10 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11097 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11097 found at Tue Sep 27 20:24:11 UTC 2022 selfserv_9223 with PID 11097 started at Tue Sep 27 20:24:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11097 at Tue Sep 27 20:24:11 UTC 2022 kill -USR1 11097 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11097 killed at Tue Sep 27 20:24:11 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11153 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11153 found at Tue Sep 27 20:24:12 UTC 2022 selfserv_9223 with PID 11153 started at Tue Sep 27 20:24:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1099: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 11153 at Tue Sep 27 20:24:12 UTC 2022 kill -USR1 11153 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11153 killed at Tue Sep 27 20:24:13 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:24:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11206 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11206 found at Tue Sep 27 20:24:13 UTC 2022 selfserv_9223 with PID 11206 started at Tue Sep 27 20:24:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1100: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 11206 at Tue Sep 27 20:24:13 UTC 2022 kill -USR1 11206 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11206 killed at Tue Sep 27 20:24:13 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11258 found at Tue Sep 27 20:24:14 UTC 2022 selfserv_9223 with PID 11258 started at Tue Sep 27 20:24:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11258 at Tue Sep 27 20:24:14 UTC 2022 kill -USR1 11258 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11258 killed at Tue Sep 27 20:24:14 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11310 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11310 found at Tue Sep 27 20:24:15 UTC 2022 selfserv_9223 with PID 11310 started at Tue Sep 27 20:24:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1102: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11310 at Tue Sep 27 20:24:16 UTC 2022 kill -USR1 11310 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11310 killed at Tue Sep 27 20:24:16 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:24:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11363 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11363 found at Tue Sep 27 20:24:16 UTC 2022 selfserv_9223 with PID 11363 started at Tue Sep 27 20:24:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11363 at Tue Sep 27 20:24:17 UTC 2022 kill -USR1 11363 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11363 killed at Tue Sep 27 20:24:17 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11415 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11415 found at Tue Sep 27 20:24:17 UTC 2022 selfserv_9223 with PID 11415 started at Tue Sep 27 20:24:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11415 at Tue Sep 27 20:24:18 UTC 2022 kill -USR1 11415 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11415 killed at Tue Sep 27 20:24:18 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11467 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11467 found at Tue Sep 27 20:24:18 UTC 2022 selfserv_9223 with PID 11467 started at Tue Sep 27 20:24:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1105: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 11467 at Tue Sep 27 20:24:19 UTC 2022 kill -USR1 11467 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11467 killed at Tue Sep 27 20:24:19 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:24:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11519 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11519 found at Tue Sep 27 20:24:20 UTC 2022 selfserv_9223 with PID 11519 started at Tue Sep 27 20:24:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1106: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 11519 at Tue Sep 27 20:24:20 UTC 2022 kill -USR1 11519 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11519 killed at Tue Sep 27 20:24:20 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11571 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11571 found at Tue Sep 27 20:24:21 UTC 2022 selfserv_9223 with PID 11571 started at Tue Sep 27 20:24:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11571 at Tue Sep 27 20:24:21 UTC 2022 kill -USR1 11571 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11571 killed at Tue Sep 27 20:24:22 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11623 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11623 found at Tue Sep 27 20:24:22 UTC 2022 selfserv_9223 with PID 11623 started at Tue Sep 27 20:24:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1108: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11623 at Tue Sep 27 20:24:23 UTC 2022 kill -USR1 11623 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11623 killed at Tue Sep 27 20:24:23 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:24:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11675 found at Tue Sep 27 20:24:23 UTC 2022 selfserv_9223 with PID 11675 started at Tue Sep 27 20:24:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11675 at Tue Sep 27 20:24:24 UTC 2022 kill -USR1 11675 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11675 killed at Tue Sep 27 20:24:24 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11727 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11727 found at Tue Sep 27 20:24:24 UTC 2022 selfserv_9223 with PID 11727 started at Tue Sep 27 20:24:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11727 at Tue Sep 27 20:24:25 UTC 2022 kill -USR1 11727 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11727 killed at Tue Sep 27 20:24:25 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11779 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11779 found at Tue Sep 27 20:24:26 UTC 2022 selfserv_9223 with PID 11779 started at Tue Sep 27 20:24:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1111: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 11779 at Tue Sep 27 20:24:26 UTC 2022 kill -USR1 11779 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11779 killed at Tue Sep 27 20:24:27 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:24:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11831 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11831 found at Tue Sep 27 20:24:27 UTC 2022 selfserv_9223 with PID 11831 started at Tue Sep 27 20:24:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1112: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 11831 at Tue Sep 27 20:24:27 UTC 2022 kill -USR1 11831 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11831 killed at Tue Sep 27 20:24:28 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11884 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11884 found at Tue Sep 27 20:24:28 UTC 2022 selfserv_9223 with PID 11884 started at Tue Sep 27 20:24:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11884 at Tue Sep 27 20:24:29 UTC 2022 kill -USR1 11884 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11884 killed at Tue Sep 27 20:24:29 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11937 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11937 found at Tue Sep 27 20:24:29 UTC 2022 selfserv_9223 with PID 11937 started at Tue Sep 27 20:24:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1114: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11937 at Tue Sep 27 20:24:30 UTC 2022 kill -USR1 11937 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11937 killed at Tue Sep 27 20:24:30 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:24:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11989 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11989 found at Tue Sep 27 20:24:30 UTC 2022 selfserv_9223 with PID 11989 started at Tue Sep 27 20:24:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1115: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11989 at Tue Sep 27 20:24:31 UTC 2022 kill -USR1 11989 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11989 killed at Tue Sep 27 20:24:31 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12041 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12041 found at Tue Sep 27 20:24:32 UTC 2022 selfserv_9223 with PID 12041 started at Tue Sep 27 20:24:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1116: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12041 at Tue Sep 27 20:24:32 UTC 2022 kill -USR1 12041 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12041 killed at Tue Sep 27 20:24:32 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12093 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12093 found at Tue Sep 27 20:24:33 UTC 2022 selfserv_9223 with PID 12093 started at Tue Sep 27 20:24:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1117: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12093 at Tue Sep 27 20:24:34 UTC 2022 kill -USR1 12093 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12093 killed at Tue Sep 27 20:24:34 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:24:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12145 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12145 found at Tue Sep 27 20:24:34 UTC 2022 selfserv_9223 with PID 12145 started at Tue Sep 27 20:24:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1118: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12145 at Tue Sep 27 20:24:35 UTC 2022 kill -USR1 12145 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12145 killed at Tue Sep 27 20:24:35 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12197 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12197 found at Tue Sep 27 20:24:35 UTC 2022 selfserv_9223 with PID 12197 started at Tue Sep 27 20:24:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1119: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12197 at Tue Sep 27 20:24:36 UTC 2022 kill -USR1 12197 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12197 killed at Tue Sep 27 20:24:36 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12249 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12249 found at Tue Sep 27 20:24:36 UTC 2022 selfserv_9223 with PID 12249 started at Tue Sep 27 20:24:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1120: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12249 at Tue Sep 27 20:24:37 UTC 2022 kill -USR1 12249 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12249 killed at Tue Sep 27 20:24:37 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12301 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12301 found at Tue Sep 27 20:24:37 UTC 2022 selfserv_9223 with PID 12301 started at Tue Sep 27 20:24:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1121: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12301 at Tue Sep 27 20:24:38 UTC 2022 kill -USR1 12301 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12301 killed at Tue Sep 27 20:24:38 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12353 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12353 found at Tue Sep 27 20:24:38 UTC 2022 selfserv_9223 with PID 12353 started at Tue Sep 27 20:24:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1122: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12353 at Tue Sep 27 20:24:39 UTC 2022 kill -USR1 12353 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12353 killed at Tue Sep 27 20:24:39 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12405 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12405 found at Tue Sep 27 20:24:39 UTC 2022 selfserv_9223 with PID 12405 started at Tue Sep 27 20:24:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1123: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12405 at Tue Sep 27 20:24:40 UTC 2022 kill -USR1 12405 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12405 killed at Tue Sep 27 20:24:40 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12458 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12458 found at Tue Sep 27 20:24:40 UTC 2022 selfserv_9223 with PID 12458 started at Tue Sep 27 20:24:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1124: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12458 at Tue Sep 27 20:24:41 UTC 2022 kill -USR1 12458 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12458 killed at Tue Sep 27 20:24:41 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12510 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12510 found at Tue Sep 27 20:24:41 UTC 2022 selfserv_9223 with PID 12510 started at Tue Sep 27 20:24:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1125: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12510 at Tue Sep 27 20:24:42 UTC 2022 kill -USR1 12510 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12510 killed at Tue Sep 27 20:24:42 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:24:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12562 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12562 found at Tue Sep 27 20:24:42 UTC 2022 selfserv_9223 with PID 12562 started at Tue Sep 27 20:24:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1126: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12562 at Tue Sep 27 20:24:43 UTC 2022 kill -USR1 12562 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12562 killed at Tue Sep 27 20:24:43 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12614 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12614 found at Tue Sep 27 20:24:43 UTC 2022 selfserv_9223 with PID 12614 started at Tue Sep 27 20:24:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1127: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12614 at Tue Sep 27 20:24:44 UTC 2022 kill -USR1 12614 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12614 killed at Tue Sep 27 20:24:44 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:24:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12666 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12666 found at Tue Sep 27 20:24:44 UTC 2022 selfserv_9223 with PID 12666 started at Tue Sep 27 20:24:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1128: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12666 at Tue Sep 27 20:24:45 UTC 2022 kill -USR1 12666 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12666 killed at Tue Sep 27 20:24:45 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12718 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12718 found at Tue Sep 27 20:24:45 UTC 2022 selfserv_9223 with PID 12718 started at Tue Sep 27 20:24:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1129: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12718 at Tue Sep 27 20:24:46 UTC 2022 kill -USR1 12718 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12718 killed at Tue Sep 27 20:24:46 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:24:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12770 found at Tue Sep 27 20:24:46 UTC 2022 selfserv_9223 with PID 12770 started at Tue Sep 27 20:24:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1130: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12770 at Tue Sep 27 20:24:47 UTC 2022 kill -USR1 12770 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12770 killed at Tue Sep 27 20:24:47 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12822 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12822 found at Tue Sep 27 20:24:47 UTC 2022 selfserv_9223 with PID 12822 started at Tue Sep 27 20:24:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1131: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12822 at Tue Sep 27 20:24:48 UTC 2022 kill -USR1 12822 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12822 killed at Tue Sep 27 20:24:48 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:24:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12874 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12874 found at Tue Sep 27 20:24:48 UTC 2022 selfserv_9223 with PID 12874 started at Tue Sep 27 20:24:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1132: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12874 at Tue Sep 27 20:24:49 UTC 2022 kill -USR1 12874 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12874 killed at Tue Sep 27 20:24:49 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12926 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12926 found at Tue Sep 27 20:24:49 UTC 2022 selfserv_9223 with PID 12926 started at Tue Sep 27 20:24:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1133: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12926 at Tue Sep 27 20:24:50 UTC 2022 kill -USR1 12926 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12926 killed at Tue Sep 27 20:24:50 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:24:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12978 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12978 found at Tue Sep 27 20:24:50 UTC 2022 selfserv_9223 with PID 12978 started at Tue Sep 27 20:24:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1134: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12978 at Tue Sep 27 20:24:51 UTC 2022 kill -USR1 12978 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12978 killed at Tue Sep 27 20:24:51 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13030 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13030 found at Tue Sep 27 20:24:51 UTC 2022 selfserv_9223 with PID 13030 started at Tue Sep 27 20:24:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1135: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13030 at Tue Sep 27 20:24:52 UTC 2022 kill -USR1 13030 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13030 killed at Tue Sep 27 20:24:52 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:24:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13082 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13082 found at Tue Sep 27 20:24:53 UTC 2022 selfserv_9223 with PID 13082 started at Tue Sep 27 20:24:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1136: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 13082 at Tue Sep 27 20:24:53 UTC 2022 kill -USR1 13082 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13082 killed at Tue Sep 27 20:24:53 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13137 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13137 found at Tue Sep 27 20:24:54 UTC 2022 selfserv_9223 with PID 13137 started at Tue Sep 27 20:24:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1137: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13137 at Tue Sep 27 20:24:54 UTC 2022 kill -USR1 13137 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13137 killed at Tue Sep 27 20:24:55 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:24:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13189 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13189 found at Tue Sep 27 20:24:55 UTC 2022 selfserv_9223 with PID 13189 started at Tue Sep 27 20:24:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1138: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13189 at Tue Sep 27 20:24:55 UTC 2022 kill -USR1 13189 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13189 killed at Tue Sep 27 20:24:56 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13241 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13241 found at Tue Sep 27 20:24:56 UTC 2022 selfserv_9223 with PID 13241 started at Tue Sep 27 20:24:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1139: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13241 at Tue Sep 27 20:24:57 UTC 2022 kill -USR1 13241 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13241 killed at Tue Sep 27 20:24:57 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:24:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13294 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13294 found at Tue Sep 27 20:24:57 UTC 2022 selfserv_9223 with PID 13294 started at Tue Sep 27 20:24:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1140: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 13294 at Tue Sep 27 20:24:58 UTC 2022 kill -USR1 13294 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13294 killed at Tue Sep 27 20:24:58 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:24:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13347 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13347 found at Tue Sep 27 20:24:58 UTC 2022 selfserv_9223 with PID 13347 started at Tue Sep 27 20:24:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1141: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13347 at Tue Sep 27 20:24:59 UTC 2022 kill -USR1 13347 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13347 killed at Tue Sep 27 20:24:59 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:24:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:24:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13399 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13399 found at Tue Sep 27 20:24:59 UTC 2022 selfserv_9223 with PID 13399 started at Tue Sep 27 20:24:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1142: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13399 at Tue Sep 27 20:25:00 UTC 2022 kill -USR1 13399 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13399 killed at Tue Sep 27 20:25:00 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:25:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:25:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13451 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13451 found at Tue Sep 27 20:25:00 UTC 2022 selfserv_9223 with PID 13451 started at Tue Sep 27 20:25:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1143: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13451 at Tue Sep 27 20:25:01 UTC 2022 kill -USR1 13451 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13451 killed at Tue Sep 27 20:25:01 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:25:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:25:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13503 found at Tue Sep 27 20:25:02 UTC 2022 selfserv_9223 with PID 13503 started at Tue Sep 27 20:25:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1144: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 13503 at Tue Sep 27 20:25:02 UTC 2022 kill -USR1 13503 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13503 killed at Tue Sep 27 20:25:02 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:25:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:25:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13555 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13555 found at Tue Sep 27 20:25:03 UTC 2022 selfserv_9223 with PID 13555 started at Tue Sep 27 20:25:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1145: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13555 at Tue Sep 27 20:25:03 UTC 2022 kill -USR1 13555 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13555 killed at Tue Sep 27 20:25:04 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:25:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:25:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13607 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13607 found at Tue Sep 27 20:25:04 UTC 2022 selfserv_9223 with PID 13607 started at Tue Sep 27 20:25:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1146: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13607 at Tue Sep 27 20:25:05 UTC 2022 kill -USR1 13607 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13607 killed at Tue Sep 27 20:25:05 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:25:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:25:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13659 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13659 found at Tue Sep 27 20:25:05 UTC 2022 selfserv_9223 with PID 13659 started at Tue Sep 27 20:25:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1147: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13659 at Tue Sep 27 20:25:06 UTC 2022 kill -USR1 13659 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13659 killed at Tue Sep 27 20:25:06 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Tue Sep 27 20:25:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:25:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13717 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13717 found at Tue Sep 27 20:25:06 UTC 2022 selfserv_9223 with PID 13717 started at Tue Sep 27 20:25:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1148: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13717 at Tue Sep 27 20:25:07 UTC 2022 kill -USR1 13717 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13717 killed at Tue Sep 27 20:25:07 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Tue Sep 27 20:25:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:25:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13777 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13777 found at Tue Sep 27 20:25:07 UTC 2022 selfserv_9223 with PID 13777 started at Tue Sep 27 20:25:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1149: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13777 at Tue Sep 27 20:25:08 UTC 2022 kill -USR1 13777 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13777 killed at Tue Sep 27 20:25:08 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Tue Sep 27 20:25:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:25:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13835 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13835 found at Tue Sep 27 20:25:08 UTC 2022 selfserv_9223 with PID 13835 started at Tue Sep 27 20:25:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1150: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 13835 at Tue Sep 27 20:25:08 UTC 2022 kill -USR1 13835 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13835 killed at Tue Sep 27 20:25:09 UTC 2022 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9223 starting at Tue Sep 27 20:25:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:25:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13893 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13893 found at Tue Sep 27 20:25:09 UTC 2022 selfserv_9223 with PID 13893 started at Tue Sep 27 20:25:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1151: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13893 at Tue Sep 27 20:25:09 UTC 2022 kill -USR1 13893 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13893 killed at Tue Sep 27 20:25:09 UTC 2022 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9223 starting at Tue Sep 27 20:25:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:25:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13963 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13963 found at Tue Sep 27 20:25:10 UTC 2022 selfserv_9223 with PID 13963 started at Tue Sep 27 20:25:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1152: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 13963 at Tue Sep 27 20:25:10 UTC 2022 kill -USR1 13963 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13963 killed at Tue Sep 27 20:25:10 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Tue Sep 27 20:25:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:25:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14025 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14025 found at Tue Sep 27 20:25:11 UTC 2022 selfserv_9223 with PID 14025 started at Tue Sep 27 20:25:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1153: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14025 at Tue Sep 27 20:25:11 UTC 2022 kill -USR1 14025 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14025 killed at Tue Sep 27 20:25:11 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Tue Sep 27 20:25:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:25:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14089 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14089 found at Tue Sep 27 20:25:11 UTC 2022 selfserv_9223 with PID 14089 started at Tue Sep 27 20:25:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1154: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14089 at Tue Sep 27 20:25:12 UTC 2022 kill -USR1 14089 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14089 killed at Tue Sep 27 20:25:12 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9223 starting at Tue Sep 27 20:25:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:25:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14148 found at Tue Sep 27 20:25:12 UTC 2022 selfserv_9223 with PID 14148 started at Tue Sep 27 20:25:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1155: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 14148 at Tue Sep 27 20:25:13 UTC 2022 kill -USR1 14148 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14148 killed at Tue Sep 27 20:25:13 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9223 starting at Tue Sep 27 20:25:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:25:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14206 found at Tue Sep 27 20:25:13 UTC 2022 selfserv_9223 with PID 14206 started at Tue Sep 27 20:25:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1156: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 14206 at Tue Sep 27 20:25:13 UTC 2022 kill -USR1 14206 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14206 killed at Tue Sep 27 20:25:14 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Tue Sep 27 20:25:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:25:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14264 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14264 found at Tue Sep 27 20:25:14 UTC 2022 selfserv_9223 with PID 14264 started at Tue Sep 27 20:25:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1157: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 14264 at Tue Sep 27 20:25:14 UTC 2022 kill -USR1 14264 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14264 killed at Tue Sep 27 20:25:14 UTC 2022 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9223 starting at Tue Sep 27 20:25:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:25:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14306 found at Tue Sep 27 20:25:15 UTC 2022 selfserv_9223 with PID 14306 started at Tue Sep 27 20:25:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1090: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14306 at Tue Sep 27 20:25:15 UTC 2022 kill -USR1 14306 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14306 killed at Tue Sep 27 20:25:15 UTC 2022 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9223 starting at Tue Sep 27 20:25:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:25:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14348 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14348 found at Tue Sep 27 20:25:15 UTC 2022 selfserv_9223 with PID 14348 started at Tue Sep 27 20:25:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1091: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9223 with PID 14348 at Tue Sep 27 20:25:16 UTC 2022 kill -USR1 14348 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14348 killed at Tue Sep 27 20:25:16 UTC 2022 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9223 starting at Tue Sep 27 20:25:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:25:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14390 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14390 found at Tue Sep 27 20:25:16 UTC 2022 selfserv_9223 with PID 14390 started at Tue Sep 27 20:25:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1092: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 14390 at Tue Sep 27 20:25:16 UTC 2022 kill -USR1 14390 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14390 killed at Tue Sep 27 20:25:17 UTC 2022 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9223 starting at Tue Sep 27 20:25:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:25:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14432 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14432 found at Tue Sep 27 20:25:17 UTC 2022 selfserv_9223 with PID 14432 started at Tue Sep 27 20:25:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1093: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 14432 at Tue Sep 27 20:25:17 UTC 2022 kill -USR1 14432 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14432 killed at Tue Sep 27 20:25:17 UTC 2022 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9223 starting at Tue Sep 27 20:25:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:25:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14474 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14474 found at Tue Sep 27 20:25:18 UTC 2022 selfserv_9223 with PID 14474 started at Tue Sep 27 20:25:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1094: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 14474 at Tue Sep 27 20:25:18 UTC 2022 kill -USR1 14474 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14474 killed at Tue Sep 27 20:25:18 UTC 2022 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9223 starting at Tue Sep 27 20:25:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:25:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14516 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14516 found at Tue Sep 27 20:25:18 UTC 2022 selfserv_9223 with PID 14516 started at Tue Sep 27 20:25:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1095: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 14516 at Tue Sep 27 20:25:19 UTC 2022 kill -USR1 14516 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14516 killed at Tue Sep 27 20:25:19 UTC 2022 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9223 starting at Tue Sep 27 20:25:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:25:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14558 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14558 found at Tue Sep 27 20:25:19 UTC 2022 selfserv_9223 with PID 14558 started at Tue Sep 27 20:25:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1096: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 14558 at Tue Sep 27 20:25:20 UTC 2022 kill -USR1 14558 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14558 killed at Tue Sep 27 20:25:20 UTC 2022 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9223 starting at Tue Sep 27 20:25:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:25:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14600 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14600 found at Tue Sep 27 20:25:20 UTC 2022 selfserv_9223 with PID 14600 started at Tue Sep 27 20:25:20 UTC 2022 strsclnt -q -p 9223 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Tue Sep 27 20:25:20 UTC 2022 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Tue Sep 27 20:26:09 UTC 2022 ssl.sh: #1097: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9223 with PID 14600 at Tue Sep 27 20:26:09 UTC 2022 kill -USR1 14600 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14600 killed at Tue Sep 27 20:26:09 UTC 2022 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Tue Sep 27 20:26:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:26:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14651 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14651 found at Tue Sep 27 20:26:09 UTC 2022 selfserv_9223 with PID 14651 started at Tue Sep 27 20:26:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14651 at Tue Sep 27 20:26:10 UTC 2022 kill -USR1 14651 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14651 killed at Tue Sep 27 20:26:10 UTC 2022 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:26:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:26:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14699 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14699 found at Tue Sep 27 20:26:10 UTC 2022 selfserv_9223 with PID 14699 started at Tue Sep 27 20:26:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1099: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14699 at Tue Sep 27 20:26:10 UTC 2022 kill -USR1 14699 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14699 killed at Tue Sep 27 20:26:11 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:26:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:26:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14742 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14742 found at Tue Sep 27 20:26:11 UTC 2022 selfserv_9223 with PID 14742 started at Tue Sep 27 20:26:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1100: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 14742 at Tue Sep 27 20:26:11 UTC 2022 kill -USR1 14742 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14742 killed at Tue Sep 27 20:26:11 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:26:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:26:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14785 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14785 found at Tue Sep 27 20:26:12 UTC 2022 selfserv_9223 with PID 14785 started at Tue Sep 27 20:26:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14785 at Tue Sep 27 20:26:12 UTC 2022 kill -USR1 14785 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14785 killed at Tue Sep 27 20:26:12 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:26:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:26:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14824 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14824 found at Tue Sep 27 20:26:12 UTC 2022 selfserv_9223 with PID 14824 started at Tue Sep 27 20:26:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1102: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 14824 at Tue Sep 27 20:26:13 UTC 2022 kill -USR1 14824 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14824 killed at Tue Sep 27 20:26:13 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:26:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:26:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14864 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14864 found at Tue Sep 27 20:26:13 UTC 2022 selfserv_9223 with PID 14864 started at Tue Sep 27 20:26:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14864 at Tue Sep 27 20:26:13 UTC 2022 kill -USR1 14864 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14864 killed at Tue Sep 27 20:26:14 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:26:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:26:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14903 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14903 found at Tue Sep 27 20:26:14 UTC 2022 selfserv_9223 with PID 14903 started at Tue Sep 27 20:26:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14903 at Tue Sep 27 20:26:14 UTC 2022 kill -USR1 14903 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14903 killed at Tue Sep 27 20:26:14 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:26:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:26:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14942 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14942 found at Tue Sep 27 20:26:15 UTC 2022 selfserv_9223 with PID 14942 started at Tue Sep 27 20:26:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1105: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14942 at Tue Sep 27 20:26:15 UTC 2022 kill -USR1 14942 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14942 killed at Tue Sep 27 20:26:15 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:26:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:26:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14981 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14981 found at Tue Sep 27 20:26:15 UTC 2022 selfserv_9223 with PID 14981 started at Tue Sep 27 20:26:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1106: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14981 at Tue Sep 27 20:26:16 UTC 2022 kill -USR1 14981 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14981 killed at Tue Sep 27 20:26:16 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:26:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:26:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15020 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15020 found at Tue Sep 27 20:26:16 UTC 2022 selfserv_9223 with PID 15020 started at Tue Sep 27 20:26:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15020 at Tue Sep 27 20:26:16 UTC 2022 kill -USR1 15020 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15020 killed at Tue Sep 27 20:26:17 UTC 2022 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:26:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:26:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15059 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15059 found at Tue Sep 27 20:26:17 UTC 2022 selfserv_9223 with PID 15059 started at Tue Sep 27 20:26:17 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1108: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15059 at Tue Sep 27 20:26:17 UTC 2022 kill -USR1 15059 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15059 killed at Tue Sep 27 20:26:17 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:26:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:26:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15099 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15099 found at Tue Sep 27 20:26:18 UTC 2022 selfserv_9223 with PID 15099 started at Tue Sep 27 20:26:18 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1109: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 15099 at Tue Sep 27 20:26:18 UTC 2022 kill -USR1 15099 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15099 killed at Tue Sep 27 20:26:18 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:26:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:26:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15139 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15139 found at Tue Sep 27 20:26:18 UTC 2022 selfserv_9223 with PID 15139 started at Tue Sep 27 20:26:18 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1110: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15139 at Tue Sep 27 20:26:19 UTC 2022 kill -USR1 15139 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15139 killed at Tue Sep 27 20:26:19 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:26:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:26:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15179 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15179 found at Tue Sep 27 20:26:19 UTC 2022 selfserv_9223 with PID 15179 started at Tue Sep 27 20:26:19 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1111: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 15179 at Tue Sep 27 20:26:19 UTC 2022 kill -USR1 15179 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15179 killed at Tue Sep 27 20:26:20 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:26:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:26:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15219 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15219 found at Tue Sep 27 20:26:20 UTC 2022 selfserv_9223 with PID 15219 started at Tue Sep 27 20:26:20 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1112: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15219 at Tue Sep 27 20:26:20 UTC 2022 kill -USR1 15219 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15219 killed at Tue Sep 27 20:26:20 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:26:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:26:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15259 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15259 found at Tue Sep 27 20:26:21 UTC 2022 selfserv_9223 with PID 15259 started at Tue Sep 27 20:26:21 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1113: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15259 at Tue Sep 27 20:26:21 UTC 2022 kill -USR1 15259 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15259 killed at Tue Sep 27 20:26:21 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:26:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:26:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15299 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15299 found at Tue Sep 27 20:26:21 UTC 2022 selfserv_9223 with PID 15299 started at Tue Sep 27 20:26:21 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1114: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15299 at Tue Sep 27 20:26:22 UTC 2022 kill -USR1 15299 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15299 killed at Tue Sep 27 20:26:22 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:26:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:26:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15339 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15339 found at Tue Sep 27 20:26:22 UTC 2022 selfserv_9223 with PID 15339 started at Tue Sep 27 20:26:22 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1115: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15339 at Tue Sep 27 20:26:22 UTC 2022 kill -USR1 15339 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15339 killed at Tue Sep 27 20:26:23 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:26:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:26:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15379 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15379 found at Tue Sep 27 20:26:23 UTC 2022 selfserv_9223 with PID 15379 started at Tue Sep 27 20:26:23 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1116: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15379 at Tue Sep 27 20:26:23 UTC 2022 kill -USR1 15379 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15379 killed at Tue Sep 27 20:26:23 UTC 2022 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9223 starting at Tue Sep 27 20:26:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:26:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 15419 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15419 found at Tue Sep 27 20:26:24 UTC 2022 selfserv_9223 with PID 15419 started at Tue Sep 27 20:26:24 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1117: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1118: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1119: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1120: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1121: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1122: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1123: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1124: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1125: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1126: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1127: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1128: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1129: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1130: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1131: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1132: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1133: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1134: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1135: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1136: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1137: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1138: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1139: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1140: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1141: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1142: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1143: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1144: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1145: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1146: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1147: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1148: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1149: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1150: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1151: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1152: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1153: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1154: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1155: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1156: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1157: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1158: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1159: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1160: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1161: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1162: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1163: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1164: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1165: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1166: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1167: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 15419 at Tue Sep 27 20:26:38 UTC 2022 kill -USR1 15419 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15419 killed at Tue Sep 27 20:26:38 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Tue Sep 27 20:26:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:26:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 15969 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15969 found at Tue Sep 27 20:26:39 UTC 2022 selfserv_9223 with PID 15969 started at Tue Sep 27 20:26:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1168: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1169: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1170: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1171: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1172: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1173: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1174: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1175: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1176: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1177: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1178: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1179: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1180: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1181: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1182: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1183: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1184: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1185: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1186: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1187: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1188: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1189: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1190: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1191: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1192: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1193: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1194: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1195: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1196: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1197: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1198: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1199: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1200: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1201: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1202: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1203: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1204: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1205: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1206: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1207: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1208: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1209: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1210: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1211: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1212: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1213: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1214: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1215: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1216: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1217: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1218: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1219: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1220: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1221: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1222: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1223: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1224: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1225: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1226: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1227: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1228: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1229: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1230: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1231: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1232: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1233: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1234: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1235: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1236: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1237: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1238: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1239: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1240: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1241: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1242: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1243: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15969 at Tue Sep 27 20:27:01 UTC 2022 kill -USR1 15969 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15969 killed at Tue Sep 27 20:27:01 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16781 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16781 found at Tue Sep 27 20:27:02 UTC 2022 selfserv_9223 with PID 16781 started at Tue Sep 27 20:27:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16781 at Tue Sep 27 20:27:02 UTC 2022 kill -USR1 16781 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16781 killed at Tue Sep 27 20:27:02 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:27:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16833 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16833 found at Tue Sep 27 20:27:03 UTC 2022 selfserv_9223 with PID 16833 started at Tue Sep 27 20:27:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16833 at Tue Sep 27 20:27:03 UTC 2022 kill -USR1 16833 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16833 killed at Tue Sep 27 20:27:03 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16885 found at Tue Sep 27 20:27:04 UTC 2022 selfserv_9223 with PID 16885 started at Tue Sep 27 20:27:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1246: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16885 at Tue Sep 27 20:27:04 UTC 2022 kill -USR1 16885 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16885 killed at Tue Sep 27 20:27:04 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16937 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16937 found at Tue Sep 27 20:27:05 UTC 2022 selfserv_9223 with PID 16937 started at Tue Sep 27 20:27:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1247: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 16937 at Tue Sep 27 20:27:05 UTC 2022 kill -USR1 16937 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16937 killed at Tue Sep 27 20:27:05 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:27:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16989 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16989 found at Tue Sep 27 20:27:06 UTC 2022 selfserv_9223 with PID 16989 started at Tue Sep 27 20:27:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1248: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 16989 at Tue Sep 27 20:27:06 UTC 2022 kill -USR1 16989 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16989 killed at Tue Sep 27 20:27:06 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17041 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17041 found at Tue Sep 27 20:27:06 UTC 2022 selfserv_9223 with PID 17041 started at Tue Sep 27 20:27:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17041 at Tue Sep 27 20:27:07 UTC 2022 kill -USR1 17041 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17041 killed at Tue Sep 27 20:27:07 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17093 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17093 found at Tue Sep 27 20:27:07 UTC 2022 selfserv_9223 with PID 17093 started at Tue Sep 27 20:27:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17093 at Tue Sep 27 20:27:08 UTC 2022 kill -USR1 17093 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17093 killed at Tue Sep 27 20:27:08 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:27:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17145 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17145 found at Tue Sep 27 20:27:08 UTC 2022 selfserv_9223 with PID 17145 started at Tue Sep 27 20:27:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17145 at Tue Sep 27 20:27:09 UTC 2022 kill -USR1 17145 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17145 killed at Tue Sep 27 20:27:09 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17197 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17197 found at Tue Sep 27 20:27:09 UTC 2022 selfserv_9223 with PID 17197 started at Tue Sep 27 20:27:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17197 at Tue Sep 27 20:27:10 UTC 2022 kill -USR1 17197 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17197 killed at Tue Sep 27 20:27:10 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17255 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17255 found at Tue Sep 27 20:27:10 UTC 2022 selfserv_9223 with PID 17255 started at Tue Sep 27 20:27:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1253: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 17255 at Tue Sep 27 20:27:11 UTC 2022 kill -USR1 17255 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17255 killed at Tue Sep 27 20:27:11 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:27:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17311 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17311 found at Tue Sep 27 20:27:11 UTC 2022 selfserv_9223 with PID 17311 started at Tue Sep 27 20:27:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1254: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 17311 at Tue Sep 27 20:27:12 UTC 2022 kill -USR1 17311 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17311 killed at Tue Sep 27 20:27:12 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17367 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17367 found at Tue Sep 27 20:27:12 UTC 2022 selfserv_9223 with PID 17367 started at Tue Sep 27 20:27:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1255: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17367 at Tue Sep 27 20:27:13 UTC 2022 kill -USR1 17367 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17367 killed at Tue Sep 27 20:27:13 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17420 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17420 found at Tue Sep 27 20:27:13 UTC 2022 selfserv_9223 with PID 17420 started at Tue Sep 27 20:27:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17420 at Tue Sep 27 20:27:14 UTC 2022 kill -USR1 17420 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17420 killed at Tue Sep 27 20:27:14 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:27:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17472 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17472 found at Tue Sep 27 20:27:14 UTC 2022 selfserv_9223 with PID 17472 started at Tue Sep 27 20:27:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17472 at Tue Sep 27 20:27:15 UTC 2022 kill -USR1 17472 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17472 killed at Tue Sep 27 20:27:15 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17524 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17524 found at Tue Sep 27 20:27:15 UTC 2022 selfserv_9223 with PID 17524 started at Tue Sep 27 20:27:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17524 at Tue Sep 27 20:27:16 UTC 2022 kill -USR1 17524 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17524 killed at Tue Sep 27 20:27:16 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17576 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17576 found at Tue Sep 27 20:27:16 UTC 2022 selfserv_9223 with PID 17576 started at Tue Sep 27 20:27:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1259: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 17576 at Tue Sep 27 20:27:17 UTC 2022 kill -USR1 17576 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17576 killed at Tue Sep 27 20:27:17 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:27:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17628 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17628 found at Tue Sep 27 20:27:17 UTC 2022 selfserv_9223 with PID 17628 started at Tue Sep 27 20:27:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1260: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 17628 at Tue Sep 27 20:27:18 UTC 2022 kill -USR1 17628 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17628 killed at Tue Sep 27 20:27:18 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17681 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17681 found at Tue Sep 27 20:27:18 UTC 2022 selfserv_9223 with PID 17681 started at Tue Sep 27 20:27:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1261: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17681 at Tue Sep 27 20:27:19 UTC 2022 kill -USR1 17681 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17681 killed at Tue Sep 27 20:27:19 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17733 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17733 found at Tue Sep 27 20:27:19 UTC 2022 selfserv_9223 with PID 17733 started at Tue Sep 27 20:27:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1262: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17733 at Tue Sep 27 20:27:20 UTC 2022 kill -USR1 17733 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17733 killed at Tue Sep 27 20:27:20 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:27:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17785 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17785 found at Tue Sep 27 20:27:21 UTC 2022 selfserv_9223 with PID 17785 started at Tue Sep 27 20:27:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1263: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17785 at Tue Sep 27 20:27:21 UTC 2022 kill -USR1 17785 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17785 killed at Tue Sep 27 20:27:21 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17837 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17837 found at Tue Sep 27 20:27:22 UTC 2022 selfserv_9223 with PID 17837 started at Tue Sep 27 20:27:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1264: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17837 at Tue Sep 27 20:27:22 UTC 2022 kill -USR1 17837 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17837 killed at Tue Sep 27 20:27:22 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17890 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17890 found at Tue Sep 27 20:27:23 UTC 2022 selfserv_9223 with PID 17890 started at Tue Sep 27 20:27:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1265: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 17890 at Tue Sep 27 20:27:23 UTC 2022 kill -USR1 17890 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17890 killed at Tue Sep 27 20:27:23 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:27:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17942 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17942 found at Tue Sep 27 20:27:24 UTC 2022 selfserv_9223 with PID 17942 started at Tue Sep 27 20:27:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1266: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 17942 at Tue Sep 27 20:27:24 UTC 2022 kill -USR1 17942 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17942 killed at Tue Sep 27 20:27:24 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17994 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17994 found at Tue Sep 27 20:27:25 UTC 2022 selfserv_9223 with PID 17994 started at Tue Sep 27 20:27:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1267: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17994 at Tue Sep 27 20:27:25 UTC 2022 kill -USR1 17994 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17994 killed at Tue Sep 27 20:27:25 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18046 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18046 found at Tue Sep 27 20:27:26 UTC 2022 selfserv_9223 with PID 18046 started at Tue Sep 27 20:27:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1268: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18046 at Tue Sep 27 20:27:26 UTC 2022 kill -USR1 18046 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18046 killed at Tue Sep 27 20:27:27 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:27:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18098 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18098 found at Tue Sep 27 20:27:27 UTC 2022 selfserv_9223 with PID 18098 started at Tue Sep 27 20:27:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1269: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18098 at Tue Sep 27 20:27:28 UTC 2022 kill -USR1 18098 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18098 killed at Tue Sep 27 20:27:28 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18150 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18150 found at Tue Sep 27 20:27:28 UTC 2022 selfserv_9223 with PID 18150 started at Tue Sep 27 20:27:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1270: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18150 at Tue Sep 27 20:27:29 UTC 2022 kill -USR1 18150 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18150 killed at Tue Sep 27 20:27:29 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18202 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18202 found at Tue Sep 27 20:27:29 UTC 2022 selfserv_9223 with PID 18202 started at Tue Sep 27 20:27:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1271: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18202 at Tue Sep 27 20:27:30 UTC 2022 kill -USR1 18202 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18202 killed at Tue Sep 27 20:27:30 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:27:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18254 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18254 found at Tue Sep 27 20:27:30 UTC 2022 selfserv_9223 with PID 18254 started at Tue Sep 27 20:27:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1272: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18254 at Tue Sep 27 20:27:31 UTC 2022 kill -USR1 18254 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18254 killed at Tue Sep 27 20:27:31 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18306 found at Tue Sep 27 20:27:31 UTC 2022 selfserv_9223 with PID 18306 started at Tue Sep 27 20:27:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1273: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18306 at Tue Sep 27 20:27:32 UTC 2022 kill -USR1 18306 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18306 killed at Tue Sep 27 20:27:32 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18358 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18358 found at Tue Sep 27 20:27:33 UTC 2022 selfserv_9223 with PID 18358 started at Tue Sep 27 20:27:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1274: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18358 at Tue Sep 27 20:27:33 UTC 2022 kill -USR1 18358 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18358 killed at Tue Sep 27 20:27:33 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18410 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18410 found at Tue Sep 27 20:27:34 UTC 2022 selfserv_9223 with PID 18410 started at Tue Sep 27 20:27:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1275: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18410 at Tue Sep 27 20:27:34 UTC 2022 kill -USR1 18410 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18410 killed at Tue Sep 27 20:27:34 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18462 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18462 found at Tue Sep 27 20:27:34 UTC 2022 selfserv_9223 with PID 18462 started at Tue Sep 27 20:27:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1276: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18462 at Tue Sep 27 20:27:35 UTC 2022 kill -USR1 18462 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18462 killed at Tue Sep 27 20:27:35 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18514 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18514 found at Tue Sep 27 20:27:35 UTC 2022 selfserv_9223 with PID 18514 started at Tue Sep 27 20:27:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1277: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18514 at Tue Sep 27 20:27:36 UTC 2022 kill -USR1 18514 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18514 killed at Tue Sep 27 20:27:36 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18566 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18566 found at Tue Sep 27 20:27:36 UTC 2022 selfserv_9223 with PID 18566 started at Tue Sep 27 20:27:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1278: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18566 at Tue Sep 27 20:27:37 UTC 2022 kill -USR1 18566 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18566 killed at Tue Sep 27 20:27:37 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18618 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18618 found at Tue Sep 27 20:27:37 UTC 2022 selfserv_9223 with PID 18618 started at Tue Sep 27 20:27:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1279: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18618 at Tue Sep 27 20:27:38 UTC 2022 kill -USR1 18618 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18618 killed at Tue Sep 27 20:27:38 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:27:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18670 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18670 found at Tue Sep 27 20:27:38 UTC 2022 selfserv_9223 with PID 18670 started at Tue Sep 27 20:27:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1280: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18670 at Tue Sep 27 20:27:39 UTC 2022 kill -USR1 18670 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18670 killed at Tue Sep 27 20:27:39 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18722 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18722 found at Tue Sep 27 20:27:39 UTC 2022 selfserv_9223 with PID 18722 started at Tue Sep 27 20:27:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1281: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18722 at Tue Sep 27 20:27:40 UTC 2022 kill -USR1 18722 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18722 killed at Tue Sep 27 20:27:40 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:27:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18774 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18774 found at Tue Sep 27 20:27:40 UTC 2022 selfserv_9223 with PID 18774 started at Tue Sep 27 20:27:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1282: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18774 at Tue Sep 27 20:27:41 UTC 2022 kill -USR1 18774 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18774 killed at Tue Sep 27 20:27:41 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18826 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18826 found at Tue Sep 27 20:27:41 UTC 2022 selfserv_9223 with PID 18826 started at Tue Sep 27 20:27:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1283: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18826 at Tue Sep 27 20:27:42 UTC 2022 kill -USR1 18826 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18826 killed at Tue Sep 27 20:27:42 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:27:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18878 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18878 found at Tue Sep 27 20:27:42 UTC 2022 selfserv_9223 with PID 18878 started at Tue Sep 27 20:27:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1284: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18878 at Tue Sep 27 20:27:42 UTC 2022 kill -USR1 18878 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18878 killed at Tue Sep 27 20:27:43 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18930 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18930 found at Tue Sep 27 20:27:43 UTC 2022 selfserv_9223 with PID 18930 started at Tue Sep 27 20:27:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1285: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18930 at Tue Sep 27 20:27:44 UTC 2022 kill -USR1 18930 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18930 killed at Tue Sep 27 20:27:44 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:27:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18982 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18982 found at Tue Sep 27 20:27:44 UTC 2022 selfserv_9223 with PID 18982 started at Tue Sep 27 20:27:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1286: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18982 at Tue Sep 27 20:27:44 UTC 2022 kill -USR1 18982 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18982 killed at Tue Sep 27 20:27:45 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19034 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19034 found at Tue Sep 27 20:27:45 UTC 2022 selfserv_9223 with PID 19034 started at Tue Sep 27 20:27:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1287: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19034 at Tue Sep 27 20:27:45 UTC 2022 kill -USR1 19034 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19034 killed at Tue Sep 27 20:27:46 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:27:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19086 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19086 found at Tue Sep 27 20:27:46 UTC 2022 selfserv_9223 with PID 19086 started at Tue Sep 27 20:27:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1288: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19086 at Tue Sep 27 20:27:46 UTC 2022 kill -USR1 19086 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19086 killed at Tue Sep 27 20:27:47 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19138 found at Tue Sep 27 20:27:47 UTC 2022 selfserv_9223 with PID 19138 started at Tue Sep 27 20:27:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1289: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19138 at Tue Sep 27 20:27:47 UTC 2022 kill -USR1 19138 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19138 killed at Tue Sep 27 20:27:48 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:27:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19190 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19190 found at Tue Sep 27 20:27:48 UTC 2022 selfserv_9223 with PID 19190 started at Tue Sep 27 20:27:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1290: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 19190 at Tue Sep 27 20:27:48 UTC 2022 kill -USR1 19190 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19190 killed at Tue Sep 27 20:27:49 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19242 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19242 found at Tue Sep 27 20:27:49 UTC 2022 selfserv_9223 with PID 19242 started at Tue Sep 27 20:27:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1291: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19242 at Tue Sep 27 20:27:50 UTC 2022 kill -USR1 19242 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19242 killed at Tue Sep 27 20:27:50 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:27:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19294 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19294 found at Tue Sep 27 20:27:50 UTC 2022 selfserv_9223 with PID 19294 started at Tue Sep 27 20:27:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1292: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19294 at Tue Sep 27 20:27:51 UTC 2022 kill -USR1 19294 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19294 killed at Tue Sep 27 20:27:51 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19346 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19346 found at Tue Sep 27 20:27:51 UTC 2022 selfserv_9223 with PID 19346 started at Tue Sep 27 20:27:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1293: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19346 at Tue Sep 27 20:27:52 UTC 2022 kill -USR1 19346 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19346 killed at Tue Sep 27 20:27:52 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:27:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19398 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19398 found at Tue Sep 27 20:27:52 UTC 2022 selfserv_9223 with PID 19398 started at Tue Sep 27 20:27:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1294: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 19398 at Tue Sep 27 20:27:53 UTC 2022 kill -USR1 19398 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19398 killed at Tue Sep 27 20:27:53 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19450 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19450 found at Tue Sep 27 20:27:53 UTC 2022 selfserv_9223 with PID 19450 started at Tue Sep 27 20:27:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1295: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19450 at Tue Sep 27 20:27:54 UTC 2022 kill -USR1 19450 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19450 killed at Tue Sep 27 20:27:54 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:27:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19502 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19502 found at Tue Sep 27 20:27:54 UTC 2022 selfserv_9223 with PID 19502 started at Tue Sep 27 20:27:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1296: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19502 at Tue Sep 27 20:27:55 UTC 2022 kill -USR1 19502 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19502 killed at Tue Sep 27 20:27:55 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19554 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19554 found at Tue Sep 27 20:27:55 UTC 2022 selfserv_9223 with PID 19554 started at Tue Sep 27 20:27:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1297: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19554 at Tue Sep 27 20:27:56 UTC 2022 kill -USR1 19554 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19554 killed at Tue Sep 27 20:27:56 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:27:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19606 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19606 found at Tue Sep 27 20:27:57 UTC 2022 selfserv_9223 with PID 19606 started at Tue Sep 27 20:27:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1298: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 19606 at Tue Sep 27 20:27:57 UTC 2022 kill -USR1 19606 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19606 killed at Tue Sep 27 20:27:57 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19658 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19658 found at Tue Sep 27 20:27:58 UTC 2022 selfserv_9223 with PID 19658 started at Tue Sep 27 20:27:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1299: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19658 at Tue Sep 27 20:27:58 UTC 2022 kill -USR1 19658 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19658 killed at Tue Sep 27 20:27:59 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:27:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:27:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19710 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19710 found at Tue Sep 27 20:27:59 UTC 2022 selfserv_9223 with PID 19710 started at Tue Sep 27 20:27:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1300: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19710 at Tue Sep 27 20:27:59 UTC 2022 kill -USR1 19710 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19710 killed at Tue Sep 27 20:28:00 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:28:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19762 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19762 found at Tue Sep 27 20:28:00 UTC 2022 selfserv_9223 with PID 19762 started at Tue Sep 27 20:28:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1301: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19762 at Tue Sep 27 20:28:00 UTC 2022 kill -USR1 19762 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19762 killed at Tue Sep 27 20:28:00 UTC 2022 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Tue Sep 27 20:28:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19844 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19844 found at Tue Sep 27 20:28:01 UTC 2022 selfserv_9223 with PID 19844 started at Tue Sep 27 20:28:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19844 at Tue Sep 27 20:28:01 UTC 2022 kill -USR1 19844 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19844 killed at Tue Sep 27 20:28:01 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:28:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19886 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19886 found at Tue Sep 27 20:28:02 UTC 2022 selfserv_9223 with PID 19886 started at Tue Sep 27 20:28:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19886 at Tue Sep 27 20:28:02 UTC 2022 kill -USR1 19886 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19886 killed at Tue Sep 27 20:28:02 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:28:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19925 found at Tue Sep 27 20:28:02 UTC 2022 selfserv_9223 with PID 19925 started at Tue Sep 27 20:28:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1246: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 19925 at Tue Sep 27 20:28:03 UTC 2022 kill -USR1 19925 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19925 killed at Tue Sep 27 20:28:03 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:28:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19964 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19964 found at Tue Sep 27 20:28:03 UTC 2022 selfserv_9223 with PID 19964 started at Tue Sep 27 20:28:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1247: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19964 at Tue Sep 27 20:28:03 UTC 2022 kill -USR1 19964 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19964 killed at Tue Sep 27 20:28:04 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:28:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20003 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20003 found at Tue Sep 27 20:28:04 UTC 2022 selfserv_9223 with PID 20003 started at Tue Sep 27 20:28:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1248: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 20003 at Tue Sep 27 20:28:04 UTC 2022 kill -USR1 20003 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20003 killed at Tue Sep 27 20:28:04 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:28:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20042 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20042 found at Tue Sep 27 20:28:05 UTC 2022 selfserv_9223 with PID 20042 started at Tue Sep 27 20:28:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20042 at Tue Sep 27 20:28:05 UTC 2022 kill -USR1 20042 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20042 killed at Tue Sep 27 20:28:05 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:28:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20081 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20081 found at Tue Sep 27 20:28:05 UTC 2022 selfserv_9223 with PID 20081 started at Tue Sep 27 20:28:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20081 at Tue Sep 27 20:28:06 UTC 2022 kill -USR1 20081 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20081 killed at Tue Sep 27 20:28:06 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:28:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20120 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20120 found at Tue Sep 27 20:28:06 UTC 2022 selfserv_9223 with PID 20120 started at Tue Sep 27 20:28:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20120 at Tue Sep 27 20:28:06 UTC 2022 kill -USR1 20120 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20120 killed at Tue Sep 27 20:28:07 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:28:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20159 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20159 found at Tue Sep 27 20:28:07 UTC 2022 selfserv_9223 with PID 20159 started at Tue Sep 27 20:28:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20159 at Tue Sep 27 20:28:07 UTC 2022 kill -USR1 20159 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20159 killed at Tue Sep 27 20:28:07 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:28:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20198 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20198 found at Tue Sep 27 20:28:08 UTC 2022 selfserv_9223 with PID 20198 started at Tue Sep 27 20:28:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1253: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20198 at Tue Sep 27 20:28:08 UTC 2022 kill -USR1 20198 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20198 killed at Tue Sep 27 20:28:08 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:28:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20237 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20237 found at Tue Sep 27 20:28:08 UTC 2022 selfserv_9223 with PID 20237 started at Tue Sep 27 20:28:08 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1254: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20237 at Tue Sep 27 20:28:09 UTC 2022 kill -USR1 20237 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20237 killed at Tue Sep 27 20:28:09 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:28:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20283 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20283 found at Tue Sep 27 20:28:09 UTC 2022 selfserv_9223 with PID 20283 started at Tue Sep 27 20:28:09 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1255: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 20283 at Tue Sep 27 20:28:09 UTC 2022 kill -USR1 20283 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20283 killed at Tue Sep 27 20:28:10 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:28:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20327 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20327 found at Tue Sep 27 20:28:10 UTC 2022 selfserv_9223 with PID 20327 started at Tue Sep 27 20:28:10 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1256: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20327 at Tue Sep 27 20:28:10 UTC 2022 kill -USR1 20327 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20327 killed at Tue Sep 27 20:28:10 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:28:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20367 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20367 found at Tue Sep 27 20:28:11 UTC 2022 selfserv_9223 with PID 20367 started at Tue Sep 27 20:28:11 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1257: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 20367 at Tue Sep 27 20:28:11 UTC 2022 kill -USR1 20367 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20367 killed at Tue Sep 27 20:28:11 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:28:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20411 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20411 found at Tue Sep 27 20:28:11 UTC 2022 selfserv_9223 with PID 20411 started at Tue Sep 27 20:28:11 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1258: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20411 at Tue Sep 27 20:28:12 UTC 2022 kill -USR1 20411 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20411 killed at Tue Sep 27 20:28:12 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:28:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20452 found at Tue Sep 27 20:28:12 UTC 2022 selfserv_9223 with PID 20452 started at Tue Sep 27 20:28:12 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1259: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20452 at Tue Sep 27 20:28:12 UTC 2022 kill -USR1 20452 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20452 killed at Tue Sep 27 20:28:13 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:28:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20492 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20492 found at Tue Sep 27 20:28:13 UTC 2022 selfserv_9223 with PID 20492 started at Tue Sep 27 20:28:13 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1260: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20492 at Tue Sep 27 20:28:13 UTC 2022 kill -USR1 20492 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20492 killed at Tue Sep 27 20:28:13 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:28:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20532 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20532 found at Tue Sep 27 20:28:14 UTC 2022 selfserv_9223 with PID 20532 started at Tue Sep 27 20:28:14 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1261: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20532 at Tue Sep 27 20:28:14 UTC 2022 kill -USR1 20532 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20532 killed at Tue Sep 27 20:28:14 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:28:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20574 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20574 found at Tue Sep 27 20:28:14 UTC 2022 selfserv_9223 with PID 20574 started at Tue Sep 27 20:28:14 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1262: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20574 at Tue Sep 27 20:28:15 UTC 2022 kill -USR1 20574 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20574 killed at Tue Sep 27 20:28:15 UTC 2022 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -fips false -force FIPS mode disabled. ssl.sh: #1263: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/server -list ssl.sh: #1264: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1265: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1266: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_server -list ssl.sh: #1267: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1268: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -fips true -force FIPS mode enabled. ssl.sh: #1269: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -list ssl.sh: #1270: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1271: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1272: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -list ssl.sh: #1273: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1274: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9223 starting at Tue Sep 27 20:28:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 20696 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20696 found at Tue Sep 27 20:28:17 UTC 2022 selfserv_9223 with PID 20696 started at Tue Sep 27 20:28:17 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1275: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1276: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1277: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1278: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1279: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1280: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1281: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1282: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1283: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1284: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1285: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1286: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1287: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1288: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1289: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1290: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1291: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1292: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1293: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1294: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1295: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1296: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1297: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1298: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1299: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1300: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1301: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1302: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1303: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1304: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1305: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1306: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1307: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1308: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1309: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1310: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1311: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1312: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1313: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1314: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1315: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1316: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1317: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1318: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1319: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1320: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1321: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1322: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1323: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1324: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1325: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 20696 at Tue Sep 27 20:28:31 UTC 2022 kill -USR1 20696 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20696 killed at Tue Sep 27 20:28:31 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Tue Sep 27 20:28:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Tue Sep 27 20:28:32 UTC 2022 selfserv_9223 with PID 21245 started at Tue Sep 27 20:28:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1326: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1327: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1328: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1329: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1330: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1331: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1332: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1333: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1334: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1335: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1336: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1337: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1338: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1339: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1340: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1341: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1342: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1343: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1344: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1345: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1346: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1347: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1348: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1349: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1350: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1351: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1352: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1353: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1354: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1355: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1356: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1357: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1358: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1359: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1360: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1361: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1362: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1363: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1364: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1365: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1366: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1367: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1368: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1369: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1370: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1371: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1372: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1373: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1374: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21245 at Tue Sep 27 20:28:54 UTC 2022 kill -USR1 21245 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21245 killed at Tue Sep 27 20:28:55 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9223 starting at Tue Sep 27 20:28:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22044 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22044 found at Tue Sep 27 20:28:55 UTC 2022 selfserv_9223 with PID 22044 started at Tue Sep 27 20:28:55 UTC 2022 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1402: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1403: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22044 at Tue Sep 27 20:28:56 UTC 2022 kill -USR1 22044 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22044 killed at Tue Sep 27 20:28:56 UTC 2022 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:28:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22122 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22122 found at Tue Sep 27 20:28:56 UTC 2022 selfserv_9223 with PID 22122 started at Tue Sep 27 20:28:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1402: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22122 at Tue Sep 27 20:28:57 UTC 2022 kill -USR1 22122 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22122 killed at Tue Sep 27 20:28:57 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:28:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:28:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22175 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22175 found at Tue Sep 27 20:28:57 UTC 2022 selfserv_9223 with PID 22175 started at Tue Sep 27 20:28:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1403: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22175 at Tue Sep 27 20:29:21 UTC 2022 kill -USR1 22175 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22175 killed at Tue Sep 27 20:29:22 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:29:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:29:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22242 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22242 found at Tue Sep 27 20:29:22 UTC 2022 selfserv_9223 with PID 22242 started at Tue Sep 27 20:29:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1404: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22242 at Tue Sep 27 20:29:23 UTC 2022 kill -USR1 22242 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22242 killed at Tue Sep 27 20:29:23 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:29:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:29:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22306 found at Tue Sep 27 20:29:23 UTC 2022 selfserv_9223 with PID 22306 started at Tue Sep 27 20:29:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1405: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22306 at Tue Sep 27 20:29:24 UTC 2022 kill -USR1 22306 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22306 killed at Tue Sep 27 20:29:24 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:29:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:29:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22358 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22358 found at Tue Sep 27 20:29:24 UTC 2022 selfserv_9223 with PID 22358 started at Tue Sep 27 20:29:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1406: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22358 at Tue Sep 27 20:29:48 UTC 2022 kill -USR1 22358 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22358 killed at Tue Sep 27 20:29:48 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:29:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:29:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22410 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22410 found at Tue Sep 27 20:29:48 UTC 2022 selfserv_9223 with PID 22410 started at Tue Sep 27 20:29:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1407: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22410 at Tue Sep 27 20:29:49 UTC 2022 kill -USR1 22410 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22410 killed at Tue Sep 27 20:29:49 UTC 2022 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:29:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:29:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22474 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22474 found at Tue Sep 27 20:29:49 UTC 2022 selfserv_9223 with PID 22474 started at Tue Sep 27 20:29:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1408: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22474 at Tue Sep 27 20:29:50 UTC 2022 kill -USR1 22474 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22474 killed at Tue Sep 27 20:29:50 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:29:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:29:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22526 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22526 found at Tue Sep 27 20:29:50 UTC 2022 selfserv_9223 with PID 22526 started at Tue Sep 27 20:29:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1409: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22526 at Tue Sep 27 20:30:15 UTC 2022 kill -USR1 22526 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22526 killed at Tue Sep 27 20:30:15 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:30:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:30:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22670 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22670 found at Tue Sep 27 20:30:15 UTC 2022 selfserv_9223 with PID 22670 started at Tue Sep 27 20:30:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22670 at Tue Sep 27 20:30:16 UTC 2022 kill -USR1 22670 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22670 killed at Tue Sep 27 20:30:16 UTC 2022 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:30:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:30:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22734 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22734 found at Tue Sep 27 20:30:16 UTC 2022 selfserv_9223 with PID 22734 started at Tue Sep 27 20:30:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1411: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22734 at Tue Sep 27 20:30:17 UTC 2022 kill -USR1 22734 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22734 killed at Tue Sep 27 20:30:17 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:30:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:30:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22786 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22786 found at Tue Sep 27 20:30:18 UTC 2022 selfserv_9223 with PID 22786 started at Tue Sep 27 20:30:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22786 at Tue Sep 27 20:30:42 UTC 2022 kill -USR1 22786 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22786 killed at Tue Sep 27 20:30:42 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:30:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:30:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22838 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22838 found at Tue Sep 27 20:30:43 UTC 2022 selfserv_9223 with PID 22838 started at Tue Sep 27 20:30:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22838 at Tue Sep 27 20:30:43 UTC 2022 kill -USR1 22838 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22838 killed at Tue Sep 27 20:30:43 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:30:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:30:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22902 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22902 found at Tue Sep 27 20:30:44 UTC 2022 selfserv_9223 with PID 22902 started at Tue Sep 27 20:30:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1414: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22902 at Tue Sep 27 20:30:45 UTC 2022 kill -USR1 22902 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22902 killed at Tue Sep 27 20:30:45 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:30:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:30:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22954 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22954 found at Tue Sep 27 20:30:45 UTC 2022 selfserv_9223 with PID 22954 started at Tue Sep 27 20:30:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1415: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22954 at Tue Sep 27 20:31:08 UTC 2022 kill -USR1 22954 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22954 killed at Tue Sep 27 20:31:08 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:31:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:31:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23006 found at Tue Sep 27 20:31:09 UTC 2022 selfserv_9223 with PID 23006 started at Tue Sep 27 20:31:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23006 at Tue Sep 27 20:31:09 UTC 2022 kill -USR1 23006 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23006 killed at Tue Sep 27 20:31:10 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:31:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:31:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23068 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23068 found at Tue Sep 27 20:31:10 UTC 2022 selfserv_9223 with PID 23068 started at Tue Sep 27 20:31:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23068 at Tue Sep 27 20:31:10 UTC 2022 kill -USR1 23068 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23068 killed at Tue Sep 27 20:31:11 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:31:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:31:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23128 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23128 found at Tue Sep 27 20:31:11 UTC 2022 selfserv_9223 with PID 23128 started at Tue Sep 27 20:31:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1418: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23128 at Tue Sep 27 20:31:11 UTC 2022 kill -USR1 23128 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23128 killed at Tue Sep 27 20:31:12 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:31:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:31:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23188 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23188 found at Tue Sep 27 20:31:12 UTC 2022 selfserv_9223 with PID 23188 started at Tue Sep 27 20:31:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23188 at Tue Sep 27 20:31:13 UTC 2022 kill -USR1 23188 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23188 killed at Tue Sep 27 20:31:13 UTC 2022 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:31:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:31:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23249 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23249 found at Tue Sep 27 20:31:13 UTC 2022 selfserv_9223 with PID 23249 started at Tue Sep 27 20:31:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1420: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23249 at Tue Sep 27 20:31:37 UTC 2022 kill -USR1 23249 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23249 killed at Tue Sep 27 20:31:38 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:31:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:31:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23302 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23302 found at Tue Sep 27 20:31:38 UTC 2022 selfserv_9223 with PID 23302 started at Tue Sep 27 20:31:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1421: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23302 at Tue Sep 27 20:31:38 UTC 2022 kill -USR1 23302 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23302 killed at Tue Sep 27 20:31:39 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:31:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:31:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23362 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23362 found at Tue Sep 27 20:31:39 UTC 2022 selfserv_9223 with PID 23362 started at Tue Sep 27 20:31:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1422: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23362 at Tue Sep 27 20:32:02 UTC 2022 kill -USR1 23362 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23362 killed at Tue Sep 27 20:32:02 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:32:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:32:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23414 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23414 found at Tue Sep 27 20:32:03 UTC 2022 selfserv_9223 with PID 23414 started at Tue Sep 27 20:32:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23414 at Tue Sep 27 20:32:03 UTC 2022 kill -USR1 23414 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23414 killed at Tue Sep 27 20:32:03 UTC 2022 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:32:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:32:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23474 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23474 found at Tue Sep 27 20:32:04 UTC 2022 selfserv_9223 with PID 23474 started at Tue Sep 27 20:32:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1424: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23474 at Tue Sep 27 20:32:28 UTC 2022 kill -USR1 23474 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23474 killed at Tue Sep 27 20:32:28 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:32:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:32:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23541 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23541 found at Tue Sep 27 20:32:29 UTC 2022 selfserv_9223 with PID 23541 started at Tue Sep 27 20:32:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23541 at Tue Sep 27 20:32:29 UTC 2022 kill -USR1 23541 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23541 killed at Tue Sep 27 20:32:29 UTC 2022 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:32:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:32:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23601 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23601 found at Tue Sep 27 20:32:30 UTC 2022 selfserv_9223 with PID 23601 started at Tue Sep 27 20:32:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1426: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23601 at Tue Sep 27 20:32:54 UTC 2022 kill -USR1 23601 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23601 killed at Tue Sep 27 20:32:54 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:32:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:32:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23653 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23653 found at Tue Sep 27 20:32:55 UTC 2022 selfserv_9223 with PID 23653 started at Tue Sep 27 20:32:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1427: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23653 at Tue Sep 27 20:32:55 UTC 2022 kill -USR1 23653 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23653 killed at Tue Sep 27 20:32:55 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:32:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:32:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23713 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23713 found at Tue Sep 27 20:32:56 UTC 2022 selfserv_9223 with PID 23713 started at Tue Sep 27 20:32:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1428: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23713 at Tue Sep 27 20:33:19 UTC 2022 kill -USR1 23713 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23713 killed at Tue Sep 27 20:33:19 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:33:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:33:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23780 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23780 found at Tue Sep 27 20:33:20 UTC 2022 selfserv_9223 with PID 23780 started at Tue Sep 27 20:33:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1429: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23780 at Tue Sep 27 20:33:20 UTC 2022 kill -USR1 23780 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23780 killed at Tue Sep 27 20:33:20 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:33:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:33:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23834 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23834 found at Tue Sep 27 20:33:21 UTC 2022 selfserv_9223 with PID 23834 started at Tue Sep 27 20:33:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1430: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23834 at Tue Sep 27 20:33:21 UTC 2022 kill -USR1 23834 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23834 killed at Tue Sep 27 20:33:22 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:33:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:33:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23886 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23886 found at Tue Sep 27 20:33:22 UTC 2022 selfserv_9223 with PID 23886 started at Tue Sep 27 20:33:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1431: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23886 at Tue Sep 27 20:33:23 UTC 2022 kill -USR1 23886 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23886 killed at Tue Sep 27 20:33:23 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Tue Sep 27 20:33:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:33:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23944 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23944 found at Tue Sep 27 20:33:23 UTC 2022 selfserv_9223 with PID 23944 started at Tue Sep 27 20:33:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1432: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23944 at Tue Sep 27 20:33:23 UTC 2022 kill -USR1 23944 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23944 killed at Tue Sep 27 20:33:24 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Tue Sep 27 20:33:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:33:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24002 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24002 found at Tue Sep 27 20:33:24 UTC 2022 selfserv_9223 with PID 24002 started at Tue Sep 27 20:33:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1433: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24002 at Tue Sep 27 20:33:24 UTC 2022 kill -USR1 24002 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24002 killed at Tue Sep 27 20:33:25 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Tue Sep 27 20:33:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:33:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24060 found at Tue Sep 27 20:33:25 UTC 2022 selfserv_9223 with PID 24060 started at Tue Sep 27 20:33:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1434: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24060 at Tue Sep 27 20:33:25 UTC 2022 kill -USR1 24060 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24060 killed at Tue Sep 27 20:33:25 UTC 2022 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9223 starting at Tue Sep 27 20:33:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:33:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24118 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24118 found at Tue Sep 27 20:33:26 UTC 2022 selfserv_9223 with PID 24118 started at Tue Sep 27 20:33:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1435: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24118 at Tue Sep 27 20:33:26 UTC 2022 kill -USR1 24118 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24118 killed at Tue Sep 27 20:33:26 UTC 2022 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9223 starting at Tue Sep 27 20:33:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:33:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24176 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24176 found at Tue Sep 27 20:33:27 UTC 2022 selfserv_9223 with PID 24176 started at Tue Sep 27 20:33:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1436: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24176 at Tue Sep 27 20:33:27 UTC 2022 kill -USR1 24176 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24176 killed at Tue Sep 27 20:33:27 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Tue Sep 27 20:33:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:33:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24234 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24234 found at Tue Sep 27 20:33:27 UTC 2022 selfserv_9223 with PID 24234 started at Tue Sep 27 20:33:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1437: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24234 at Tue Sep 27 20:33:28 UTC 2022 kill -USR1 24234 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24234 killed at Tue Sep 27 20:33:28 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Tue Sep 27 20:33:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:33:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24292 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24292 found at Tue Sep 27 20:33:28 UTC 2022 selfserv_9223 with PID 24292 started at Tue Sep 27 20:33:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1438: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24292 at Tue Sep 27 20:33:29 UTC 2022 kill -USR1 24292 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24292 killed at Tue Sep 27 20:33:29 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9223 starting at Tue Sep 27 20:33:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:33:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24350 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24350 found at Tue Sep 27 20:33:29 UTC 2022 selfserv_9223 with PID 24350 started at Tue Sep 27 20:33:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1439: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24350 at Tue Sep 27 20:33:29 UTC 2022 kill -USR1 24350 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24350 killed at Tue Sep 27 20:33:30 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9223 starting at Tue Sep 27 20:33:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:33:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24408 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24408 found at Tue Sep 27 20:33:30 UTC 2022 selfserv_9223 with PID 24408 started at Tue Sep 27 20:33:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1440: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24408 at Tue Sep 27 20:33:30 UTC 2022 kill -USR1 24408 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24408 killed at Tue Sep 27 20:33:30 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Tue Sep 27 20:33:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:33:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24467 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24467 found at Tue Sep 27 20:33:31 UTC 2022 selfserv_9223 with PID 24467 started at Tue Sep 27 20:33:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1441: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24467 at Tue Sep 27 20:33:31 UTC 2022 kill -USR1 24467 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24467 killed at Tue Sep 27 20:33:31 UTC 2022 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9223 starting at Tue Sep 27 20:33:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:33:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24509 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24509 found at Tue Sep 27 20:33:31 UTC 2022 selfserv_9223 with PID 24509 started at Tue Sep 27 20:33:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1402: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24509 at Tue Sep 27 20:33:32 UTC 2022 kill -USR1 24509 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24509 killed at Tue Sep 27 20:33:32 UTC 2022 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9223 starting at Tue Sep 27 20:33:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:33:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24551 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24551 found at Tue Sep 27 20:33:32 UTC 2022 selfserv_9223 with PID 24551 started at Tue Sep 27 20:33:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1403: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9223 with PID 24551 at Tue Sep 27 20:33:32 UTC 2022 kill -USR1 24551 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24551 killed at Tue Sep 27 20:33:33 UTC 2022 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9223 starting at Tue Sep 27 20:33:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:33:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24593 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24593 found at Tue Sep 27 20:33:33 UTC 2022 selfserv_9223 with PID 24593 started at Tue Sep 27 20:33:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1404: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 24593 at Tue Sep 27 20:33:33 UTC 2022 kill -USR1 24593 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24593 killed at Tue Sep 27 20:33:33 UTC 2022 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9223 starting at Tue Sep 27 20:33:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:33:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24635 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24635 found at Tue Sep 27 20:33:34 UTC 2022 selfserv_9223 with PID 24635 started at Tue Sep 27 20:33:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1405: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 24635 at Tue Sep 27 20:33:34 UTC 2022 kill -USR1 24635 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24635 killed at Tue Sep 27 20:33:34 UTC 2022 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9223 starting at Tue Sep 27 20:33:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:33:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24677 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24677 found at Tue Sep 27 20:33:35 UTC 2022 selfserv_9223 with PID 24677 started at Tue Sep 27 20:33:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1406: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 24677 at Tue Sep 27 20:33:35 UTC 2022 kill -USR1 24677 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24677 killed at Tue Sep 27 20:33:35 UTC 2022 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9223 starting at Tue Sep 27 20:33:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:33:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24719 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24719 found at Tue Sep 27 20:33:35 UTC 2022 selfserv_9223 with PID 24719 started at Tue Sep 27 20:33:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1407: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 24719 at Tue Sep 27 20:33:36 UTC 2022 kill -USR1 24719 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24719 killed at Tue Sep 27 20:33:36 UTC 2022 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9223 starting at Tue Sep 27 20:33:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:33:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24761 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24761 found at Tue Sep 27 20:33:36 UTC 2022 selfserv_9223 with PID 24761 started at Tue Sep 27 20:33:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1408: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 24761 at Tue Sep 27 20:33:36 UTC 2022 kill -USR1 24761 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24761 killed at Tue Sep 27 20:33:36 UTC 2022 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9223 starting at Tue Sep 27 20:33:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:33:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24803 found at Tue Sep 27 20:33:37 UTC 2022 selfserv_9223 with PID 24803 started at Tue Sep 27 20:33:37 UTC 2022 strsclnt -q -p 9223 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Tue Sep 27 20:33:37 UTC 2022 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Tue Sep 27 20:34:26 UTC 2022 ssl.sh: #1409: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9223 with PID 24803 at Tue Sep 27 20:34:26 UTC 2022 kill -USR1 24803 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24803 killed at Tue Sep 27 20:34:26 UTC 2022 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Tue Sep 27 20:34:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:34:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24869 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24869 found at Tue Sep 27 20:34:26 UTC 2022 selfserv_9223 with PID 24869 started at Tue Sep 27 20:34:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24869 at Tue Sep 27 20:34:27 UTC 2022 kill -USR1 24869 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24869 killed at Tue Sep 27 20:34:27 UTC 2022 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:34:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:34:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24911 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24911 found at Tue Sep 27 20:34:27 UTC 2022 selfserv_9223 with PID 24911 started at Tue Sep 27 20:34:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1411: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24911 at Tue Sep 27 20:34:27 UTC 2022 kill -USR1 24911 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24911 killed at Tue Sep 27 20:34:28 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:34:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:34:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24950 found at Tue Sep 27 20:34:28 UTC 2022 selfserv_9223 with PID 24950 started at Tue Sep 27 20:34:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 24950 at Tue Sep 27 20:34:28 UTC 2022 kill -USR1 24950 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24950 killed at Tue Sep 27 20:34:28 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:34:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:34:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24989 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24989 found at Tue Sep 27 20:34:29 UTC 2022 selfserv_9223 with PID 24989 started at Tue Sep 27 20:34:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24989 at Tue Sep 27 20:34:29 UTC 2022 kill -USR1 24989 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24989 killed at Tue Sep 27 20:34:29 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:34:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:34:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25028 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25028 found at Tue Sep 27 20:34:29 UTC 2022 selfserv_9223 with PID 25028 started at Tue Sep 27 20:34:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1414: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 25028 at Tue Sep 27 20:34:30 UTC 2022 kill -USR1 25028 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25028 killed at Tue Sep 27 20:34:30 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:34:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:34:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25067 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25067 found at Tue Sep 27 20:34:30 UTC 2022 selfserv_9223 with PID 25067 started at Tue Sep 27 20:34:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1415: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25067 at Tue Sep 27 20:34:30 UTC 2022 kill -USR1 25067 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25067 killed at Tue Sep 27 20:34:31 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:34:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:34:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25107 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25107 found at Tue Sep 27 20:34:31 UTC 2022 selfserv_9223 with PID 25107 started at Tue Sep 27 20:34:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25107 at Tue Sep 27 20:34:31 UTC 2022 kill -USR1 25107 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25107 killed at Tue Sep 27 20:34:31 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:34:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:34:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25146 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25146 found at Tue Sep 27 20:34:32 UTC 2022 selfserv_9223 with PID 25146 started at Tue Sep 27 20:34:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25146 at Tue Sep 27 20:34:32 UTC 2022 kill -USR1 25146 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25146 killed at Tue Sep 27 20:34:32 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:34:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:34:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25185 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25185 found at Tue Sep 27 20:34:32 UTC 2022 selfserv_9223 with PID 25185 started at Tue Sep 27 20:34:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1418: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25185 at Tue Sep 27 20:34:33 UTC 2022 kill -USR1 25185 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25185 killed at Tue Sep 27 20:34:33 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:34:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:34:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25224 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25224 found at Tue Sep 27 20:34:33 UTC 2022 selfserv_9223 with PID 25224 started at Tue Sep 27 20:34:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25224 at Tue Sep 27 20:34:33 UTC 2022 kill -USR1 25224 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25224 killed at Tue Sep 27 20:34:34 UTC 2022 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:34:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:34:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25263 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25263 found at Tue Sep 27 20:34:34 UTC 2022 selfserv_9223 with PID 25263 started at Tue Sep 27 20:34:34 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1420: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25263 at Tue Sep 27 20:34:34 UTC 2022 kill -USR1 25263 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25263 killed at Tue Sep 27 20:34:34 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:34:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:34:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25303 found at Tue Sep 27 20:34:35 UTC 2022 selfserv_9223 with PID 25303 started at Tue Sep 27 20:34:35 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1421: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25303 at Tue Sep 27 20:34:35 UTC 2022 kill -USR1 25303 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25303 killed at Tue Sep 27 20:34:35 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:34:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:34:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25343 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25343 found at Tue Sep 27 20:34:35 UTC 2022 selfserv_9223 with PID 25343 started at Tue Sep 27 20:34:35 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1422: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25343 at Tue Sep 27 20:34:36 UTC 2022 kill -USR1 25343 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25343 killed at Tue Sep 27 20:34:36 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:34:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:34:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25383 found at Tue Sep 27 20:34:36 UTC 2022 selfserv_9223 with PID 25383 started at Tue Sep 27 20:34:36 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1423: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25383 at Tue Sep 27 20:34:36 UTC 2022 kill -USR1 25383 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25383 killed at Tue Sep 27 20:34:37 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:34:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:34:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25423 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25423 found at Tue Sep 27 20:34:37 UTC 2022 selfserv_9223 with PID 25423 started at Tue Sep 27 20:34:37 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1424: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25423 at Tue Sep 27 20:34:37 UTC 2022 kill -USR1 25423 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25423 killed at Tue Sep 27 20:34:37 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:34:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:34:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25463 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25463 found at Tue Sep 27 20:34:38 UTC 2022 selfserv_9223 with PID 25463 started at Tue Sep 27 20:34:38 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1425: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25463 at Tue Sep 27 20:34:38 UTC 2022 kill -USR1 25463 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25463 killed at Tue Sep 27 20:34:38 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:34:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:34:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25503 found at Tue Sep 27 20:34:38 UTC 2022 selfserv_9223 with PID 25503 started at Tue Sep 27 20:34:38 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1426: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25503 at Tue Sep 27 20:34:39 UTC 2022 kill -USR1 25503 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25503 killed at Tue Sep 27 20:34:39 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:34:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:34:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25543 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25543 found at Tue Sep 27 20:34:39 UTC 2022 selfserv_9223 with PID 25543 started at Tue Sep 27 20:34:39 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1427: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25543 at Tue Sep 27 20:34:39 UTC 2022 kill -USR1 25543 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25543 killed at Tue Sep 27 20:34:40 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:34:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:34:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25583 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25583 found at Tue Sep 27 20:34:40 UTC 2022 selfserv_9223 with PID 25583 started at Tue Sep 27 20:34:40 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1428: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25583 at Tue Sep 27 20:34:40 UTC 2022 kill -USR1 25583 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25583 killed at Tue Sep 27 20:34:40 UTC 2022 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9223 starting at Tue Sep 27 20:34:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:34:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 25623 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25623 found at Tue Sep 27 20:34:41 UTC 2022 selfserv_9223 with PID 25623 started at Tue Sep 27 20:34:41 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1429: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1430: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1431: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1432: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1433: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1434: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1435: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 25623 at Tue Sep 27 20:34:55 UTC 2022 kill -USR1 25623 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25623 killed at Tue Sep 27 20:34:55 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Tue Sep 27 20:34:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:34:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 26172 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26172 found at Tue Sep 27 20:34:56 UTC 2022 selfserv_9223 with PID 26172 started at Tue Sep 27 20:34:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1500: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1501: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1502: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1503: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1504: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1505: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1506: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1507: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1508: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1509: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1510: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1511: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1512: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1513: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1514: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1515: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1516: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1517: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1518: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1519: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1520: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1521: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1522: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1523: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1524: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1525: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1526: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1527: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1528: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26172 at Tue Sep 27 20:35:18 UTC 2022 kill -USR1 26172 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26172 killed at Tue Sep 27 20:35:18 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:35:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:35:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27027 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27027 found at Tue Sep 27 20:35:19 UTC 2022 selfserv_9223 with PID 27027 started at Tue Sep 27 20:35:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1556: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27027 at Tue Sep 27 20:35:19 UTC 2022 kill -USR1 27027 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27027 killed at Tue Sep 27 20:35:19 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:35:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:35:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27079 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27079 found at Tue Sep 27 20:35:20 UTC 2022 selfserv_9223 with PID 27079 started at Tue Sep 27 20:35:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1557: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27079 at Tue Sep 27 20:35:45 UTC 2022 kill -USR1 27079 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27079 killed at Tue Sep 27 20:35:45 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:35:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:35:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27131 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27131 found at Tue Sep 27 20:35:45 UTC 2022 selfserv_9223 with PID 27131 started at Tue Sep 27 20:35:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1558: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27131 at Tue Sep 27 20:35:46 UTC 2022 kill -USR1 27131 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27131 killed at Tue Sep 27 20:35:46 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:35:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:35:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27195 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27195 found at Tue Sep 27 20:35:46 UTC 2022 selfserv_9223 with PID 27195 started at Tue Sep 27 20:35:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1559: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27195 at Tue Sep 27 20:35:47 UTC 2022 kill -USR1 27195 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27195 killed at Tue Sep 27 20:35:47 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:35:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:35:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27247 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27247 found at Tue Sep 27 20:35:47 UTC 2022 selfserv_9223 with PID 27247 started at Tue Sep 27 20:35:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1560: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27247 at Tue Sep 27 20:36:11 UTC 2022 kill -USR1 27247 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27247 killed at Tue Sep 27 20:36:11 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:36:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:36:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27313 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27313 found at Tue Sep 27 20:36:11 UTC 2022 selfserv_9223 with PID 27313 started at Tue Sep 27 20:36:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27313 at Tue Sep 27 20:36:12 UTC 2022 kill -USR1 27313 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27313 killed at Tue Sep 27 20:36:12 UTC 2022 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:36:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:36:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27379 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27379 found at Tue Sep 27 20:36:12 UTC 2022 selfserv_9223 with PID 27379 started at Tue Sep 27 20:36:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1562: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27379 at Tue Sep 27 20:36:13 UTC 2022 kill -USR1 27379 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27379 killed at Tue Sep 27 20:36:13 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:36:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:36:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27432 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27432 found at Tue Sep 27 20:36:13 UTC 2022 selfserv_9223 with PID 27432 started at Tue Sep 27 20:36:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1563: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27432 at Tue Sep 27 20:36:39 UTC 2022 kill -USR1 27432 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27432 killed at Tue Sep 27 20:36:39 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:36:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:36:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27484 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27484 found at Tue Sep 27 20:36:39 UTC 2022 selfserv_9223 with PID 27484 started at Tue Sep 27 20:36:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27484 at Tue Sep 27 20:36:40 UTC 2022 kill -USR1 27484 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27484 killed at Tue Sep 27 20:36:40 UTC 2022 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:36:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:36:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27549 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27549 found at Tue Sep 27 20:36:40 UTC 2022 selfserv_9223 with PID 27549 started at Tue Sep 27 20:36:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1565: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27549 at Tue Sep 27 20:36:41 UTC 2022 kill -USR1 27549 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27549 killed at Tue Sep 27 20:36:41 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:36:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:36:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27601 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27601 found at Tue Sep 27 20:36:41 UTC 2022 selfserv_9223 with PID 27601 started at Tue Sep 27 20:36:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1566: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27601 at Tue Sep 27 20:37:07 UTC 2022 kill -USR1 27601 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27601 killed at Tue Sep 27 20:37:07 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:37:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:37:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27653 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27653 found at Tue Sep 27 20:37:07 UTC 2022 selfserv_9223 with PID 27653 started at Tue Sep 27 20:37:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1567: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27653 at Tue Sep 27 20:37:08 UTC 2022 kill -USR1 27653 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27653 killed at Tue Sep 27 20:37:08 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:37:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:37:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27717 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27717 found at Tue Sep 27 20:37:08 UTC 2022 selfserv_9223 with PID 27717 started at Tue Sep 27 20:37:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1568: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27717 at Tue Sep 27 20:37:09 UTC 2022 kill -USR1 27717 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27717 killed at Tue Sep 27 20:37:09 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:37:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:37:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27769 found at Tue Sep 27 20:37:09 UTC 2022 selfserv_9223 with PID 27769 started at Tue Sep 27 20:37:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1569: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27769 at Tue Sep 27 20:37:33 UTC 2022 kill -USR1 27769 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27769 killed at Tue Sep 27 20:37:33 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:37:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:37:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27836 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27836 found at Tue Sep 27 20:37:33 UTC 2022 selfserv_9223 with PID 27836 started at Tue Sep 27 20:37:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27836 at Tue Sep 27 20:37:34 UTC 2022 kill -USR1 27836 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27836 killed at Tue Sep 27 20:37:34 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:37:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:37:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27892 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27892 found at Tue Sep 27 20:37:34 UTC 2022 selfserv_9223 with PID 27892 started at Tue Sep 27 20:37:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1571: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27892 at Tue Sep 27 20:37:35 UTC 2022 kill -USR1 27892 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27892 killed at Tue Sep 27 20:37:35 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 20:37:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:37:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27949 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27949 found at Tue Sep 27 20:37:35 UTC 2022 selfserv_9223 with PID 27949 started at Tue Sep 27 20:37:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1572: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27949 at Tue Sep 27 20:37:36 UTC 2022 kill -USR1 27949 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27949 killed at Tue Sep 27 20:37:36 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:37:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:37:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28005 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28005 found at Tue Sep 27 20:37:36 UTC 2022 selfserv_9223 with PID 28005 started at Tue Sep 27 20:37:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1573: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28005 at Tue Sep 27 20:37:37 UTC 2022 kill -USR1 28005 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28005 killed at Tue Sep 27 20:37:37 UTC 2022 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:37:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:37:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28065 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28065 found at Tue Sep 27 20:37:37 UTC 2022 selfserv_9223 with PID 28065 started at Tue Sep 27 20:37:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1574: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28065 at Tue Sep 27 20:38:02 UTC 2022 kill -USR1 28065 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28065 killed at Tue Sep 27 20:38:03 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:38:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:38:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28117 found at Tue Sep 27 20:38:03 UTC 2022 selfserv_9223 with PID 28117 started at Tue Sep 27 20:38:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1575: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28117 at Tue Sep 27 20:38:03 UTC 2022 kill -USR1 28117 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28117 killed at Tue Sep 27 20:38:04 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:38:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:38:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28177 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28177 found at Tue Sep 27 20:38:04 UTC 2022 selfserv_9223 with PID 28177 started at Tue Sep 27 20:38:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1576: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28177 at Tue Sep 27 20:38:27 UTC 2022 kill -USR1 28177 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28177 killed at Tue Sep 27 20:38:27 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:38:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:38:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28244 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28244 found at Tue Sep 27 20:38:28 UTC 2022 selfserv_9223 with PID 28244 started at Tue Sep 27 20:38:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1577: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28244 at Tue Sep 27 20:38:28 UTC 2022 kill -USR1 28244 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28244 killed at Tue Sep 27 20:38:29 UTC 2022 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:38:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:38:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28304 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28304 found at Tue Sep 27 20:38:29 UTC 2022 selfserv_9223 with PID 28304 started at Tue Sep 27 20:38:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1578: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28304 at Tue Sep 27 20:38:54 UTC 2022 kill -USR1 28304 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28304 killed at Tue Sep 27 20:38:54 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:38:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:38:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28357 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28357 found at Tue Sep 27 20:38:55 UTC 2022 selfserv_9223 with PID 28357 started at Tue Sep 27 20:38:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1579: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28357 at Tue Sep 27 20:38:55 UTC 2022 kill -USR1 28357 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28357 killed at Tue Sep 27 20:38:55 UTC 2022 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:38:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:38:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28417 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28417 found at Tue Sep 27 20:38:56 UTC 2022 selfserv_9223 with PID 28417 started at Tue Sep 27 20:38:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1580: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28417 at Tue Sep 27 20:39:21 UTC 2022 kill -USR1 28417 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28417 killed at Tue Sep 27 20:39:21 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:39:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:39:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28485 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28485 found at Tue Sep 27 20:39:21 UTC 2022 selfserv_9223 with PID 28485 started at Tue Sep 27 20:39:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28485 at Tue Sep 27 20:39:22 UTC 2022 kill -USR1 28485 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28485 killed at Tue Sep 27 20:39:22 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 20:39:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:39:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28545 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28545 found at Tue Sep 27 20:39:23 UTC 2022 selfserv_9223 with PID 28545 started at Tue Sep 27 20:39:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1582: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28545 at Tue Sep 27 20:39:46 UTC 2022 kill -USR1 28545 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28545 killed at Tue Sep 27 20:39:46 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:39:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:39:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28598 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28598 found at Tue Sep 27 20:39:46 UTC 2022 selfserv_9223 with PID 28598 started at Tue Sep 27 20:39:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1583: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28598 at Tue Sep 27 20:39:47 UTC 2022 kill -USR1 28598 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28598 killed at Tue Sep 27 20:39:47 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:39:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:39:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28650 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28650 found at Tue Sep 27 20:39:48 UTC 2022 selfserv_9223 with PID 28650 started at Tue Sep 27 20:39:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1584: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28650 at Tue Sep 27 20:39:48 UTC 2022 kill -USR1 28650 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28650 killed at Tue Sep 27 20:39:48 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 20:39:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:39:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28702 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28702 found at Tue Sep 27 20:39:49 UTC 2022 selfserv_9223 with PID 28702 started at Tue Sep 27 20:39:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1585: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28702 at Tue Sep 27 20:39:49 UTC 2022 kill -USR1 28702 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28702 killed at Tue Sep 27 20:39:49 UTC 2022 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Tue Sep 27 20:39:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:39:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28784 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28784 found at Tue Sep 27 20:39:50 UTC 2022 selfserv_9223 with PID 28784 started at Tue Sep 27 20:39:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1556: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28784 at Tue Sep 27 20:39:50 UTC 2022 kill -USR1 28784 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28784 killed at Tue Sep 27 20:39:50 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:39:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:39:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28826 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28826 found at Tue Sep 27 20:39:50 UTC 2022 selfserv_9223 with PID 28826 started at Tue Sep 27 20:39:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1557: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28826 at Tue Sep 27 20:39:51 UTC 2022 kill -USR1 28826 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28826 killed at Tue Sep 27 20:39:51 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:39:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:39:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28865 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28865 found at Tue Sep 27 20:39:51 UTC 2022 selfserv_9223 with PID 28865 started at Tue Sep 27 20:39:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1558: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 28865 at Tue Sep 27 20:39:51 UTC 2022 kill -USR1 28865 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28865 killed at Tue Sep 27 20:39:52 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:39:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:39:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28904 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28904 found at Tue Sep 27 20:39:52 UTC 2022 selfserv_9223 with PID 28904 started at Tue Sep 27 20:39:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1559: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28904 at Tue Sep 27 20:39:52 UTC 2022 kill -USR1 28904 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28904 killed at Tue Sep 27 20:39:52 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:39:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:39:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28943 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28943 found at Tue Sep 27 20:39:53 UTC 2022 selfserv_9223 with PID 28943 started at Tue Sep 27 20:39:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1560: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 28943 at Tue Sep 27 20:39:53 UTC 2022 kill -USR1 28943 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28943 killed at Tue Sep 27 20:39:53 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:39:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:39:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28982 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28982 found at Tue Sep 27 20:39:53 UTC 2022 selfserv_9223 with PID 28982 started at Tue Sep 27 20:39:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28982 at Tue Sep 27 20:39:54 UTC 2022 kill -USR1 28982 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28982 killed at Tue Sep 27 20:39:54 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:39:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:39:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29021 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29021 found at Tue Sep 27 20:39:54 UTC 2022 selfserv_9223 with PID 29021 started at Tue Sep 27 20:39:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1562: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29021 at Tue Sep 27 20:39:54 UTC 2022 kill -USR1 29021 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29021 killed at Tue Sep 27 20:39:55 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:39:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:39:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29060 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29060 found at Tue Sep 27 20:39:55 UTC 2022 selfserv_9223 with PID 29060 started at Tue Sep 27 20:39:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29060 at Tue Sep 27 20:39:55 UTC 2022 kill -USR1 29060 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29060 killed at Tue Sep 27 20:39:55 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:39:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:39:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29099 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29099 found at Tue Sep 27 20:39:56 UTC 2022 selfserv_9223 with PID 29099 started at Tue Sep 27 20:39:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29099 at Tue Sep 27 20:39:56 UTC 2022 kill -USR1 29099 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29099 killed at Tue Sep 27 20:39:56 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:39:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:39:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29138 found at Tue Sep 27 20:39:56 UTC 2022 selfserv_9223 with PID 29138 started at Tue Sep 27 20:39:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1565: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29138 at Tue Sep 27 20:39:57 UTC 2022 kill -USR1 29138 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29138 killed at Tue Sep 27 20:39:57 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:39:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:39:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29177 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29177 found at Tue Sep 27 20:39:57 UTC 2022 selfserv_9223 with PID 29177 started at Tue Sep 27 20:39:57 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1566: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29177 at Tue Sep 27 20:39:57 UTC 2022 kill -USR1 29177 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29177 killed at Tue Sep 27 20:39:58 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:39:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:39:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29217 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29217 found at Tue Sep 27 20:39:58 UTC 2022 selfserv_9223 with PID 29217 started at Tue Sep 27 20:39:58 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1567: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29217 at Tue Sep 27 20:39:58 UTC 2022 kill -USR1 29217 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29217 killed at Tue Sep 27 20:39:58 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:39:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:39:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29257 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29257 found at Tue Sep 27 20:39:59 UTC 2022 selfserv_9223 with PID 29257 started at Tue Sep 27 20:39:59 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1568: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29257 at Tue Sep 27 20:39:59 UTC 2022 kill -USR1 29257 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29257 killed at Tue Sep 27 20:39:59 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:39:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:39:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29297 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29297 found at Tue Sep 27 20:39:59 UTC 2022 selfserv_9223 with PID 29297 started at Tue Sep 27 20:39:59 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1569: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29297 at Tue Sep 27 20:40:00 UTC 2022 kill -USR1 29297 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29297 killed at Tue Sep 27 20:40:00 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:40:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:40:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29337 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29337 found at Tue Sep 27 20:40:00 UTC 2022 selfserv_9223 with PID 29337 started at Tue Sep 27 20:40:00 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1570: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29337 at Tue Sep 27 20:40:00 UTC 2022 kill -USR1 29337 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29337 killed at Tue Sep 27 20:40:01 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:40:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:40:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29377 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29377 found at Tue Sep 27 20:40:01 UTC 2022 selfserv_9223 with PID 29377 started at Tue Sep 27 20:40:01 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1571: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29377 at Tue Sep 27 20:40:01 UTC 2022 kill -USR1 29377 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29377 killed at Tue Sep 27 20:40:01 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:40:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:40:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29417 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29417 found at Tue Sep 27 20:40:02 UTC 2022 selfserv_9223 with PID 29417 started at Tue Sep 27 20:40:02 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1572: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29417 at Tue Sep 27 20:40:02 UTC 2022 kill -USR1 29417 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29417 killed at Tue Sep 27 20:40:02 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:40:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:40:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29457 found at Tue Sep 27 20:40:02 UTC 2022 selfserv_9223 with PID 29457 started at Tue Sep 27 20:40:02 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1573: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29457 at Tue Sep 27 20:40:03 UTC 2022 kill -USR1 29457 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29457 killed at Tue Sep 27 20:40:03 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 20:40:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 20:40:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29497 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29497 found at Tue Sep 27 20:40:03 UTC 2022 selfserv_9223 with PID 29497 started at Tue Sep 27 20:40:03 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1574: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29497 at Tue Sep 27 20:40:03 UTC 2022 kill -USR1 29497 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29497 killed at Tue Sep 27 20:40:04 UTC 2022 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -fips false -force FIPS mode disabled. ssl.sh: #1575: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/client -list ssl.sh: #1576: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1577: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -fips false -force FIPS mode disabled. ssl.sh: #1578: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/ext_client -list ssl.sh: #1579: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1580: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Tue Sep 27 20:40:04 UTC 2022 Running tests for ocsp TIMESTAMP ocsp BEGIN: Tue Sep 27 20:40:04 UTC 2022 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Tue Sep 27 20:40:05 UTC 2022 Running tests for merge TIMESTAMP merge BEGIN: Tue Sep 27 20:40:05 UTC 2022 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests.v3.3122 -t Test2 -f ../tests.pw merge.sh: #1: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #2: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #3: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #4: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #6: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:18:43 2022 Not After : Mon Sep 27 19:18:43 2027 Subject: "CN=TestUser45,E=TestUser45@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 94:da:68:64:b5:20:a7:e6:fe:56:66:61:07:fd:c3:e2: 5d:65:51:af:3a:62:ac:b9:1b:9e:65:02:1e:ea:44:bf: 67:52:31:6a:73:b7:28:98:0e:d5:1d:b3:91:65:e2:6d: 6b:ce:36:80:de:a6:65:b7:3a:88:28:43:83:bd:ce:8f: 22:3a:c5:09:3e:66:32:3e:36:46:d5:9c:33:ae:d4:06: 44:9f:d4:fd:9a:83:10:40:bd:1f:1e:05:1d:32:a4:70: dd:90:9b:fc:95:80:b2:e6:f8:76:b6:af:db:8e:00:cc: 50:bf:0f:6a:dc:b0:b2:d1:66:24:8a:87:c2:95:5a:8e: 10:3a:2f:d6:73:6b:75:e0:46:8a:54:05:38:8a:0e:04: cf:e3:89:ad:e2:94:39:b3:d0:d8:9e:f5:9d:8e:39:e8: da:c0:19:79:ba:37:6a:d5:bc:8a:06:b3:e6:5f:94:56: 0a:eb:f1:3d:e0:f4:a6:4e:75:f8:c2:81:93:6f:78:b1: 45:4a:e7:4f:ef:5c:15:f3:12:ac:b1:72:b2:d5:17:b5: 97:5b:68:2e:be:95:06:b2:a4:17:51:dc:31:a3:ef:6c: fc:c2:01:94:ef:d6:dc:65:f5:81:0b:35:80:b5:9b:a5: 16:fc:00:9c:95:35:24:70:fc:bf:e0:9e:4e:d7:85:37 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:35:1a:6c:76:45:83:c4:95:80:e7:94:d6:d8:8d:14: 46:93:45:08:f9:28:3d:bb:ad:88:62:04:e6:74:c8:d8: d5:3b:3f:1f:e9:68:2e:86:e8:fd:ce:84:12:f5:fb:4a: f8:94:1e:35:39:2d:c8:fd:93:45:1c:21:54:45:e9:c4: bd:e5:a6:d1:59:c9:3f:b5:e1:93:0f:b6:4a:df:5b:07: a7:3b:8c:1a:db:84:a3:16:23:28:e3:b8:85:10:42:e3: 3c:24:1b:bb:ae:6f:b4:a1:26:c7:ce:3c:19:56:b0:a9: 7c:81:bd:7b:7c:14:62:a6:6c:a7:b3:43:42:5b:34:fe: db:70:ac:93:50:8f:f5:0c:c7:46:32:49:ed:57:4b:c2: ba:41:d5:b9:45:7c:d0:e9:74:9c:97:a7:69:8a:81:e3: e5:d5:c7:43:70:dc:90:d0:13:80:92:42:a3:cb:c8:9c: 44:1b:ee:17:a2:2d:5c:01:c5:f4:6f:d8:db:b9:64:bc: b4:a6:5d:10:2d:f6:7b:79:e3:05:e2:83:55:c6:19:f9: b9:9a:97:d6:e6:e7:b4:1c:f7:07:7c:2d:e0:bb:49:16: 26:57:a7:4c:57:f2:f1:5a:2a:53:8f:3e:1f:00:f7:87: ec:fe:cb:c4:f0:ed:11:d2:d7:65:2f:00:8f:0f:84:ae Fingerprint (SHA-256): 3F:C1:BC:02:CE:93:6E:47:DF:CB:FE:48:38:1D:74:00:B1:B5:45:DE:16:EF:00:7F:35:BD:E9:62:E3:DB:81:CE Fingerprint (SHA1): 4F:AD:9B:66:E4:93:BA:98:2B:08:20:EC:EE:DD:6A:9A:9B:62:C8:16 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #7: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:18:49 2022 Not After : Mon Sep 27 19:18:49 2027 Subject: "CN=TestUser46,E=TestUser46@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:fc:4c:37:06:09:d7:5c:6b:66:d1:4b:48:22:55:de: fa:82:20:7f:a1:66:5e:5f:66:aa:29:db:e9:65:f9:95: fd:ea:ab:ff:0f:32:95:6a:50:48:64:a2:e3:67:86:93: f7:8d:83:b9:70:0d:5e:7a:49:b1:e3:22:39:2a:f6:48: bf:9c:4b:6f:40:50:f9:04:ce:35:14:7a:fe:6b:b7:b5: 53:42:f3:76:1a:9c:16:68:ef:7b:be:3e:3b:70:c2:8d: 79:1d:4a:2d:9a:11:99:2f:87:de:27:52:4e:2f:2e:c4: 16:02:40:f8:92:14:66:11:ab:c6:1f:da:5f:a8:80:30: 5a:4a:e9:2d:c3:61:dc:1f:ab:d7:bc:f6:6c:79:99:fd: e9:c0:43:c3:ea:9c:8c:5d:77:cc:c8:bb:23:02:a8:00: c4:8c:a0:97:a4:5d:bb:11:b0:d5:c3:80:b9:8f:35:a0: 85:6a:bc:8a:22:0b:11:a0:cc:c1:18:33:af:f4:9f:2f: bc:cc:c7:a1:a4:c4:93:b5:44:56:7d:d3:c2:90:26:9a: 58:da:89:64:00:ca:c3:40:f2:53:c7:7d:6f:e5:1d:fa: d7:e4:b1:12:58:f6:ec:57:e3:e3:ce:b3:36:01:d9:b7: 77:42:ee:fe:93:c7:1e:d6:5b:d3:81:94:70:19:d7:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:e4:3e:af:5d:26:58:b2:c6:7f:c7:f5:29:62:86:c3: 37:2c:cb:1a:0d:92:84:52:4a:15:91:43:b7:23:ce:4f: 18:65:f4:e3:cf:06:2c:8e:a9:9c:8a:cb:d1:07:4c:91: d2:22:c6:23:93:9c:74:1e:dc:73:13:30:91:8f:57:ce: 85:ce:58:1c:23:2b:97:86:7e:35:7d:b0:4f:7e:31:9f: 0a:45:43:c4:93:07:6a:fb:55:82:da:e8:ae:d1:f1:27: 2c:a3:04:2a:7b:fc:dd:59:e7:6f:3b:c3:66:43:1c:3c: 55:48:eb:39:74:08:05:bd:19:2c:c5:d6:98:64:48:e8: 95:43:a4:e5:4f:7c:c3:b2:48:46:cd:01:ef:f1:4d:b8: a3:26:93:81:bc:95:2c:b4:36:48:25:59:40:79:b5:4a: a6:c3:d9:16:63:7b:b9:c3:89:37:82:0f:d6:06:a2:19: 3b:30:03:34:5c:30:68:53:3c:f4:fc:09:13:a5:98:3d: f0:7d:12:ac:9f:c4:6f:d6:c8:4f:99:eb:99:d0:16:0e: 54:26:f0:9b:53:06:50:27:9b:0d:2e:90:56:27:9d:64: 08:28:f3:7a:bf:d7:78:6c:1e:e3:9a:c9:f6:c6:cc:11: 50:81:8b:8e:1d:ca:ef:a7:b1:ae:d9:04:7f:89:86:8c Fingerprint (SHA-256): 56:E6:99:95:CF:AE:A9:D2:60:CA:B0:7F:22:3F:EB:12:E2:20:2B:55:CB:58:94:CB:E2:85:B5:03:62:B0:1F:6D Fingerprint (SHA1): A3:CF:5C:AA:80:98:DD:B4:0A:98:E1:6A:5B:E2:6C:A7:DE:66:6D:68 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #8: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #9: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA-dsa CT,C,C Alice-ec u,u,u Dave u,u,u localhost.localdomain-dsamixed ,, localhost-sni.localdomain-rsa-pss u,u,u serverCA-dsa C,C,C chain-2-clientCA-ec ,, Alice #1 ,, Alice-rsa-pss u,u,u Dave-dsa ,, localhost.localdomain-ecmixed ,, localhost-sni.localdomain-dsamixed ,, Alice #99 ,, Alice-dsamixed u,u,u eve@example.com ,, bob-ec@example.com ,, localhost.localdomain u,u,u localhost-sni.localdomain-ecmixed ,, clientCA T,C,C Alice #3 ,, TestCA CT,C,C TestCA-ec CT,C,C Alice-ecmixed u,u,u TestUser-rsa-pss-interop u,u,u Dave-ecmixed ,, localhost.localdomain-dsa ,, localhost.localdomain-rsa-pss u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-ec ,, ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-ec ,, serverCA-ec C,C,C clientCA-dsa T,C,C chain-1-clientCA ,, chain-1-clientCA-ec ,, Alice #2 ,, Alice #4 ,, Alice u,u,u Dave-ec ,, localhost-sni.localdomain-dsa ,, ExtendedSSLUser-dsa ,, ExtendedSSLUser-ecmixed ,, chain-1-clientCA-dsa ,, chain-2-clientCA ,, Alice #100 ,, Alice-dsa u,u,u Dave-rsa-pss u,u,u ExtendedSSLUser-dsamixed ,, chain-2-clientCA-dsa ,, bob@example.com ,, Dave-dsamixed ,, localhost.localdomain-ec ,, clientCA-ec T,C,C CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests.v3.3122 -t Test2 -f ../tests.pw merge.sh: #10: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests.v1.3122 -t Test1 -f ../tests.pw merge.sh: #11: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #12: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . This is a test message from Alice to Bob. merge.sh: #13: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #14: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Tue Sep 27 19:19:37 2022 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Tue Sep 27 19:15:22 2022 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Tue Sep 27 19:19:32 2022 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #15: Verifying TestCA CRL - PASSED TEST_MODE=STANDARD NSS_DEFAULT_DB_TYPE=dbm TIMESTAMP merge END: Tue Sep 27 20:40:10 UTC 2022 Running tests for chains TIMESTAMP chains BEGIN: Tue Sep 27 20:40:10 UTC 2022 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #1: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204011 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #3: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #4: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #5: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #9: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #10: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #14: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #15: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #16: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9234 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #17: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #18: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #19: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #20: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -2 -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #21: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #22: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #23: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #24: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -2 -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #25: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #26: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #27: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #28: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -2 -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #29: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #30: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #31: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #32: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -2 -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #33: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #34: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #35: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #36: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -2 -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #37: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9234 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #38: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #39: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #40: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -2 -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #41: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #42: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #43: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #44: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -2 -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #45: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #46: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #47: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #48: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -2 -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #49: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9234 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #50: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #51: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #52: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -2 -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #53: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #54: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #55: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #56: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -2 -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #57: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #58: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #59: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #60: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -2 -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #61: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9234 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #62: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #63: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20220927204059Z nextupdate=20230927204059Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Tue Sep 27 20:40:59 2022 Next Update: Wed Sep 27 20:40:59 2023 CRL Extensions: chains.sh: #64: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20220927204100Z addcert 2 20220927204100Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Tue Sep 27 20:41:00 2022 Next Update: Wed Sep 27 20:40:59 2023 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Tue Sep 27 20:41:00 2022 CRL Extensions: chains.sh: #65: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20220927204100Z nextupdate=20230927204100Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Tue Sep 27 20:41:00 2022 Next Update: Wed Sep 27 20:41:00 2023 CRL Extensions: chains.sh: #66: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20220927204101Z addcert 2 20220927204101Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Tue Sep 27 20:41:01 2022 Next Update: Wed Sep 27 20:41:00 2023 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Tue Sep 27 20:41:01 2022 CRL Extensions: chains.sh: #67: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20220927204102Z addcert 4 20220927204102Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Tue Sep 27 20:41:02 2022 Next Update: Wed Sep 27 20:41:00 2023 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Tue Sep 27 20:41:01 2022 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Tue Sep 27 20:41:02 2022 CRL Extensions: chains.sh: #68: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20220927204102Z nextupdate=20230927204102Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Tue Sep 27 20:41:02 2022 Next Update: Wed Sep 27 20:41:02 2023 CRL Extensions: chains.sh: #69: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20220927204103Z addcert 2 20220927204103Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Tue Sep 27 20:41:03 2022 Next Update: Wed Sep 27 20:41:02 2023 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Tue Sep 27 20:41:03 2022 CRL Extensions: chains.sh: #70: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20220927204104Z addcert 3 20220927204104Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Tue Sep 27 20:41:04 2022 Next Update: Wed Sep 27 20:41:02 2023 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Tue Sep 27 20:41:03 2022 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Tue Sep 27 20:41:04 2022 CRL Extensions: chains.sh: #71: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20220927204104Z nextupdate=20230927204104Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Tue Sep 27 20:41:04 2022 Next Update: Wed Sep 27 20:41:04 2023 CRL Extensions: chains.sh: #72: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20220927204105Z addcert 2 20220927204105Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Tue Sep 27 20:41:05 2022 Next Update: Wed Sep 27 20:41:04 2023 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Tue Sep 27 20:41:05 2022 CRL Extensions: chains.sh: #73: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20220927204106Z addcert 3 20220927204106Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Tue Sep 27 20:41:06 2022 Next Update: Wed Sep 27 20:41:04 2023 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Tue Sep 27 20:41:05 2022 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Tue Sep 27 20:41:06 2022 CRL Extensions: chains.sh: #74: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #75: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #76: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #77: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #78: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #79: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #80: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #81: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #82: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #83: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #84: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #85: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #86: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #87: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #88: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #89: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #90: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #91: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #92: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #93: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #94: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #95: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #96: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #97: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #98: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #99: IPsec: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204012 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #100: IPsec: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #101: IPsec: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #102: IPsec: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #103: IPsec: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927204013 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #104: IPsec: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #105: IPsec: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB NoKUDB certutil -N -d NoKUDB -f NoKUDB/dbpasswd chains.sh: #106: IPsec: Creating DB NoKUDB - PASSED chains.sh: Creating EE certifiate request NoKUReq.der certutil -s "CN=NoKU EE, O=NoKU, C=US" -R -2 -d NoKUDB -f NoKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o NoKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #107: IPsec: Creating EE certifiate request NoKUReq.der - PASSED chains.sh: Creating certficate NoKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoKUReq.der -o NoKUCA1.der -f CA1DB/dbpasswd -m 927204014 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #108: IPsec: Creating certficate NoKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoKUCA1.der to NoKUDB database certutil -A -n NoKU -t u,u,u -d NoKUDB -f NoKUDB/dbpasswd -i NoKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #109: IPsec: Importing certificate NoKUCA1.der to NoKUDB database - PASSED chains.sh: Creating DB DigSigDB certutil -N -d DigSigDB -f DigSigDB/dbpasswd chains.sh: #110: IPsec: Creating DB DigSigDB - PASSED chains.sh: Creating EE certifiate request DigSigReq.der certutil -s "CN=DigSig EE, O=DigSig, C=US" -R -2 -d DigSigDB -f DigSigDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o DigSigReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #111: IPsec: Creating EE certifiate request DigSigReq.der - PASSED chains.sh: Creating certficate DigSigCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigReq.der -o DigSigCA1.der -f CA1DB/dbpasswd -m 927204015 --keyUsage digitalSignature < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #112: IPsec: Creating certficate DigSigCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigCA1.der to DigSigDB database certutil -A -n DigSig -t u,u,u -d DigSigDB -f DigSigDB/dbpasswd -i DigSigCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #113: IPsec: Importing certificate DigSigCA1.der to DigSigDB database - PASSED chains.sh: Creating DB NonRepDB certutil -N -d NonRepDB -f NonRepDB/dbpasswd chains.sh: #114: IPsec: Creating DB NonRepDB - PASSED chains.sh: Creating EE certifiate request NonRepReq.der certutil -s "CN=NonRep EE, O=NonRep, C=US" -R -2 -d NonRepDB -f NonRepDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o NonRepReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #115: IPsec: Creating EE certifiate request NonRepReq.der - PASSED chains.sh: Creating certficate NonRepCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonRepReq.der -o NonRepCA1.der -f CA1DB/dbpasswd -m 927204016 --keyUsage nonRepudiation < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #116: IPsec: Creating certficate NonRepCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonRepCA1.der to NonRepDB database certutil -A -n NonRep -t u,u,u -d NonRepDB -f NonRepDB/dbpasswd -i NonRepCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #117: IPsec: Importing certificate NonRepCA1.der to NonRepDB database - PASSED chains.sh: Creating DB DigSigNonRepAndExtraDB certutil -N -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd chains.sh: #118: IPsec: Creating DB DigSigNonRepAndExtraDB - PASSED chains.sh: Creating EE certifiate request DigSigNonRepAndExtraReq.der certutil -s "CN=DigSigNonRepAndExtra EE, O=DigSigNonRepAndExtra, C=US" -R -2 -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o DigSigNonRepAndExtraReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #119: IPsec: Creating EE certifiate request DigSigNonRepAndExtraReq.der - PASSED chains.sh: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigNonRepAndExtraReq.der -o DigSigNonRepAndExtraCA1.der -f CA1DB/dbpasswd -m 927204017 --keyUsage digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #120: IPsec: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database certutil -A -n DigSigNonRepAndExtra -t u,u,u -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -i DigSigNonRepAndExtraCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #121: IPsec: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database - PASSED chains.sh: Creating DB NoMatchDB certutil -N -d NoMatchDB -f NoMatchDB/dbpasswd chains.sh: #122: IPsec: Creating DB NoMatchDB - PASSED chains.sh: Creating EE certifiate request NoMatchReq.der certutil -s "CN=NoMatch EE, O=NoMatch, C=US" -R -2 -d NoMatchDB -f NoMatchDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o NoMatchReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #123: IPsec: Creating EE certifiate request NoMatchReq.der - PASSED chains.sh: Creating certficate NoMatchCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoMatchReq.der -o NoMatchCA1.der -f CA1DB/dbpasswd -m 927204018 --keyUsage keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #124: IPsec: Creating certficate NoMatchCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoMatchCA1.der to NoMatchDB database certutil -A -n NoMatch -t u,u,u -d NoMatchDB -f NoMatchDB/dbpasswd -i NoMatchCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #125: IPsec: Importing certificate NoMatchCA1.der to NoMatchDB database - PASSED chains.sh: Creating DB NonCriticalServerAuthEKUDB certutil -N -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd chains.sh: #126: IPsec: Creating DB NonCriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request NonCriticalServerAuthEKUReq.der certutil -s "CN=NonCriticalServerAuthEKU EE, O=NonCriticalServerAuthEKU, C=US" -R -2 -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o NonCriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #127: IPsec: Creating EE certifiate request NonCriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonCriticalServerAuthEKUReq.der -o NonCriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 927204019 --extKeyUsage serverAuth < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #128: IPsec: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database certutil -A -n NonCriticalServerAuthEKU -t u,u,u -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -i NonCriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #129: IPsec: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB NonIPSECEKUDB certutil -N -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd chains.sh: #130: IPsec: Creating DB NonIPSECEKUDB - PASSED chains.sh: Creating EE certifiate request NonIPSECEKUReq.der certutil -s "CN=NonIPSECEKU EE, O=NonIPSECEKU, C=US" -R -2 -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o NonIPSECEKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #131: IPsec: Creating EE certifiate request NonIPSECEKUReq.der - PASSED chains.sh: Creating certficate NonIPSECEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonIPSECEKUReq.der -o NonIPSECEKUCA1.der -f CA1DB/dbpasswd -m 927204020 --extKeyUsage codeSigning < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #132: IPsec: Creating certficate NonIPSECEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database certutil -A -n NonIPSECEKU -t u,u,u -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -i NonIPSECEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #133: IPsec: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database - PASSED chains.sh: Creating DB CriticalServerAuthEKUDB certutil -N -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd chains.sh: #134: IPsec: Creating DB CriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request CriticalServerAuthEKUReq.der certutil -s "CN=CriticalServerAuthEKU EE, O=CriticalServerAuthEKU, C=US" -R -2 -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #135: IPsec: Creating EE certifiate request CriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CriticalServerAuthEKUReq.der -o CriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 927204021 --keyUsage digitalSignature --extKeyUsage critical,serverAuth < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #136: IPsec: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database certutil -A -n CriticalServerAuthEKU -t u,u,u -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -i CriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #137: IPsec: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB EKUIPsecIKEDB certutil -N -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd chains.sh: #138: IPsec: Creating DB EKUIPsecIKEDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEReq.der certutil -s "CN=EKUIPsecIKE EE, O=EKUIPsecIKE, C=US" -R -2 -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EKUIPsecIKEReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #139: IPsec: Creating EE certifiate request EKUIPsecIKEReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKECA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEReq.der -o EKUIPsecIKECA1.der -f CA1DB/dbpasswd -m 927204022 --keyUsage digitalSignature --extKeyUsage critical,ipsecIKE < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #140: IPsec: Creating certficate EKUIPsecIKECA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database certutil -A -n EKUIPsecIKE -t u,u,u -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -i EKUIPsecIKECA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #141: IPsec: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database - PASSED chains.sh: Creating DB EKUIPsecIKEEndDB certutil -N -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd chains.sh: #142: IPsec: Creating DB EKUIPsecIKEEndDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEEndReq.der certutil -s "CN=EKUIPsecIKEEnd EE, O=EKUIPsecIKEEnd, C=US" -R -2 -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EKUIPsecIKEEndReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #143: IPsec: Creating EE certifiate request EKUIPsecIKEEndReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEEndReq.der -o EKUIPsecIKEEndCA1.der -f CA1DB/dbpasswd -m 927204023 --keyUsage digitalSignature --extKeyUsage ipsecIKEEnd < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #144: IPsec: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database certutil -A -n EKUIPsecIKEEnd -t u,u,u -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -i EKUIPsecIKEEndCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #145: IPsec: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database - PASSED chains.sh: Creating DB EKUIPsecIKEIntermediateDB certutil -N -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd chains.sh: #146: IPsec: Creating DB EKUIPsecIKEIntermediateDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der certutil -s "CN=EKUIPsecIKEIntermediate EE, O=EKUIPsecIKEIntermediate, C=US" -R -2 -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EKUIPsecIKEIntermediateReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #147: IPsec: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEIntermediateReq.der -o EKUIPsecIKEIntermediateCA1.der -f CA1DB/dbpasswd -m 927204024 --keyUsage digitalSignature --extKeyUsage codeSigning,serverAuth,ipsecIKEIntermediate < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #148: IPsec: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database certutil -A -n EKUIPsecIKEIntermediate -t u,u,u -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -i EKUIPsecIKEIntermediateCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #149: IPsec: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database - PASSED chains.sh: Creating DB EKUAnyDB certutil -N -d EKUAnyDB -f EKUAnyDB/dbpasswd chains.sh: #150: IPsec: Creating DB EKUAnyDB - PASSED chains.sh: Creating EE certifiate request EKUAnyReq.der certutil -s "CN=EKUAny EE, O=EKUAny, C=US" -R -2 -d EKUAnyDB -f EKUAnyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EKUAnyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #151: IPsec: Creating EE certifiate request EKUAnyReq.der - PASSED chains.sh: Creating certficate EKUAnyCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUAnyReq.der -o EKUAnyCA1.der -f CA1DB/dbpasswd -m 927204025 --keyUsage digitalSignature --extKeyUsage x509Any < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #152: IPsec: Creating certficate EKUAnyCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUAnyCA1.der to EKUAnyDB database certutil -A -n EKUAny -t u,u,u -d EKUAnyDB -f EKUAnyDB/dbpasswd -i EKUAnyCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #153: IPsec: Importing certificate EKUAnyCA1.der to EKUAnyDB database - PASSED chains.sh: Creating DB EKUEmailDB certutil -N -d EKUEmailDB -f EKUEmailDB/dbpasswd chains.sh: #154: IPsec: Creating DB EKUEmailDB - PASSED chains.sh: Creating EE certifiate request EKUEmailReq.der certutil -s "CN=EKUEmail EE, O=EKUEmail, C=US" -R -2 -d EKUEmailDB -f EKUEmailDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EKUEmailReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #155: IPsec: Creating EE certifiate request EKUEmailReq.der - PASSED chains.sh: Creating certficate EKUEmailCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUEmailReq.der -o EKUEmailCA1.der -f CA1DB/dbpasswd -m 927204026 --keyUsage digitalSignature --extKeyUsage emailProtection < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #156: IPsec: Creating certficate EKUEmailCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUEmailCA1.der to EKUEmailDB database certutil -A -n EKUEmail -t u,u,u -d EKUEmailDB -f EKUEmailDB/dbpasswd -i EKUEmailCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #157: IPsec: Importing certificate EKUEmailCA1.der to EKUEmailDB database - PASSED chains.sh: Creating DB EKUIPsecUserDB certutil -N -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd chains.sh: #158: IPsec: Creating DB EKUIPsecUserDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecUserReq.der certutil -s "CN=EKUIPsecUser EE, O=EKUIPsecUser, C=US" -R -2 -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EKUIPsecUserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #159: IPsec: Creating EE certifiate request EKUIPsecUserReq.der - PASSED chains.sh: Creating certficate EKUIPsecUserCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecUserReq.der -o EKUIPsecUserCA1.der -f CA1DB/dbpasswd -m 927204027 --keyUsage digitalSignature --extKeyUsage ipsecUser < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #160: IPsec: Creating certficate EKUIPsecUserCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database certutil -A -n EKUIPsecUser -t u,u,u -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -i EKUIPsecUserCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #161: IPsec: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #162: IPsec: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,," -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #163: IPsec: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #164: IPsec: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204012 (0x374402ac) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:41:34 2022 Not After : Tue Sep 27 20:41:34 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:60:9e:54:89:23:c6:50:88:b3:60:5a:bf:6a:cf:c1: ec:13:69:98:f8:e0:49:b5:b7:f4:de:e1:c4:1e:b1:de: 37:8c:c9:c5:77:39:d6:5c:08:a5:ad:e9:9f:38:ed:d5: 6c:f6:9f:71:43:d2:bc:76:e6:2f:60:dc:9c:49:f4:4a: 22:e1:ec:00:59:c4:2c:95:8e:60:25:a7:3f:04:78:ae: bf:86:ac:53:23:48:a7:d1:38:93:c2:af:ca:3b:44:6a: a4:fa:a2:57:4c:8a:e2:9f:f4:91:24:03:6e:39:a1:f7: 9a:c8:76:26:a6:7a:a5:a9:11:1e:40:6d:78:a2:02:23: a2:78:0a:b2:10:6a:47:ce:bf:a7:15:00:c6:1d:1d:1c: 13:95:24:97:dd:d1:cc:34:7d:07:2c:b7:6a:d5:09:bb: e4:f9:08:64:ec:6d:66:c1:8f:bb:2d:2b:87:c2:ea:43: 3b:90:30:22:16:f3:61:ce:16:08:24:ec:bb:db:78:e2: 55:d0:75:91:b9:c6:89:1d:8a:6d:ba:86:77:a3:b7:13: fa:09:00:f5:43:60:27:37:20:00:a3:06:e1:bd:e3:dd: 73:47:f5:17:38:79:79:51:c7:f2:0d:c7:ee:00:4f:e6: fa:61:12:6d:2d:7b:21:65:34:9d:1d:d9:10:b2:04:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:15:59:72:d7:f2:d0:cb:9d:b8:46:ba:b6:0a:bb:c2: 1c:70:de:6f:e7:3d:81:d8:64:0d:4c:32:61:12:c3:90: e4:37:30:ea:48:af:2f:b7:b8:26:a1:e4:05:6c:97:73: 55:06:a3:2d:60:27:51:a6:66:60:32:77:6d:0b:d3:8d: 76:50:58:f1:c8:c7:17:3d:34:c8:3c:dd:5d:5f:10:43: 7c:ca:56:a6:b0:39:28:1b:cd:26:4a:57:02:0a:b9:5c: 3f:1f:3b:12:f8:68:e8:0d:ad:15:f8:a5:75:81:e9:34: cd:d2:30:a4:9d:11:4f:ee:fc:2b:dd:24:15:90:d1:eb: 2c:ef:6d:75:8d:76:4d:5d:08:17:76:7b:67:da:e7:4c: ab:8c:5e:d0:fc:96:68:5f:28:c5:5a:0e:67:74:76:38: e6:f6:33:83:f2:44:3e:d1:91:42:21:8a:5e:f9:64:07: f7:8f:40:77:2c:d6:bc:5d:dd:87:3f:11:70:ab:69:3b: 36:5c:88:9c:c5:02:f0:68:3f:28:52:7b:08:ff:86:5f: f9:78:7a:1d:af:55:4b:d5:95:0b:8f:07:51:90:d0:48: 88:21:b4:32:28:13:45:73:49:f0:89:4f:83:03:c6:71: 20:1e:b6:11:25:cf:f8:85:0b:66:75:93:cf:83:7f:2f Fingerprint (SHA-256): 4D:5B:E9:CA:C5:F9:8B:A4:36:E8:39:5F:54:4A:6A:F8:88:8D:71:37:D3:D3:D1:2E:D5:15:CB:30:96:E7:7D:65 Fingerprint (SHA1): 36:BE:0D:E4:2A:4C:4D:C7:28:02:BE:B3:42:2E:7D:45:74:0E:77:9E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NoKU EE,O=NoKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #165: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #166: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #167: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204012 (0x374402ac) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:41:34 2022 Not After : Tue Sep 27 20:41:34 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:60:9e:54:89:23:c6:50:88:b3:60:5a:bf:6a:cf:c1: ec:13:69:98:f8:e0:49:b5:b7:f4:de:e1:c4:1e:b1:de: 37:8c:c9:c5:77:39:d6:5c:08:a5:ad:e9:9f:38:ed:d5: 6c:f6:9f:71:43:d2:bc:76:e6:2f:60:dc:9c:49:f4:4a: 22:e1:ec:00:59:c4:2c:95:8e:60:25:a7:3f:04:78:ae: bf:86:ac:53:23:48:a7:d1:38:93:c2:af:ca:3b:44:6a: a4:fa:a2:57:4c:8a:e2:9f:f4:91:24:03:6e:39:a1:f7: 9a:c8:76:26:a6:7a:a5:a9:11:1e:40:6d:78:a2:02:23: a2:78:0a:b2:10:6a:47:ce:bf:a7:15:00:c6:1d:1d:1c: 13:95:24:97:dd:d1:cc:34:7d:07:2c:b7:6a:d5:09:bb: e4:f9:08:64:ec:6d:66:c1:8f:bb:2d:2b:87:c2:ea:43: 3b:90:30:22:16:f3:61:ce:16:08:24:ec:bb:db:78:e2: 55:d0:75:91:b9:c6:89:1d:8a:6d:ba:86:77:a3:b7:13: fa:09:00:f5:43:60:27:37:20:00:a3:06:e1:bd:e3:dd: 73:47:f5:17:38:79:79:51:c7:f2:0d:c7:ee:00:4f:e6: fa:61:12:6d:2d:7b:21:65:34:9d:1d:d9:10:b2:04:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:15:59:72:d7:f2:d0:cb:9d:b8:46:ba:b6:0a:bb:c2: 1c:70:de:6f:e7:3d:81:d8:64:0d:4c:32:61:12:c3:90: e4:37:30:ea:48:af:2f:b7:b8:26:a1:e4:05:6c:97:73: 55:06:a3:2d:60:27:51:a6:66:60:32:77:6d:0b:d3:8d: 76:50:58:f1:c8:c7:17:3d:34:c8:3c:dd:5d:5f:10:43: 7c:ca:56:a6:b0:39:28:1b:cd:26:4a:57:02:0a:b9:5c: 3f:1f:3b:12:f8:68:e8:0d:ad:15:f8:a5:75:81:e9:34: cd:d2:30:a4:9d:11:4f:ee:fc:2b:dd:24:15:90:d1:eb: 2c:ef:6d:75:8d:76:4d:5d:08:17:76:7b:67:da:e7:4c: ab:8c:5e:d0:fc:96:68:5f:28:c5:5a:0e:67:74:76:38: e6:f6:33:83:f2:44:3e:d1:91:42:21:8a:5e:f9:64:07: f7:8f:40:77:2c:d6:bc:5d:dd:87:3f:11:70:ab:69:3b: 36:5c:88:9c:c5:02:f0:68:3f:28:52:7b:08:ff:86:5f: f9:78:7a:1d:af:55:4b:d5:95:0b:8f:07:51:90:d0:48: 88:21:b4:32:28:13:45:73:49:f0:89:4f:83:03:c6:71: 20:1e:b6:11:25:cf:f8:85:0b:66:75:93:cf:83:7f:2f Fingerprint (SHA-256): 4D:5B:E9:CA:C5:F9:8B:A4:36:E8:39:5F:54:4A:6A:F8:88:8D:71:37:D3:D3:D1:2E:D5:15:CB:30:96:E7:7D:65 Fingerprint (SHA1): 36:BE:0D:E4:2A:4C:4D:C7:28:02:BE:B3:42:2E:7D:45:74:0E:77:9E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSig EE,O=DigSig,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #168: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #169: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #170: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonRepCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204012 (0x374402ac) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:41:34 2022 Not After : Tue Sep 27 20:41:34 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:60:9e:54:89:23:c6:50:88:b3:60:5a:bf:6a:cf:c1: ec:13:69:98:f8:e0:49:b5:b7:f4:de:e1:c4:1e:b1:de: 37:8c:c9:c5:77:39:d6:5c:08:a5:ad:e9:9f:38:ed:d5: 6c:f6:9f:71:43:d2:bc:76:e6:2f:60:dc:9c:49:f4:4a: 22:e1:ec:00:59:c4:2c:95:8e:60:25:a7:3f:04:78:ae: bf:86:ac:53:23:48:a7:d1:38:93:c2:af:ca:3b:44:6a: a4:fa:a2:57:4c:8a:e2:9f:f4:91:24:03:6e:39:a1:f7: 9a:c8:76:26:a6:7a:a5:a9:11:1e:40:6d:78:a2:02:23: a2:78:0a:b2:10:6a:47:ce:bf:a7:15:00:c6:1d:1d:1c: 13:95:24:97:dd:d1:cc:34:7d:07:2c:b7:6a:d5:09:bb: e4:f9:08:64:ec:6d:66:c1:8f:bb:2d:2b:87:c2:ea:43: 3b:90:30:22:16:f3:61:ce:16:08:24:ec:bb:db:78:e2: 55:d0:75:91:b9:c6:89:1d:8a:6d:ba:86:77:a3:b7:13: fa:09:00:f5:43:60:27:37:20:00:a3:06:e1:bd:e3:dd: 73:47:f5:17:38:79:79:51:c7:f2:0d:c7:ee:00:4f:e6: fa:61:12:6d:2d:7b:21:65:34:9d:1d:d9:10:b2:04:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:15:59:72:d7:f2:d0:cb:9d:b8:46:ba:b6:0a:bb:c2: 1c:70:de:6f:e7:3d:81:d8:64:0d:4c:32:61:12:c3:90: e4:37:30:ea:48:af:2f:b7:b8:26:a1:e4:05:6c:97:73: 55:06:a3:2d:60:27:51:a6:66:60:32:77:6d:0b:d3:8d: 76:50:58:f1:c8:c7:17:3d:34:c8:3c:dd:5d:5f:10:43: 7c:ca:56:a6:b0:39:28:1b:cd:26:4a:57:02:0a:b9:5c: 3f:1f:3b:12:f8:68:e8:0d:ad:15:f8:a5:75:81:e9:34: cd:d2:30:a4:9d:11:4f:ee:fc:2b:dd:24:15:90:d1:eb: 2c:ef:6d:75:8d:76:4d:5d:08:17:76:7b:67:da:e7:4c: ab:8c:5e:d0:fc:96:68:5f:28:c5:5a:0e:67:74:76:38: e6:f6:33:83:f2:44:3e:d1:91:42:21:8a:5e:f9:64:07: f7:8f:40:77:2c:d6:bc:5d:dd:87:3f:11:70:ab:69:3b: 36:5c:88:9c:c5:02:f0:68:3f:28:52:7b:08:ff:86:5f: f9:78:7a:1d:af:55:4b:d5:95:0b:8f:07:51:90:d0:48: 88:21:b4:32:28:13:45:73:49:f0:89:4f:83:03:c6:71: 20:1e:b6:11:25:cf:f8:85:0b:66:75:93:cf:83:7f:2f Fingerprint (SHA-256): 4D:5B:E9:CA:C5:F9:8B:A4:36:E8:39:5F:54:4A:6A:F8:88:8D:71:37:D3:D3:D1:2E:D5:15:CB:30:96:E7:7D:65 Fingerprint (SHA1): 36:BE:0D:E4:2A:4C:4D:C7:28:02:BE:B3:42:2E:7D:45:74:0E:77:9E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonRep EE,O=NonRep,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #171: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #172: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #173: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204012 (0x374402ac) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:41:34 2022 Not After : Tue Sep 27 20:41:34 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:60:9e:54:89:23:c6:50:88:b3:60:5a:bf:6a:cf:c1: ec:13:69:98:f8:e0:49:b5:b7:f4:de:e1:c4:1e:b1:de: 37:8c:c9:c5:77:39:d6:5c:08:a5:ad:e9:9f:38:ed:d5: 6c:f6:9f:71:43:d2:bc:76:e6:2f:60:dc:9c:49:f4:4a: 22:e1:ec:00:59:c4:2c:95:8e:60:25:a7:3f:04:78:ae: bf:86:ac:53:23:48:a7:d1:38:93:c2:af:ca:3b:44:6a: a4:fa:a2:57:4c:8a:e2:9f:f4:91:24:03:6e:39:a1:f7: 9a:c8:76:26:a6:7a:a5:a9:11:1e:40:6d:78:a2:02:23: a2:78:0a:b2:10:6a:47:ce:bf:a7:15:00:c6:1d:1d:1c: 13:95:24:97:dd:d1:cc:34:7d:07:2c:b7:6a:d5:09:bb: e4:f9:08:64:ec:6d:66:c1:8f:bb:2d:2b:87:c2:ea:43: 3b:90:30:22:16:f3:61:ce:16:08:24:ec:bb:db:78:e2: 55:d0:75:91:b9:c6:89:1d:8a:6d:ba:86:77:a3:b7:13: fa:09:00:f5:43:60:27:37:20:00:a3:06:e1:bd:e3:dd: 73:47:f5:17:38:79:79:51:c7:f2:0d:c7:ee:00:4f:e6: fa:61:12:6d:2d:7b:21:65:34:9d:1d:d9:10:b2:04:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:15:59:72:d7:f2:d0:cb:9d:b8:46:ba:b6:0a:bb:c2: 1c:70:de:6f:e7:3d:81:d8:64:0d:4c:32:61:12:c3:90: e4:37:30:ea:48:af:2f:b7:b8:26:a1:e4:05:6c:97:73: 55:06:a3:2d:60:27:51:a6:66:60:32:77:6d:0b:d3:8d: 76:50:58:f1:c8:c7:17:3d:34:c8:3c:dd:5d:5f:10:43: 7c:ca:56:a6:b0:39:28:1b:cd:26:4a:57:02:0a:b9:5c: 3f:1f:3b:12:f8:68:e8:0d:ad:15:f8:a5:75:81:e9:34: cd:d2:30:a4:9d:11:4f:ee:fc:2b:dd:24:15:90:d1:eb: 2c:ef:6d:75:8d:76:4d:5d:08:17:76:7b:67:da:e7:4c: ab:8c:5e:d0:fc:96:68:5f:28:c5:5a:0e:67:74:76:38: e6:f6:33:83:f2:44:3e:d1:91:42:21:8a:5e:f9:64:07: f7:8f:40:77:2c:d6:bc:5d:dd:87:3f:11:70:ab:69:3b: 36:5c:88:9c:c5:02:f0:68:3f:28:52:7b:08:ff:86:5f: f9:78:7a:1d:af:55:4b:d5:95:0b:8f:07:51:90:d0:48: 88:21:b4:32:28:13:45:73:49:f0:89:4f:83:03:c6:71: 20:1e:b6:11:25:cf:f8:85:0b:66:75:93:cf:83:7f:2f Fingerprint (SHA-256): 4D:5B:E9:CA:C5:F9:8B:A4:36:E8:39:5F:54:4A:6A:F8:88:8D:71:37:D3:D3:D1:2E:D5:15:CB:30:96:E7:7D:65 Fingerprint (SHA1): 36:BE:0D:E4:2A:4C:4D:C7:28:02:BE:B3:42:2E:7D:45:74:0E:77:9E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSigNonRepAndExtra EE,O=DigSigNonRepAndExtra,C=U S" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #174: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #175: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #176: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #177: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #178: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #179: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #180: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #181: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #182: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204012 (0x374402ac) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:41:34 2022 Not After : Tue Sep 27 20:41:34 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:60:9e:54:89:23:c6:50:88:b3:60:5a:bf:6a:cf:c1: ec:13:69:98:f8:e0:49:b5:b7:f4:de:e1:c4:1e:b1:de: 37:8c:c9:c5:77:39:d6:5c:08:a5:ad:e9:9f:38:ed:d5: 6c:f6:9f:71:43:d2:bc:76:e6:2f:60:dc:9c:49:f4:4a: 22:e1:ec:00:59:c4:2c:95:8e:60:25:a7:3f:04:78:ae: bf:86:ac:53:23:48:a7:d1:38:93:c2:af:ca:3b:44:6a: a4:fa:a2:57:4c:8a:e2:9f:f4:91:24:03:6e:39:a1:f7: 9a:c8:76:26:a6:7a:a5:a9:11:1e:40:6d:78:a2:02:23: a2:78:0a:b2:10:6a:47:ce:bf:a7:15:00:c6:1d:1d:1c: 13:95:24:97:dd:d1:cc:34:7d:07:2c:b7:6a:d5:09:bb: e4:f9:08:64:ec:6d:66:c1:8f:bb:2d:2b:87:c2:ea:43: 3b:90:30:22:16:f3:61:ce:16:08:24:ec:bb:db:78:e2: 55:d0:75:91:b9:c6:89:1d:8a:6d:ba:86:77:a3:b7:13: fa:09:00:f5:43:60:27:37:20:00:a3:06:e1:bd:e3:dd: 73:47:f5:17:38:79:79:51:c7:f2:0d:c7:ee:00:4f:e6: fa:61:12:6d:2d:7b:21:65:34:9d:1d:d9:10:b2:04:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:15:59:72:d7:f2:d0:cb:9d:b8:46:ba:b6:0a:bb:c2: 1c:70:de:6f:e7:3d:81:d8:64:0d:4c:32:61:12:c3:90: e4:37:30:ea:48:af:2f:b7:b8:26:a1:e4:05:6c:97:73: 55:06:a3:2d:60:27:51:a6:66:60:32:77:6d:0b:d3:8d: 76:50:58:f1:c8:c7:17:3d:34:c8:3c:dd:5d:5f:10:43: 7c:ca:56:a6:b0:39:28:1b:cd:26:4a:57:02:0a:b9:5c: 3f:1f:3b:12:f8:68:e8:0d:ad:15:f8:a5:75:81:e9:34: cd:d2:30:a4:9d:11:4f:ee:fc:2b:dd:24:15:90:d1:eb: 2c:ef:6d:75:8d:76:4d:5d:08:17:76:7b:67:da:e7:4c: ab:8c:5e:d0:fc:96:68:5f:28:c5:5a:0e:67:74:76:38: e6:f6:33:83:f2:44:3e:d1:91:42:21:8a:5e:f9:64:07: f7:8f:40:77:2c:d6:bc:5d:dd:87:3f:11:70:ab:69:3b: 36:5c:88:9c:c5:02:f0:68:3f:28:52:7b:08:ff:86:5f: f9:78:7a:1d:af:55:4b:d5:95:0b:8f:07:51:90:d0:48: 88:21:b4:32:28:13:45:73:49:f0:89:4f:83:03:c6:71: 20:1e:b6:11:25:cf:f8:85:0b:66:75:93:cf:83:7f:2f Fingerprint (SHA-256): 4D:5B:E9:CA:C5:F9:8B:A4:36:E8:39:5F:54:4A:6A:F8:88:8D:71:37:D3:D3:D1:2E:D5:15:CB:30:96:E7:7D:65 Fingerprint (SHA1): 36:BE:0D:E4:2A:4C:4D:C7:28:02:BE:B3:42:2E:7D:45:74:0E:77:9E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonCriticalServerAuthEKU EE,O=NonCriticalServerAut hEKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #183: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #184: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #185: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204012 (0x374402ac) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:41:34 2022 Not After : Tue Sep 27 20:41:34 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:60:9e:54:89:23:c6:50:88:b3:60:5a:bf:6a:cf:c1: ec:13:69:98:f8:e0:49:b5:b7:f4:de:e1:c4:1e:b1:de: 37:8c:c9:c5:77:39:d6:5c:08:a5:ad:e9:9f:38:ed:d5: 6c:f6:9f:71:43:d2:bc:76:e6:2f:60:dc:9c:49:f4:4a: 22:e1:ec:00:59:c4:2c:95:8e:60:25:a7:3f:04:78:ae: bf:86:ac:53:23:48:a7:d1:38:93:c2:af:ca:3b:44:6a: a4:fa:a2:57:4c:8a:e2:9f:f4:91:24:03:6e:39:a1:f7: 9a:c8:76:26:a6:7a:a5:a9:11:1e:40:6d:78:a2:02:23: a2:78:0a:b2:10:6a:47:ce:bf:a7:15:00:c6:1d:1d:1c: 13:95:24:97:dd:d1:cc:34:7d:07:2c:b7:6a:d5:09:bb: e4:f9:08:64:ec:6d:66:c1:8f:bb:2d:2b:87:c2:ea:43: 3b:90:30:22:16:f3:61:ce:16:08:24:ec:bb:db:78:e2: 55:d0:75:91:b9:c6:89:1d:8a:6d:ba:86:77:a3:b7:13: fa:09:00:f5:43:60:27:37:20:00:a3:06:e1:bd:e3:dd: 73:47:f5:17:38:79:79:51:c7:f2:0d:c7:ee:00:4f:e6: fa:61:12:6d:2d:7b:21:65:34:9d:1d:d9:10:b2:04:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:15:59:72:d7:f2:d0:cb:9d:b8:46:ba:b6:0a:bb:c2: 1c:70:de:6f:e7:3d:81:d8:64:0d:4c:32:61:12:c3:90: e4:37:30:ea:48:af:2f:b7:b8:26:a1:e4:05:6c:97:73: 55:06:a3:2d:60:27:51:a6:66:60:32:77:6d:0b:d3:8d: 76:50:58:f1:c8:c7:17:3d:34:c8:3c:dd:5d:5f:10:43: 7c:ca:56:a6:b0:39:28:1b:cd:26:4a:57:02:0a:b9:5c: 3f:1f:3b:12:f8:68:e8:0d:ad:15:f8:a5:75:81:e9:34: cd:d2:30:a4:9d:11:4f:ee:fc:2b:dd:24:15:90:d1:eb: 2c:ef:6d:75:8d:76:4d:5d:08:17:76:7b:67:da:e7:4c: ab:8c:5e:d0:fc:96:68:5f:28:c5:5a:0e:67:74:76:38: e6:f6:33:83:f2:44:3e:d1:91:42:21:8a:5e:f9:64:07: f7:8f:40:77:2c:d6:bc:5d:dd:87:3f:11:70:ab:69:3b: 36:5c:88:9c:c5:02:f0:68:3f:28:52:7b:08:ff:86:5f: f9:78:7a:1d:af:55:4b:d5:95:0b:8f:07:51:90:d0:48: 88:21:b4:32:28:13:45:73:49:f0:89:4f:83:03:c6:71: 20:1e:b6:11:25:cf:f8:85:0b:66:75:93:cf:83:7f:2f Fingerprint (SHA-256): 4D:5B:E9:CA:C5:F9:8B:A4:36:E8:39:5F:54:4A:6A:F8:88:8D:71:37:D3:D3:D1:2E:D5:15:CB:30:96:E7:7D:65 Fingerprint (SHA1): 36:BE:0D:E4:2A:4C:4D:C7:28:02:BE:B3:42:2E:7D:45:74:0E:77:9E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=CriticalServerAuthEKU EE,O=CriticalServerAuthEKU,C =US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #186: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #187: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #188: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKECA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204012 (0x374402ac) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:41:34 2022 Not After : Tue Sep 27 20:41:34 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:60:9e:54:89:23:c6:50:88:b3:60:5a:bf:6a:cf:c1: ec:13:69:98:f8:e0:49:b5:b7:f4:de:e1:c4:1e:b1:de: 37:8c:c9:c5:77:39:d6:5c:08:a5:ad:e9:9f:38:ed:d5: 6c:f6:9f:71:43:d2:bc:76:e6:2f:60:dc:9c:49:f4:4a: 22:e1:ec:00:59:c4:2c:95:8e:60:25:a7:3f:04:78:ae: bf:86:ac:53:23:48:a7:d1:38:93:c2:af:ca:3b:44:6a: a4:fa:a2:57:4c:8a:e2:9f:f4:91:24:03:6e:39:a1:f7: 9a:c8:76:26:a6:7a:a5:a9:11:1e:40:6d:78:a2:02:23: a2:78:0a:b2:10:6a:47:ce:bf:a7:15:00:c6:1d:1d:1c: 13:95:24:97:dd:d1:cc:34:7d:07:2c:b7:6a:d5:09:bb: e4:f9:08:64:ec:6d:66:c1:8f:bb:2d:2b:87:c2:ea:43: 3b:90:30:22:16:f3:61:ce:16:08:24:ec:bb:db:78:e2: 55:d0:75:91:b9:c6:89:1d:8a:6d:ba:86:77:a3:b7:13: fa:09:00:f5:43:60:27:37:20:00:a3:06:e1:bd:e3:dd: 73:47:f5:17:38:79:79:51:c7:f2:0d:c7:ee:00:4f:e6: fa:61:12:6d:2d:7b:21:65:34:9d:1d:d9:10:b2:04:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:15:59:72:d7:f2:d0:cb:9d:b8:46:ba:b6:0a:bb:c2: 1c:70:de:6f:e7:3d:81:d8:64:0d:4c:32:61:12:c3:90: e4:37:30:ea:48:af:2f:b7:b8:26:a1:e4:05:6c:97:73: 55:06:a3:2d:60:27:51:a6:66:60:32:77:6d:0b:d3:8d: 76:50:58:f1:c8:c7:17:3d:34:c8:3c:dd:5d:5f:10:43: 7c:ca:56:a6:b0:39:28:1b:cd:26:4a:57:02:0a:b9:5c: 3f:1f:3b:12:f8:68:e8:0d:ad:15:f8:a5:75:81:e9:34: cd:d2:30:a4:9d:11:4f:ee:fc:2b:dd:24:15:90:d1:eb: 2c:ef:6d:75:8d:76:4d:5d:08:17:76:7b:67:da:e7:4c: ab:8c:5e:d0:fc:96:68:5f:28:c5:5a:0e:67:74:76:38: e6:f6:33:83:f2:44:3e:d1:91:42:21:8a:5e:f9:64:07: f7:8f:40:77:2c:d6:bc:5d:dd:87:3f:11:70:ab:69:3b: 36:5c:88:9c:c5:02:f0:68:3f:28:52:7b:08:ff:86:5f: f9:78:7a:1d:af:55:4b:d5:95:0b:8f:07:51:90:d0:48: 88:21:b4:32:28:13:45:73:49:f0:89:4f:83:03:c6:71: 20:1e:b6:11:25:cf:f8:85:0b:66:75:93:cf:83:7f:2f Fingerprint (SHA-256): 4D:5B:E9:CA:C5:F9:8B:A4:36:E8:39:5F:54:4A:6A:F8:88:8D:71:37:D3:D3:D1:2E:D5:15:CB:30:96:E7:7D:65 Fingerprint (SHA1): 36:BE:0D:E4:2A:4C:4D:C7:28:02:BE:B3:42:2E:7D:45:74:0E:77:9E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKE EE,O=EKUIPsecIKE,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #189: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #190: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #191: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204012 (0x374402ac) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:41:34 2022 Not After : Tue Sep 27 20:41:34 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:60:9e:54:89:23:c6:50:88:b3:60:5a:bf:6a:cf:c1: ec:13:69:98:f8:e0:49:b5:b7:f4:de:e1:c4:1e:b1:de: 37:8c:c9:c5:77:39:d6:5c:08:a5:ad:e9:9f:38:ed:d5: 6c:f6:9f:71:43:d2:bc:76:e6:2f:60:dc:9c:49:f4:4a: 22:e1:ec:00:59:c4:2c:95:8e:60:25:a7:3f:04:78:ae: bf:86:ac:53:23:48:a7:d1:38:93:c2:af:ca:3b:44:6a: a4:fa:a2:57:4c:8a:e2:9f:f4:91:24:03:6e:39:a1:f7: 9a:c8:76:26:a6:7a:a5:a9:11:1e:40:6d:78:a2:02:23: a2:78:0a:b2:10:6a:47:ce:bf:a7:15:00:c6:1d:1d:1c: 13:95:24:97:dd:d1:cc:34:7d:07:2c:b7:6a:d5:09:bb: e4:f9:08:64:ec:6d:66:c1:8f:bb:2d:2b:87:c2:ea:43: 3b:90:30:22:16:f3:61:ce:16:08:24:ec:bb:db:78:e2: 55:d0:75:91:b9:c6:89:1d:8a:6d:ba:86:77:a3:b7:13: fa:09:00:f5:43:60:27:37:20:00:a3:06:e1:bd:e3:dd: 73:47:f5:17:38:79:79:51:c7:f2:0d:c7:ee:00:4f:e6: fa:61:12:6d:2d:7b:21:65:34:9d:1d:d9:10:b2:04:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:15:59:72:d7:f2:d0:cb:9d:b8:46:ba:b6:0a:bb:c2: 1c:70:de:6f:e7:3d:81:d8:64:0d:4c:32:61:12:c3:90: e4:37:30:ea:48:af:2f:b7:b8:26:a1:e4:05:6c:97:73: 55:06:a3:2d:60:27:51:a6:66:60:32:77:6d:0b:d3:8d: 76:50:58:f1:c8:c7:17:3d:34:c8:3c:dd:5d:5f:10:43: 7c:ca:56:a6:b0:39:28:1b:cd:26:4a:57:02:0a:b9:5c: 3f:1f:3b:12:f8:68:e8:0d:ad:15:f8:a5:75:81:e9:34: cd:d2:30:a4:9d:11:4f:ee:fc:2b:dd:24:15:90:d1:eb: 2c:ef:6d:75:8d:76:4d:5d:08:17:76:7b:67:da:e7:4c: ab:8c:5e:d0:fc:96:68:5f:28:c5:5a:0e:67:74:76:38: e6:f6:33:83:f2:44:3e:d1:91:42:21:8a:5e:f9:64:07: f7:8f:40:77:2c:d6:bc:5d:dd:87:3f:11:70:ab:69:3b: 36:5c:88:9c:c5:02:f0:68:3f:28:52:7b:08:ff:86:5f: f9:78:7a:1d:af:55:4b:d5:95:0b:8f:07:51:90:d0:48: 88:21:b4:32:28:13:45:73:49:f0:89:4f:83:03:c6:71: 20:1e:b6:11:25:cf:f8:85:0b:66:75:93:cf:83:7f:2f Fingerprint (SHA-256): 4D:5B:E9:CA:C5:F9:8B:A4:36:E8:39:5F:54:4A:6A:F8:88:8D:71:37:D3:D3:D1:2E:D5:15:CB:30:96:E7:7D:65 Fingerprint (SHA1): 36:BE:0D:E4:2A:4C:4D:C7:28:02:BE:B3:42:2E:7D:45:74:0E:77:9E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEEnd EE,O=EKUIPsecIKEEnd,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #192: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #193: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #194: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204012 (0x374402ac) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:41:34 2022 Not After : Tue Sep 27 20:41:34 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:60:9e:54:89:23:c6:50:88:b3:60:5a:bf:6a:cf:c1: ec:13:69:98:f8:e0:49:b5:b7:f4:de:e1:c4:1e:b1:de: 37:8c:c9:c5:77:39:d6:5c:08:a5:ad:e9:9f:38:ed:d5: 6c:f6:9f:71:43:d2:bc:76:e6:2f:60:dc:9c:49:f4:4a: 22:e1:ec:00:59:c4:2c:95:8e:60:25:a7:3f:04:78:ae: bf:86:ac:53:23:48:a7:d1:38:93:c2:af:ca:3b:44:6a: a4:fa:a2:57:4c:8a:e2:9f:f4:91:24:03:6e:39:a1:f7: 9a:c8:76:26:a6:7a:a5:a9:11:1e:40:6d:78:a2:02:23: a2:78:0a:b2:10:6a:47:ce:bf:a7:15:00:c6:1d:1d:1c: 13:95:24:97:dd:d1:cc:34:7d:07:2c:b7:6a:d5:09:bb: e4:f9:08:64:ec:6d:66:c1:8f:bb:2d:2b:87:c2:ea:43: 3b:90:30:22:16:f3:61:ce:16:08:24:ec:bb:db:78:e2: 55:d0:75:91:b9:c6:89:1d:8a:6d:ba:86:77:a3:b7:13: fa:09:00:f5:43:60:27:37:20:00:a3:06:e1:bd:e3:dd: 73:47:f5:17:38:79:79:51:c7:f2:0d:c7:ee:00:4f:e6: fa:61:12:6d:2d:7b:21:65:34:9d:1d:d9:10:b2:04:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:15:59:72:d7:f2:d0:cb:9d:b8:46:ba:b6:0a:bb:c2: 1c:70:de:6f:e7:3d:81:d8:64:0d:4c:32:61:12:c3:90: e4:37:30:ea:48:af:2f:b7:b8:26:a1:e4:05:6c:97:73: 55:06:a3:2d:60:27:51:a6:66:60:32:77:6d:0b:d3:8d: 76:50:58:f1:c8:c7:17:3d:34:c8:3c:dd:5d:5f:10:43: 7c:ca:56:a6:b0:39:28:1b:cd:26:4a:57:02:0a:b9:5c: 3f:1f:3b:12:f8:68:e8:0d:ad:15:f8:a5:75:81:e9:34: cd:d2:30:a4:9d:11:4f:ee:fc:2b:dd:24:15:90:d1:eb: 2c:ef:6d:75:8d:76:4d:5d:08:17:76:7b:67:da:e7:4c: ab:8c:5e:d0:fc:96:68:5f:28:c5:5a:0e:67:74:76:38: e6:f6:33:83:f2:44:3e:d1:91:42:21:8a:5e:f9:64:07: f7:8f:40:77:2c:d6:bc:5d:dd:87:3f:11:70:ab:69:3b: 36:5c:88:9c:c5:02:f0:68:3f:28:52:7b:08:ff:86:5f: f9:78:7a:1d:af:55:4b:d5:95:0b:8f:07:51:90:d0:48: 88:21:b4:32:28:13:45:73:49:f0:89:4f:83:03:c6:71: 20:1e:b6:11:25:cf:f8:85:0b:66:75:93:cf:83:7f:2f Fingerprint (SHA-256): 4D:5B:E9:CA:C5:F9:8B:A4:36:E8:39:5F:54:4A:6A:F8:88:8D:71:37:D3:D3:D1:2E:D5:15:CB:30:96:E7:7D:65 Fingerprint (SHA1): 36:BE:0D:E4:2A:4C:4D:C7:28:02:BE:B3:42:2E:7D:45:74:0E:77:9E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEIntermediate EE,O=EKUIPsecIKEIntermedia te,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #195: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #196: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #197: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUAnyCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204012 (0x374402ac) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:41:34 2022 Not After : Tue Sep 27 20:41:34 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:60:9e:54:89:23:c6:50:88:b3:60:5a:bf:6a:cf:c1: ec:13:69:98:f8:e0:49:b5:b7:f4:de:e1:c4:1e:b1:de: 37:8c:c9:c5:77:39:d6:5c:08:a5:ad:e9:9f:38:ed:d5: 6c:f6:9f:71:43:d2:bc:76:e6:2f:60:dc:9c:49:f4:4a: 22:e1:ec:00:59:c4:2c:95:8e:60:25:a7:3f:04:78:ae: bf:86:ac:53:23:48:a7:d1:38:93:c2:af:ca:3b:44:6a: a4:fa:a2:57:4c:8a:e2:9f:f4:91:24:03:6e:39:a1:f7: 9a:c8:76:26:a6:7a:a5:a9:11:1e:40:6d:78:a2:02:23: a2:78:0a:b2:10:6a:47:ce:bf:a7:15:00:c6:1d:1d:1c: 13:95:24:97:dd:d1:cc:34:7d:07:2c:b7:6a:d5:09:bb: e4:f9:08:64:ec:6d:66:c1:8f:bb:2d:2b:87:c2:ea:43: 3b:90:30:22:16:f3:61:ce:16:08:24:ec:bb:db:78:e2: 55:d0:75:91:b9:c6:89:1d:8a:6d:ba:86:77:a3:b7:13: fa:09:00:f5:43:60:27:37:20:00:a3:06:e1:bd:e3:dd: 73:47:f5:17:38:79:79:51:c7:f2:0d:c7:ee:00:4f:e6: fa:61:12:6d:2d:7b:21:65:34:9d:1d:d9:10:b2:04:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:15:59:72:d7:f2:d0:cb:9d:b8:46:ba:b6:0a:bb:c2: 1c:70:de:6f:e7:3d:81:d8:64:0d:4c:32:61:12:c3:90: e4:37:30:ea:48:af:2f:b7:b8:26:a1:e4:05:6c:97:73: 55:06:a3:2d:60:27:51:a6:66:60:32:77:6d:0b:d3:8d: 76:50:58:f1:c8:c7:17:3d:34:c8:3c:dd:5d:5f:10:43: 7c:ca:56:a6:b0:39:28:1b:cd:26:4a:57:02:0a:b9:5c: 3f:1f:3b:12:f8:68:e8:0d:ad:15:f8:a5:75:81:e9:34: cd:d2:30:a4:9d:11:4f:ee:fc:2b:dd:24:15:90:d1:eb: 2c:ef:6d:75:8d:76:4d:5d:08:17:76:7b:67:da:e7:4c: ab:8c:5e:d0:fc:96:68:5f:28:c5:5a:0e:67:74:76:38: e6:f6:33:83:f2:44:3e:d1:91:42:21:8a:5e:f9:64:07: f7:8f:40:77:2c:d6:bc:5d:dd:87:3f:11:70:ab:69:3b: 36:5c:88:9c:c5:02:f0:68:3f:28:52:7b:08:ff:86:5f: f9:78:7a:1d:af:55:4b:d5:95:0b:8f:07:51:90:d0:48: 88:21:b4:32:28:13:45:73:49:f0:89:4f:83:03:c6:71: 20:1e:b6:11:25:cf:f8:85:0b:66:75:93:cf:83:7f:2f Fingerprint (SHA-256): 4D:5B:E9:CA:C5:F9:8B:A4:36:E8:39:5F:54:4A:6A:F8:88:8D:71:37:D3:D3:D1:2E:D5:15:CB:30:96:E7:7D:65 Fingerprint (SHA1): 36:BE:0D:E4:2A:4C:4D:C7:28:02:BE:B3:42:2E:7D:45:74:0E:77:9E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUAny EE,O=EKUAny,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #198: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #199: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #200: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUEmailCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204012 (0x374402ac) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:41:34 2022 Not After : Tue Sep 27 20:41:34 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:60:9e:54:89:23:c6:50:88:b3:60:5a:bf:6a:cf:c1: ec:13:69:98:f8:e0:49:b5:b7:f4:de:e1:c4:1e:b1:de: 37:8c:c9:c5:77:39:d6:5c:08:a5:ad:e9:9f:38:ed:d5: 6c:f6:9f:71:43:d2:bc:76:e6:2f:60:dc:9c:49:f4:4a: 22:e1:ec:00:59:c4:2c:95:8e:60:25:a7:3f:04:78:ae: bf:86:ac:53:23:48:a7:d1:38:93:c2:af:ca:3b:44:6a: a4:fa:a2:57:4c:8a:e2:9f:f4:91:24:03:6e:39:a1:f7: 9a:c8:76:26:a6:7a:a5:a9:11:1e:40:6d:78:a2:02:23: a2:78:0a:b2:10:6a:47:ce:bf:a7:15:00:c6:1d:1d:1c: 13:95:24:97:dd:d1:cc:34:7d:07:2c:b7:6a:d5:09:bb: e4:f9:08:64:ec:6d:66:c1:8f:bb:2d:2b:87:c2:ea:43: 3b:90:30:22:16:f3:61:ce:16:08:24:ec:bb:db:78:e2: 55:d0:75:91:b9:c6:89:1d:8a:6d:ba:86:77:a3:b7:13: fa:09:00:f5:43:60:27:37:20:00:a3:06:e1:bd:e3:dd: 73:47:f5:17:38:79:79:51:c7:f2:0d:c7:ee:00:4f:e6: fa:61:12:6d:2d:7b:21:65:34:9d:1d:d9:10:b2:04:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:15:59:72:d7:f2:d0:cb:9d:b8:46:ba:b6:0a:bb:c2: 1c:70:de:6f:e7:3d:81:d8:64:0d:4c:32:61:12:c3:90: e4:37:30:ea:48:af:2f:b7:b8:26:a1:e4:05:6c:97:73: 55:06:a3:2d:60:27:51:a6:66:60:32:77:6d:0b:d3:8d: 76:50:58:f1:c8:c7:17:3d:34:c8:3c:dd:5d:5f:10:43: 7c:ca:56:a6:b0:39:28:1b:cd:26:4a:57:02:0a:b9:5c: 3f:1f:3b:12:f8:68:e8:0d:ad:15:f8:a5:75:81:e9:34: cd:d2:30:a4:9d:11:4f:ee:fc:2b:dd:24:15:90:d1:eb: 2c:ef:6d:75:8d:76:4d:5d:08:17:76:7b:67:da:e7:4c: ab:8c:5e:d0:fc:96:68:5f:28:c5:5a:0e:67:74:76:38: e6:f6:33:83:f2:44:3e:d1:91:42:21:8a:5e:f9:64:07: f7:8f:40:77:2c:d6:bc:5d:dd:87:3f:11:70:ab:69:3b: 36:5c:88:9c:c5:02:f0:68:3f:28:52:7b:08:ff:86:5f: f9:78:7a:1d:af:55:4b:d5:95:0b:8f:07:51:90:d0:48: 88:21:b4:32:28:13:45:73:49:f0:89:4f:83:03:c6:71: 20:1e:b6:11:25:cf:f8:85:0b:66:75:93:cf:83:7f:2f Fingerprint (SHA-256): 4D:5B:E9:CA:C5:F9:8B:A4:36:E8:39:5F:54:4A:6A:F8:88:8D:71:37:D3:D3:D1:2E:D5:15:CB:30:96:E7:7D:65 Fingerprint (SHA1): 36:BE:0D:E4:2A:4C:4D:C7:28:02:BE:B3:42:2E:7D:45:74:0E:77:9E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUEmail EE,O=EKUEmail,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #201: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #202: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #203: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 - PASSED httpserv starting at Tue Sep 27 20:42:09 UTC 2022 httpserv -D -p 9233 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/aiahttp/http_pid.3122 & trying to connect to httpserv at Tue Sep 27 20:42:09 UTC 2022 tstclnt -4 -p 9233 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9233 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 31925 >/dev/null 2>/dev/null httpserv with PID 31925 found at Tue Sep 27 20:42:09 UTC 2022 httpserv with PID 31925 started at Tue Sep 27 20:42:10 UTC 2022 chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecUserCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204012 (0x374402ac) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:41:34 2022 Not After : Tue Sep 27 20:41:34 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:60:9e:54:89:23:c6:50:88:b3:60:5a:bf:6a:cf:c1: ec:13:69:98:f8:e0:49:b5:b7:f4:de:e1:c4:1e:b1:de: 37:8c:c9:c5:77:39:d6:5c:08:a5:ad:e9:9f:38:ed:d5: 6c:f6:9f:71:43:d2:bc:76:e6:2f:60:dc:9c:49:f4:4a: 22:e1:ec:00:59:c4:2c:95:8e:60:25:a7:3f:04:78:ae: bf:86:ac:53:23:48:a7:d1:38:93:c2:af:ca:3b:44:6a: a4:fa:a2:57:4c:8a:e2:9f:f4:91:24:03:6e:39:a1:f7: 9a:c8:76:26:a6:7a:a5:a9:11:1e:40:6d:78:a2:02:23: a2:78:0a:b2:10:6a:47:ce:bf:a7:15:00:c6:1d:1d:1c: 13:95:24:97:dd:d1:cc:34:7d:07:2c:b7:6a:d5:09:bb: e4:f9:08:64:ec:6d:66:c1:8f:bb:2d:2b:87:c2:ea:43: 3b:90:30:22:16:f3:61:ce:16:08:24:ec:bb:db:78:e2: 55:d0:75:91:b9:c6:89:1d:8a:6d:ba:86:77:a3:b7:13: fa:09:00:f5:43:60:27:37:20:00:a3:06:e1:bd:e3:dd: 73:47:f5:17:38:79:79:51:c7:f2:0d:c7:ee:00:4f:e6: fa:61:12:6d:2d:7b:21:65:34:9d:1d:d9:10:b2:04:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:15:59:72:d7:f2:d0:cb:9d:b8:46:ba:b6:0a:bb:c2: 1c:70:de:6f:e7:3d:81:d8:64:0d:4c:32:61:12:c3:90: e4:37:30:ea:48:af:2f:b7:b8:26:a1:e4:05:6c:97:73: 55:06:a3:2d:60:27:51:a6:66:60:32:77:6d:0b:d3:8d: 76:50:58:f1:c8:c7:17:3d:34:c8:3c:dd:5d:5f:10:43: 7c:ca:56:a6:b0:39:28:1b:cd:26:4a:57:02:0a:b9:5c: 3f:1f:3b:12:f8:68:e8:0d:ad:15:f8:a5:75:81:e9:34: cd:d2:30:a4:9d:11:4f:ee:fc:2b:dd:24:15:90:d1:eb: 2c:ef:6d:75:8d:76:4d:5d:08:17:76:7b:67:da:e7:4c: ab:8c:5e:d0:fc:96:68:5f:28:c5:5a:0e:67:74:76:38: e6:f6:33:83:f2:44:3e:d1:91:42:21:8a:5e:f9:64:07: f7:8f:40:77:2c:d6:bc:5d:dd:87:3f:11:70:ab:69:3b: 36:5c:88:9c:c5:02:f0:68:3f:28:52:7b:08:ff:86:5f: f9:78:7a:1d:af:55:4b:d5:95:0b:8f:07:51:90:d0:48: 88:21:b4:32:28:13:45:73:49:f0:89:4f:83:03:c6:71: 20:1e:b6:11:25:cf:f8:85:0b:66:75:93:cf:83:7f:2f Fingerprint (SHA-256): 4D:5B:E9:CA:C5:F9:8B:A4:36:E8:39:5F:54:4A:6A:F8:88:8D:71:37:D3:D3:D1:2E:D5:15:CB:30:96:E7:7D:65 Fingerprint (SHA1): 36:BE:0D:E4:2A:4C:4D:C7:28:02:BE:B3:42:2E:7D:45:74:0E:77:9E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecUser EE,O=EKUIPsecUser,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #204: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #205: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #206: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 - PASSED tstclnt -4 -h localhost.localdomain -p 9233 -q -t 20 chains.sh: #207: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204011 (0x374402ab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Tue Sep 27 20:40:11 2022 Not After : Tue Sep 27 20:40:11 2072 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:15:97:9d:05:9b:b7:b7:4f:bc:8e:b5:db:39:30:dd: 64:da:a4:ef:80:99:29:1f:9f:3f:32:2f:a2:c8:74:dc: 77:db:a4:cf:74:90:fb:eb:96:93:72:5f:fe:f4:7a:14: 6b:37:08:4c:18:38:b4:54:aa:f3:46:a4:aa:f4:0c:4d: d1:3a:a7:8a:51:6b:ba:1f:4b:53:e2:86:b7:cc:3b:8f: 2a:95:48:82:66:6c:af:73:99:26:40:c2:4e:4e:85:10: 03:9a:e4:50:00:5d:0d:d6:b4:05:3b:00:2f:aa:47:c2: fc:ad:a8:20:26:ef:b8:f6:00:ce:e2:00:68:aa:30:04: 7e:c7:e0:61:f1:34:fe:a9:b7:41:95:d5:f1:1d:04:c7: 80:32:12:a7:09:c9:db:81:a0:91:f6:d9:54:b0:63:26: 93:11:48:7d:e5:a9:c5:26:43:15:32:8e:8d:e2:ac:76: 56:cc:7d:f0:14:5f:71:38:a8:16:7e:95:66:0f:92:0f: fa:69:7a:33:b7:a1:8d:ea:1f:7f:02:33:a9:5e:64:3e: 5e:41:60:2a:91:cd:4c:79:55:52:98:10:d7:0e:06:00: d8:28:94:53:09:bb:ca:86:32:73:1d:71:a5:4c:d7:08: a8:c0:ea:d5:a7:22:3f:cc:c5:dd:3a:2c:36:32:75:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:d2:b7:14:6a:6b:e8:0e:bd:d1:56:7a:84:4d:a2:ab: a8:5f:da:f3:aa:56:74:a1:3c:43:9e:f5:ca:15:b6:6a: 9d:b4:e1:f4:8d:b1:11:90:dc:b8:c2:80:2d:a2:70:74: 6c:88:22:d2:25:37:ed:11:37:09:0f:86:5b:ec:23:3a: 1a:e7:39:4d:25:cf:1c:80:11:03:d1:94:72:1d:2c:44: ba:1c:27:a4:e2:8f:ea:f9:85:65:14:00:4e:fe:8f:ec: e5:54:47:e0:03:c2:53:21:d3:d6:a2:d2:20:55:3d:d5: eb:43:6e:95:04:19:05:1f:28:66:82:09:8f:48:9f:79: 4e:03:99:7e:d8:4d:04:b2:c0:57:7c:a2:d3:76:cf:0d: 9c:c5:d1:8e:8b:b5:9f:08:7b:00:a6:00:af:a7:8d:1b: 6b:0f:16:09:90:f3:f5:1c:95:78:dd:75:8c:45:e5:4a: 0c:8b:5f:be:34:09:d1:1c:e7:fe:4f:c8:6d:09:80:5e: a0:87:50:d5:17:f5:64:c4:d5:cb:bb:6c:64:2e:90:dd: ef:bc:d6:c2:b4:36:a2:0d:45:fa:0f:90:06:83:78:55: 6a:91:5f:79:bc:42:13:d0:dc:da:cc:d9:d9:ae:e1:eb: fc:aa:00:b4:50:a9:e6:22:f5:8b:8f:d8:26:27:98:79 Fingerprint (SHA-256): B4:3C:F7:19:1B:54:E0:17:54:BE:BF:7E:42:61:E5:69:32:27:7B:08:F4:3C:57:CC:60:F4:87:17:2F:A0:C3:99 Fingerprint (SHA1): 80:12:55:1B:2D:EE:E6:C0:6B:10:C0:7B:8D:42:3C:0F:35:58:AF:F6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #208: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #209: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #210: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 31925 at Tue Sep 27 20:42:12 UTC 2022 kill -USR1 31925 httpserv: normal termination httpserv -b -p 9233 2>/dev/null; httpserv with PID 31925 killed at Tue Sep 27 20:42:12 UTC 2022 httpserv starting at Tue Sep 27 20:42:12 UTC 2022 httpserv -D -p 9233 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/aiahttp/http_pid.3122 & trying to connect to httpserv at Tue Sep 27 20:42:12 UTC 2022 tstclnt -4 -p 9233 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9233 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 32141 >/dev/null 2>/dev/null httpserv with PID 32141 found at Tue Sep 27 20:42:12 UTC 2022 httpserv with PID 32141 started at Tue Sep 27 20:42:12 UTC 2022 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #211: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. OCSPEE12OCSPCA1 : ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #212: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #213: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED tstclnt -4 -h localhost.localdomain -p 9233 -q -t 20 chains.sh: #214: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204011 (0x374402ab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Tue Sep 27 20:40:11 2022 Not After : Tue Sep 27 20:40:11 2072 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:15:97:9d:05:9b:b7:b7:4f:bc:8e:b5:db:39:30:dd: 64:da:a4:ef:80:99:29:1f:9f:3f:32:2f:a2:c8:74:dc: 77:db:a4:cf:74:90:fb:eb:96:93:72:5f:fe:f4:7a:14: 6b:37:08:4c:18:38:b4:54:aa:f3:46:a4:aa:f4:0c:4d: d1:3a:a7:8a:51:6b:ba:1f:4b:53:e2:86:b7:cc:3b:8f: 2a:95:48:82:66:6c:af:73:99:26:40:c2:4e:4e:85:10: 03:9a:e4:50:00:5d:0d:d6:b4:05:3b:00:2f:aa:47:c2: fc:ad:a8:20:26:ef:b8:f6:00:ce:e2:00:68:aa:30:04: 7e:c7:e0:61:f1:34:fe:a9:b7:41:95:d5:f1:1d:04:c7: 80:32:12:a7:09:c9:db:81:a0:91:f6:d9:54:b0:63:26: 93:11:48:7d:e5:a9:c5:26:43:15:32:8e:8d:e2:ac:76: 56:cc:7d:f0:14:5f:71:38:a8:16:7e:95:66:0f:92:0f: fa:69:7a:33:b7:a1:8d:ea:1f:7f:02:33:a9:5e:64:3e: 5e:41:60:2a:91:cd:4c:79:55:52:98:10:d7:0e:06:00: d8:28:94:53:09:bb:ca:86:32:73:1d:71:a5:4c:d7:08: a8:c0:ea:d5:a7:22:3f:cc:c5:dd:3a:2c:36:32:75:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:d2:b7:14:6a:6b:e8:0e:bd:d1:56:7a:84:4d:a2:ab: a8:5f:da:f3:aa:56:74:a1:3c:43:9e:f5:ca:15:b6:6a: 9d:b4:e1:f4:8d:b1:11:90:dc:b8:c2:80:2d:a2:70:74: 6c:88:22:d2:25:37:ed:11:37:09:0f:86:5b:ec:23:3a: 1a:e7:39:4d:25:cf:1c:80:11:03:d1:94:72:1d:2c:44: ba:1c:27:a4:e2:8f:ea:f9:85:65:14:00:4e:fe:8f:ec: e5:54:47:e0:03:c2:53:21:d3:d6:a2:d2:20:55:3d:d5: eb:43:6e:95:04:19:05:1f:28:66:82:09:8f:48:9f:79: 4e:03:99:7e:d8:4d:04:b2:c0:57:7c:a2:d3:76:cf:0d: 9c:c5:d1:8e:8b:b5:9f:08:7b:00:a6:00:af:a7:8d:1b: 6b:0f:16:09:90:f3:f5:1c:95:78:dd:75:8c:45:e5:4a: 0c:8b:5f:be:34:09:d1:1c:e7:fe:4f:c8:6d:09:80:5e: a0:87:50:d5:17:f5:64:c4:d5:cb:bb:6c:64:2e:90:dd: ef:bc:d6:c2:b4:36:a2:0d:45:fa:0f:90:06:83:78:55: 6a:91:5f:79:bc:42:13:d0:dc:da:cc:d9:d9:ae:e1:eb: fc:aa:00:b4:50:a9:e6:22:f5:8b:8f:d8:26:27:98:79 Fingerprint (SHA-256): B4:3C:F7:19:1B:54:E0:17:54:BE:BF:7E:42:61:E5:69:32:27:7B:08:F4:3C:57:CC:60:F4:87:17:2F:A0:C3:99 Fingerprint (SHA1): 80:12:55:1B:2D:EE:E6:C0:6B:10:C0:7B:8D:42:3C:0F:35:58:AF:F6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #215: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #216: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #217: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 32141 at Tue Sep 27 20:42:14 UTC 2022 kill -USR1 32141 httpserv: normal termination httpserv -b -p 9233 2>/dev/null; httpserv with PID 32141 killed at Tue Sep 27 20:42:15 UTC 2022 httpserv starting at Tue Sep 27 20:42:15 UTC 2022 httpserv -D -p 9233 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/aiahttp/http_pid.3122 & trying to connect to httpserv at Tue Sep 27 20:42:15 UTC 2022 tstclnt -4 -p 9233 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9233 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 32360 >/dev/null 2>/dev/null httpserv with PID 32360 found at Tue Sep 27 20:42:15 UTC 2022 httpserv with PID 32360 started at Tue Sep 27 20:42:15 UTC 2022 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #218: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #219: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204028 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #220: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #221: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #222: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204029 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #223: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #224: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #225: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #226: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 927204030 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #227: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #228: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 927204031 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #229: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #230: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #231: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #232: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #233: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 927204032 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #234: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #235: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #236: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #237: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #238: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204029 (0x374402bd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 20:42:17 2022 Not After : Tue Sep 27 20:42:17 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:93:e1:3a:5d:ac:df:62:f6:5f:2a:80:2c:04:a6:83: a2:00:e1:f0:96:28:54:f3:40:6c:c9:b4:a1:55:38:3d: 3c:da:88:85:83:38:36:03:96:1f:01:69:4c:b8:ec:0d: 6e:a2:7e:db:16:0e:dd:42:24:68:6a:04:be:a6:7d:d1: b9:39:ed:32:b2:83:fb:af:d4:9d:05:0c:d7:6c:3d:b5: 32:f0:fa:81:3c:87:b9:4f:22:82:01:0d:88:1d:91:44: 36:c5:50:90:e7:de:a5:87:c4:4b:30:c7:9d:2a:e8:28: 32:cd:3a:cd:13:60:6a:e0:74:21:d8:91:09:5d:28:5a: 1a:14:0e:b6:e4:23:26:1a:fc:d1:e7:7a:57:63:c8:4a: b9:ef:79:08:6a:8a:a4:01:a2:78:91:22:56:0e:06:85: 1a:1c:56:3d:f6:ac:77:a3:27:6f:db:f8:ec:e0:b3:9d: 8a:40:8b:aa:e9:bf:a9:a8:93:61:cf:07:95:c6:db:d2: 5f:c6:bc:ba:96:a8:7c:d2:e5:6f:75:88:d8:cb:a0:df: 07:38:f8:ac:a4:e8:94:56:bf:ff:c9:eb:08:18:f6:d8: 5b:a2:a7:e6:44:41:4e:af:97:b8:58:3f:b8:d6:84:c4: b9:61:2f:a0:d0:46:d1:66:80:e2:b2:e9:ea:37:9c:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:90:a5:ac:cb:39:c8:06:fd:de:8c:37:7b:80:c3:1e: fa:23:2b:05:63:ad:5b:65:2c:7f:44:1a:ec:f1:c1:6b: 00:5f:3c:4f:75:35:60:d5:1f:63:be:58:a6:14:0b:3b: 97:8a:d8:e7:5a:b7:ff:71:2e:32:0a:bc:e8:de:e6:a1: 93:2c:90:8d:58:d1:f4:5f:9b:16:30:a7:96:db:c6:bf: a5:43:50:1a:75:02:38:ce:6a:13:2c:68:ee:fc:69:fb: b3:c0:5e:f2:d8:8c:b3:37:6d:66:d8:51:5a:d3:18:da: 71:ec:13:44:85:79:4d:8e:1e:3a:a0:24:6b:99:01:ea: d9:ab:50:a7:97:26:bf:43:1a:f0:26:62:cd:c9:1e:c9: 9c:51:84:a2:08:82:b3:00:2e:c6:d2:1d:d6:f3:20:d4: 33:63:92:5c:0f:b3:b7:ff:4f:82:ff:71:c4:0c:50:3b: 36:03:7c:f6:3d:47:ba:01:7f:c3:17:e8:6b:8a:ff:75: ac:9a:f0:1a:98:6c:04:02:89:b1:15:7d:f7:62:de:9a: fa:06:bb:31:7c:2b:24:53:c9:d4:f6:be:96:7c:73:3d: f8:46:bc:c2:d7:f4:26:50:6b:8d:07:0f:b9:18:9b:b1: b1:71:12:1b:a1:40:ac:a0:3a:46:ff:9d:56:bf:cf:b0 Fingerprint (SHA-256): C6:DF:34:11:D3:11:F4:B6:43:9F:23:AF:4C:0F:98:F4:3B:67:2C:FC:04:E1:36:54:C9:03:C5:76:27:BC:B8:8C Fingerprint (SHA1): CD:1D:32:5E:3C:45:BF:17:D5:0D:E8:6F:68:92:B6:3D:F8:1E:56:A6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #239: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204028 (0x374402bc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 20:42:16 2022 Not After : Tue Sep 27 20:42:16 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:1e:59:1e:45:03:b6:3e:1c:a4:7b:92:89:ab:35:7b: 46:d0:04:e8:2b:6e:3b:10:83:97:32:ed:e2:0c:af:92: 79:8c:38:f3:91:a3:4a:b1:ae:2f:27:a5:42:9e:08:11: 10:f3:fd:68:01:fb:86:cd:96:42:18:fb:82:1c:3d:7d: fc:bd:51:15:6c:d9:d7:ff:37:09:b0:f2:72:21:6b:09: 3c:6a:a6:23:c3:05:7e:d2:4f:6a:6e:15:b1:cf:bf:da: 45:ed:59:60:50:5e:4f:c1:ad:92:5e:db:65:3a:76:85: d2:c4:74:3c:18:8e:cf:ed:91:29:1c:3a:e3:1d:96:02: a4:c4:fa:d0:e0:d2:8a:48:cd:6e:22:2a:72:aa:2e:84: 6a:3a:56:b7:b8:e8:6f:15:6d:b0:3e:1c:85:fa:6f:a8: 82:a3:68:fb:fb:9e:dd:0e:0b:52:fb:b0:a2:b9:f4:14: a6:55:90:ef:a1:55:0d:f5:14:70:8b:0c:6e:46:05:4d: 9b:17:19:dc:bb:2d:df:2c:33:9a:b5:0d:55:a4:5a:de: 55:0e:d4:00:cd:b0:4d:ee:8e:8b:6d:fb:40:76:7b:d0: 92:e2:dc:74:40:e0:17:08:e9:54:83:a2:66:b6:65:76: 22:e7:9f:f0:19:c3:b6:11:4a:ab:6d:98:35:40:92:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7c:1c:c6:e4:5a:be:62:65:e2:b0:ad:ae:32:26:80:67: c3:e8:03:fb:5c:b1:69:d9:b9:2a:f7:6e:c0:4d:6b:39: 68:bc:1a:4b:98:bc:43:22:c9:c5:7e:8f:cf:92:6f:a6: 37:b7:5f:6a:92:de:af:93:d1:44:a2:4b:2b:ee:ad:e7: fe:1e:50:7d:d8:b3:af:ef:1c:84:57:51:85:88:2e:eb: e2:7a:5e:91:c7:b1:20:0e:92:32:15:6c:b9:67:f9:14: da:ac:7f:36:69:3f:a1:8d:70:32:a0:d3:5b:d9:2c:22: a3:aa:3d:bb:32:57:85:d3:75:f7:43:93:3a:76:25:7f: 0e:d2:58:34:3a:79:1b:86:e0:e6:be:09:8b:3e:07:88: 1d:ab:98:7a:d3:be:01:d8:6a:d5:93:41:3a:48:34:8e: d4:18:5c:c2:16:90:ea:6e:40:73:5a:07:7e:70:ee:f0: b3:e8:eb:4c:03:e6:56:72:f9:58:8e:df:69:a3:d4:ae: 3a:b9:45:1c:4b:6d:6d:f3:ac:7e:df:83:32:b0:f0:de: 7c:05:90:7f:a2:e3:da:18:d9:89:ff:62:07:2d:60:55: 33:4f:9f:00:f2:05:49:cc:68:d0:ea:67:fa:a5:11:a8: 75:b1:ab:9c:32:99:26:2a:e7:6d:1d:32:d9:16:b2:0a Fingerprint (SHA-256): 40:74:F8:5A:5B:2D:D1:C6:94:B8:2B:EA:67:9D:4F:55:49:1C:A1:15:DD:95:8A:3E:90:5D:72:DF:6D:EC:CF:9E Fingerprint (SHA1): 6B:5B:14:E6:37:68:1E:4E:1C:7C:A7:B0:94:CF:4E:A2:22:48:F6:97 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #240: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #241: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #242: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #243: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204028 (0x374402bc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 20:42:16 2022 Not After : Tue Sep 27 20:42:16 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:1e:59:1e:45:03:b6:3e:1c:a4:7b:92:89:ab:35:7b: 46:d0:04:e8:2b:6e:3b:10:83:97:32:ed:e2:0c:af:92: 79:8c:38:f3:91:a3:4a:b1:ae:2f:27:a5:42:9e:08:11: 10:f3:fd:68:01:fb:86:cd:96:42:18:fb:82:1c:3d:7d: fc:bd:51:15:6c:d9:d7:ff:37:09:b0:f2:72:21:6b:09: 3c:6a:a6:23:c3:05:7e:d2:4f:6a:6e:15:b1:cf:bf:da: 45:ed:59:60:50:5e:4f:c1:ad:92:5e:db:65:3a:76:85: d2:c4:74:3c:18:8e:cf:ed:91:29:1c:3a:e3:1d:96:02: a4:c4:fa:d0:e0:d2:8a:48:cd:6e:22:2a:72:aa:2e:84: 6a:3a:56:b7:b8:e8:6f:15:6d:b0:3e:1c:85:fa:6f:a8: 82:a3:68:fb:fb:9e:dd:0e:0b:52:fb:b0:a2:b9:f4:14: a6:55:90:ef:a1:55:0d:f5:14:70:8b:0c:6e:46:05:4d: 9b:17:19:dc:bb:2d:df:2c:33:9a:b5:0d:55:a4:5a:de: 55:0e:d4:00:cd:b0:4d:ee:8e:8b:6d:fb:40:76:7b:d0: 92:e2:dc:74:40:e0:17:08:e9:54:83:a2:66:b6:65:76: 22:e7:9f:f0:19:c3:b6:11:4a:ab:6d:98:35:40:92:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7c:1c:c6:e4:5a:be:62:65:e2:b0:ad:ae:32:26:80:67: c3:e8:03:fb:5c:b1:69:d9:b9:2a:f7:6e:c0:4d:6b:39: 68:bc:1a:4b:98:bc:43:22:c9:c5:7e:8f:cf:92:6f:a6: 37:b7:5f:6a:92:de:af:93:d1:44:a2:4b:2b:ee:ad:e7: fe:1e:50:7d:d8:b3:af:ef:1c:84:57:51:85:88:2e:eb: e2:7a:5e:91:c7:b1:20:0e:92:32:15:6c:b9:67:f9:14: da:ac:7f:36:69:3f:a1:8d:70:32:a0:d3:5b:d9:2c:22: a3:aa:3d:bb:32:57:85:d3:75:f7:43:93:3a:76:25:7f: 0e:d2:58:34:3a:79:1b:86:e0:e6:be:09:8b:3e:07:88: 1d:ab:98:7a:d3:be:01:d8:6a:d5:93:41:3a:48:34:8e: d4:18:5c:c2:16:90:ea:6e:40:73:5a:07:7e:70:ee:f0: b3:e8:eb:4c:03:e6:56:72:f9:58:8e:df:69:a3:d4:ae: 3a:b9:45:1c:4b:6d:6d:f3:ac:7e:df:83:32:b0:f0:de: 7c:05:90:7f:a2:e3:da:18:d9:89:ff:62:07:2d:60:55: 33:4f:9f:00:f2:05:49:cc:68:d0:ea:67:fa:a5:11:a8: 75:b1:ab:9c:32:99:26:2a:e7:6d:1d:32:d9:16:b2:0a Fingerprint (SHA-256): 40:74:F8:5A:5B:2D:D1:C6:94:B8:2B:EA:67:9D:4F:55:49:1C:A1:15:DD:95:8A:3E:90:5D:72:DF:6D:EC:CF:9E Fingerprint (SHA1): 6B:5B:14:E6:37:68:1E:4E:1C:7C:A7:B0:94:CF:4E:A2:22:48:F6:97 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #244: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204029 (0x374402bd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 20:42:17 2022 Not After : Tue Sep 27 20:42:17 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:93:e1:3a:5d:ac:df:62:f6:5f:2a:80:2c:04:a6:83: a2:00:e1:f0:96:28:54:f3:40:6c:c9:b4:a1:55:38:3d: 3c:da:88:85:83:38:36:03:96:1f:01:69:4c:b8:ec:0d: 6e:a2:7e:db:16:0e:dd:42:24:68:6a:04:be:a6:7d:d1: b9:39:ed:32:b2:83:fb:af:d4:9d:05:0c:d7:6c:3d:b5: 32:f0:fa:81:3c:87:b9:4f:22:82:01:0d:88:1d:91:44: 36:c5:50:90:e7:de:a5:87:c4:4b:30:c7:9d:2a:e8:28: 32:cd:3a:cd:13:60:6a:e0:74:21:d8:91:09:5d:28:5a: 1a:14:0e:b6:e4:23:26:1a:fc:d1:e7:7a:57:63:c8:4a: b9:ef:79:08:6a:8a:a4:01:a2:78:91:22:56:0e:06:85: 1a:1c:56:3d:f6:ac:77:a3:27:6f:db:f8:ec:e0:b3:9d: 8a:40:8b:aa:e9:bf:a9:a8:93:61:cf:07:95:c6:db:d2: 5f:c6:bc:ba:96:a8:7c:d2:e5:6f:75:88:d8:cb:a0:df: 07:38:f8:ac:a4:e8:94:56:bf:ff:c9:eb:08:18:f6:d8: 5b:a2:a7:e6:44:41:4e:af:97:b8:58:3f:b8:d6:84:c4: b9:61:2f:a0:d0:46:d1:66:80:e2:b2:e9:ea:37:9c:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:90:a5:ac:cb:39:c8:06:fd:de:8c:37:7b:80:c3:1e: fa:23:2b:05:63:ad:5b:65:2c:7f:44:1a:ec:f1:c1:6b: 00:5f:3c:4f:75:35:60:d5:1f:63:be:58:a6:14:0b:3b: 97:8a:d8:e7:5a:b7:ff:71:2e:32:0a:bc:e8:de:e6:a1: 93:2c:90:8d:58:d1:f4:5f:9b:16:30:a7:96:db:c6:bf: a5:43:50:1a:75:02:38:ce:6a:13:2c:68:ee:fc:69:fb: b3:c0:5e:f2:d8:8c:b3:37:6d:66:d8:51:5a:d3:18:da: 71:ec:13:44:85:79:4d:8e:1e:3a:a0:24:6b:99:01:ea: d9:ab:50:a7:97:26:bf:43:1a:f0:26:62:cd:c9:1e:c9: 9c:51:84:a2:08:82:b3:00:2e:c6:d2:1d:d6:f3:20:d4: 33:63:92:5c:0f:b3:b7:ff:4f:82:ff:71:c4:0c:50:3b: 36:03:7c:f6:3d:47:ba:01:7f:c3:17:e8:6b:8a:ff:75: ac:9a:f0:1a:98:6c:04:02:89:b1:15:7d:f7:62:de:9a: fa:06:bb:31:7c:2b:24:53:c9:d4:f6:be:96:7c:73:3d: f8:46:bc:c2:d7:f4:26:50:6b:8d:07:0f:b9:18:9b:b1: b1:71:12:1b:a1:40:ac:a0:3a:46:ff:9d:56:bf:cf:b0 Fingerprint (SHA-256): C6:DF:34:11:D3:11:F4:B6:43:9F:23:AF:4C:0F:98:F4:3B:67:2C:FC:04:E1:36:54:C9:03:C5:76:27:BC:B8:8C Fingerprint (SHA1): CD:1D:32:5E:3C:45:BF:17:D5:0D:E8:6F:68:92:B6:3D:F8:1E:56:A6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #245: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #246: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #247: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #248: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #249: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #250: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204029 (0x374402bd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 20:42:17 2022 Not After : Tue Sep 27 20:42:17 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:93:e1:3a:5d:ac:df:62:f6:5f:2a:80:2c:04:a6:83: a2:00:e1:f0:96:28:54:f3:40:6c:c9:b4:a1:55:38:3d: 3c:da:88:85:83:38:36:03:96:1f:01:69:4c:b8:ec:0d: 6e:a2:7e:db:16:0e:dd:42:24:68:6a:04:be:a6:7d:d1: b9:39:ed:32:b2:83:fb:af:d4:9d:05:0c:d7:6c:3d:b5: 32:f0:fa:81:3c:87:b9:4f:22:82:01:0d:88:1d:91:44: 36:c5:50:90:e7:de:a5:87:c4:4b:30:c7:9d:2a:e8:28: 32:cd:3a:cd:13:60:6a:e0:74:21:d8:91:09:5d:28:5a: 1a:14:0e:b6:e4:23:26:1a:fc:d1:e7:7a:57:63:c8:4a: b9:ef:79:08:6a:8a:a4:01:a2:78:91:22:56:0e:06:85: 1a:1c:56:3d:f6:ac:77:a3:27:6f:db:f8:ec:e0:b3:9d: 8a:40:8b:aa:e9:bf:a9:a8:93:61:cf:07:95:c6:db:d2: 5f:c6:bc:ba:96:a8:7c:d2:e5:6f:75:88:d8:cb:a0:df: 07:38:f8:ac:a4:e8:94:56:bf:ff:c9:eb:08:18:f6:d8: 5b:a2:a7:e6:44:41:4e:af:97:b8:58:3f:b8:d6:84:c4: b9:61:2f:a0:d0:46:d1:66:80:e2:b2:e9:ea:37:9c:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:90:a5:ac:cb:39:c8:06:fd:de:8c:37:7b:80:c3:1e: fa:23:2b:05:63:ad:5b:65:2c:7f:44:1a:ec:f1:c1:6b: 00:5f:3c:4f:75:35:60:d5:1f:63:be:58:a6:14:0b:3b: 97:8a:d8:e7:5a:b7:ff:71:2e:32:0a:bc:e8:de:e6:a1: 93:2c:90:8d:58:d1:f4:5f:9b:16:30:a7:96:db:c6:bf: a5:43:50:1a:75:02:38:ce:6a:13:2c:68:ee:fc:69:fb: b3:c0:5e:f2:d8:8c:b3:37:6d:66:d8:51:5a:d3:18:da: 71:ec:13:44:85:79:4d:8e:1e:3a:a0:24:6b:99:01:ea: d9:ab:50:a7:97:26:bf:43:1a:f0:26:62:cd:c9:1e:c9: 9c:51:84:a2:08:82:b3:00:2e:c6:d2:1d:d6:f3:20:d4: 33:63:92:5c:0f:b3:b7:ff:4f:82:ff:71:c4:0c:50:3b: 36:03:7c:f6:3d:47:ba:01:7f:c3:17:e8:6b:8a:ff:75: ac:9a:f0:1a:98:6c:04:02:89:b1:15:7d:f7:62:de:9a: fa:06:bb:31:7c:2b:24:53:c9:d4:f6:be:96:7c:73:3d: f8:46:bc:c2:d7:f4:26:50:6b:8d:07:0f:b9:18:9b:b1: b1:71:12:1b:a1:40:ac:a0:3a:46:ff:9d:56:bf:cf:b0 Fingerprint (SHA-256): C6:DF:34:11:D3:11:F4:B6:43:9F:23:AF:4C:0F:98:F4:3B:67:2C:FC:04:E1:36:54:C9:03:C5:76:27:BC:B8:8C Fingerprint (SHA1): CD:1D:32:5E:3C:45:BF:17:D5:0D:E8:6F:68:92:B6:3D:F8:1E:56:A6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #251: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204029 (0x374402bd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 20:42:17 2022 Not After : Tue Sep 27 20:42:17 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:93:e1:3a:5d:ac:df:62:f6:5f:2a:80:2c:04:a6:83: a2:00:e1:f0:96:28:54:f3:40:6c:c9:b4:a1:55:38:3d: 3c:da:88:85:83:38:36:03:96:1f:01:69:4c:b8:ec:0d: 6e:a2:7e:db:16:0e:dd:42:24:68:6a:04:be:a6:7d:d1: b9:39:ed:32:b2:83:fb:af:d4:9d:05:0c:d7:6c:3d:b5: 32:f0:fa:81:3c:87:b9:4f:22:82:01:0d:88:1d:91:44: 36:c5:50:90:e7:de:a5:87:c4:4b:30:c7:9d:2a:e8:28: 32:cd:3a:cd:13:60:6a:e0:74:21:d8:91:09:5d:28:5a: 1a:14:0e:b6:e4:23:26:1a:fc:d1:e7:7a:57:63:c8:4a: b9:ef:79:08:6a:8a:a4:01:a2:78:91:22:56:0e:06:85: 1a:1c:56:3d:f6:ac:77:a3:27:6f:db:f8:ec:e0:b3:9d: 8a:40:8b:aa:e9:bf:a9:a8:93:61:cf:07:95:c6:db:d2: 5f:c6:bc:ba:96:a8:7c:d2:e5:6f:75:88:d8:cb:a0:df: 07:38:f8:ac:a4:e8:94:56:bf:ff:c9:eb:08:18:f6:d8: 5b:a2:a7:e6:44:41:4e:af:97:b8:58:3f:b8:d6:84:c4: b9:61:2f:a0:d0:46:d1:66:80:e2:b2:e9:ea:37:9c:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:90:a5:ac:cb:39:c8:06:fd:de:8c:37:7b:80:c3:1e: fa:23:2b:05:63:ad:5b:65:2c:7f:44:1a:ec:f1:c1:6b: 00:5f:3c:4f:75:35:60:d5:1f:63:be:58:a6:14:0b:3b: 97:8a:d8:e7:5a:b7:ff:71:2e:32:0a:bc:e8:de:e6:a1: 93:2c:90:8d:58:d1:f4:5f:9b:16:30:a7:96:db:c6:bf: a5:43:50:1a:75:02:38:ce:6a:13:2c:68:ee:fc:69:fb: b3:c0:5e:f2:d8:8c:b3:37:6d:66:d8:51:5a:d3:18:da: 71:ec:13:44:85:79:4d:8e:1e:3a:a0:24:6b:99:01:ea: d9:ab:50:a7:97:26:bf:43:1a:f0:26:62:cd:c9:1e:c9: 9c:51:84:a2:08:82:b3:00:2e:c6:d2:1d:d6:f3:20:d4: 33:63:92:5c:0f:b3:b7:ff:4f:82:ff:71:c4:0c:50:3b: 36:03:7c:f6:3d:47:ba:01:7f:c3:17:e8:6b:8a:ff:75: ac:9a:f0:1a:98:6c:04:02:89:b1:15:7d:f7:62:de:9a: fa:06:bb:31:7c:2b:24:53:c9:d4:f6:be:96:7c:73:3d: f8:46:bc:c2:d7:f4:26:50:6b:8d:07:0f:b9:18:9b:b1: b1:71:12:1b:a1:40:ac:a0:3a:46:ff:9d:56:bf:cf:b0 Fingerprint (SHA-256): C6:DF:34:11:D3:11:F4:B6:43:9F:23:AF:4C:0F:98:F4:3B:67:2C:FC:04:E1:36:54:C9:03:C5:76:27:BC:B8:8C Fingerprint (SHA1): CD:1D:32:5E:3C:45:BF:17:D5:0D:E8:6F:68:92:B6:3D:F8:1E:56:A6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #252: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #253: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #254: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #255: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #256: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #257: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204028 (0x374402bc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 20:42:16 2022 Not After : Tue Sep 27 20:42:16 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:1e:59:1e:45:03:b6:3e:1c:a4:7b:92:89:ab:35:7b: 46:d0:04:e8:2b:6e:3b:10:83:97:32:ed:e2:0c:af:92: 79:8c:38:f3:91:a3:4a:b1:ae:2f:27:a5:42:9e:08:11: 10:f3:fd:68:01:fb:86:cd:96:42:18:fb:82:1c:3d:7d: fc:bd:51:15:6c:d9:d7:ff:37:09:b0:f2:72:21:6b:09: 3c:6a:a6:23:c3:05:7e:d2:4f:6a:6e:15:b1:cf:bf:da: 45:ed:59:60:50:5e:4f:c1:ad:92:5e:db:65:3a:76:85: d2:c4:74:3c:18:8e:cf:ed:91:29:1c:3a:e3:1d:96:02: a4:c4:fa:d0:e0:d2:8a:48:cd:6e:22:2a:72:aa:2e:84: 6a:3a:56:b7:b8:e8:6f:15:6d:b0:3e:1c:85:fa:6f:a8: 82:a3:68:fb:fb:9e:dd:0e:0b:52:fb:b0:a2:b9:f4:14: a6:55:90:ef:a1:55:0d:f5:14:70:8b:0c:6e:46:05:4d: 9b:17:19:dc:bb:2d:df:2c:33:9a:b5:0d:55:a4:5a:de: 55:0e:d4:00:cd:b0:4d:ee:8e:8b:6d:fb:40:76:7b:d0: 92:e2:dc:74:40:e0:17:08:e9:54:83:a2:66:b6:65:76: 22:e7:9f:f0:19:c3:b6:11:4a:ab:6d:98:35:40:92:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7c:1c:c6:e4:5a:be:62:65:e2:b0:ad:ae:32:26:80:67: c3:e8:03:fb:5c:b1:69:d9:b9:2a:f7:6e:c0:4d:6b:39: 68:bc:1a:4b:98:bc:43:22:c9:c5:7e:8f:cf:92:6f:a6: 37:b7:5f:6a:92:de:af:93:d1:44:a2:4b:2b:ee:ad:e7: fe:1e:50:7d:d8:b3:af:ef:1c:84:57:51:85:88:2e:eb: e2:7a:5e:91:c7:b1:20:0e:92:32:15:6c:b9:67:f9:14: da:ac:7f:36:69:3f:a1:8d:70:32:a0:d3:5b:d9:2c:22: a3:aa:3d:bb:32:57:85:d3:75:f7:43:93:3a:76:25:7f: 0e:d2:58:34:3a:79:1b:86:e0:e6:be:09:8b:3e:07:88: 1d:ab:98:7a:d3:be:01:d8:6a:d5:93:41:3a:48:34:8e: d4:18:5c:c2:16:90:ea:6e:40:73:5a:07:7e:70:ee:f0: b3:e8:eb:4c:03:e6:56:72:f9:58:8e:df:69:a3:d4:ae: 3a:b9:45:1c:4b:6d:6d:f3:ac:7e:df:83:32:b0:f0:de: 7c:05:90:7f:a2:e3:da:18:d9:89:ff:62:07:2d:60:55: 33:4f:9f:00:f2:05:49:cc:68:d0:ea:67:fa:a5:11:a8: 75:b1:ab:9c:32:99:26:2a:e7:6d:1d:32:d9:16:b2:0a Fingerprint (SHA-256): 40:74:F8:5A:5B:2D:D1:C6:94:B8:2B:EA:67:9D:4F:55:49:1C:A1:15:DD:95:8A:3E:90:5D:72:DF:6D:EC:CF:9E Fingerprint (SHA1): 6B:5B:14:E6:37:68:1E:4E:1C:7C:A7:B0:94:CF:4E:A2:22:48:F6:97 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #258: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204028 (0x374402bc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 20:42:16 2022 Not After : Tue Sep 27 20:42:16 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:1e:59:1e:45:03:b6:3e:1c:a4:7b:92:89:ab:35:7b: 46:d0:04:e8:2b:6e:3b:10:83:97:32:ed:e2:0c:af:92: 79:8c:38:f3:91:a3:4a:b1:ae:2f:27:a5:42:9e:08:11: 10:f3:fd:68:01:fb:86:cd:96:42:18:fb:82:1c:3d:7d: fc:bd:51:15:6c:d9:d7:ff:37:09:b0:f2:72:21:6b:09: 3c:6a:a6:23:c3:05:7e:d2:4f:6a:6e:15:b1:cf:bf:da: 45:ed:59:60:50:5e:4f:c1:ad:92:5e:db:65:3a:76:85: d2:c4:74:3c:18:8e:cf:ed:91:29:1c:3a:e3:1d:96:02: a4:c4:fa:d0:e0:d2:8a:48:cd:6e:22:2a:72:aa:2e:84: 6a:3a:56:b7:b8:e8:6f:15:6d:b0:3e:1c:85:fa:6f:a8: 82:a3:68:fb:fb:9e:dd:0e:0b:52:fb:b0:a2:b9:f4:14: a6:55:90:ef:a1:55:0d:f5:14:70:8b:0c:6e:46:05:4d: 9b:17:19:dc:bb:2d:df:2c:33:9a:b5:0d:55:a4:5a:de: 55:0e:d4:00:cd:b0:4d:ee:8e:8b:6d:fb:40:76:7b:d0: 92:e2:dc:74:40:e0:17:08:e9:54:83:a2:66:b6:65:76: 22:e7:9f:f0:19:c3:b6:11:4a:ab:6d:98:35:40:92:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7c:1c:c6:e4:5a:be:62:65:e2:b0:ad:ae:32:26:80:67: c3:e8:03:fb:5c:b1:69:d9:b9:2a:f7:6e:c0:4d:6b:39: 68:bc:1a:4b:98:bc:43:22:c9:c5:7e:8f:cf:92:6f:a6: 37:b7:5f:6a:92:de:af:93:d1:44:a2:4b:2b:ee:ad:e7: fe:1e:50:7d:d8:b3:af:ef:1c:84:57:51:85:88:2e:eb: e2:7a:5e:91:c7:b1:20:0e:92:32:15:6c:b9:67:f9:14: da:ac:7f:36:69:3f:a1:8d:70:32:a0:d3:5b:d9:2c:22: a3:aa:3d:bb:32:57:85:d3:75:f7:43:93:3a:76:25:7f: 0e:d2:58:34:3a:79:1b:86:e0:e6:be:09:8b:3e:07:88: 1d:ab:98:7a:d3:be:01:d8:6a:d5:93:41:3a:48:34:8e: d4:18:5c:c2:16:90:ea:6e:40:73:5a:07:7e:70:ee:f0: b3:e8:eb:4c:03:e6:56:72:f9:58:8e:df:69:a3:d4:ae: 3a:b9:45:1c:4b:6d:6d:f3:ac:7e:df:83:32:b0:f0:de: 7c:05:90:7f:a2:e3:da:18:d9:89:ff:62:07:2d:60:55: 33:4f:9f:00:f2:05:49:cc:68:d0:ea:67:fa:a5:11:a8: 75:b1:ab:9c:32:99:26:2a:e7:6d:1d:32:d9:16:b2:0a Fingerprint (SHA-256): 40:74:F8:5A:5B:2D:D1:C6:94:B8:2B:EA:67:9D:4F:55:49:1C:A1:15:DD:95:8A:3E:90:5D:72:DF:6D:EC:CF:9E Fingerprint (SHA1): 6B:5B:14:E6:37:68:1E:4E:1C:7C:A7:B0:94:CF:4E:A2:22:48:F6:97 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #259: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #260: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204033 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #261: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #262: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #263: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204034 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #264: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #265: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #266: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204035 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #267: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #268: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #269: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204036 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #270: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #271: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #272: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204037 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #273: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #274: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #275: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204038 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #276: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #277: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #278: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204039 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #279: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #280: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #281: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204040 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #282: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #283: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #284: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204041 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #285: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #286: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #287: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #288: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 927204042 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #289: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #290: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 927204043 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #291: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #292: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 927204044 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #293: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #294: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #295: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #296: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #297: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 927204045 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #298: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #299: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 927204046 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #300: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #301: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 927204047 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #302: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #303: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #304: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #305: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #306: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 927204048 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #307: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #308: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 927204049 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #309: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #310: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 927204050 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #311: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #312: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #313: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #314: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #315: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 927204051 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #316: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #317: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 927204052 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #318: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #319: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 927204053 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #320: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #321: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #322: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #323: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #324: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 927204054 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #325: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #326: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #327: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #328: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 927204055 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #329: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #330: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204033 (0x374402c1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Tue Sep 27 20:42:28 2022 Not After : Tue Sep 27 20:42:28 2072 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f7:fe:bd:45:8a:95:04:6c:b0:c6:cd:fa:61:1f:ba:79: 0e:45:ff:22:f6:c3:5a:a0:31:2c:6f:e6:86:f7:f7:86: 34:40:3a:62:21:cc:17:26:a0:a4:e6:65:fe:02:5e:8c: a7:ae:51:13:f2:e9:e9:63:84:84:ab:a9:69:c1:08:85: a2:2a:11:1a:f8:8b:9d:59:96:f4:f6:b1:2d:df:c4:7d: 42:46:75:99:59:53:ad:16:7f:f3:ad:b5:dc:0d:e7:73: 73:7a:4d:78:17:8b:a1:11:e7:42:80:1f:80:d6:0f:39: c6:0d:63:8d:96:4b:a2:52:de:42:8b:17:e4:ba:bc:3c: d5:5f:b0:88:3d:67:84:e8:c0:f6:ad:20:42:7e:78:72: af:60:68:30:34:da:ea:ae:cd:37:8f:d3:d8:ab:ad:4e: 12:39:58:ef:b5:a6:d5:da:ff:73:bb:84:ea:24:4d:78: da:c8:76:7c:bb:63:a7:a1:cb:ce:a3:8b:cf:ca:2b:41: ef:92:df:77:be:9c:20:e0:bd:70:ef:4a:12:1d:75:27: 23:f8:fd:78:81:89:29:9f:54:21:78:e7:1e:e7:12:af: d8:44:f7:8e:3f:7d:4f:30:fa:ed:c5:f9:09:33:69:98: 2a:ef:67:bd:46:df:d1:11:04:2f:dc:6b:0c:d7:cc:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:e5:8e:c3:7e:39:10:26:28:0c:46:ad:06:12:f5:9f: 21:54:b1:f3:aa:91:05:4d:c0:89:ad:1c:ac:b5:ea:94: de:6e:ad:ef:72:b7:ee:20:35:8f:7e:01:f6:aa:06:0a: dc:77:a5:57:e4:4e:c6:ff:e7:7c:d8:69:22:e2:7a:39: 2f:b2:92:2f:89:8b:6b:96:78:17:51:df:96:dd:68:0b: 70:cc:b0:65:2c:bf:ec:3f:60:f2:7e:9b:a9:fb:f4:77: 86:7a:2e:31:ed:09:00:2f:de:12:53:e4:c1:e7:cc:a1: d5:84:29:f9:3d:3a:00:6f:7a:36:89:d6:47:9b:06:9e: 7b:7b:9b:d6:d8:44:d9:8b:4b:55:1a:10:18:76:88:bf: ad:f8:ad:85:eb:a7:a0:af:15:d4:db:4d:01:6d:37:36: 39:6f:53:e2:61:55:a3:c1:f3:25:dd:44:d0:d1:e9:6f: 7a:a5:58:09:8d:79:78:8d:5d:ee:e2:e9:24:5c:5d:64: 77:8a:81:35:f8:b8:fd:d0:9a:3b:47:7f:e6:ca:20:23: 2d:7c:ec:b7:b4:15:58:00:29:c2:b0:ef:f8:bb:c7:14: eb:52:18:ad:0f:7d:25:2d:a0:bd:d6:1a:5f:7b:f1:89: d9:de:3a:a8:9b:8d:fd:fa:cc:a6:ef:b1:05:75:5b:8b Fingerprint (SHA-256): FC:FD:F9:92:02:A8:98:78:BA:97:FE:81:BB:D9:D8:4E:E0:92:04:0A:9E:45:A5:67:6E:36:22:71:76:BF:19:76 Fingerprint (SHA1): 4D:B8:E7:F7:E8:47:52:B6:9F:43:AE:89:BC:B1:F4:18:4C:57:6B:4D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #331: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204034 (0x374402c2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Tue Sep 27 20:42:30 2022 Not After : Tue Sep 27 20:42:30 2072 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:55:17:e7:dd:ef:9f:d9:22:30:86:96:12:03:55:87: cc:fc:96:32:cc:fd:db:67:76:f7:cb:9d:4e:34:0c:0e: 48:f1:2a:73:75:2f:5c:59:75:9c:85:d0:97:33:4d:a1: 6a:7a:ee:ba:8c:7e:1c:aa:33:13:65:ce:e1:47:41:6d: b2:e9:ee:91:a8:52:a4:d3:a4:db:19:b9:74:ca:56:2f: bc:5f:31:34:37:f3:fc:2b:7d:57:6b:b9:ee:e4:a5:99: 44:e7:16:25:de:c6:a9:de:31:2d:3f:8f:b8:1a:43:c8: 32:e9:11:43:79:98:02:dd:89:e9:ad:e4:b5:91:08:dc: 71:1b:08:6a:05:ea:4e:24:22:65:ed:dc:98:eb:dd:96: fa:56:a0:af:d4:6f:63:0c:1a:f9:da:ae:e8:93:f7:df: d1:34:d8:98:47:28:b4:da:9f:b0:5f:db:f5:10:6b:d5: c1:f2:f8:14:4f:f9:0f:8f:f7:81:8f:70:62:dc:c2:0c: dd:b2:c4:82:bf:b6:c8:34:89:46:bd:4b:57:38:21:26: a3:54:6b:b9:7d:62:5b:c1:01:d3:cc:3d:8c:48:cb:ac: 58:24:67:f5:b9:ad:41:5f:c5:1c:b9:43:68:e6:a9:c1: 93:5b:58:26:0d:92:07:53:45:21:d1:75:ba:02:9e:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:4a:1f:12:03:70:78:6d:9e:d3:5d:93:d5:1f:f6:7b: 73:33:83:4c:29:1d:0a:4c:39:0d:3a:8d:26:91:35:0b: bd:6a:0e:bb:b7:2e:9e:08:c7:9e:e4:a8:49:4c:16:5f: 5f:68:c8:b1:af:34:54:1d:40:01:ec:03:59:83:25:00: 43:27:c9:4d:56:28:52:68:f3:20:9e:1b:5e:3e:31:32: bc:9e:e0:a1:62:05:9d:f7:59:7f:b0:8b:50:0f:31:b2: 70:6f:1b:3a:f3:80:8f:1b:35:cd:82:b5:67:20:8f:8c: 9c:e7:f2:95:56:8c:6e:62:4b:75:ea:3a:8b:28:06:b0: 03:44:b2:23:9b:d8:5d:70:04:8f:b7:f4:d1:f4:5a:8d: 18:25:f4:a1:15:a3:87:5a:6c:d8:b5:74:1a:93:6c:da: 12:a3:a5:be:f5:ed:79:ee:23:fd:9c:ca:b8:e5:55:a2: 68:9c:5b:bb:49:ba:d5:67:2b:77:42:3f:33:bd:d2:7a: 98:fa:81:b0:23:10:e7:f3:14:00:ce:95:f2:51:33:35: 7a:7c:32:94:46:05:d8:ca:51:4a:96:76:2f:02:24:56: fe:39:f3:8e:65:82:79:93:e1:a8:1b:75:b5:06:5e:13: a7:66:e2:a3:ed:72:ae:0f:a8:9f:d8:b5:50:2c:86:c8 Fingerprint (SHA-256): B7:CD:25:EE:86:3F:8D:21:AA:BF:D0:88:0C:4F:73:36:57:36:4F:D3:C5:5A:52:C5:67:DF:FF:56:C7:04:FC:9E Fingerprint (SHA1): 61:0C:8F:98:A1:0E:43:D0:F8:DF:A5:56:9B:38:11:6C:E3:C1:E6:A3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #332: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204035 (0x374402c3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Tue Sep 27 20:42:31 2022 Not After : Tue Sep 27 20:42:31 2072 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f0:19:57:62:77:30:d0:93:52:8a:05:86:5e:78:b2:07: 49:8b:34:85:3c:1d:d6:93:16:86:4e:87:d4:b4:a2:2e: c4:2f:12:dd:de:4d:1d:d1:d2:5f:5d:cd:47:47:fa:80: 14:84:34:ad:7d:58:49:51:52:4e:9c:93:8d:16:7a:70: 58:90:cf:6a:60:13:66:c9:e1:f5:f7:43:f4:a2:f2:78: ec:42:c4:11:57:26:78:82:f4:de:7c:3a:c7:af:4d:43: b8:e2:0b:94:b6:ca:a5:9a:8b:a4:2e:b1:42:68:4c:75: b6:9d:c2:95:04:53:e0:fd:b5:91:d2:2c:ee:72:93:35: c8:67:77:3e:22:fd:45:b6:1f:2a:72:fa:0f:89:e1:7a: 2d:5b:47:68:6f:43:55:8a:83:80:e3:e3:62:c7:f2:37: c2:73:0d:01:0a:b2:db:20:aa:ca:c5:7c:47:8c:5d:93: 2a:fa:67:40:10:2e:90:85:e1:0a:1d:ca:ec:b6:72:79: 78:d8:5d:fa:81:36:14:0b:a2:b8:af:82:6c:89:60:e0: 98:c7:00:61:0f:43:e4:73:de:61:29:f7:49:79:17:c7: 2c:fc:6f:78:c8:f7:ca:e1:43:c0:79:0f:f4:7c:17:ae: e4:26:e5:19:7c:ad:18:20:4b:1d:18:eb:bd:c5:96:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:ad:0d:e3:04:81:3c:6c:23:47:3a:aa:59:55:54:6a: 40:ba:cb:e4:0f:07:64:e1:93:8d:da:f4:cb:ea:ef:0d: 3d:a1:69:3e:4a:9c:ad:ca:ad:c4:86:5e:a2:4b:86:c0: ad:fe:a5:f7:cd:12:13:3f:e9:5a:ab:3a:39:a9:14:88: a7:6f:a1:8a:f0:f6:09:70:33:db:90:3d:28:a5:10:c7: 72:eb:90:27:a8:67:20:b7:18:3e:e2:ff:b8:ef:fd:51: ae:3a:fe:ee:c5:5e:9b:f6:33:43:3f:5f:a7:33:ae:9d: c2:fd:70:2b:ba:8e:23:db:2d:52:d5:1d:e1:82:97:b5: 9d:7a:77:8b:db:6d:6d:e6:54:6e:90:e8:53:3d:28:6e: a0:78:68:36:95:50:15:92:31:cb:81:51:d2:e5:3c:24: 8e:6b:a4:ab:c6:d1:f3:7a:33:65:fa:a9:55:5d:52:a7: 36:ba:3b:24:07:e5:d9:0a:c7:e7:df:f0:40:0e:57:e8: f3:d4:8a:18:a5:bc:e7:f5:12:6f:98:94:83:df:7b:bf: 8a:1b:3a:eb:59:6a:5c:06:89:08:e9:1e:0d:32:cb:82: bb:de:4b:2f:99:da:6f:97:81:c3:ab:9c:56:9e:fb:ba: 39:4a:3b:cd:82:52:df:71:6d:cb:dd:d7:de:87:74:20 Fingerprint (SHA-256): 9F:3D:D2:13:90:0B:16:85:8F:EF:18:2A:BB:AC:71:27:EB:D5:3E:4D:BE:C7:CC:A8:8B:0F:64:9B:33:48:52:BC Fingerprint (SHA1): EB:04:6B:72:AB:62:57:30:D5:EC:63:4B:47:4D:A5:99:52:36:1F:3A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #333: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204036 (0x374402c4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Tue Sep 27 20:42:33 2022 Not After : Tue Sep 27 20:42:33 2072 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:d5:2c:25:38:ee:1a:ad:db:d7:74:82:3d:2a:79:ee: a7:4c:da:09:0e:34:95:bd:b5:87:e0:0c:33:9a:78:d4: 39:9a:79:ef:08:da:f2:61:5a:c4:c6:ca:5d:ba:61:fc: b7:58:10:02:8a:d1:a2:9f:4b:91:00:ec:d1:13:40:98: 86:c5:5b:d6:20:9d:72:1d:a3:f9:40:ab:9a:36:d7:54: a0:bf:16:50:a0:cb:1f:82:33:e8:a3:61:9e:6a:1d:9b: c6:20:d5:72:7f:cc:e4:36:aa:82:b5:2f:b7:24:a0:85: 68:3a:ab:16:56:de:cf:6e:32:5e:24:f7:7e:2c:90:e4: 97:17:ee:60:e4:e9:0d:7b:a3:af:32:f4:e3:3d:ec:4d: d4:ed:ec:ee:97:ff:23:8b:bf:33:36:aa:0f:5c:66:e5: 92:60:c2:b0:63:bb:03:ca:5d:c7:44:62:e7:77:be:01: 30:a8:7e:bf:56:dc:7c:c7:ae:25:04:4c:ad:c2:4b:a7: 92:70:80:1a:9d:5c:54:21:5a:b0:e3:91:fe:76:e3:6d: 7d:a8:9c:9d:fa:3b:17:b9:0c:39:b1:a8:8e:c7:86:8b: 10:3a:04:0b:d8:b4:00:a7:e4:8d:e1:62:4f:ad:50:af: 97:33:d5:93:47:fe:ed:ec:bf:82:27:30:76:43:22:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:c0:cd:21:dc:b7:d2:97:58:6f:51:0d:00:76:e4:c2: da:77:c8:08:9c:2a:8d:54:bc:24:63:4c:ec:35:72:3a: 31:32:15:d3:ed:c3:32:3e:82:f8:ad:08:90:26:d7:13: 4b:d1:07:71:99:1e:89:00:5d:b9:d5:39:99:e1:02:0c: d4:ed:80:e2:2b:0f:be:a0:6a:1f:54:e1:86:7a:d2:d7: 4c:15:08:80:f0:3e:27:fa:9a:f8:f7:62:f8:fd:c1:05: ff:04:d9:b8:8d:82:27:f5:e2:e7:ea:8f:3f:60:16:ed: 4c:55:cf:40:24:71:2f:35:a3:33:c0:79:1b:7c:2b:6a: de:a0:ad:ca:f4:e3:45:e1:85:97:aa:f2:6d:63:e7:6c: 38:df:d5:84:6e:ae:98:5f:51:91:44:e5:ba:c9:78:be: 63:17:7d:88:cb:e6:5a:34:2e:0a:fc:eb:f0:ba:fe:89: bd:8c:03:56:7f:69:0c:70:25:b4:76:28:05:dc:43:8b: 98:48:5e:6a:65:43:82:fe:b8:b1:39:2f:9b:ba:3d:25: 96:93:c4:d9:83:06:85:56:74:98:eb:bf:84:e9:be:0c: 7a:95:de:3f:12:ec:79:cf:01:9e:8a:bf:e5:b3:0b:7e: 9e:27:73:04:1f:ae:a9:f6:58:13:e3:15:b9:e5:4d:c2 Fingerprint (SHA-256): 7D:E7:39:8E:1F:A2:69:71:8D:46:58:B6:EB:44:53:F3:E5:79:45:14:2C:CA:FF:F8:BC:BD:95:A4:07:F2:32:AE Fingerprint (SHA1): C0:DB:4C:F1:BB:94:1B:7C:97:F2:11:95:E2:22:CA:54:AA:78:2A:4E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #334: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204037 (0x374402c5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Tue Sep 27 20:42:35 2022 Not After : Tue Sep 27 20:42:35 2072 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:01:ad:d0:fa:89:79:3a:d0:48:17:86:bd:6d:a5:7a: 9f:f5:41:28:3c:d3:83:ba:3f:a9:f5:a6:f4:c0:10:3e: fa:21:51:b9:6d:14:89:b0:64:cd:02:b2:1a:a6:62:24: a2:7a:76:a0:f7:de:46:4b:38:e7:30:2c:75:7f:23:75: a7:c6:1d:a4:68:0e:f2:56:57:a0:a0:42:13:72:8b:7e: 03:a6:72:08:a0:d9:ba:68:05:a9:49:ac:2f:db:86:17: 2a:59:64:84:31:50:b4:d3:af:59:e3:35:d3:73:54:dd: 58:5d:65:c7:ba:73:56:31:ae:fc:b0:db:5c:65:f2:58: f6:17:de:69:dc:1f:7c:de:b1:f4:5c:a8:25:10:82:b3: 05:b2:a5:ff:66:c2:b1:9d:02:c3:d8:6a:1a:4b:9e:48: e2:4d:23:27:c0:59:c0:6a:71:74:d1:e7:4c:7b:b3:32: 0e:fb:8a:8d:8e:13:26:a8:3a:8a:cd:95:00:07:6d:ce: 79:9d:87:b6:48:e5:fe:c0:9b:1a:72:1a:ee:1f:77:9c: c4:78:94:c5:1e:ee:97:3a:b0:c8:bc:94:b6:fe:2a:5b: 03:48:3c:f5:42:6d:c5:13:dc:57:64:5f:30:13:e8:41: 0c:c8:17:c4:e5:b3:dd:38:9a:0c:91:eb:d4:f5:5a:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:78:9a:3d:ee:54:eb:2b:84:d6:42:7c:e2:3d:6c:5f: ed:01:bf:68:14:df:72:3a:2f:bc:a4:e1:c2:cf:04:81: 06:4b:51:2d:1a:4e:da:dc:4b:b8:4a:62:12:23:c8:2f: d0:ca:45:ac:9f:78:29:8a:53:f0:da:2a:69:31:5a:ef: 90:80:74:62:7f:76:65:0e:f9:77:a2:56:d4:7e:5a:6b: 60:b1:a3:b9:5e:de:57:c6:1e:88:1c:60:a8:56:58:32: 3c:41:cb:ac:f3:cf:fc:0f:a0:ad:67:fd:9e:11:4a:aa: b6:bc:b8:c4:81:6e:f6:3f:b0:97:88:74:c7:4e:58:7a: d5:e2:ba:31:87:e4:db:22:2e:91:2f:26:98:e0:31:a2: 66:55:24:89:48:96:02:2d:6b:dc:04:68:04:f8:7a:13: c4:69:52:9e:71:cb:ca:14:54:5e:a0:a6:04:3c:41:16: c7:7c:83:d5:2b:df:80:c7:8f:66:56:c1:da:d5:d6:ff: 29:53:b4:41:d1:ee:df:2f:6c:2c:3c:a9:7b:d5:3e:96: 8f:cc:94:20:03:8c:a2:57:44:52:98:db:27:0a:88:d8: d7:8b:6d:ad:66:96:ae:d4:49:27:01:47:66:4e:11:e9: 9a:6b:47:bf:fe:2d:32:e1:b7:ec:61:f6:84:15:78:48 Fingerprint (SHA-256): 3E:7B:FC:2C:22:56:68:33:02:35:39:91:35:D6:51:A4:00:00:AE:2F:70:4C:DF:2C:FE:75:28:A4:D6:FF:90:FE Fingerprint (SHA1): EA:6A:7D:B6:DC:5C:BE:2A:1D:16:43:19:0F:63:CF:3E:E4:C0:0C:41 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #335: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204038 (0x374402c6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Tue Sep 27 20:42:36 2022 Not After : Tue Sep 27 20:42:36 2072 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:83:6e:a3:5e:25:e8:8a:2b:b4:ce:f8:04:cf:d6:ca: c6:fd:f2:ec:6c:89:a2:0b:3f:69:7d:f4:30:fc:b7:a2: e2:fc:04:5c:74:60:2e:9c:2c:04:21:4e:3d:d8:72:c2: 12:0b:00:f0:54:58:0e:8a:07:90:8a:ed:0e:89:49:13: 8e:e9:c8:59:cf:fc:51:be:e7:04:8c:2e:d2:41:14:f6: 62:7d:b2:dc:15:7b:6d:30:16:d4:0c:45:50:33:a5:3f: 2e:c5:b0:54:31:3b:29:d4:41:72:b9:b5:f7:5b:36:f7: 66:1a:44:59:bb:c7:89:bb:a2:32:02:6e:2c:31:e1:34: 88:65:89:ae:4b:55:d0:50:22:1b:d2:22:4d:c7:43:82: 68:bf:2a:c0:6b:3e:99:0b:07:b0:7c:fc:95:f7:18:16: 74:27:cf:6c:69:77:76:d2:13:c2:5a:ce:76:23:a9:6b: 8f:8d:e5:11:b3:bb:57:a8:93:b2:06:f3:25:ec:60:5b: e1:87:a5:50:0d:21:75:32:6b:3a:b8:bb:79:40:76:c1: 53:aa:62:08:2b:5b:ef:97:88:5a:09:f1:81:6f:79:01: 13:e1:fc:41:a5:0c:56:71:13:07:bd:28:8c:22:8f:e8: 01:71:b9:8e:36:c0:09:22:bf:58:80:23:5e:f3:c3:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:bb:9d:f6:b1:e1:f9:11:fe:23:bc:93:11:b8:e0:89: 9a:e5:47:c8:f9:4b:1a:9b:43:39:fa:36:da:d0:7d:62: ef:a6:ef:e1:75:f5:b4:fd:7b:d6:07:92:f4:a4:88:e4: e2:99:f0:da:b1:3f:7e:40:02:e9:1e:eb:56:b6:91:3c: c5:d7:9c:96:d0:35:ba:32:59:b1:07:7c:c9:10:9b:2c: 2b:6d:45:a3:8e:39:c9:5e:3e:2d:09:d1:d3:f1:5d:d4: b0:c2:49:ac:d4:da:e6:8b:a2:0b:97:0c:b8:eb:34:a6: 03:d6:76:f5:ab:24:64:f2:e8:bf:9d:e1:8e:ad:2a:b9: e6:c7:b5:17:ef:cc:e3:76:4d:5d:f8:bc:86:4a:1a:ad: 49:de:63:54:60:52:63:44:f2:3f:cd:51:63:21:7b:2e: 9c:5b:e2:12:5b:40:bd:5d:91:8e:49:b0:27:ed:98:f3: 9b:75:c8:f8:bf:c5:36:85:9a:47:a7:70:b1:60:c6:5f: ff:b2:69:44:2f:6c:c1:21:4e:30:15:d0:e2:46:d0:99: d3:58:60:af:c4:91:8d:c1:a0:bc:53:76:57:0d:57:ee: 77:96:85:d6:78:08:04:95:a9:8c:fd:8b:9d:ce:26:0e: f9:bf:38:72:0c:3e:70:69:ee:d0:d1:50:64:63:54:b4 Fingerprint (SHA-256): D4:98:0C:FF:A4:26:2B:90:EE:D6:62:85:03:30:1A:5C:1A:3A:5C:67:A1:22:ED:CA:FF:2E:D2:30:1C:94:73:74 Fingerprint (SHA1): 96:7C:79:ED:D5:99:9B:FC:6E:A1:5B:55:9F:67:81:A5:8F:4E:80:25 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #336: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204039 (0x374402c7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Tue Sep 27 20:42:37 2022 Not After : Tue Sep 27 20:42:37 2072 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:9c:f5:88:bd:29:f8:05:bd:44:e2:06:80:ca:ab:dc: 11:10:7d:35:c1:49:e8:41:13:8d:0d:e1:18:61:02:85: 7a:0d:bf:8e:1f:28:d1:93:4d:9e:a5:d6:39:27:99:9e: f7:bb:81:98:39:1c:e2:6e:39:5b:88:0b:40:00:74:dd: b1:1a:df:9b:bc:b0:cb:4f:b5:90:01:b6:2e:23:29:82: 5b:92:1e:44:04:d7:4d:df:64:9d:52:40:4b:fb:d5:a9: bc:3a:07:01:90:96:d5:78:a8:be:bf:cf:98:f9:08:16: 81:59:77:c5:bb:e5:1e:50:38:b2:00:3a:65:46:a1:48: 72:48:ca:66:af:ce:d8:ef:21:47:4c:2b:33:64:3d:b8: 19:87:e2:60:91:6f:73:c9:35:7a:a1:b9:85:0a:f1:f3: d5:8c:a0:25:00:00:12:de:11:5e:4f:f3:82:fe:45:43: b9:89:fe:11:71:60:89:af:f0:f4:41:60:e1:0f:3d:d1: 2d:0c:8a:ab:de:92:4a:9a:ed:63:96:6c:94:d1:b0:dc: 77:ba:f5:90:b7:4d:db:c2:06:3f:ba:80:be:50:21:fa: dd:21:67:96:bd:68:14:5a:7e:50:b1:c6:7b:1a:34:0c: b9:97:bd:67:04:45:84:01:ed:a3:8d:97:af:5c:5b:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:69:86:da:4f:f5:a2:3e:c5:4b:3b:2c:70:62:e7:63: cd:c2:4b:99:3c:4b:b9:c6:01:cf:39:3c:e2:88:de:18: c5:e0:0d:a2:1b:a9:d1:67:9c:53:1b:fd:bf:7b:9a:b3: 28:7d:5a:2f:78:27:5e:0e:05:5d:41:74:cd:db:0e:42: fc:1a:2e:34:10:9d:d3:59:37:88:b9:d5:fb:0e:69:de: 87:79:eb:34:93:a1:97:dd:f1:26:78:d1:50:f7:1a:4c: 2f:06:13:83:ed:bc:37:55:5b:1d:35:9a:db:a4:96:7b: 45:c8:c7:db:52:95:e0:7d:53:85:d2:4e:4d:9c:70:04: da:8e:6c:cb:50:d8:8c:49:d8:44:52:fd:38:78:0c:e9: 0f:dc:64:9b:4a:bf:b9:b4:13:cc:dc:5a:a9:b6:3f:60: 69:e7:14:ac:68:d8:62:0e:ad:80:fe:85:d8:ad:f4:05: e6:fd:d8:ae:20:b6:3a:92:a6:10:f9:73:bc:3c:83:4f: e7:b3:8f:ce:cf:cf:f7:9a:bc:b5:30:36:3f:41:99:dd: ef:fa:42:1b:e5:93:ae:64:9f:28:7e:23:72:71:64:21: 8e:0a:f1:24:26:bb:e4:c1:bc:44:4a:48:bb:c6:a0:1e: a0:c2:6e:e7:e4:ba:68:ea:60:23:6f:f5:8d:68:f6:d5 Fingerprint (SHA-256): 20:49:FE:BD:36:70:07:76:46:0B:4E:8A:41:F6:03:00:05:EE:2A:56:B7:09:76:68:84:CC:E6:CA:07:69:ED:8F Fingerprint (SHA1): 8A:5C:7D:CF:FC:B5:5C:6E:C4:E2:D8:40:F5:6F:68:24:6B:E4:20:8A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #337: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204040 (0x374402c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Tue Sep 27 20:42:38 2022 Not After : Tue Sep 27 20:42:38 2072 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:1b:00:40:29:0a:cc:10:db:96:fb:4e:d6:12:f9:d2: 07:ca:ac:1d:bb:3d:69:5a:56:d3:36:d4:a7:d8:92:b8: 47:a7:f7:a9:86:d8:53:d3:9a:7d:da:db:ac:6c:d1:38: bc:c0:8d:54:f6:2f:67:5f:8b:92:18:d0:69:46:ee:9d: 7e:1e:60:4f:38:ea:e1:cd:f9:e2:7f:3a:84:f9:fc:4d: 8d:89:e8:ca:d2:6c:8a:6b:43:a8:e9:b1:01:62:67:df: 6e:e4:bf:78:f3:98:d1:7a:79:39:80:c5:da:9f:5e:ea: 40:66:68:2c:d2:8f:01:13:18:27:91:d3:62:ad:9e:30: b2:be:fe:16:f0:26:47:7d:cc:c4:92:b7:55:64:c9:d1: 2d:8e:c8:18:60:10:72:cf:a4:ae:b0:74:7d:21:3e:64: 75:f4:ab:c2:53:81:af:4e:f7:21:00:03:57:be:8b:cd: c8:60:77:59:a3:00:35:de:47:22:50:a2:7e:72:7c:b4: 9a:e0:55:9c:e6:54:87:78:3a:0c:ee:ef:27:00:7d:ed: 6e:29:6d:54:c0:20:ff:21:7d:43:23:aa:82:a2:d5:3c: af:f5:63:23:0d:e6:74:48:94:47:ce:f8:53:c8:f0:92: e3:f0:46:66:5f:33:cf:63:33:ea:6d:69:df:2e:14:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:fd:aa:87:23:98:4f:18:cf:b6:a9:18:0a:aa:22:4a: 56:bf:72:94:e0:7c:81:d6:c6:19:18:2d:1e:a2:e4:3c: ec:de:f8:67:cf:79:1b:2a:24:5b:ba:b8:cb:1e:fa:01: 57:30:64:24:e6:c8:7b:f7:e4:2f:64:7a:00:ba:b6:6a: 7c:75:e5:0d:14:3d:ac:7f:ae:6e:01:8b:b0:12:ca:33: 31:63:b0:7d:c8:11:3c:53:b0:73:9b:f1:0c:f4:91:b2: 78:fd:eb:21:8d:94:2b:06:4c:1e:5d:1c:d2:f5:fb:c0: a4:c6:2d:31:58:85:28:ff:fd:b9:0d:68:5a:40:ef:fc: ef:97:92:07:86:89:22:d7:f7:bf:95:9c:c2:d3:10:1d: 22:3b:42:d7:db:de:0c:9e:de:26:aa:a5:2d:6e:4c:f4: da:4b:68:c3:b4:c1:0d:0f:c5:e8:b8:0d:51:5c:07:6d: b8:1a:ca:f9:b9:ed:9a:b4:8a:c5:8f:04:13:f2:d7:b3: e4:8c:0a:68:dd:23:2b:38:1a:4b:a6:0d:91:65:14:c1: 47:ff:58:34:65:22:ca:ca:64:17:48:e2:d9:07:e6:07: 8a:02:af:92:ef:af:bd:75:4f:42:0f:5e:31:ff:50:ef: 77:b0:08:69:4c:f7:02:bf:79:c5:dc:35:85:d5:61:14 Fingerprint (SHA-256): 6E:2B:0A:B3:33:44:5A:91:47:D6:EA:17:15:AD:C4:5E:A6:E0:22:AB:19:0C:45:0D:AF:0C:96:BF:9A:21:39:95 Fingerprint (SHA1): 91:9E:60:2B:87:AB:F6:1C:93:C1:36:B3:2C:59:D3:23:1B:9B:BA:FB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #338: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204041 (0x374402c9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Tue Sep 27 20:42:40 2022 Not After : Tue Sep 27 20:42:40 2072 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:a5:42:4e:4b:a8:9c:26:33:e0:af:87:79:e8:00:f5: 90:f9:0f:9a:07:51:25:ce:89:1b:21:b1:fd:34:29:05: 99:90:0f:98:3c:36:2d:90:d2:74:19:a8:d4:4b:a3:3b: 29:c2:07:f4:39:71:4b:fc:a3:e5:07:dc:e2:02:25:79: 4a:a2:cc:86:0a:e4:ad:c1:49:e3:bb:34:1c:d5:8f:18: 73:ec:63:ae:3b:e3:d7:0c:fd:3d:f8:8b:90:dd:71:0a: ea:c3:2b:73:5f:ef:47:cc:b0:ec:0a:f5:44:c5:4d:70: 1b:8e:67:8e:3b:5d:cd:60:38:10:0a:8b:a7:a9:1c:1b: 7e:cc:be:ea:84:41:be:44:a6:3a:e4:ee:d9:cb:a3:8e: d4:70:4f:f4:68:e7:a6:57:e8:7a:ce:09:18:4f:0f:a4: e8:5e:fb:c7:f0:63:0a:c7:db:34:d8:bf:ab:6a:3a:26: df:25:46:fb:c5:17:85:aa:89:09:b3:d2:8c:94:f6:cc: ef:75:df:c9:1f:28:ad:05:5e:07:d6:dd:d0:40:a8:2c: 15:f5:9d:4b:93:9b:e2:e4:c3:ba:d5:a9:62:b5:ab:88: 23:07:32:f8:58:2f:7e:14:37:60:9f:ca:91:ec:e6:db: 92:da:7f:bb:c1:50:65:cf:3a:a0:85:90:85:24:77:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:f1:4a:56:03:8a:d5:8c:43:e1:40:14:36:c6:20:a3: ef:e8:58:52:b8:5f:d7:5b:f5:7b:b4:3b:85:fa:d2:68: ec:02:34:43:00:e7:09:74:02:35:19:f8:a8:69:62:ba: 5e:2f:60:2c:e6:ec:77:fd:fb:7f:bf:72:48:c5:dc:5f: 88:19:68:25:4a:70:e7:38:d0:40:1b:27:aa:0a:dd:eb: 3f:1e:fd:40:e8:47:e3:d2:4c:24:04:b6:6d:0c:30:c0: d1:42:93:9d:01:73:03:33:81:e0:fc:ed:09:82:17:4b: 06:35:4f:24:d9:1a:65:84:d6:45:72:0b:e6:86:7f:34: 8c:e2:50:42:dc:a7:41:67:ec:1f:45:b2:ea:52:48:f9: 64:6b:ad:40:72:a5:53:4c:ee:de:62:f1:f5:e1:1e:62: a6:07:b0:fb:47:5b:49:ca:15:55:56:50:c7:5a:c6:b4: 2d:f4:ef:02:a6:ae:49:4f:1d:b0:eb:13:45:a4:a5:14: 23:38:d6:22:3c:df:45:59:da:9c:02:c0:3e:27:57:a8: 50:19:6c:97:55:d1:b5:c7:31:b7:28:b1:23:1b:6c:2a: 0a:5e:1f:f3:76:c8:22:07:30:4b:f8:41:13:d6:78:02: 34:33:f6:1c:d9:e8:0a:37:46:98:62:c7:27:5a:fd:0d Fingerprint (SHA-256): C0:29:D3:FE:60:34:15:FA:9F:D2:40:1B:E1:CA:10:3E:7C:BA:97:87:FC:2B:54:A1:D3:E1:AF:4F:84:D6:26:DE Fingerprint (SHA1): CB:B6:2B:A0:8A:F7:98:47:0D:4F:7A:74:B0:74:AE:4A:DA:97:7D:0C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #339: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #340: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204056 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #341: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #342: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #343: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #344: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927204057 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #345: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #346: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #347: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #348: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927204058 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #349: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #350: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #351: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #352: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 927204059 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #353: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #354: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #355: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204056 (0x374402d8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:43:00 2022 Not After : Tue Sep 27 20:43:00 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:52:b5:e6:eb:05:58:c1:30:83:44:57:4a:e4:f7:d9: eb:16:12:59:43:e8:52:7e:22:b8:da:58:44:a9:a9:b6: da:ea:2f:f9:55:0f:93:29:00:f6:4d:60:08:5a:92:f8: 91:b2:ef:19:63:5d:a5:49:c2:a1:d5:ed:17:0c:f8:4e: dd:76:a3:cc:38:b7:ba:b5:b4:30:8e:41:92:55:6d:b8: f1:1f:65:4b:e8:4b:bd:92:e6:09:9c:ea:43:8f:61:89: 59:87:07:bf:c4:01:79:49:c5:60:a3:1c:89:bd:23:82: bb:46:d8:8c:c4:a2:82:34:f6:13:9b:cf:bc:40:b4:d2: 29:eb:d5:19:5a:cb:67:50:2e:b0:ff:df:84:ef:da:31: bc:03:b6:d2:db:26:42:dc:72:e5:63:c7:5a:a4:30:de: 91:b2:cb:c3:88:aa:88:fa:b6:8f:36:c1:ed:3f:90:5d: 39:51:1f:c4:48:68:f4:33:3a:29:c4:8f:ae:25:86:74: 36:39:38:70:ef:9f:25:dd:b2:74:1a:ef:8f:d5:2d:e6: 1c:fd:2c:f6:19:9a:25:fa:33:c5:59:b3:b1:49:2b:a2: f1:00:a6:7e:a0:dc:23:f8:2a:b3:73:bd:1b:d6:cf:01: a5:66:42:f2:fb:cc:29:40:2a:db:d0:52:9f:53:41:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:dd:68:f4:ad:db:36:c9:6c:91:04:3d:59:a2:5a:8d: 69:2c:6b:98:e1:99:90:d9:d3:3a:34:e3:de:63:38:f5: 0f:91:48:eb:6a:77:c9:76:30:6a:61:fd:a7:c3:bb:39: 3d:a7:6c:4a:a0:3a:74:ba:9d:3b:06:94:e6:91:78:e7: 3b:f4:06:86:77:f1:16:86:e7:36:28:10:33:bb:67:81: 3e:94:9d:56:ec:01:1f:19:46:e2:aa:44:47:c1:05:c8: 75:a7:9e:7b:5d:c3:af:5c:43:bc:67:9e:60:dc:e4:8b: c2:a3:f1:99:25:74:06:a3:f8:47:9d:3a:57:f9:f5:c6: cd:0d:3c:9e:ae:15:51:bf:87:45:8d:3c:e4:9b:92:02: 01:60:f8:6d:44:dd:47:f6:ad:e9:28:f3:c1:6c:07:bc: 0f:c3:11:ef:ba:b2:6d:29:8c:9e:76:2a:c7:20:fa:85: 01:2f:97:d3:7f:7c:f5:d2:1b:60:8a:06:5b:f5:e8:48: 5c:91:e5:83:12:40:6a:8d:cc:60:71:57:0c:8c:ea:10: 46:35:fe:0f:94:bc:79:14:01:cc:9e:89:4c:12:1c:ed: 51:c2:e1:22:3a:7f:99:b6:5a:f2:71:54:f5:d5:21:00: 09:c7:69:bf:97:7f:1e:99:a2:72:37:d6:85:d9:cd:14 Fingerprint (SHA-256): 04:66:5B:C8:B7:41:04:18:1E:AB:6C:5D:73:E6:16:B4:3B:A0:D7:38:B7:D6:C5:04:D0:F9:77:6C:BE:60:2F:1F Fingerprint (SHA1): ED:B7:63:1D:41:AF:38:B5:4B:3C:F9:ED:25:A2:DD:D3:89:5B:61:AF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #356: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #357: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204057 (0x374402d9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:43:02 2022 Not After : Mon Sep 27 20:43:02 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:83:bb:c2:6f:9a:b2:46:66:06:5a:60:9e:3c:bf:23: c6:31:b0:fa:75:64:f0:a4:ec:a6:72:5a:6a:36:fd:95: 65:fa:80:d6:e0:c7:14:eb:90:b8:e7:b2:52:9c:81:f1: b7:d8:66:65:ec:48:55:d8:f7:b6:59:44:62:1b:23:16: df:39:61:64:30:58:d0:69:88:df:49:ef:d4:18:27:c5: 51:8b:c8:ed:0c:d5:f5:84:96:40:28:f6:ee:80:ac:cb: ee:40:f0:0a:2a:59:cd:db:81:f6:2f:39:9e:4a:64:c2: d0:fd:bd:9e:0f:2b:b4:8e:d1:48:e7:59:32:78:89:d0: 45:5d:35:81:b6:e9:41:cd:10:64:3d:fb:4e:52:f1:81: 5e:9d:71:60:61:de:80:ea:a7:73:df:4c:e8:3a:0d:a4: 8b:db:6f:8f:06:cf:45:75:f6:ab:2d:43:d7:71:8f:33: bc:0d:2b:8e:e3:a1:09:47:d3:dd:4c:fa:35:34:2f:9d: f9:5a:2d:07:f2:59:01:e0:22:72:ec:f9:39:43:ef:6d: 25:de:e6:06:0a:77:19:f0:c6:c9:8f:36:d4:77:97:2c: 62:a5:a1:de:a2:c1:d8:d8:7b:ea:ff:26:56:bc:24:25: 63:af:c9:f6:23:3c:30:7f:02:24:6a:f2:aa:d3:a6:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:b0:98:4d:99:d2:0a:35:cb:df:2d:50:57:89:b1:ca: 94:c0:b0:8e:ca:96:dd:53:5b:39:c7:2d:d4:ea:d7:74: 81:bf:65:0a:48:21:22:e2:a9:9a:c4:07:ab:a1:35:77: 68:41:43:1e:ea:c0:41:fa:e7:92:41:32:58:06:51:a9: 38:18:38:f1:ee:8a:fa:b2:45:9a:f1:a7:55:9b:2a:6a: 59:fc:4b:e3:b5:52:4c:fb:9e:33:09:52:19:08:78:bd: af:66:3d:42:ff:2a:11:fb:fd:47:07:bc:04:13:7a:35: c3:15:cf:d0:20:41:f5:65:57:b4:0b:19:8f:74:73:62: 31:49:04:06:6b:6a:0f:aa:3c:be:3d:74:82:22:76:f7: 68:ac:e2:5d:b1:19:04:1c:d9:22:b0:02:83:35:ba:26: c4:ee:6e:70:e5:f4:81:b2:43:e8:d1:bf:f4:0d:69:31: ca:75:40:bb:ac:60:6f:0e:db:58:e3:46:eb:3c:a6:7f: 84:1c:8e:9b:1b:b0:cf:16:ef:e4:67:95:66:3f:dc:d0: af:8b:82:0a:d7:26:fe:48:9b:c0:40:dd:8e:fd:5e:e2: 53:4d:ff:45:a5:5c:6e:03:93:ba:6d:be:48:f4:2f:62: bc:60:cb:d2:b5:c4:02:08:b6:1d:92:47:67:1a:8c:49 Fingerprint (SHA-256): 50:24:FC:3A:7E:0C:42:6B:2E:BD:C4:B6:74:81:AE:F7:9B:F5:B6:AF:13:FC:D4:F7:77:32:B6:8B:0C:60:7F:84 Fingerprint (SHA1): 38:C7:62:F8:2B:86:2D:2A:84:49:56:E6:14:41:6C:0A:3A:73:2B:2E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #358: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #359: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204058 (0x374402da) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 20:43:03 2022 Not After : Mon Sep 27 20:43:03 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:a9:1b:2b:cf:19:43:ba:7b:88:63:e2:ff:5b:15:fc: 1f:23:53:56:7e:c4:5b:ff:0f:1c:09:01:69:de:31:87: 94:81:96:98:30:ed:27:24:7e:ab:38:9a:03:a3:e4:09: 29:4b:8f:db:07:17:ab:84:ca:90:79:2c:fa:1e:44:04: c9:4b:b4:85:37:81:79:ca:3e:c9:93:10:28:f8:20:84: 62:f0:bb:b9:7b:69:9c:fb:53:0c:54:dd:f6:b0:51:39: 97:12:b4:42:88:56:f6:59:e0:39:1c:4b:48:0f:a4:3e: ea:9e:65:5d:e0:c3:48:a7:c9:2f:7b:56:d8:21:84:5f: 55:ac:2f:44:ad:13:0a:25:5e:12:57:46:54:31:4b:ec: 7d:7b:6f:4f:ee:82:de:6f:a5:d4:1b:75:c6:f3:44:30: 34:5f:d2:8b:ed:5b:8a:6a:67:a4:2e:37:31:9f:98:3b: 9c:a1:33:76:20:dd:3d:d9:a8:46:c1:ac:f4:56:3d:ee: a5:0f:4f:05:ef:65:f0:11:91:27:e2:78:0a:b2:54:79: eb:c9:eb:67:1f:cb:56:29:7b:53:df:fa:42:3c:7a:79: 90:a3:4a:c7:86:87:a8:65:e8:72:52:a4:aa:bb:39:f4: 42:7b:9d:94:9d:9e:ec:0b:19:3a:00:90:34:ac:43:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:db:85:52:ca:f0:71:bf:86:52:2c:06:b7:41:62:2a: 88:80:d5:f6:e0:13:ff:e8:d1:cb:d8:c5:92:35:d4:55: ce:5b:9f:e0:9f:49:88:33:41:81:48:88:07:99:e9:49: 67:f0:87:5e:ed:b0:a7:d4:54:73:8d:cf:88:95:e0:47: 90:d5:1b:0f:f2:2a:c9:e8:db:26:be:af:11:68:8b:c5: 46:97:0d:90:bb:52:71:6d:3e:e3:0e:d6:11:b5:68:dd: 21:f1:13:f1:a5:d6:ef:94:05:e9:a6:c7:f7:6e:c2:79: e2:15:c0:46:ae:bc:7a:31:d3:ce:dc:84:96:34:36:17: e7:d5:6e:52:1d:b6:49:f5:36:48:cd:89:b5:1b:6f:25: 07:8c:a9:79:cd:5f:69:37:42:12:d2:37:30:4b:15:36: 8d:42:7f:89:da:4c:46:1b:70:8e:68:98:82:70:20:05: 2a:68:bf:ea:83:c3:49:15:4a:e8:56:ca:0e:ad:d9:1c: 70:96:71:bb:a4:4b:03:d8:d1:44:d9:8f:d6:e9:0d:63: 28:a1:52:4e:7b:a2:d8:a4:89:2c:08:34:d9:bf:7f:5a: 11:47:84:ac:7e:b0:04:52:09:70:25:97:e7:7a:31:e0: 65:c8:0a:db:dc:46:05:9e:29:d8:82:3e:16:36:41:9f Fingerprint (SHA-256): 47:5F:B8:0B:3B:05:AD:C1:A3:C4:74:F9:3F:51:08:A4:28:BC:B1:01:31:11:25:D0:88:1E:24:C0:9F:5B:04:FC Fingerprint (SHA1): 36:00:CB:0B:7E:08:EF:AB:0D:FA:48:D7:B4:42:20:24:EC:3B:7E:BC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #360: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #361: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #362: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #363: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #364: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204056 (0x374402d8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:43:00 2022 Not After : Tue Sep 27 20:43:00 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:52:b5:e6:eb:05:58:c1:30:83:44:57:4a:e4:f7:d9: eb:16:12:59:43:e8:52:7e:22:b8:da:58:44:a9:a9:b6: da:ea:2f:f9:55:0f:93:29:00:f6:4d:60:08:5a:92:f8: 91:b2:ef:19:63:5d:a5:49:c2:a1:d5:ed:17:0c:f8:4e: dd:76:a3:cc:38:b7:ba:b5:b4:30:8e:41:92:55:6d:b8: f1:1f:65:4b:e8:4b:bd:92:e6:09:9c:ea:43:8f:61:89: 59:87:07:bf:c4:01:79:49:c5:60:a3:1c:89:bd:23:82: bb:46:d8:8c:c4:a2:82:34:f6:13:9b:cf:bc:40:b4:d2: 29:eb:d5:19:5a:cb:67:50:2e:b0:ff:df:84:ef:da:31: bc:03:b6:d2:db:26:42:dc:72:e5:63:c7:5a:a4:30:de: 91:b2:cb:c3:88:aa:88:fa:b6:8f:36:c1:ed:3f:90:5d: 39:51:1f:c4:48:68:f4:33:3a:29:c4:8f:ae:25:86:74: 36:39:38:70:ef:9f:25:dd:b2:74:1a:ef:8f:d5:2d:e6: 1c:fd:2c:f6:19:9a:25:fa:33:c5:59:b3:b1:49:2b:a2: f1:00:a6:7e:a0:dc:23:f8:2a:b3:73:bd:1b:d6:cf:01: a5:66:42:f2:fb:cc:29:40:2a:db:d0:52:9f:53:41:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:dd:68:f4:ad:db:36:c9:6c:91:04:3d:59:a2:5a:8d: 69:2c:6b:98:e1:99:90:d9:d3:3a:34:e3:de:63:38:f5: 0f:91:48:eb:6a:77:c9:76:30:6a:61:fd:a7:c3:bb:39: 3d:a7:6c:4a:a0:3a:74:ba:9d:3b:06:94:e6:91:78:e7: 3b:f4:06:86:77:f1:16:86:e7:36:28:10:33:bb:67:81: 3e:94:9d:56:ec:01:1f:19:46:e2:aa:44:47:c1:05:c8: 75:a7:9e:7b:5d:c3:af:5c:43:bc:67:9e:60:dc:e4:8b: c2:a3:f1:99:25:74:06:a3:f8:47:9d:3a:57:f9:f5:c6: cd:0d:3c:9e:ae:15:51:bf:87:45:8d:3c:e4:9b:92:02: 01:60:f8:6d:44:dd:47:f6:ad:e9:28:f3:c1:6c:07:bc: 0f:c3:11:ef:ba:b2:6d:29:8c:9e:76:2a:c7:20:fa:85: 01:2f:97:d3:7f:7c:f5:d2:1b:60:8a:06:5b:f5:e8:48: 5c:91:e5:83:12:40:6a:8d:cc:60:71:57:0c:8c:ea:10: 46:35:fe:0f:94:bc:79:14:01:cc:9e:89:4c:12:1c:ed: 51:c2:e1:22:3a:7f:99:b6:5a:f2:71:54:f5:d5:21:00: 09:c7:69:bf:97:7f:1e:99:a2:72:37:d6:85:d9:cd:14 Fingerprint (SHA-256): 04:66:5B:C8:B7:41:04:18:1E:AB:6C:5D:73:E6:16:B4:3B:A0:D7:38:B7:D6:C5:04:D0:F9:77:6C:BE:60:2F:1F Fingerprint (SHA1): ED:B7:63:1D:41:AF:38:B5:4B:3C:F9:ED:25:A2:DD:D3:89:5B:61:AF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #365: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #366: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204057 (0x374402d9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:43:02 2022 Not After : Mon Sep 27 20:43:02 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:83:bb:c2:6f:9a:b2:46:66:06:5a:60:9e:3c:bf:23: c6:31:b0:fa:75:64:f0:a4:ec:a6:72:5a:6a:36:fd:95: 65:fa:80:d6:e0:c7:14:eb:90:b8:e7:b2:52:9c:81:f1: b7:d8:66:65:ec:48:55:d8:f7:b6:59:44:62:1b:23:16: df:39:61:64:30:58:d0:69:88:df:49:ef:d4:18:27:c5: 51:8b:c8:ed:0c:d5:f5:84:96:40:28:f6:ee:80:ac:cb: ee:40:f0:0a:2a:59:cd:db:81:f6:2f:39:9e:4a:64:c2: d0:fd:bd:9e:0f:2b:b4:8e:d1:48:e7:59:32:78:89:d0: 45:5d:35:81:b6:e9:41:cd:10:64:3d:fb:4e:52:f1:81: 5e:9d:71:60:61:de:80:ea:a7:73:df:4c:e8:3a:0d:a4: 8b:db:6f:8f:06:cf:45:75:f6:ab:2d:43:d7:71:8f:33: bc:0d:2b:8e:e3:a1:09:47:d3:dd:4c:fa:35:34:2f:9d: f9:5a:2d:07:f2:59:01:e0:22:72:ec:f9:39:43:ef:6d: 25:de:e6:06:0a:77:19:f0:c6:c9:8f:36:d4:77:97:2c: 62:a5:a1:de:a2:c1:d8:d8:7b:ea:ff:26:56:bc:24:25: 63:af:c9:f6:23:3c:30:7f:02:24:6a:f2:aa:d3:a6:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:b0:98:4d:99:d2:0a:35:cb:df:2d:50:57:89:b1:ca: 94:c0:b0:8e:ca:96:dd:53:5b:39:c7:2d:d4:ea:d7:74: 81:bf:65:0a:48:21:22:e2:a9:9a:c4:07:ab:a1:35:77: 68:41:43:1e:ea:c0:41:fa:e7:92:41:32:58:06:51:a9: 38:18:38:f1:ee:8a:fa:b2:45:9a:f1:a7:55:9b:2a:6a: 59:fc:4b:e3:b5:52:4c:fb:9e:33:09:52:19:08:78:bd: af:66:3d:42:ff:2a:11:fb:fd:47:07:bc:04:13:7a:35: c3:15:cf:d0:20:41:f5:65:57:b4:0b:19:8f:74:73:62: 31:49:04:06:6b:6a:0f:aa:3c:be:3d:74:82:22:76:f7: 68:ac:e2:5d:b1:19:04:1c:d9:22:b0:02:83:35:ba:26: c4:ee:6e:70:e5:f4:81:b2:43:e8:d1:bf:f4:0d:69:31: ca:75:40:bb:ac:60:6f:0e:db:58:e3:46:eb:3c:a6:7f: 84:1c:8e:9b:1b:b0:cf:16:ef:e4:67:95:66:3f:dc:d0: af:8b:82:0a:d7:26:fe:48:9b:c0:40:dd:8e:fd:5e:e2: 53:4d:ff:45:a5:5c:6e:03:93:ba:6d:be:48:f4:2f:62: bc:60:cb:d2:b5:c4:02:08:b6:1d:92:47:67:1a:8c:49 Fingerprint (SHA-256): 50:24:FC:3A:7E:0C:42:6B:2E:BD:C4:B6:74:81:AE:F7:9B:F5:B6:AF:13:FC:D4:F7:77:32:B6:8B:0C:60:7F:84 Fingerprint (SHA1): 38:C7:62:F8:2B:86:2D:2A:84:49:56:E6:14:41:6C:0A:3A:73:2B:2E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #367: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #368: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204058 (0x374402da) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 20:43:03 2022 Not After : Mon Sep 27 20:43:03 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:a9:1b:2b:cf:19:43:ba:7b:88:63:e2:ff:5b:15:fc: 1f:23:53:56:7e:c4:5b:ff:0f:1c:09:01:69:de:31:87: 94:81:96:98:30:ed:27:24:7e:ab:38:9a:03:a3:e4:09: 29:4b:8f:db:07:17:ab:84:ca:90:79:2c:fa:1e:44:04: c9:4b:b4:85:37:81:79:ca:3e:c9:93:10:28:f8:20:84: 62:f0:bb:b9:7b:69:9c:fb:53:0c:54:dd:f6:b0:51:39: 97:12:b4:42:88:56:f6:59:e0:39:1c:4b:48:0f:a4:3e: ea:9e:65:5d:e0:c3:48:a7:c9:2f:7b:56:d8:21:84:5f: 55:ac:2f:44:ad:13:0a:25:5e:12:57:46:54:31:4b:ec: 7d:7b:6f:4f:ee:82:de:6f:a5:d4:1b:75:c6:f3:44:30: 34:5f:d2:8b:ed:5b:8a:6a:67:a4:2e:37:31:9f:98:3b: 9c:a1:33:76:20:dd:3d:d9:a8:46:c1:ac:f4:56:3d:ee: a5:0f:4f:05:ef:65:f0:11:91:27:e2:78:0a:b2:54:79: eb:c9:eb:67:1f:cb:56:29:7b:53:df:fa:42:3c:7a:79: 90:a3:4a:c7:86:87:a8:65:e8:72:52:a4:aa:bb:39:f4: 42:7b:9d:94:9d:9e:ec:0b:19:3a:00:90:34:ac:43:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:db:85:52:ca:f0:71:bf:86:52:2c:06:b7:41:62:2a: 88:80:d5:f6:e0:13:ff:e8:d1:cb:d8:c5:92:35:d4:55: ce:5b:9f:e0:9f:49:88:33:41:81:48:88:07:99:e9:49: 67:f0:87:5e:ed:b0:a7:d4:54:73:8d:cf:88:95:e0:47: 90:d5:1b:0f:f2:2a:c9:e8:db:26:be:af:11:68:8b:c5: 46:97:0d:90:bb:52:71:6d:3e:e3:0e:d6:11:b5:68:dd: 21:f1:13:f1:a5:d6:ef:94:05:e9:a6:c7:f7:6e:c2:79: e2:15:c0:46:ae:bc:7a:31:d3:ce:dc:84:96:34:36:17: e7:d5:6e:52:1d:b6:49:f5:36:48:cd:89:b5:1b:6f:25: 07:8c:a9:79:cd:5f:69:37:42:12:d2:37:30:4b:15:36: 8d:42:7f:89:da:4c:46:1b:70:8e:68:98:82:70:20:05: 2a:68:bf:ea:83:c3:49:15:4a:e8:56:ca:0e:ad:d9:1c: 70:96:71:bb:a4:4b:03:d8:d1:44:d9:8f:d6:e9:0d:63: 28:a1:52:4e:7b:a2:d8:a4:89:2c:08:34:d9:bf:7f:5a: 11:47:84:ac:7e:b0:04:52:09:70:25:97:e7:7a:31:e0: 65:c8:0a:db:dc:46:05:9e:29:d8:82:3e:16:36:41:9f Fingerprint (SHA-256): 47:5F:B8:0B:3B:05:AD:C1:A3:C4:74:F9:3F:51:08:A4:28:BC:B1:01:31:11:25:D0:88:1E:24:C0:9F:5B:04:FC Fingerprint (SHA1): 36:00:CB:0B:7E:08:EF:AB:0D:FA:48:D7:B4:42:20:24:EC:3B:7E:BC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #369: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #370: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #371: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204060 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #372: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #373: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #374: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #375: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927204061 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #376: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #377: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #378: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #379: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927204062 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #380: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #381: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #382: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #383: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 927204063 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #384: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #385: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #386: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #387: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 927204064 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #388: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #389: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #390: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204060 (0x374402dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:43:10 2022 Not After : Tue Sep 27 20:43:10 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:8f:af:d8:86:36:a0:ff:cf:c7:79:ca:7a:76:e0:c8: 7b:80:58:b5:42:95:e3:e2:17:df:c0:18:46:c4:07:26: 27:f0:22:5a:da:fa:fd:39:cd:f4:3d:d7:58:82:db:4e: ee:d8:56:3c:99:a3:ad:65:1d:d4:00:6d:53:3a:5f:b4: 8f:39:9b:4a:79:81:50:a8:dd:dd:dd:42:4a:98:1c:27: 7a:50:8e:fe:2f:79:b5:2e:c5:0a:d6:66:ff:f3:b1:6d: 3f:7e:04:92:84:45:30:d3:1d:6e:6a:b1:0c:23:97:59: 20:82:a5:46:44:c8:b7:39:cf:67:06:9a:d3:4e:15:9e: 81:c4:4a:e9:a0:81:f5:2e:13:eb:75:3c:b0:ea:dc:97: 62:c4:9b:d3:e3:34:51:e4:77:4c:73:6a:87:5e:bc:f7: b9:a8:14:c7:c9:f3:1f:98:09:48:ff:68:2a:9d:fd:d6: 7c:7a:0b:53:fe:d9:61:3d:f0:4c:f7:3c:77:04:06:db: f9:e1:6b:3a:f2:93:a4:78:9f:17:ed:e8:10:5d:6a:4f: 7f:fe:c9:4f:ab:5c:99:7d:ad:e1:7c:d5:75:35:0d:35: a6:fb:ab:bf:c8:d4:92:ae:1e:93:cd:95:d0:96:a3:29: 3e:d9:f3:74:df:45:57:98:86:a8:50:82:dd:8e:2c:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:d0:9d:c5:dd:d5:e3:c8:25:bc:94:e7:51:a4:69:13: 0c:15:83:b9:10:ed:ff:2d:09:ad:1f:40:02:3c:25:c6: b9:25:0a:b6:8b:5f:33:89:59:83:36:3f:38:33:b9:5a: d2:eb:30:a0:6d:66:6e:9a:bf:ef:c1:e5:1e:17:84:24: c2:1e:85:06:a1:f1:36:ec:b6:5a:64:53:f9:68:c8:ea: 7a:23:cf:69:b2:ad:c7:f4:b0:a8:d2:13:c7:c0:b2:3b: 01:fe:72:7c:c7:3c:48:f3:51:c1:25:f5:cf:a4:86:29: 04:63:7d:58:6c:49:3d:48:51:03:01:48:23:5e:05:58: fb:80:73:a1:bf:3c:31:e4:5a:d4:58:02:9d:cf:a9:5d: 10:ac:a0:88:2f:0f:2e:9e:03:74:48:c5:f0:74:7b:bb: 7f:30:72:51:99:a1:08:41:33:07:10:b3:63:38:93:86: dc:b8:a4:56:b4:1d:fc:82:e7:83:eb:35:1d:38:83:1d: 93:db:e2:83:e6:1c:ea:aa:33:ae:30:fa:37:31:b3:23: f1:45:38:87:e6:07:cd:15:0d:1b:8b:6b:e4:4c:21:dd: bf:90:6f:bc:29:f9:1b:37:32:6e:8d:4a:54:f9:55:53: 92:93:d7:21:f2:06:0e:de:3a:1f:02:06:79:92:7c:f3 Fingerprint (SHA-256): 45:8B:D2:F1:29:6D:69:F2:AF:13:07:23:61:27:9E:ED:CB:FB:12:76:A0:B3:C2:35:5A:05:2A:5B:95:36:D8:B6 Fingerprint (SHA1): 3F:CC:D3:A9:57:D5:E7:E8:7D:7B:0F:60:69:17:1F:60:F6:F0:04:47 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #391: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #392: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204061 (0x374402dd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:43:12 2022 Not After : Mon Sep 27 20:43:12 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:8d:e4:b2:a6:55:a3:b5:17:31:2f:09:fb:17:6a:48: cf:f3:2a:12:db:80:68:a8:b6:81:9a:ad:ed:83:18:6d: 7c:f4:34:3e:97:26:ea:2c:90:35:a5:05:c8:f3:db:4c: cc:1f:18:4e:21:94:fb:0d:95:32:99:48:bd:70:3e:a4: 35:c3:48:ff:39:bd:04:a6:2c:8b:6b:87:f5:ff:0d:d5: 39:05:5c:8c:cd:dd:1e:f8:2b:0b:14:b4:09:73:a5:db: ec:a9:0d:a0:2e:a2:29:cc:13:19:91:79:97:d6:f7:a1: 06:d9:b3:c6:a3:0a:19:6c:62:34:ac:62:ea:e5:f6:21: 23:ca:6d:af:42:4a:51:02:88:33:bb:b7:1a:87:c9:b4: 67:9c:d2:51:d9:5f:4a:55:58:b0:8e:14:69:66:93:20: f1:04:a1:81:8b:a2:3b:a1:a8:b2:a9:33:3a:6f:d0:35: 18:58:71:75:cf:12:e5:2f:fc:6c:c4:d5:81:56:c8:de: e0:e8:2a:a5:bc:04:b6:50:05:20:bd:cf:8d:a9:97:ec: 79:1d:12:49:2e:44:8c:8e:93:2b:2d:ed:f2:7a:77:82: cd:b6:3e:26:f1:bb:5b:21:11:cb:83:05:45:25:c9:a4: a8:f0:8a:e0:ff:5c:57:2e:69:b1:06:44:3e:f7:8d:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:6b:b2:55:c8:85:d8:4a:1f:6f:a5:56:ef:aa:99:de: 19:66:97:85:0d:54:96:23:a0:26:37:84:ea:51:4d:a0: dc:99:90:81:18:8e:44:df:1f:39:09:d2:8f:d3:1f:d9: 59:e9:af:cf:5e:ab:22:a7:71:79:a6:6d:e0:af:a0:de: 0d:7f:2c:45:9b:5b:29:30:93:70:96:c1:4c:7b:34:9d: bb:7d:42:25:35:3d:96:0b:ec:3e:59:cb:1c:0a:5d:03: b1:1a:37:c1:e5:4c:e7:bc:85:62:92:0a:62:1b:83:1c: e9:38:7c:47:34:e8:61:3f:c0:6f:ef:06:4d:ff:52:4e: 79:37:9f:8e:11:c6:04:c3:ee:32:f4:00:c9:3e:8e:b8: ec:16:67:d0:d1:7e:99:86:db:58:d8:d7:db:47:c5:65: d7:bb:df:38:59:51:61:ff:42:b1:60:a7:a6:ca:ee:91: 6e:f1:fb:98:44:16:13:d0:bb:34:1d:a7:6b:7f:17:15: 2f:fd:d4:45:93:4a:11:24:e7:9f:44:0a:28:5d:66:b4: 5d:35:f3:bb:f1:8a:ee:e7:51:d6:21:95:da:32:fd:ae: a8:ea:c6:4b:74:53:f7:03:f3:37:46:7d:e7:10:25:40: 96:ea:67:5f:72:c0:26:3b:c1:4b:ef:b3:51:83:30:28 Fingerprint (SHA-256): 92:F5:50:AA:54:B9:8E:A3:EF:6F:CE:78:1F:70:86:28:BD:C0:00:CF:CD:FB:CE:7E:F6:4A:A4:6A:BB:02:B0:C8 Fingerprint (SHA1): 0A:88:CB:73:8F:13:36:09:A0:83:DD:41:BC:48:45:97:EC:C2:7C:E0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #393: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #394: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204062 (0x374402de) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 20:43:13 2022 Not After : Mon Sep 27 20:43:13 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:7f:95:e3:89:37:fc:f9:9c:ed:b9:60:85:c7:e6:9b: 1d:e0:d1:84:4d:fb:d6:b4:dd:87:ae:6c:a4:e5:a0:43: 40:ba:09:b6:4a:bb:39:48:d3:1c:10:3e:cf:52:0e:cc: f9:4f:f9:7c:e7:67:3d:2e:3f:28:60:3b:16:54:0a:09: 77:c5:f3:9b:ac:1b:82:84:ac:69:34:bb:23:01:80:f6: 41:7a:43:d6:30:42:8d:62:93:e2:90:ec:75:4e:46:e1: 8e:08:bf:e8:a9:dd:ad:15:36:65:8b:6d:3c:ad:49:ce: 90:5c:bf:48:48:f8:a3:af:9c:93:04:84:d4:56:d0:46: ae:d7:95:84:ee:cb:1b:c0:bc:8a:d9:3a:d3:27:d1:8d: c5:88:48:c4:4f:6b:22:5a:e5:70:1c:4c:21:87:be:da: 20:3c:32:1d:65:cd:30:bb:cb:b7:d2:76:b8:aa:50:38: d9:28:4a:9b:22:16:63:72:1d:84:99:22:77:9e:95:e8: 52:30:87:34:88:77:1d:a2:c2:50:b0:84:e4:b7:bf:3e: 8e:15:56:84:95:12:cf:6a:4b:92:9a:5a:42:36:13:f4: 9f:91:69:18:43:4d:e2:04:8c:06:e9:63:a7:b1:2c:ac: f3:64:f5:9f:e4:93:24:d7:09:4d:58:e6:59:d2:d3:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:b1:6b:28:54:86:9b:47:2d:b0:b8:8a:d6:72:3f:13: c8:18:b5:fc:eb:20:4d:99:41:29:4f:d3:d4:02:db:01: 4e:75:c6:56:f0:97:87:1b:ab:fa:f0:3f:f0:3e:5e:43: 20:6c:97:aa:95:1f:1d:c0:92:f3:3e:89:34:72:c6:3f: 77:f5:70:e9:06:e3:b1:b4:3c:8c:e3:77:83:81:ed:1e: 16:59:87:50:d9:4f:09:97:09:82:b3:8d:8d:f7:54:bb: c9:85:08:71:ff:2a:c5:b7:e8:78:3f:34:7b:1b:d5:0c: 86:1d:87:6d:20:58:29:3c:68:75:45:7b:86:60:96:dc: 7b:b0:98:63:3b:44:0b:92:0f:d4:70:8c:ff:69:fa:9d: d9:e3:07:53:1c:7e:ec:ee:e9:f6:2c:38:5e:14:59:f4: c8:94:8d:09:4a:65:20:a9:59:fd:e6:c5:f2:c8:11:90: e8:27:45:9e:ec:86:25:20:93:bc:08:f4:47:1e:8b:b8: bb:f2:8c:e9:ed:b2:16:a6:a7:6f:ca:a8:e1:80:25:95: b6:27:82:3d:eb:f9:90:b2:12:7c:1a:40:35:b4:dd:9a: 71:aa:28:de:d3:e0:3a:33:cf:83:10:dc:e2:50:0a:9a: e8:80:41:c7:9a:3f:4e:ae:ee:f8:29:37:10:57:82:8d Fingerprint (SHA-256): 87:8D:1F:9B:91:28:8A:07:5F:97:8F:8B:1A:9E:3F:E9:90:F2:3E:4A:82:B9:82:43:1A:EE:7E:8A:2F:5A:47:64 Fingerprint (SHA1): 90:63:35:73:43:46:3A:B4:92:D0:6F:E7:2D:55:0E:7C:05:DF:5C:84 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #395: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #396: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #397: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #398: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #399: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204060 (0x374402dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:43:10 2022 Not After : Tue Sep 27 20:43:10 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:8f:af:d8:86:36:a0:ff:cf:c7:79:ca:7a:76:e0:c8: 7b:80:58:b5:42:95:e3:e2:17:df:c0:18:46:c4:07:26: 27:f0:22:5a:da:fa:fd:39:cd:f4:3d:d7:58:82:db:4e: ee:d8:56:3c:99:a3:ad:65:1d:d4:00:6d:53:3a:5f:b4: 8f:39:9b:4a:79:81:50:a8:dd:dd:dd:42:4a:98:1c:27: 7a:50:8e:fe:2f:79:b5:2e:c5:0a:d6:66:ff:f3:b1:6d: 3f:7e:04:92:84:45:30:d3:1d:6e:6a:b1:0c:23:97:59: 20:82:a5:46:44:c8:b7:39:cf:67:06:9a:d3:4e:15:9e: 81:c4:4a:e9:a0:81:f5:2e:13:eb:75:3c:b0:ea:dc:97: 62:c4:9b:d3:e3:34:51:e4:77:4c:73:6a:87:5e:bc:f7: b9:a8:14:c7:c9:f3:1f:98:09:48:ff:68:2a:9d:fd:d6: 7c:7a:0b:53:fe:d9:61:3d:f0:4c:f7:3c:77:04:06:db: f9:e1:6b:3a:f2:93:a4:78:9f:17:ed:e8:10:5d:6a:4f: 7f:fe:c9:4f:ab:5c:99:7d:ad:e1:7c:d5:75:35:0d:35: a6:fb:ab:bf:c8:d4:92:ae:1e:93:cd:95:d0:96:a3:29: 3e:d9:f3:74:df:45:57:98:86:a8:50:82:dd:8e:2c:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:d0:9d:c5:dd:d5:e3:c8:25:bc:94:e7:51:a4:69:13: 0c:15:83:b9:10:ed:ff:2d:09:ad:1f:40:02:3c:25:c6: b9:25:0a:b6:8b:5f:33:89:59:83:36:3f:38:33:b9:5a: d2:eb:30:a0:6d:66:6e:9a:bf:ef:c1:e5:1e:17:84:24: c2:1e:85:06:a1:f1:36:ec:b6:5a:64:53:f9:68:c8:ea: 7a:23:cf:69:b2:ad:c7:f4:b0:a8:d2:13:c7:c0:b2:3b: 01:fe:72:7c:c7:3c:48:f3:51:c1:25:f5:cf:a4:86:29: 04:63:7d:58:6c:49:3d:48:51:03:01:48:23:5e:05:58: fb:80:73:a1:bf:3c:31:e4:5a:d4:58:02:9d:cf:a9:5d: 10:ac:a0:88:2f:0f:2e:9e:03:74:48:c5:f0:74:7b:bb: 7f:30:72:51:99:a1:08:41:33:07:10:b3:63:38:93:86: dc:b8:a4:56:b4:1d:fc:82:e7:83:eb:35:1d:38:83:1d: 93:db:e2:83:e6:1c:ea:aa:33:ae:30:fa:37:31:b3:23: f1:45:38:87:e6:07:cd:15:0d:1b:8b:6b:e4:4c:21:dd: bf:90:6f:bc:29:f9:1b:37:32:6e:8d:4a:54:f9:55:53: 92:93:d7:21:f2:06:0e:de:3a:1f:02:06:79:92:7c:f3 Fingerprint (SHA-256): 45:8B:D2:F1:29:6D:69:F2:AF:13:07:23:61:27:9E:ED:CB:FB:12:76:A0:B3:C2:35:5A:05:2A:5B:95:36:D8:B6 Fingerprint (SHA1): 3F:CC:D3:A9:57:D5:E7:E8:7D:7B:0F:60:69:17:1F:60:F6:F0:04:47 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #400: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #401: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204061 (0x374402dd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:43:12 2022 Not After : Mon Sep 27 20:43:12 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:8d:e4:b2:a6:55:a3:b5:17:31:2f:09:fb:17:6a:48: cf:f3:2a:12:db:80:68:a8:b6:81:9a:ad:ed:83:18:6d: 7c:f4:34:3e:97:26:ea:2c:90:35:a5:05:c8:f3:db:4c: cc:1f:18:4e:21:94:fb:0d:95:32:99:48:bd:70:3e:a4: 35:c3:48:ff:39:bd:04:a6:2c:8b:6b:87:f5:ff:0d:d5: 39:05:5c:8c:cd:dd:1e:f8:2b:0b:14:b4:09:73:a5:db: ec:a9:0d:a0:2e:a2:29:cc:13:19:91:79:97:d6:f7:a1: 06:d9:b3:c6:a3:0a:19:6c:62:34:ac:62:ea:e5:f6:21: 23:ca:6d:af:42:4a:51:02:88:33:bb:b7:1a:87:c9:b4: 67:9c:d2:51:d9:5f:4a:55:58:b0:8e:14:69:66:93:20: f1:04:a1:81:8b:a2:3b:a1:a8:b2:a9:33:3a:6f:d0:35: 18:58:71:75:cf:12:e5:2f:fc:6c:c4:d5:81:56:c8:de: e0:e8:2a:a5:bc:04:b6:50:05:20:bd:cf:8d:a9:97:ec: 79:1d:12:49:2e:44:8c:8e:93:2b:2d:ed:f2:7a:77:82: cd:b6:3e:26:f1:bb:5b:21:11:cb:83:05:45:25:c9:a4: a8:f0:8a:e0:ff:5c:57:2e:69:b1:06:44:3e:f7:8d:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:6b:b2:55:c8:85:d8:4a:1f:6f:a5:56:ef:aa:99:de: 19:66:97:85:0d:54:96:23:a0:26:37:84:ea:51:4d:a0: dc:99:90:81:18:8e:44:df:1f:39:09:d2:8f:d3:1f:d9: 59:e9:af:cf:5e:ab:22:a7:71:79:a6:6d:e0:af:a0:de: 0d:7f:2c:45:9b:5b:29:30:93:70:96:c1:4c:7b:34:9d: bb:7d:42:25:35:3d:96:0b:ec:3e:59:cb:1c:0a:5d:03: b1:1a:37:c1:e5:4c:e7:bc:85:62:92:0a:62:1b:83:1c: e9:38:7c:47:34:e8:61:3f:c0:6f:ef:06:4d:ff:52:4e: 79:37:9f:8e:11:c6:04:c3:ee:32:f4:00:c9:3e:8e:b8: ec:16:67:d0:d1:7e:99:86:db:58:d8:d7:db:47:c5:65: d7:bb:df:38:59:51:61:ff:42:b1:60:a7:a6:ca:ee:91: 6e:f1:fb:98:44:16:13:d0:bb:34:1d:a7:6b:7f:17:15: 2f:fd:d4:45:93:4a:11:24:e7:9f:44:0a:28:5d:66:b4: 5d:35:f3:bb:f1:8a:ee:e7:51:d6:21:95:da:32:fd:ae: a8:ea:c6:4b:74:53:f7:03:f3:37:46:7d:e7:10:25:40: 96:ea:67:5f:72:c0:26:3b:c1:4b:ef:b3:51:83:30:28 Fingerprint (SHA-256): 92:F5:50:AA:54:B9:8E:A3:EF:6F:CE:78:1F:70:86:28:BD:C0:00:CF:CD:FB:CE:7E:F6:4A:A4:6A:BB:02:B0:C8 Fingerprint (SHA1): 0A:88:CB:73:8F:13:36:09:A0:83:DD:41:BC:48:45:97:EC:C2:7C:E0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #402: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #403: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204062 (0x374402de) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 20:43:13 2022 Not After : Mon Sep 27 20:43:13 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:7f:95:e3:89:37:fc:f9:9c:ed:b9:60:85:c7:e6:9b: 1d:e0:d1:84:4d:fb:d6:b4:dd:87:ae:6c:a4:e5:a0:43: 40:ba:09:b6:4a:bb:39:48:d3:1c:10:3e:cf:52:0e:cc: f9:4f:f9:7c:e7:67:3d:2e:3f:28:60:3b:16:54:0a:09: 77:c5:f3:9b:ac:1b:82:84:ac:69:34:bb:23:01:80:f6: 41:7a:43:d6:30:42:8d:62:93:e2:90:ec:75:4e:46:e1: 8e:08:bf:e8:a9:dd:ad:15:36:65:8b:6d:3c:ad:49:ce: 90:5c:bf:48:48:f8:a3:af:9c:93:04:84:d4:56:d0:46: ae:d7:95:84:ee:cb:1b:c0:bc:8a:d9:3a:d3:27:d1:8d: c5:88:48:c4:4f:6b:22:5a:e5:70:1c:4c:21:87:be:da: 20:3c:32:1d:65:cd:30:bb:cb:b7:d2:76:b8:aa:50:38: d9:28:4a:9b:22:16:63:72:1d:84:99:22:77:9e:95:e8: 52:30:87:34:88:77:1d:a2:c2:50:b0:84:e4:b7:bf:3e: 8e:15:56:84:95:12:cf:6a:4b:92:9a:5a:42:36:13:f4: 9f:91:69:18:43:4d:e2:04:8c:06:e9:63:a7:b1:2c:ac: f3:64:f5:9f:e4:93:24:d7:09:4d:58:e6:59:d2:d3:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:b1:6b:28:54:86:9b:47:2d:b0:b8:8a:d6:72:3f:13: c8:18:b5:fc:eb:20:4d:99:41:29:4f:d3:d4:02:db:01: 4e:75:c6:56:f0:97:87:1b:ab:fa:f0:3f:f0:3e:5e:43: 20:6c:97:aa:95:1f:1d:c0:92:f3:3e:89:34:72:c6:3f: 77:f5:70:e9:06:e3:b1:b4:3c:8c:e3:77:83:81:ed:1e: 16:59:87:50:d9:4f:09:97:09:82:b3:8d:8d:f7:54:bb: c9:85:08:71:ff:2a:c5:b7:e8:78:3f:34:7b:1b:d5:0c: 86:1d:87:6d:20:58:29:3c:68:75:45:7b:86:60:96:dc: 7b:b0:98:63:3b:44:0b:92:0f:d4:70:8c:ff:69:fa:9d: d9:e3:07:53:1c:7e:ec:ee:e9:f6:2c:38:5e:14:59:f4: c8:94:8d:09:4a:65:20:a9:59:fd:e6:c5:f2:c8:11:90: e8:27:45:9e:ec:86:25:20:93:bc:08:f4:47:1e:8b:b8: bb:f2:8c:e9:ed:b2:16:a6:a7:6f:ca:a8:e1:80:25:95: b6:27:82:3d:eb:f9:90:b2:12:7c:1a:40:35:b4:dd:9a: 71:aa:28:de:d3:e0:3a:33:cf:83:10:dc:e2:50:0a:9a: e8:80:41:c7:9a:3f:4e:ae:ee:f8:29:37:10:57:82:8d Fingerprint (SHA-256): 87:8D:1F:9B:91:28:8A:07:5F:97:8F:8B:1A:9E:3F:E9:90:F2:3E:4A:82:B9:82:43:1A:EE:7E:8A:2F:5A:47:64 Fingerprint (SHA1): 90:63:35:73:43:46:3A:B4:92:D0:6F:E7:2D:55:0E:7C:05:DF:5C:84 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #404: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #405: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204060 (0x374402dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:43:10 2022 Not After : Tue Sep 27 20:43:10 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:8f:af:d8:86:36:a0:ff:cf:c7:79:ca:7a:76:e0:c8: 7b:80:58:b5:42:95:e3:e2:17:df:c0:18:46:c4:07:26: 27:f0:22:5a:da:fa:fd:39:cd:f4:3d:d7:58:82:db:4e: ee:d8:56:3c:99:a3:ad:65:1d:d4:00:6d:53:3a:5f:b4: 8f:39:9b:4a:79:81:50:a8:dd:dd:dd:42:4a:98:1c:27: 7a:50:8e:fe:2f:79:b5:2e:c5:0a:d6:66:ff:f3:b1:6d: 3f:7e:04:92:84:45:30:d3:1d:6e:6a:b1:0c:23:97:59: 20:82:a5:46:44:c8:b7:39:cf:67:06:9a:d3:4e:15:9e: 81:c4:4a:e9:a0:81:f5:2e:13:eb:75:3c:b0:ea:dc:97: 62:c4:9b:d3:e3:34:51:e4:77:4c:73:6a:87:5e:bc:f7: b9:a8:14:c7:c9:f3:1f:98:09:48:ff:68:2a:9d:fd:d6: 7c:7a:0b:53:fe:d9:61:3d:f0:4c:f7:3c:77:04:06:db: f9:e1:6b:3a:f2:93:a4:78:9f:17:ed:e8:10:5d:6a:4f: 7f:fe:c9:4f:ab:5c:99:7d:ad:e1:7c:d5:75:35:0d:35: a6:fb:ab:bf:c8:d4:92:ae:1e:93:cd:95:d0:96:a3:29: 3e:d9:f3:74:df:45:57:98:86:a8:50:82:dd:8e:2c:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:d0:9d:c5:dd:d5:e3:c8:25:bc:94:e7:51:a4:69:13: 0c:15:83:b9:10:ed:ff:2d:09:ad:1f:40:02:3c:25:c6: b9:25:0a:b6:8b:5f:33:89:59:83:36:3f:38:33:b9:5a: d2:eb:30:a0:6d:66:6e:9a:bf:ef:c1:e5:1e:17:84:24: c2:1e:85:06:a1:f1:36:ec:b6:5a:64:53:f9:68:c8:ea: 7a:23:cf:69:b2:ad:c7:f4:b0:a8:d2:13:c7:c0:b2:3b: 01:fe:72:7c:c7:3c:48:f3:51:c1:25:f5:cf:a4:86:29: 04:63:7d:58:6c:49:3d:48:51:03:01:48:23:5e:05:58: fb:80:73:a1:bf:3c:31:e4:5a:d4:58:02:9d:cf:a9:5d: 10:ac:a0:88:2f:0f:2e:9e:03:74:48:c5:f0:74:7b:bb: 7f:30:72:51:99:a1:08:41:33:07:10:b3:63:38:93:86: dc:b8:a4:56:b4:1d:fc:82:e7:83:eb:35:1d:38:83:1d: 93:db:e2:83:e6:1c:ea:aa:33:ae:30:fa:37:31:b3:23: f1:45:38:87:e6:07:cd:15:0d:1b:8b:6b:e4:4c:21:dd: bf:90:6f:bc:29:f9:1b:37:32:6e:8d:4a:54:f9:55:53: 92:93:d7:21:f2:06:0e:de:3a:1f:02:06:79:92:7c:f3 Fingerprint (SHA-256): 45:8B:D2:F1:29:6D:69:F2:AF:13:07:23:61:27:9E:ED:CB:FB:12:76:A0:B3:C2:35:5A:05:2A:5B:95:36:D8:B6 Fingerprint (SHA1): 3F:CC:D3:A9:57:D5:E7:E8:7D:7B:0F:60:69:17:1F:60:F6:F0:04:47 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #406: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204060 (0x374402dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:43:10 2022 Not After : Tue Sep 27 20:43:10 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:8f:af:d8:86:36:a0:ff:cf:c7:79:ca:7a:76:e0:c8: 7b:80:58:b5:42:95:e3:e2:17:df:c0:18:46:c4:07:26: 27:f0:22:5a:da:fa:fd:39:cd:f4:3d:d7:58:82:db:4e: ee:d8:56:3c:99:a3:ad:65:1d:d4:00:6d:53:3a:5f:b4: 8f:39:9b:4a:79:81:50:a8:dd:dd:dd:42:4a:98:1c:27: 7a:50:8e:fe:2f:79:b5:2e:c5:0a:d6:66:ff:f3:b1:6d: 3f:7e:04:92:84:45:30:d3:1d:6e:6a:b1:0c:23:97:59: 20:82:a5:46:44:c8:b7:39:cf:67:06:9a:d3:4e:15:9e: 81:c4:4a:e9:a0:81:f5:2e:13:eb:75:3c:b0:ea:dc:97: 62:c4:9b:d3:e3:34:51:e4:77:4c:73:6a:87:5e:bc:f7: b9:a8:14:c7:c9:f3:1f:98:09:48:ff:68:2a:9d:fd:d6: 7c:7a:0b:53:fe:d9:61:3d:f0:4c:f7:3c:77:04:06:db: f9:e1:6b:3a:f2:93:a4:78:9f:17:ed:e8:10:5d:6a:4f: 7f:fe:c9:4f:ab:5c:99:7d:ad:e1:7c:d5:75:35:0d:35: a6:fb:ab:bf:c8:d4:92:ae:1e:93:cd:95:d0:96:a3:29: 3e:d9:f3:74:df:45:57:98:86:a8:50:82:dd:8e:2c:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:d0:9d:c5:dd:d5:e3:c8:25:bc:94:e7:51:a4:69:13: 0c:15:83:b9:10:ed:ff:2d:09:ad:1f:40:02:3c:25:c6: b9:25:0a:b6:8b:5f:33:89:59:83:36:3f:38:33:b9:5a: d2:eb:30:a0:6d:66:6e:9a:bf:ef:c1:e5:1e:17:84:24: c2:1e:85:06:a1:f1:36:ec:b6:5a:64:53:f9:68:c8:ea: 7a:23:cf:69:b2:ad:c7:f4:b0:a8:d2:13:c7:c0:b2:3b: 01:fe:72:7c:c7:3c:48:f3:51:c1:25:f5:cf:a4:86:29: 04:63:7d:58:6c:49:3d:48:51:03:01:48:23:5e:05:58: fb:80:73:a1:bf:3c:31:e4:5a:d4:58:02:9d:cf:a9:5d: 10:ac:a0:88:2f:0f:2e:9e:03:74:48:c5:f0:74:7b:bb: 7f:30:72:51:99:a1:08:41:33:07:10:b3:63:38:93:86: dc:b8:a4:56:b4:1d:fc:82:e7:83:eb:35:1d:38:83:1d: 93:db:e2:83:e6:1c:ea:aa:33:ae:30:fa:37:31:b3:23: f1:45:38:87:e6:07:cd:15:0d:1b:8b:6b:e4:4c:21:dd: bf:90:6f:bc:29:f9:1b:37:32:6e:8d:4a:54:f9:55:53: 92:93:d7:21:f2:06:0e:de:3a:1f:02:06:79:92:7c:f3 Fingerprint (SHA-256): 45:8B:D2:F1:29:6D:69:F2:AF:13:07:23:61:27:9E:ED:CB:FB:12:76:A0:B3:C2:35:5A:05:2A:5B:95:36:D8:B6 Fingerprint (SHA1): 3F:CC:D3:A9:57:D5:E7:E8:7D:7B:0F:60:69:17:1F:60:F6:F0:04:47 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #407: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204061 (0x374402dd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:43:12 2022 Not After : Mon Sep 27 20:43:12 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:8d:e4:b2:a6:55:a3:b5:17:31:2f:09:fb:17:6a:48: cf:f3:2a:12:db:80:68:a8:b6:81:9a:ad:ed:83:18:6d: 7c:f4:34:3e:97:26:ea:2c:90:35:a5:05:c8:f3:db:4c: cc:1f:18:4e:21:94:fb:0d:95:32:99:48:bd:70:3e:a4: 35:c3:48:ff:39:bd:04:a6:2c:8b:6b:87:f5:ff:0d:d5: 39:05:5c:8c:cd:dd:1e:f8:2b:0b:14:b4:09:73:a5:db: ec:a9:0d:a0:2e:a2:29:cc:13:19:91:79:97:d6:f7:a1: 06:d9:b3:c6:a3:0a:19:6c:62:34:ac:62:ea:e5:f6:21: 23:ca:6d:af:42:4a:51:02:88:33:bb:b7:1a:87:c9:b4: 67:9c:d2:51:d9:5f:4a:55:58:b0:8e:14:69:66:93:20: f1:04:a1:81:8b:a2:3b:a1:a8:b2:a9:33:3a:6f:d0:35: 18:58:71:75:cf:12:e5:2f:fc:6c:c4:d5:81:56:c8:de: e0:e8:2a:a5:bc:04:b6:50:05:20:bd:cf:8d:a9:97:ec: 79:1d:12:49:2e:44:8c:8e:93:2b:2d:ed:f2:7a:77:82: cd:b6:3e:26:f1:bb:5b:21:11:cb:83:05:45:25:c9:a4: a8:f0:8a:e0:ff:5c:57:2e:69:b1:06:44:3e:f7:8d:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:6b:b2:55:c8:85:d8:4a:1f:6f:a5:56:ef:aa:99:de: 19:66:97:85:0d:54:96:23:a0:26:37:84:ea:51:4d:a0: dc:99:90:81:18:8e:44:df:1f:39:09:d2:8f:d3:1f:d9: 59:e9:af:cf:5e:ab:22:a7:71:79:a6:6d:e0:af:a0:de: 0d:7f:2c:45:9b:5b:29:30:93:70:96:c1:4c:7b:34:9d: bb:7d:42:25:35:3d:96:0b:ec:3e:59:cb:1c:0a:5d:03: b1:1a:37:c1:e5:4c:e7:bc:85:62:92:0a:62:1b:83:1c: e9:38:7c:47:34:e8:61:3f:c0:6f:ef:06:4d:ff:52:4e: 79:37:9f:8e:11:c6:04:c3:ee:32:f4:00:c9:3e:8e:b8: ec:16:67:d0:d1:7e:99:86:db:58:d8:d7:db:47:c5:65: d7:bb:df:38:59:51:61:ff:42:b1:60:a7:a6:ca:ee:91: 6e:f1:fb:98:44:16:13:d0:bb:34:1d:a7:6b:7f:17:15: 2f:fd:d4:45:93:4a:11:24:e7:9f:44:0a:28:5d:66:b4: 5d:35:f3:bb:f1:8a:ee:e7:51:d6:21:95:da:32:fd:ae: a8:ea:c6:4b:74:53:f7:03:f3:37:46:7d:e7:10:25:40: 96:ea:67:5f:72:c0:26:3b:c1:4b:ef:b3:51:83:30:28 Fingerprint (SHA-256): 92:F5:50:AA:54:B9:8E:A3:EF:6F:CE:78:1F:70:86:28:BD:C0:00:CF:CD:FB:CE:7E:F6:4A:A4:6A:BB:02:B0:C8 Fingerprint (SHA1): 0A:88:CB:73:8F:13:36:09:A0:83:DD:41:BC:48:45:97:EC:C2:7C:E0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #408: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204061 (0x374402dd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:43:12 2022 Not After : Mon Sep 27 20:43:12 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:8d:e4:b2:a6:55:a3:b5:17:31:2f:09:fb:17:6a:48: cf:f3:2a:12:db:80:68:a8:b6:81:9a:ad:ed:83:18:6d: 7c:f4:34:3e:97:26:ea:2c:90:35:a5:05:c8:f3:db:4c: cc:1f:18:4e:21:94:fb:0d:95:32:99:48:bd:70:3e:a4: 35:c3:48:ff:39:bd:04:a6:2c:8b:6b:87:f5:ff:0d:d5: 39:05:5c:8c:cd:dd:1e:f8:2b:0b:14:b4:09:73:a5:db: ec:a9:0d:a0:2e:a2:29:cc:13:19:91:79:97:d6:f7:a1: 06:d9:b3:c6:a3:0a:19:6c:62:34:ac:62:ea:e5:f6:21: 23:ca:6d:af:42:4a:51:02:88:33:bb:b7:1a:87:c9:b4: 67:9c:d2:51:d9:5f:4a:55:58:b0:8e:14:69:66:93:20: f1:04:a1:81:8b:a2:3b:a1:a8:b2:a9:33:3a:6f:d0:35: 18:58:71:75:cf:12:e5:2f:fc:6c:c4:d5:81:56:c8:de: e0:e8:2a:a5:bc:04:b6:50:05:20:bd:cf:8d:a9:97:ec: 79:1d:12:49:2e:44:8c:8e:93:2b:2d:ed:f2:7a:77:82: cd:b6:3e:26:f1:bb:5b:21:11:cb:83:05:45:25:c9:a4: a8:f0:8a:e0:ff:5c:57:2e:69:b1:06:44:3e:f7:8d:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:6b:b2:55:c8:85:d8:4a:1f:6f:a5:56:ef:aa:99:de: 19:66:97:85:0d:54:96:23:a0:26:37:84:ea:51:4d:a0: dc:99:90:81:18:8e:44:df:1f:39:09:d2:8f:d3:1f:d9: 59:e9:af:cf:5e:ab:22:a7:71:79:a6:6d:e0:af:a0:de: 0d:7f:2c:45:9b:5b:29:30:93:70:96:c1:4c:7b:34:9d: bb:7d:42:25:35:3d:96:0b:ec:3e:59:cb:1c:0a:5d:03: b1:1a:37:c1:e5:4c:e7:bc:85:62:92:0a:62:1b:83:1c: e9:38:7c:47:34:e8:61:3f:c0:6f:ef:06:4d:ff:52:4e: 79:37:9f:8e:11:c6:04:c3:ee:32:f4:00:c9:3e:8e:b8: ec:16:67:d0:d1:7e:99:86:db:58:d8:d7:db:47:c5:65: d7:bb:df:38:59:51:61:ff:42:b1:60:a7:a6:ca:ee:91: 6e:f1:fb:98:44:16:13:d0:bb:34:1d:a7:6b:7f:17:15: 2f:fd:d4:45:93:4a:11:24:e7:9f:44:0a:28:5d:66:b4: 5d:35:f3:bb:f1:8a:ee:e7:51:d6:21:95:da:32:fd:ae: a8:ea:c6:4b:74:53:f7:03:f3:37:46:7d:e7:10:25:40: 96:ea:67:5f:72:c0:26:3b:c1:4b:ef:b3:51:83:30:28 Fingerprint (SHA-256): 92:F5:50:AA:54:B9:8E:A3:EF:6F:CE:78:1F:70:86:28:BD:C0:00:CF:CD:FB:CE:7E:F6:4A:A4:6A:BB:02:B0:C8 Fingerprint (SHA1): 0A:88:CB:73:8F:13:36:09:A0:83:DD:41:BC:48:45:97:EC:C2:7C:E0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #409: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204062 (0x374402de) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 20:43:13 2022 Not After : Mon Sep 27 20:43:13 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:7f:95:e3:89:37:fc:f9:9c:ed:b9:60:85:c7:e6:9b: 1d:e0:d1:84:4d:fb:d6:b4:dd:87:ae:6c:a4:e5:a0:43: 40:ba:09:b6:4a:bb:39:48:d3:1c:10:3e:cf:52:0e:cc: f9:4f:f9:7c:e7:67:3d:2e:3f:28:60:3b:16:54:0a:09: 77:c5:f3:9b:ac:1b:82:84:ac:69:34:bb:23:01:80:f6: 41:7a:43:d6:30:42:8d:62:93:e2:90:ec:75:4e:46:e1: 8e:08:bf:e8:a9:dd:ad:15:36:65:8b:6d:3c:ad:49:ce: 90:5c:bf:48:48:f8:a3:af:9c:93:04:84:d4:56:d0:46: ae:d7:95:84:ee:cb:1b:c0:bc:8a:d9:3a:d3:27:d1:8d: c5:88:48:c4:4f:6b:22:5a:e5:70:1c:4c:21:87:be:da: 20:3c:32:1d:65:cd:30:bb:cb:b7:d2:76:b8:aa:50:38: d9:28:4a:9b:22:16:63:72:1d:84:99:22:77:9e:95:e8: 52:30:87:34:88:77:1d:a2:c2:50:b0:84:e4:b7:bf:3e: 8e:15:56:84:95:12:cf:6a:4b:92:9a:5a:42:36:13:f4: 9f:91:69:18:43:4d:e2:04:8c:06:e9:63:a7:b1:2c:ac: f3:64:f5:9f:e4:93:24:d7:09:4d:58:e6:59:d2:d3:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:b1:6b:28:54:86:9b:47:2d:b0:b8:8a:d6:72:3f:13: c8:18:b5:fc:eb:20:4d:99:41:29:4f:d3:d4:02:db:01: 4e:75:c6:56:f0:97:87:1b:ab:fa:f0:3f:f0:3e:5e:43: 20:6c:97:aa:95:1f:1d:c0:92:f3:3e:89:34:72:c6:3f: 77:f5:70:e9:06:e3:b1:b4:3c:8c:e3:77:83:81:ed:1e: 16:59:87:50:d9:4f:09:97:09:82:b3:8d:8d:f7:54:bb: c9:85:08:71:ff:2a:c5:b7:e8:78:3f:34:7b:1b:d5:0c: 86:1d:87:6d:20:58:29:3c:68:75:45:7b:86:60:96:dc: 7b:b0:98:63:3b:44:0b:92:0f:d4:70:8c:ff:69:fa:9d: d9:e3:07:53:1c:7e:ec:ee:e9:f6:2c:38:5e:14:59:f4: c8:94:8d:09:4a:65:20:a9:59:fd:e6:c5:f2:c8:11:90: e8:27:45:9e:ec:86:25:20:93:bc:08:f4:47:1e:8b:b8: bb:f2:8c:e9:ed:b2:16:a6:a7:6f:ca:a8:e1:80:25:95: b6:27:82:3d:eb:f9:90:b2:12:7c:1a:40:35:b4:dd:9a: 71:aa:28:de:d3:e0:3a:33:cf:83:10:dc:e2:50:0a:9a: e8:80:41:c7:9a:3f:4e:ae:ee:f8:29:37:10:57:82:8d Fingerprint (SHA-256): 87:8D:1F:9B:91:28:8A:07:5F:97:8F:8B:1A:9E:3F:E9:90:F2:3E:4A:82:B9:82:43:1A:EE:7E:8A:2F:5A:47:64 Fingerprint (SHA1): 90:63:35:73:43:46:3A:B4:92:D0:6F:E7:2D:55:0E:7C:05:DF:5C:84 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #410: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204062 (0x374402de) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 20:43:13 2022 Not After : Mon Sep 27 20:43:13 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:7f:95:e3:89:37:fc:f9:9c:ed:b9:60:85:c7:e6:9b: 1d:e0:d1:84:4d:fb:d6:b4:dd:87:ae:6c:a4:e5:a0:43: 40:ba:09:b6:4a:bb:39:48:d3:1c:10:3e:cf:52:0e:cc: f9:4f:f9:7c:e7:67:3d:2e:3f:28:60:3b:16:54:0a:09: 77:c5:f3:9b:ac:1b:82:84:ac:69:34:bb:23:01:80:f6: 41:7a:43:d6:30:42:8d:62:93:e2:90:ec:75:4e:46:e1: 8e:08:bf:e8:a9:dd:ad:15:36:65:8b:6d:3c:ad:49:ce: 90:5c:bf:48:48:f8:a3:af:9c:93:04:84:d4:56:d0:46: ae:d7:95:84:ee:cb:1b:c0:bc:8a:d9:3a:d3:27:d1:8d: c5:88:48:c4:4f:6b:22:5a:e5:70:1c:4c:21:87:be:da: 20:3c:32:1d:65:cd:30:bb:cb:b7:d2:76:b8:aa:50:38: d9:28:4a:9b:22:16:63:72:1d:84:99:22:77:9e:95:e8: 52:30:87:34:88:77:1d:a2:c2:50:b0:84:e4:b7:bf:3e: 8e:15:56:84:95:12:cf:6a:4b:92:9a:5a:42:36:13:f4: 9f:91:69:18:43:4d:e2:04:8c:06:e9:63:a7:b1:2c:ac: f3:64:f5:9f:e4:93:24:d7:09:4d:58:e6:59:d2:d3:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:b1:6b:28:54:86:9b:47:2d:b0:b8:8a:d6:72:3f:13: c8:18:b5:fc:eb:20:4d:99:41:29:4f:d3:d4:02:db:01: 4e:75:c6:56:f0:97:87:1b:ab:fa:f0:3f:f0:3e:5e:43: 20:6c:97:aa:95:1f:1d:c0:92:f3:3e:89:34:72:c6:3f: 77:f5:70:e9:06:e3:b1:b4:3c:8c:e3:77:83:81:ed:1e: 16:59:87:50:d9:4f:09:97:09:82:b3:8d:8d:f7:54:bb: c9:85:08:71:ff:2a:c5:b7:e8:78:3f:34:7b:1b:d5:0c: 86:1d:87:6d:20:58:29:3c:68:75:45:7b:86:60:96:dc: 7b:b0:98:63:3b:44:0b:92:0f:d4:70:8c:ff:69:fa:9d: d9:e3:07:53:1c:7e:ec:ee:e9:f6:2c:38:5e:14:59:f4: c8:94:8d:09:4a:65:20:a9:59:fd:e6:c5:f2:c8:11:90: e8:27:45:9e:ec:86:25:20:93:bc:08:f4:47:1e:8b:b8: bb:f2:8c:e9:ed:b2:16:a6:a7:6f:ca:a8:e1:80:25:95: b6:27:82:3d:eb:f9:90:b2:12:7c:1a:40:35:b4:dd:9a: 71:aa:28:de:d3:e0:3a:33:cf:83:10:dc:e2:50:0a:9a: e8:80:41:c7:9a:3f:4e:ae:ee:f8:29:37:10:57:82:8d Fingerprint (SHA-256): 87:8D:1F:9B:91:28:8A:07:5F:97:8F:8B:1A:9E:3F:E9:90:F2:3E:4A:82:B9:82:43:1A:EE:7E:8A:2F:5A:47:64 Fingerprint (SHA1): 90:63:35:73:43:46:3A:B4:92:D0:6F:E7:2D:55:0E:7C:05:DF:5C:84 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #411: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #412: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204065 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #413: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #414: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #415: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #416: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 927204066 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #417: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #418: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #419: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #420: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927204067 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #421: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #422: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #423: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #424: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 927204068 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #425: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #426: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #427: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #428: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 927204069 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #429: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #430: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #431: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #432: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 927204070 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #433: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #434: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #435: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #436: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 927204071 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #437: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #438: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #439: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #440: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #441: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #442: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #443: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204065 (0x374402e1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:43:23 2022 Not After : Tue Sep 27 20:43:23 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:b9:72:0f:41:e1:be:95:02:cd:7e:e9:d3:9e:0c:72: bf:d3:ef:54:8a:4d:3d:f0:93:5a:72:51:5d:8f:56:4f: e3:78:a2:70:6b:66:0b:e0:c6:86:84:63:0e:ce:aa:3f: 31:07:27:f9:49:55:c8:bf:04:28:18:fe:1c:c4:f2:09: 81:f8:a2:ae:75:9f:34:be:85:1d:57:b5:5c:b5:ec:2c: 35:87:d1:24:08:65:42:b8:9b:3f:c2:e4:3d:1c:5c:e3: a8:a8:42:1e:86:24:6a:8b:70:9b:6b:7e:f5:8c:23:35: bf:91:90:45:f4:a7:d5:6d:b2:b9:56:89:87:01:58:22: 4b:e6:a7:23:af:9a:e6:7c:86:bd:28:19:ae:20:92:c1: 6a:34:e5:22:14:17:ef:8d:c7:c0:f2:22:62:c3:8a:25: 0c:6d:02:f2:0d:a1:34:74:43:d3:5c:12:24:cf:5d:b5: e7:87:49:cc:77:7a:7e:b2:e5:6d:6a:08:ae:2a:15:4d: 39:7f:62:b9:82:f2:35:79:13:b8:34:eb:37:66:df:e5: bd:11:b7:55:47:0b:e7:48:77:82:b6:1d:7d:d9:9d:23: 25:2a:ff:ce:ab:c8:3d:1b:8d:84:dc:49:b6:de:09:85: 29:7d:67:98:41:b8:86:e4:70:5b:ba:05:2a:a6:e7:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:09:54:a0:7f:bf:64:04:9e:0d:08:6f:d1:2e:e5:ce: 3e:47:ca:a1:c1:26:a8:7b:cc:f2:84:e3:31:48:30:b0: 31:1c:d4:92:c6:57:4d:5d:7f:5b:61:61:40:51:d3:c4: 92:88:3f:7a:fe:2b:8a:25:f7:d0:53:b9:a2:27:8d:ab: a8:bf:1a:02:fa:37:31:c6:19:47:62:be:74:7a:0c:0e: 04:eb:fb:97:d3:8f:29:62:cf:d6:7d:cd:9a:73:b0:bd: fe:5d:35:0a:3c:60:a8:e2:b2:f0:6b:3d:27:d8:96:c6: fd:f8:12:e1:dd:5b:1d:56:34:f2:4e:f3:d2:bf:43:ca: bf:32:57:5f:49:1f:6e:d6:09:af:7b:51:92:a8:c8:d0: b3:93:cb:31:24:6a:49:a4:3b:df:83:16:59:30:7e:e4: 94:2f:e8:71:3c:0a:3c:67:dd:10:84:13:82:0e:01:bd: 9b:c5:ff:58:6e:e1:04:c0:b5:b8:1e:a9:ff:d4:89:7f: 3d:c7:6d:c0:18:47:a5:ef:3d:7d:7f:eb:8a:86:04:f6: 85:63:e6:dd:96:e3:44:ad:63:b8:ec:dc:27:54:06:a5: 1d:08:51:16:e0:87:c7:80:eb:c0:19:bd:7d:98:82:36: 3b:62:c4:b1:51:5a:85:53:12:f8:31:b9:ba:fe:d5:d3 Fingerprint (SHA-256): BA:FB:09:98:7A:4B:D9:6B:C7:2A:A6:2B:F6:38:B3:0F:3D:9A:C8:52:58:19:A0:AD:10:17:87:14:4C:26:3E:C6 Fingerprint (SHA1): CD:12:44:3C:D8:68:32:73:6E:BF:BD:C9:19:59:FC:54:24:16:3B:7C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #444: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #445: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #446: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #447: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204065 (0x374402e1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:43:23 2022 Not After : Tue Sep 27 20:43:23 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:b9:72:0f:41:e1:be:95:02:cd:7e:e9:d3:9e:0c:72: bf:d3:ef:54:8a:4d:3d:f0:93:5a:72:51:5d:8f:56:4f: e3:78:a2:70:6b:66:0b:e0:c6:86:84:63:0e:ce:aa:3f: 31:07:27:f9:49:55:c8:bf:04:28:18:fe:1c:c4:f2:09: 81:f8:a2:ae:75:9f:34:be:85:1d:57:b5:5c:b5:ec:2c: 35:87:d1:24:08:65:42:b8:9b:3f:c2:e4:3d:1c:5c:e3: a8:a8:42:1e:86:24:6a:8b:70:9b:6b:7e:f5:8c:23:35: bf:91:90:45:f4:a7:d5:6d:b2:b9:56:89:87:01:58:22: 4b:e6:a7:23:af:9a:e6:7c:86:bd:28:19:ae:20:92:c1: 6a:34:e5:22:14:17:ef:8d:c7:c0:f2:22:62:c3:8a:25: 0c:6d:02:f2:0d:a1:34:74:43:d3:5c:12:24:cf:5d:b5: e7:87:49:cc:77:7a:7e:b2:e5:6d:6a:08:ae:2a:15:4d: 39:7f:62:b9:82:f2:35:79:13:b8:34:eb:37:66:df:e5: bd:11:b7:55:47:0b:e7:48:77:82:b6:1d:7d:d9:9d:23: 25:2a:ff:ce:ab:c8:3d:1b:8d:84:dc:49:b6:de:09:85: 29:7d:67:98:41:b8:86:e4:70:5b:ba:05:2a:a6:e7:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:09:54:a0:7f:bf:64:04:9e:0d:08:6f:d1:2e:e5:ce: 3e:47:ca:a1:c1:26:a8:7b:cc:f2:84:e3:31:48:30:b0: 31:1c:d4:92:c6:57:4d:5d:7f:5b:61:61:40:51:d3:c4: 92:88:3f:7a:fe:2b:8a:25:f7:d0:53:b9:a2:27:8d:ab: a8:bf:1a:02:fa:37:31:c6:19:47:62:be:74:7a:0c:0e: 04:eb:fb:97:d3:8f:29:62:cf:d6:7d:cd:9a:73:b0:bd: fe:5d:35:0a:3c:60:a8:e2:b2:f0:6b:3d:27:d8:96:c6: fd:f8:12:e1:dd:5b:1d:56:34:f2:4e:f3:d2:bf:43:ca: bf:32:57:5f:49:1f:6e:d6:09:af:7b:51:92:a8:c8:d0: b3:93:cb:31:24:6a:49:a4:3b:df:83:16:59:30:7e:e4: 94:2f:e8:71:3c:0a:3c:67:dd:10:84:13:82:0e:01:bd: 9b:c5:ff:58:6e:e1:04:c0:b5:b8:1e:a9:ff:d4:89:7f: 3d:c7:6d:c0:18:47:a5:ef:3d:7d:7f:eb:8a:86:04:f6: 85:63:e6:dd:96:e3:44:ad:63:b8:ec:dc:27:54:06:a5: 1d:08:51:16:e0:87:c7:80:eb:c0:19:bd:7d:98:82:36: 3b:62:c4:b1:51:5a:85:53:12:f8:31:b9:ba:fe:d5:d3 Fingerprint (SHA-256): BA:FB:09:98:7A:4B:D9:6B:C7:2A:A6:2B:F6:38:B3:0F:3D:9A:C8:52:58:19:A0:AD:10:17:87:14:4C:26:3E:C6 Fingerprint (SHA1): CD:12:44:3C:D8:68:32:73:6E:BF:BD:C9:19:59:FC:54:24:16:3B:7C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #448: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #449: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #450: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204072 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #451: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #452: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #453: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #454: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 927204073 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #455: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #456: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #457: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #458: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 927204074 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #459: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #460: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #461: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #462: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 927204075 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #463: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #464: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #465: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #466: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 927204076 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #467: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #468: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #469: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #470: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 927204077 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #471: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #472: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #473: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #474: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 927204078 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #475: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #476: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #477: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #478: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 927204079 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #479: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #480: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #481: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #482: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 927204080 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #483: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #484: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #485: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #486: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 927204081 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #487: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #488: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #489: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #490: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 927204082 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #491: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #492: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #493: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #494: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 927204083 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #495: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #496: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #497: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #498: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 927204084 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #499: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #500: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #501: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #502: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 927204085 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #503: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #504: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #505: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #506: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 927204086 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #507: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #508: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #509: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #510: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 927204087 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #511: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #512: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #513: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #514: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 927204088 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #515: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #516: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #517: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #518: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 927204089 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #519: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #520: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #521: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #522: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 927204090 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #523: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #524: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #525: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #526: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 927204091 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #527: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #528: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #529: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #530: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 927204092 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #531: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #532: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #533: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #534: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 927204093 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #535: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #536: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #537: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #538: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 927204094 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #539: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #540: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #541: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #542: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 927204095 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #543: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #544: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #545: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #546: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 927204096 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #547: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #548: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #549: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #550: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 927204097 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #551: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #552: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #553: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #554: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 927204098 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #555: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #556: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #557: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #558: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 927204099 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #559: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #560: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #561: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #562: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 927204100 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #563: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #564: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #565: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #566: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 927204101 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #567: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #568: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #569: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204072 (0x374402e8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:43:36 2022 Not After : Tue Sep 27 20:43:36 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:34:fe:dc:39:1c:35:9f:a5:71:ce:fc:28:e2:09:17: f4:b8:98:42:4b:6a:3f:b1:b0:27:ec:74:fd:74:f1:a2: 30:af:1c:d1:ca:f1:3c:5b:6a:73:9a:fa:35:db:6f:8d: fe:ac:df:3c:77:33:b0:17:51:51:0c:45:ec:12:1f:3d: 09:e8:b6:9e:2c:80:84:f6:0c:07:fb:ea:fc:5c:03:0a: 82:b9:a5:49:49:d3:ea:c0:08:07:d6:79:fe:e3:fa:76: f6:99:4b:0b:28:57:df:36:c0:ea:59:b7:92:53:2a:f1: cc:fa:b4:24:08:aa:b9:38:ca:3c:0d:b3:d1:e3:1e:44: 4d:eb:72:16:a5:7a:a1:52:81:15:2d:90:02:9e:aa:e8: b2:d5:f5:ee:22:3d:23:75:55:ff:39:aa:73:41:ff:9a: 21:81:e5:21:76:43:be:d3:8d:8d:6a:1c:75:27:5e:fb: 3d:ab:e6:38:45:08:b2:17:8e:a2:ee:6c:10:f7:09:73: ac:d8:b9:0e:0c:3f:a0:42:a2:e1:c9:10:cb:98:87:83: f2:2b:bd:d7:d8:24:5a:81:1e:b8:a6:95:13:21:06:67: b2:1e:ec:50:cc:d8:5a:fa:83:b2:2f:9d:94:63:05:7d: 3d:ef:37:e4:40:14:93:48:c6:48:42:8a:58:9a:a2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:85:19:24:a1:62:77:7d:a8:a6:ac:37:aa:a8:cb:11: 88:c4:48:77:dc:ee:ec:fd:6c:14:3a:44:79:6c:37:62: 16:7c:51:d7:92:f7:b7:ae:c7:ef:88:ac:c3:85:c8:d7: 48:be:9d:e4:5c:f0:0f:ad:b9:a6:98:6f:49:00:d0:ff: 00:f8:46:c4:63:85:ac:15:6c:dc:fa:61:18:41:0e:d0: f9:fc:c6:0a:79:cf:71:77:63:52:89:e0:09:55:97:bb: 8e:94:2b:5b:a8:9a:c0:22:a2:27:aa:04:db:10:a6:a6: 85:09:0b:16:fc:ed:d2:d7:05:ad:a6:48:2e:9a:3f:9a: 04:e2:0e:5f:ba:82:5c:63:4f:aa:09:93:c7:33:9c:5f: 4b:ae:35:db:8b:91:3a:7d:a7:6e:86:9d:a6:82:f4:87: e0:72:26:b1:4a:36:02:fe:c6:18:ed:9f:a8:37:53:a9: a6:a0:c0:66:e2:08:3a:14:7d:ef:c8:33:c4:b2:d0:eb: 93:f5:8e:14:4d:56:c7:d5:2a:f8:9e:b0:73:80:10:34: f2:24:1d:00:ec:9b:90:8c:b8:2c:07:6d:14:6d:f7:56: 9d:a4:48:d0:c1:ee:da:17:7e:e3:1e:03:68:a9:a5:b1: ce:d4:65:c3:c7:42:68:15:b4:32:eb:08:63:77:2e:4a Fingerprint (SHA-256): 4C:C6:D3:23:50:29:7F:A6:CF:DB:5E:1A:E1:E0:AA:80:28:F5:F9:C0:D6:22:D5:2F:1F:50:5E:09:BF:A0:1D:4A Fingerprint (SHA1): ED:B1:91:B2:88:BD:E1:CB:2C:9D:5D:CA:5D:7C:D6:E7:DF:EE:3E:F6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #570: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #571: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204072 (0x374402e8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:43:36 2022 Not After : Tue Sep 27 20:43:36 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:34:fe:dc:39:1c:35:9f:a5:71:ce:fc:28:e2:09:17: f4:b8:98:42:4b:6a:3f:b1:b0:27:ec:74:fd:74:f1:a2: 30:af:1c:d1:ca:f1:3c:5b:6a:73:9a:fa:35:db:6f:8d: fe:ac:df:3c:77:33:b0:17:51:51:0c:45:ec:12:1f:3d: 09:e8:b6:9e:2c:80:84:f6:0c:07:fb:ea:fc:5c:03:0a: 82:b9:a5:49:49:d3:ea:c0:08:07:d6:79:fe:e3:fa:76: f6:99:4b:0b:28:57:df:36:c0:ea:59:b7:92:53:2a:f1: cc:fa:b4:24:08:aa:b9:38:ca:3c:0d:b3:d1:e3:1e:44: 4d:eb:72:16:a5:7a:a1:52:81:15:2d:90:02:9e:aa:e8: b2:d5:f5:ee:22:3d:23:75:55:ff:39:aa:73:41:ff:9a: 21:81:e5:21:76:43:be:d3:8d:8d:6a:1c:75:27:5e:fb: 3d:ab:e6:38:45:08:b2:17:8e:a2:ee:6c:10:f7:09:73: ac:d8:b9:0e:0c:3f:a0:42:a2:e1:c9:10:cb:98:87:83: f2:2b:bd:d7:d8:24:5a:81:1e:b8:a6:95:13:21:06:67: b2:1e:ec:50:cc:d8:5a:fa:83:b2:2f:9d:94:63:05:7d: 3d:ef:37:e4:40:14:93:48:c6:48:42:8a:58:9a:a2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:85:19:24:a1:62:77:7d:a8:a6:ac:37:aa:a8:cb:11: 88:c4:48:77:dc:ee:ec:fd:6c:14:3a:44:79:6c:37:62: 16:7c:51:d7:92:f7:b7:ae:c7:ef:88:ac:c3:85:c8:d7: 48:be:9d:e4:5c:f0:0f:ad:b9:a6:98:6f:49:00:d0:ff: 00:f8:46:c4:63:85:ac:15:6c:dc:fa:61:18:41:0e:d0: f9:fc:c6:0a:79:cf:71:77:63:52:89:e0:09:55:97:bb: 8e:94:2b:5b:a8:9a:c0:22:a2:27:aa:04:db:10:a6:a6: 85:09:0b:16:fc:ed:d2:d7:05:ad:a6:48:2e:9a:3f:9a: 04:e2:0e:5f:ba:82:5c:63:4f:aa:09:93:c7:33:9c:5f: 4b:ae:35:db:8b:91:3a:7d:a7:6e:86:9d:a6:82:f4:87: e0:72:26:b1:4a:36:02:fe:c6:18:ed:9f:a8:37:53:a9: a6:a0:c0:66:e2:08:3a:14:7d:ef:c8:33:c4:b2:d0:eb: 93:f5:8e:14:4d:56:c7:d5:2a:f8:9e:b0:73:80:10:34: f2:24:1d:00:ec:9b:90:8c:b8:2c:07:6d:14:6d:f7:56: 9d:a4:48:d0:c1:ee:da:17:7e:e3:1e:03:68:a9:a5:b1: ce:d4:65:c3:c7:42:68:15:b4:32:eb:08:63:77:2e:4a Fingerprint (SHA-256): 4C:C6:D3:23:50:29:7F:A6:CF:DB:5E:1A:E1:E0:AA:80:28:F5:F9:C0:D6:22:D5:2F:1F:50:5E:09:BF:A0:1D:4A Fingerprint (SHA1): ED:B1:91:B2:88:BD:E1:CB:2C:9D:5D:CA:5D:7C:D6:E7:DF:EE:3E:F6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #572: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #573: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #574: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #575: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204072 (0x374402e8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:43:36 2022 Not After : Tue Sep 27 20:43:36 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:34:fe:dc:39:1c:35:9f:a5:71:ce:fc:28:e2:09:17: f4:b8:98:42:4b:6a:3f:b1:b0:27:ec:74:fd:74:f1:a2: 30:af:1c:d1:ca:f1:3c:5b:6a:73:9a:fa:35:db:6f:8d: fe:ac:df:3c:77:33:b0:17:51:51:0c:45:ec:12:1f:3d: 09:e8:b6:9e:2c:80:84:f6:0c:07:fb:ea:fc:5c:03:0a: 82:b9:a5:49:49:d3:ea:c0:08:07:d6:79:fe:e3:fa:76: f6:99:4b:0b:28:57:df:36:c0:ea:59:b7:92:53:2a:f1: cc:fa:b4:24:08:aa:b9:38:ca:3c:0d:b3:d1:e3:1e:44: 4d:eb:72:16:a5:7a:a1:52:81:15:2d:90:02:9e:aa:e8: b2:d5:f5:ee:22:3d:23:75:55:ff:39:aa:73:41:ff:9a: 21:81:e5:21:76:43:be:d3:8d:8d:6a:1c:75:27:5e:fb: 3d:ab:e6:38:45:08:b2:17:8e:a2:ee:6c:10:f7:09:73: ac:d8:b9:0e:0c:3f:a0:42:a2:e1:c9:10:cb:98:87:83: f2:2b:bd:d7:d8:24:5a:81:1e:b8:a6:95:13:21:06:67: b2:1e:ec:50:cc:d8:5a:fa:83:b2:2f:9d:94:63:05:7d: 3d:ef:37:e4:40:14:93:48:c6:48:42:8a:58:9a:a2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:85:19:24:a1:62:77:7d:a8:a6:ac:37:aa:a8:cb:11: 88:c4:48:77:dc:ee:ec:fd:6c:14:3a:44:79:6c:37:62: 16:7c:51:d7:92:f7:b7:ae:c7:ef:88:ac:c3:85:c8:d7: 48:be:9d:e4:5c:f0:0f:ad:b9:a6:98:6f:49:00:d0:ff: 00:f8:46:c4:63:85:ac:15:6c:dc:fa:61:18:41:0e:d0: f9:fc:c6:0a:79:cf:71:77:63:52:89:e0:09:55:97:bb: 8e:94:2b:5b:a8:9a:c0:22:a2:27:aa:04:db:10:a6:a6: 85:09:0b:16:fc:ed:d2:d7:05:ad:a6:48:2e:9a:3f:9a: 04:e2:0e:5f:ba:82:5c:63:4f:aa:09:93:c7:33:9c:5f: 4b:ae:35:db:8b:91:3a:7d:a7:6e:86:9d:a6:82:f4:87: e0:72:26:b1:4a:36:02:fe:c6:18:ed:9f:a8:37:53:a9: a6:a0:c0:66:e2:08:3a:14:7d:ef:c8:33:c4:b2:d0:eb: 93:f5:8e:14:4d:56:c7:d5:2a:f8:9e:b0:73:80:10:34: f2:24:1d:00:ec:9b:90:8c:b8:2c:07:6d:14:6d:f7:56: 9d:a4:48:d0:c1:ee:da:17:7e:e3:1e:03:68:a9:a5:b1: ce:d4:65:c3:c7:42:68:15:b4:32:eb:08:63:77:2e:4a Fingerprint (SHA-256): 4C:C6:D3:23:50:29:7F:A6:CF:DB:5E:1A:E1:E0:AA:80:28:F5:F9:C0:D6:22:D5:2F:1F:50:5E:09:BF:A0:1D:4A Fingerprint (SHA1): ED:B1:91:B2:88:BD:E1:CB:2C:9D:5D:CA:5D:7C:D6:E7:DF:EE:3E:F6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #576: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #577: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #578: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #579: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204072 (0x374402e8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:43:36 2022 Not After : Tue Sep 27 20:43:36 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:34:fe:dc:39:1c:35:9f:a5:71:ce:fc:28:e2:09:17: f4:b8:98:42:4b:6a:3f:b1:b0:27:ec:74:fd:74:f1:a2: 30:af:1c:d1:ca:f1:3c:5b:6a:73:9a:fa:35:db:6f:8d: fe:ac:df:3c:77:33:b0:17:51:51:0c:45:ec:12:1f:3d: 09:e8:b6:9e:2c:80:84:f6:0c:07:fb:ea:fc:5c:03:0a: 82:b9:a5:49:49:d3:ea:c0:08:07:d6:79:fe:e3:fa:76: f6:99:4b:0b:28:57:df:36:c0:ea:59:b7:92:53:2a:f1: cc:fa:b4:24:08:aa:b9:38:ca:3c:0d:b3:d1:e3:1e:44: 4d:eb:72:16:a5:7a:a1:52:81:15:2d:90:02:9e:aa:e8: b2:d5:f5:ee:22:3d:23:75:55:ff:39:aa:73:41:ff:9a: 21:81:e5:21:76:43:be:d3:8d:8d:6a:1c:75:27:5e:fb: 3d:ab:e6:38:45:08:b2:17:8e:a2:ee:6c:10:f7:09:73: ac:d8:b9:0e:0c:3f:a0:42:a2:e1:c9:10:cb:98:87:83: f2:2b:bd:d7:d8:24:5a:81:1e:b8:a6:95:13:21:06:67: b2:1e:ec:50:cc:d8:5a:fa:83:b2:2f:9d:94:63:05:7d: 3d:ef:37:e4:40:14:93:48:c6:48:42:8a:58:9a:a2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:85:19:24:a1:62:77:7d:a8:a6:ac:37:aa:a8:cb:11: 88:c4:48:77:dc:ee:ec:fd:6c:14:3a:44:79:6c:37:62: 16:7c:51:d7:92:f7:b7:ae:c7:ef:88:ac:c3:85:c8:d7: 48:be:9d:e4:5c:f0:0f:ad:b9:a6:98:6f:49:00:d0:ff: 00:f8:46:c4:63:85:ac:15:6c:dc:fa:61:18:41:0e:d0: f9:fc:c6:0a:79:cf:71:77:63:52:89:e0:09:55:97:bb: 8e:94:2b:5b:a8:9a:c0:22:a2:27:aa:04:db:10:a6:a6: 85:09:0b:16:fc:ed:d2:d7:05:ad:a6:48:2e:9a:3f:9a: 04:e2:0e:5f:ba:82:5c:63:4f:aa:09:93:c7:33:9c:5f: 4b:ae:35:db:8b:91:3a:7d:a7:6e:86:9d:a6:82:f4:87: e0:72:26:b1:4a:36:02:fe:c6:18:ed:9f:a8:37:53:a9: a6:a0:c0:66:e2:08:3a:14:7d:ef:c8:33:c4:b2:d0:eb: 93:f5:8e:14:4d:56:c7:d5:2a:f8:9e:b0:73:80:10:34: f2:24:1d:00:ec:9b:90:8c:b8:2c:07:6d:14:6d:f7:56: 9d:a4:48:d0:c1:ee:da:17:7e:e3:1e:03:68:a9:a5:b1: ce:d4:65:c3:c7:42:68:15:b4:32:eb:08:63:77:2e:4a Fingerprint (SHA-256): 4C:C6:D3:23:50:29:7F:A6:CF:DB:5E:1A:E1:E0:AA:80:28:F5:F9:C0:D6:22:D5:2F:1F:50:5E:09:BF:A0:1D:4A Fingerprint (SHA1): ED:B1:91:B2:88:BD:E1:CB:2C:9D:5D:CA:5D:7C:D6:E7:DF:EE:3E:F6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #580: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204072 (0x374402e8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:43:36 2022 Not After : Tue Sep 27 20:43:36 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:34:fe:dc:39:1c:35:9f:a5:71:ce:fc:28:e2:09:17: f4:b8:98:42:4b:6a:3f:b1:b0:27:ec:74:fd:74:f1:a2: 30:af:1c:d1:ca:f1:3c:5b:6a:73:9a:fa:35:db:6f:8d: fe:ac:df:3c:77:33:b0:17:51:51:0c:45:ec:12:1f:3d: 09:e8:b6:9e:2c:80:84:f6:0c:07:fb:ea:fc:5c:03:0a: 82:b9:a5:49:49:d3:ea:c0:08:07:d6:79:fe:e3:fa:76: f6:99:4b:0b:28:57:df:36:c0:ea:59:b7:92:53:2a:f1: cc:fa:b4:24:08:aa:b9:38:ca:3c:0d:b3:d1:e3:1e:44: 4d:eb:72:16:a5:7a:a1:52:81:15:2d:90:02:9e:aa:e8: b2:d5:f5:ee:22:3d:23:75:55:ff:39:aa:73:41:ff:9a: 21:81:e5:21:76:43:be:d3:8d:8d:6a:1c:75:27:5e:fb: 3d:ab:e6:38:45:08:b2:17:8e:a2:ee:6c:10:f7:09:73: ac:d8:b9:0e:0c:3f:a0:42:a2:e1:c9:10:cb:98:87:83: f2:2b:bd:d7:d8:24:5a:81:1e:b8:a6:95:13:21:06:67: b2:1e:ec:50:cc:d8:5a:fa:83:b2:2f:9d:94:63:05:7d: 3d:ef:37:e4:40:14:93:48:c6:48:42:8a:58:9a:a2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:85:19:24:a1:62:77:7d:a8:a6:ac:37:aa:a8:cb:11: 88:c4:48:77:dc:ee:ec:fd:6c:14:3a:44:79:6c:37:62: 16:7c:51:d7:92:f7:b7:ae:c7:ef:88:ac:c3:85:c8:d7: 48:be:9d:e4:5c:f0:0f:ad:b9:a6:98:6f:49:00:d0:ff: 00:f8:46:c4:63:85:ac:15:6c:dc:fa:61:18:41:0e:d0: f9:fc:c6:0a:79:cf:71:77:63:52:89:e0:09:55:97:bb: 8e:94:2b:5b:a8:9a:c0:22:a2:27:aa:04:db:10:a6:a6: 85:09:0b:16:fc:ed:d2:d7:05:ad:a6:48:2e:9a:3f:9a: 04:e2:0e:5f:ba:82:5c:63:4f:aa:09:93:c7:33:9c:5f: 4b:ae:35:db:8b:91:3a:7d:a7:6e:86:9d:a6:82:f4:87: e0:72:26:b1:4a:36:02:fe:c6:18:ed:9f:a8:37:53:a9: a6:a0:c0:66:e2:08:3a:14:7d:ef:c8:33:c4:b2:d0:eb: 93:f5:8e:14:4d:56:c7:d5:2a:f8:9e:b0:73:80:10:34: f2:24:1d:00:ec:9b:90:8c:b8:2c:07:6d:14:6d:f7:56: 9d:a4:48:d0:c1:ee:da:17:7e:e3:1e:03:68:a9:a5:b1: ce:d4:65:c3:c7:42:68:15:b4:32:eb:08:63:77:2e:4a Fingerprint (SHA-256): 4C:C6:D3:23:50:29:7F:A6:CF:DB:5E:1A:E1:E0:AA:80:28:F5:F9:C0:D6:22:D5:2F:1F:50:5E:09:BF:A0:1D:4A Fingerprint (SHA1): ED:B1:91:B2:88:BD:E1:CB:2C:9D:5D:CA:5D:7C:D6:E7:DF:EE:3E:F6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #581: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #582: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204072 (0x374402e8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:43:36 2022 Not After : Tue Sep 27 20:43:36 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:34:fe:dc:39:1c:35:9f:a5:71:ce:fc:28:e2:09:17: f4:b8:98:42:4b:6a:3f:b1:b0:27:ec:74:fd:74:f1:a2: 30:af:1c:d1:ca:f1:3c:5b:6a:73:9a:fa:35:db:6f:8d: fe:ac:df:3c:77:33:b0:17:51:51:0c:45:ec:12:1f:3d: 09:e8:b6:9e:2c:80:84:f6:0c:07:fb:ea:fc:5c:03:0a: 82:b9:a5:49:49:d3:ea:c0:08:07:d6:79:fe:e3:fa:76: f6:99:4b:0b:28:57:df:36:c0:ea:59:b7:92:53:2a:f1: cc:fa:b4:24:08:aa:b9:38:ca:3c:0d:b3:d1:e3:1e:44: 4d:eb:72:16:a5:7a:a1:52:81:15:2d:90:02:9e:aa:e8: b2:d5:f5:ee:22:3d:23:75:55:ff:39:aa:73:41:ff:9a: 21:81:e5:21:76:43:be:d3:8d:8d:6a:1c:75:27:5e:fb: 3d:ab:e6:38:45:08:b2:17:8e:a2:ee:6c:10:f7:09:73: ac:d8:b9:0e:0c:3f:a0:42:a2:e1:c9:10:cb:98:87:83: f2:2b:bd:d7:d8:24:5a:81:1e:b8:a6:95:13:21:06:67: b2:1e:ec:50:cc:d8:5a:fa:83:b2:2f:9d:94:63:05:7d: 3d:ef:37:e4:40:14:93:48:c6:48:42:8a:58:9a:a2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:85:19:24:a1:62:77:7d:a8:a6:ac:37:aa:a8:cb:11: 88:c4:48:77:dc:ee:ec:fd:6c:14:3a:44:79:6c:37:62: 16:7c:51:d7:92:f7:b7:ae:c7:ef:88:ac:c3:85:c8:d7: 48:be:9d:e4:5c:f0:0f:ad:b9:a6:98:6f:49:00:d0:ff: 00:f8:46:c4:63:85:ac:15:6c:dc:fa:61:18:41:0e:d0: f9:fc:c6:0a:79:cf:71:77:63:52:89:e0:09:55:97:bb: 8e:94:2b:5b:a8:9a:c0:22:a2:27:aa:04:db:10:a6:a6: 85:09:0b:16:fc:ed:d2:d7:05:ad:a6:48:2e:9a:3f:9a: 04:e2:0e:5f:ba:82:5c:63:4f:aa:09:93:c7:33:9c:5f: 4b:ae:35:db:8b:91:3a:7d:a7:6e:86:9d:a6:82:f4:87: e0:72:26:b1:4a:36:02:fe:c6:18:ed:9f:a8:37:53:a9: a6:a0:c0:66:e2:08:3a:14:7d:ef:c8:33:c4:b2:d0:eb: 93:f5:8e:14:4d:56:c7:d5:2a:f8:9e:b0:73:80:10:34: f2:24:1d:00:ec:9b:90:8c:b8:2c:07:6d:14:6d:f7:56: 9d:a4:48:d0:c1:ee:da:17:7e:e3:1e:03:68:a9:a5:b1: ce:d4:65:c3:c7:42:68:15:b4:32:eb:08:63:77:2e:4a Fingerprint (SHA-256): 4C:C6:D3:23:50:29:7F:A6:CF:DB:5E:1A:E1:E0:AA:80:28:F5:F9:C0:D6:22:D5:2F:1F:50:5E:09:BF:A0:1D:4A Fingerprint (SHA1): ED:B1:91:B2:88:BD:E1:CB:2C:9D:5D:CA:5D:7C:D6:E7:DF:EE:3E:F6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #583: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #584: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #585: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #586: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204072 (0x374402e8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:43:36 2022 Not After : Tue Sep 27 20:43:36 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:34:fe:dc:39:1c:35:9f:a5:71:ce:fc:28:e2:09:17: f4:b8:98:42:4b:6a:3f:b1:b0:27:ec:74:fd:74:f1:a2: 30:af:1c:d1:ca:f1:3c:5b:6a:73:9a:fa:35:db:6f:8d: fe:ac:df:3c:77:33:b0:17:51:51:0c:45:ec:12:1f:3d: 09:e8:b6:9e:2c:80:84:f6:0c:07:fb:ea:fc:5c:03:0a: 82:b9:a5:49:49:d3:ea:c0:08:07:d6:79:fe:e3:fa:76: f6:99:4b:0b:28:57:df:36:c0:ea:59:b7:92:53:2a:f1: cc:fa:b4:24:08:aa:b9:38:ca:3c:0d:b3:d1:e3:1e:44: 4d:eb:72:16:a5:7a:a1:52:81:15:2d:90:02:9e:aa:e8: b2:d5:f5:ee:22:3d:23:75:55:ff:39:aa:73:41:ff:9a: 21:81:e5:21:76:43:be:d3:8d:8d:6a:1c:75:27:5e:fb: 3d:ab:e6:38:45:08:b2:17:8e:a2:ee:6c:10:f7:09:73: ac:d8:b9:0e:0c:3f:a0:42:a2:e1:c9:10:cb:98:87:83: f2:2b:bd:d7:d8:24:5a:81:1e:b8:a6:95:13:21:06:67: b2:1e:ec:50:cc:d8:5a:fa:83:b2:2f:9d:94:63:05:7d: 3d:ef:37:e4:40:14:93:48:c6:48:42:8a:58:9a:a2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:85:19:24:a1:62:77:7d:a8:a6:ac:37:aa:a8:cb:11: 88:c4:48:77:dc:ee:ec:fd:6c:14:3a:44:79:6c:37:62: 16:7c:51:d7:92:f7:b7:ae:c7:ef:88:ac:c3:85:c8:d7: 48:be:9d:e4:5c:f0:0f:ad:b9:a6:98:6f:49:00:d0:ff: 00:f8:46:c4:63:85:ac:15:6c:dc:fa:61:18:41:0e:d0: f9:fc:c6:0a:79:cf:71:77:63:52:89:e0:09:55:97:bb: 8e:94:2b:5b:a8:9a:c0:22:a2:27:aa:04:db:10:a6:a6: 85:09:0b:16:fc:ed:d2:d7:05:ad:a6:48:2e:9a:3f:9a: 04:e2:0e:5f:ba:82:5c:63:4f:aa:09:93:c7:33:9c:5f: 4b:ae:35:db:8b:91:3a:7d:a7:6e:86:9d:a6:82:f4:87: e0:72:26:b1:4a:36:02:fe:c6:18:ed:9f:a8:37:53:a9: a6:a0:c0:66:e2:08:3a:14:7d:ef:c8:33:c4:b2:d0:eb: 93:f5:8e:14:4d:56:c7:d5:2a:f8:9e:b0:73:80:10:34: f2:24:1d:00:ec:9b:90:8c:b8:2c:07:6d:14:6d:f7:56: 9d:a4:48:d0:c1:ee:da:17:7e:e3:1e:03:68:a9:a5:b1: ce:d4:65:c3:c7:42:68:15:b4:32:eb:08:63:77:2e:4a Fingerprint (SHA-256): 4C:C6:D3:23:50:29:7F:A6:CF:DB:5E:1A:E1:E0:AA:80:28:F5:F9:C0:D6:22:D5:2F:1F:50:5E:09:BF:A0:1D:4A Fingerprint (SHA1): ED:B1:91:B2:88:BD:E1:CB:2C:9D:5D:CA:5D:7C:D6:E7:DF:EE:3E:F6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #587: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204072 (0x374402e8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:43:36 2022 Not After : Tue Sep 27 20:43:36 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:34:fe:dc:39:1c:35:9f:a5:71:ce:fc:28:e2:09:17: f4:b8:98:42:4b:6a:3f:b1:b0:27:ec:74:fd:74:f1:a2: 30:af:1c:d1:ca:f1:3c:5b:6a:73:9a:fa:35:db:6f:8d: fe:ac:df:3c:77:33:b0:17:51:51:0c:45:ec:12:1f:3d: 09:e8:b6:9e:2c:80:84:f6:0c:07:fb:ea:fc:5c:03:0a: 82:b9:a5:49:49:d3:ea:c0:08:07:d6:79:fe:e3:fa:76: f6:99:4b:0b:28:57:df:36:c0:ea:59:b7:92:53:2a:f1: cc:fa:b4:24:08:aa:b9:38:ca:3c:0d:b3:d1:e3:1e:44: 4d:eb:72:16:a5:7a:a1:52:81:15:2d:90:02:9e:aa:e8: b2:d5:f5:ee:22:3d:23:75:55:ff:39:aa:73:41:ff:9a: 21:81:e5:21:76:43:be:d3:8d:8d:6a:1c:75:27:5e:fb: 3d:ab:e6:38:45:08:b2:17:8e:a2:ee:6c:10:f7:09:73: ac:d8:b9:0e:0c:3f:a0:42:a2:e1:c9:10:cb:98:87:83: f2:2b:bd:d7:d8:24:5a:81:1e:b8:a6:95:13:21:06:67: b2:1e:ec:50:cc:d8:5a:fa:83:b2:2f:9d:94:63:05:7d: 3d:ef:37:e4:40:14:93:48:c6:48:42:8a:58:9a:a2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:85:19:24:a1:62:77:7d:a8:a6:ac:37:aa:a8:cb:11: 88:c4:48:77:dc:ee:ec:fd:6c:14:3a:44:79:6c:37:62: 16:7c:51:d7:92:f7:b7:ae:c7:ef:88:ac:c3:85:c8:d7: 48:be:9d:e4:5c:f0:0f:ad:b9:a6:98:6f:49:00:d0:ff: 00:f8:46:c4:63:85:ac:15:6c:dc:fa:61:18:41:0e:d0: f9:fc:c6:0a:79:cf:71:77:63:52:89:e0:09:55:97:bb: 8e:94:2b:5b:a8:9a:c0:22:a2:27:aa:04:db:10:a6:a6: 85:09:0b:16:fc:ed:d2:d7:05:ad:a6:48:2e:9a:3f:9a: 04:e2:0e:5f:ba:82:5c:63:4f:aa:09:93:c7:33:9c:5f: 4b:ae:35:db:8b:91:3a:7d:a7:6e:86:9d:a6:82:f4:87: e0:72:26:b1:4a:36:02:fe:c6:18:ed:9f:a8:37:53:a9: a6:a0:c0:66:e2:08:3a:14:7d:ef:c8:33:c4:b2:d0:eb: 93:f5:8e:14:4d:56:c7:d5:2a:f8:9e:b0:73:80:10:34: f2:24:1d:00:ec:9b:90:8c:b8:2c:07:6d:14:6d:f7:56: 9d:a4:48:d0:c1:ee:da:17:7e:e3:1e:03:68:a9:a5:b1: ce:d4:65:c3:c7:42:68:15:b4:32:eb:08:63:77:2e:4a Fingerprint (SHA-256): 4C:C6:D3:23:50:29:7F:A6:CF:DB:5E:1A:E1:E0:AA:80:28:F5:F9:C0:D6:22:D5:2F:1F:50:5E:09:BF:A0:1D:4A Fingerprint (SHA1): ED:B1:91:B2:88:BD:E1:CB:2C:9D:5D:CA:5D:7C:D6:E7:DF:EE:3E:F6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #588: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204072 (0x374402e8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:43:36 2022 Not After : Tue Sep 27 20:43:36 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:34:fe:dc:39:1c:35:9f:a5:71:ce:fc:28:e2:09:17: f4:b8:98:42:4b:6a:3f:b1:b0:27:ec:74:fd:74:f1:a2: 30:af:1c:d1:ca:f1:3c:5b:6a:73:9a:fa:35:db:6f:8d: fe:ac:df:3c:77:33:b0:17:51:51:0c:45:ec:12:1f:3d: 09:e8:b6:9e:2c:80:84:f6:0c:07:fb:ea:fc:5c:03:0a: 82:b9:a5:49:49:d3:ea:c0:08:07:d6:79:fe:e3:fa:76: f6:99:4b:0b:28:57:df:36:c0:ea:59:b7:92:53:2a:f1: cc:fa:b4:24:08:aa:b9:38:ca:3c:0d:b3:d1:e3:1e:44: 4d:eb:72:16:a5:7a:a1:52:81:15:2d:90:02:9e:aa:e8: b2:d5:f5:ee:22:3d:23:75:55:ff:39:aa:73:41:ff:9a: 21:81:e5:21:76:43:be:d3:8d:8d:6a:1c:75:27:5e:fb: 3d:ab:e6:38:45:08:b2:17:8e:a2:ee:6c:10:f7:09:73: ac:d8:b9:0e:0c:3f:a0:42:a2:e1:c9:10:cb:98:87:83: f2:2b:bd:d7:d8:24:5a:81:1e:b8:a6:95:13:21:06:67: b2:1e:ec:50:cc:d8:5a:fa:83:b2:2f:9d:94:63:05:7d: 3d:ef:37:e4:40:14:93:48:c6:48:42:8a:58:9a:a2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:85:19:24:a1:62:77:7d:a8:a6:ac:37:aa:a8:cb:11: 88:c4:48:77:dc:ee:ec:fd:6c:14:3a:44:79:6c:37:62: 16:7c:51:d7:92:f7:b7:ae:c7:ef:88:ac:c3:85:c8:d7: 48:be:9d:e4:5c:f0:0f:ad:b9:a6:98:6f:49:00:d0:ff: 00:f8:46:c4:63:85:ac:15:6c:dc:fa:61:18:41:0e:d0: f9:fc:c6:0a:79:cf:71:77:63:52:89:e0:09:55:97:bb: 8e:94:2b:5b:a8:9a:c0:22:a2:27:aa:04:db:10:a6:a6: 85:09:0b:16:fc:ed:d2:d7:05:ad:a6:48:2e:9a:3f:9a: 04:e2:0e:5f:ba:82:5c:63:4f:aa:09:93:c7:33:9c:5f: 4b:ae:35:db:8b:91:3a:7d:a7:6e:86:9d:a6:82:f4:87: e0:72:26:b1:4a:36:02:fe:c6:18:ed:9f:a8:37:53:a9: a6:a0:c0:66:e2:08:3a:14:7d:ef:c8:33:c4:b2:d0:eb: 93:f5:8e:14:4d:56:c7:d5:2a:f8:9e:b0:73:80:10:34: f2:24:1d:00:ec:9b:90:8c:b8:2c:07:6d:14:6d:f7:56: 9d:a4:48:d0:c1:ee:da:17:7e:e3:1e:03:68:a9:a5:b1: ce:d4:65:c3:c7:42:68:15:b4:32:eb:08:63:77:2e:4a Fingerprint (SHA-256): 4C:C6:D3:23:50:29:7F:A6:CF:DB:5E:1A:E1:E0:AA:80:28:F5:F9:C0:D6:22:D5:2F:1F:50:5E:09:BF:A0:1D:4A Fingerprint (SHA1): ED:B1:91:B2:88:BD:E1:CB:2C:9D:5D:CA:5D:7C:D6:E7:DF:EE:3E:F6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #589: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204072 (0x374402e8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:43:36 2022 Not After : Tue Sep 27 20:43:36 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:34:fe:dc:39:1c:35:9f:a5:71:ce:fc:28:e2:09:17: f4:b8:98:42:4b:6a:3f:b1:b0:27:ec:74:fd:74:f1:a2: 30:af:1c:d1:ca:f1:3c:5b:6a:73:9a:fa:35:db:6f:8d: fe:ac:df:3c:77:33:b0:17:51:51:0c:45:ec:12:1f:3d: 09:e8:b6:9e:2c:80:84:f6:0c:07:fb:ea:fc:5c:03:0a: 82:b9:a5:49:49:d3:ea:c0:08:07:d6:79:fe:e3:fa:76: f6:99:4b:0b:28:57:df:36:c0:ea:59:b7:92:53:2a:f1: cc:fa:b4:24:08:aa:b9:38:ca:3c:0d:b3:d1:e3:1e:44: 4d:eb:72:16:a5:7a:a1:52:81:15:2d:90:02:9e:aa:e8: b2:d5:f5:ee:22:3d:23:75:55:ff:39:aa:73:41:ff:9a: 21:81:e5:21:76:43:be:d3:8d:8d:6a:1c:75:27:5e:fb: 3d:ab:e6:38:45:08:b2:17:8e:a2:ee:6c:10:f7:09:73: ac:d8:b9:0e:0c:3f:a0:42:a2:e1:c9:10:cb:98:87:83: f2:2b:bd:d7:d8:24:5a:81:1e:b8:a6:95:13:21:06:67: b2:1e:ec:50:cc:d8:5a:fa:83:b2:2f:9d:94:63:05:7d: 3d:ef:37:e4:40:14:93:48:c6:48:42:8a:58:9a:a2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:85:19:24:a1:62:77:7d:a8:a6:ac:37:aa:a8:cb:11: 88:c4:48:77:dc:ee:ec:fd:6c:14:3a:44:79:6c:37:62: 16:7c:51:d7:92:f7:b7:ae:c7:ef:88:ac:c3:85:c8:d7: 48:be:9d:e4:5c:f0:0f:ad:b9:a6:98:6f:49:00:d0:ff: 00:f8:46:c4:63:85:ac:15:6c:dc:fa:61:18:41:0e:d0: f9:fc:c6:0a:79:cf:71:77:63:52:89:e0:09:55:97:bb: 8e:94:2b:5b:a8:9a:c0:22:a2:27:aa:04:db:10:a6:a6: 85:09:0b:16:fc:ed:d2:d7:05:ad:a6:48:2e:9a:3f:9a: 04:e2:0e:5f:ba:82:5c:63:4f:aa:09:93:c7:33:9c:5f: 4b:ae:35:db:8b:91:3a:7d:a7:6e:86:9d:a6:82:f4:87: e0:72:26:b1:4a:36:02:fe:c6:18:ed:9f:a8:37:53:a9: a6:a0:c0:66:e2:08:3a:14:7d:ef:c8:33:c4:b2:d0:eb: 93:f5:8e:14:4d:56:c7:d5:2a:f8:9e:b0:73:80:10:34: f2:24:1d:00:ec:9b:90:8c:b8:2c:07:6d:14:6d:f7:56: 9d:a4:48:d0:c1:ee:da:17:7e:e3:1e:03:68:a9:a5:b1: ce:d4:65:c3:c7:42:68:15:b4:32:eb:08:63:77:2e:4a Fingerprint (SHA-256): 4C:C6:D3:23:50:29:7F:A6:CF:DB:5E:1A:E1:E0:AA:80:28:F5:F9:C0:D6:22:D5:2F:1F:50:5E:09:BF:A0:1D:4A Fingerprint (SHA1): ED:B1:91:B2:88:BD:E1:CB:2C:9D:5D:CA:5D:7C:D6:E7:DF:EE:3E:F6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #590: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204072 (0x374402e8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:43:36 2022 Not After : Tue Sep 27 20:43:36 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:34:fe:dc:39:1c:35:9f:a5:71:ce:fc:28:e2:09:17: f4:b8:98:42:4b:6a:3f:b1:b0:27:ec:74:fd:74:f1:a2: 30:af:1c:d1:ca:f1:3c:5b:6a:73:9a:fa:35:db:6f:8d: fe:ac:df:3c:77:33:b0:17:51:51:0c:45:ec:12:1f:3d: 09:e8:b6:9e:2c:80:84:f6:0c:07:fb:ea:fc:5c:03:0a: 82:b9:a5:49:49:d3:ea:c0:08:07:d6:79:fe:e3:fa:76: f6:99:4b:0b:28:57:df:36:c0:ea:59:b7:92:53:2a:f1: cc:fa:b4:24:08:aa:b9:38:ca:3c:0d:b3:d1:e3:1e:44: 4d:eb:72:16:a5:7a:a1:52:81:15:2d:90:02:9e:aa:e8: b2:d5:f5:ee:22:3d:23:75:55:ff:39:aa:73:41:ff:9a: 21:81:e5:21:76:43:be:d3:8d:8d:6a:1c:75:27:5e:fb: 3d:ab:e6:38:45:08:b2:17:8e:a2:ee:6c:10:f7:09:73: ac:d8:b9:0e:0c:3f:a0:42:a2:e1:c9:10:cb:98:87:83: f2:2b:bd:d7:d8:24:5a:81:1e:b8:a6:95:13:21:06:67: b2:1e:ec:50:cc:d8:5a:fa:83:b2:2f:9d:94:63:05:7d: 3d:ef:37:e4:40:14:93:48:c6:48:42:8a:58:9a:a2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:85:19:24:a1:62:77:7d:a8:a6:ac:37:aa:a8:cb:11: 88:c4:48:77:dc:ee:ec:fd:6c:14:3a:44:79:6c:37:62: 16:7c:51:d7:92:f7:b7:ae:c7:ef:88:ac:c3:85:c8:d7: 48:be:9d:e4:5c:f0:0f:ad:b9:a6:98:6f:49:00:d0:ff: 00:f8:46:c4:63:85:ac:15:6c:dc:fa:61:18:41:0e:d0: f9:fc:c6:0a:79:cf:71:77:63:52:89:e0:09:55:97:bb: 8e:94:2b:5b:a8:9a:c0:22:a2:27:aa:04:db:10:a6:a6: 85:09:0b:16:fc:ed:d2:d7:05:ad:a6:48:2e:9a:3f:9a: 04:e2:0e:5f:ba:82:5c:63:4f:aa:09:93:c7:33:9c:5f: 4b:ae:35:db:8b:91:3a:7d:a7:6e:86:9d:a6:82:f4:87: e0:72:26:b1:4a:36:02:fe:c6:18:ed:9f:a8:37:53:a9: a6:a0:c0:66:e2:08:3a:14:7d:ef:c8:33:c4:b2:d0:eb: 93:f5:8e:14:4d:56:c7:d5:2a:f8:9e:b0:73:80:10:34: f2:24:1d:00:ec:9b:90:8c:b8:2c:07:6d:14:6d:f7:56: 9d:a4:48:d0:c1:ee:da:17:7e:e3:1e:03:68:a9:a5:b1: ce:d4:65:c3:c7:42:68:15:b4:32:eb:08:63:77:2e:4a Fingerprint (SHA-256): 4C:C6:D3:23:50:29:7F:A6:CF:DB:5E:1A:E1:E0:AA:80:28:F5:F9:C0:D6:22:D5:2F:1F:50:5E:09:BF:A0:1D:4A Fingerprint (SHA1): ED:B1:91:B2:88:BD:E1:CB:2C:9D:5D:CA:5D:7C:D6:E7:DF:EE:3E:F6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #591: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204072 (0x374402e8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:43:36 2022 Not After : Tue Sep 27 20:43:36 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:34:fe:dc:39:1c:35:9f:a5:71:ce:fc:28:e2:09:17: f4:b8:98:42:4b:6a:3f:b1:b0:27:ec:74:fd:74:f1:a2: 30:af:1c:d1:ca:f1:3c:5b:6a:73:9a:fa:35:db:6f:8d: fe:ac:df:3c:77:33:b0:17:51:51:0c:45:ec:12:1f:3d: 09:e8:b6:9e:2c:80:84:f6:0c:07:fb:ea:fc:5c:03:0a: 82:b9:a5:49:49:d3:ea:c0:08:07:d6:79:fe:e3:fa:76: f6:99:4b:0b:28:57:df:36:c0:ea:59:b7:92:53:2a:f1: cc:fa:b4:24:08:aa:b9:38:ca:3c:0d:b3:d1:e3:1e:44: 4d:eb:72:16:a5:7a:a1:52:81:15:2d:90:02:9e:aa:e8: b2:d5:f5:ee:22:3d:23:75:55:ff:39:aa:73:41:ff:9a: 21:81:e5:21:76:43:be:d3:8d:8d:6a:1c:75:27:5e:fb: 3d:ab:e6:38:45:08:b2:17:8e:a2:ee:6c:10:f7:09:73: ac:d8:b9:0e:0c:3f:a0:42:a2:e1:c9:10:cb:98:87:83: f2:2b:bd:d7:d8:24:5a:81:1e:b8:a6:95:13:21:06:67: b2:1e:ec:50:cc:d8:5a:fa:83:b2:2f:9d:94:63:05:7d: 3d:ef:37:e4:40:14:93:48:c6:48:42:8a:58:9a:a2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:85:19:24:a1:62:77:7d:a8:a6:ac:37:aa:a8:cb:11: 88:c4:48:77:dc:ee:ec:fd:6c:14:3a:44:79:6c:37:62: 16:7c:51:d7:92:f7:b7:ae:c7:ef:88:ac:c3:85:c8:d7: 48:be:9d:e4:5c:f0:0f:ad:b9:a6:98:6f:49:00:d0:ff: 00:f8:46:c4:63:85:ac:15:6c:dc:fa:61:18:41:0e:d0: f9:fc:c6:0a:79:cf:71:77:63:52:89:e0:09:55:97:bb: 8e:94:2b:5b:a8:9a:c0:22:a2:27:aa:04:db:10:a6:a6: 85:09:0b:16:fc:ed:d2:d7:05:ad:a6:48:2e:9a:3f:9a: 04:e2:0e:5f:ba:82:5c:63:4f:aa:09:93:c7:33:9c:5f: 4b:ae:35:db:8b:91:3a:7d:a7:6e:86:9d:a6:82:f4:87: e0:72:26:b1:4a:36:02:fe:c6:18:ed:9f:a8:37:53:a9: a6:a0:c0:66:e2:08:3a:14:7d:ef:c8:33:c4:b2:d0:eb: 93:f5:8e:14:4d:56:c7:d5:2a:f8:9e:b0:73:80:10:34: f2:24:1d:00:ec:9b:90:8c:b8:2c:07:6d:14:6d:f7:56: 9d:a4:48:d0:c1:ee:da:17:7e:e3:1e:03:68:a9:a5:b1: ce:d4:65:c3:c7:42:68:15:b4:32:eb:08:63:77:2e:4a Fingerprint (SHA-256): 4C:C6:D3:23:50:29:7F:A6:CF:DB:5E:1A:E1:E0:AA:80:28:F5:F9:C0:D6:22:D5:2F:1F:50:5E:09:BF:A0:1D:4A Fingerprint (SHA1): ED:B1:91:B2:88:BD:E1:CB:2C:9D:5D:CA:5D:7C:D6:E7:DF:EE:3E:F6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #592: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #593: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #594: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204102 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #595: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #596: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #597: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #598: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 927204103 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #599: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #600: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #601: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #602: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 927204104 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #603: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #604: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #605: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #606: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 927204105 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #607: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #608: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #609: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #610: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 927204106 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #611: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #612: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #613: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #614: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 927204107 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #615: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #616: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #617: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #618: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 927204108 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #619: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #620: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #621: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204102 (0x37440306) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:44:34 2022 Not After : Tue Sep 27 20:44:34 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:67:bf:2d:47:93:0f:de:86:8f:0e:14:f2:21:23:44: 62:16:07:53:17:4e:03:c7:6b:73:57:2b:23:fb:ef:d8: a9:9a:2a:05:a5:ec:9a:68:d7:53:28:2a:cc:9e:57:cc: 4d:00:5e:67:21:5b:fb:da:b7:dc:2c:c0:b4:15:d3:33: d3:ef:58:47:6d:5c:d4:7f:51:51:26:69:dc:08:81:d3: ea:e9:ae:de:e8:e0:52:79:35:91:27:6c:de:da:f4:2d: 79:8c:2e:1e:f8:99:a8:b6:6d:44:b0:f9:ae:6f:76:91: 86:4b:0b:8e:d3:28:24:aa:ed:3b:51:22:46:d7:86:ab: e1:2f:bb:46:15:2f:5f:01:72:58:bb:a8:73:82:0b:7d: 07:96:ee:67:08:3c:c1:73:da:d0:b3:19:fd:0c:4c:3f: 3d:87:6d:64:6d:cc:67:fa:43:ec:77:00:67:0e:3b:b6: 34:49:b6:87:ff:8d:9e:49:2f:78:58:bc:00:4d:e2:c9: a5:97:8b:c0:55:6b:fc:d7:b8:7e:a9:cd:23:57:86:b9: fc:e5:de:30:9e:77:7c:5e:91:14:98:b7:41:46:bb:b6: 4a:dc:24:38:c6:1a:3f:b1:ac:17:68:0f:6c:68:57:89: a5:9f:9d:47:32:d0:a2:8c:2b:6d:d9:32:28:3f:9d:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b7:10:2a:b9:fa:44:d3:67:29:9c:96:e0:f5:2f:a8:19: 88:d2:2c:c8:a8:63:94:22:1a:e6:e1:42:fd:78:de:b3: 55:d6:a4:0b:33:2e:99:26:e6:35:54:5d:68:b7:aa:3a: 69:cd:df:ba:d3:20:4d:21:37:6e:ac:00:a6:01:43:e2: 1e:7f:37:40:e2:a6:f2:60:56:e3:a6:9b:cc:d3:b2:9d: 92:2f:92:ee:d7:a5:b0:d3:d8:09:6f:89:7e:f9:26:58: 68:0d:bd:6e:40:e8:5d:ca:23:ad:a9:e8:80:ac:3f:36: ed:1a:10:ca:b2:3f:1b:9c:28:9a:bf:36:9b:94:72:1f: 5a:a8:18:60:a4:16:88:27:de:62:d5:fb:70:31:dc:ea: 6d:d0:19:43:2e:14:1a:5b:61:51:9f:18:ad:ff:a3:e3: 57:72:22:13:8b:5b:23:97:7f:78:69:51:2b:55:3a:98: 38:8f:b1:51:91:71:2e:ad:01:da:a8:d4:cf:28:d1:0f: 91:d9:a4:24:0a:b1:ee:df:5f:5e:dc:9b:db:da:0b:04: c6:2c:1f:98:d6:3a:b5:98:3a:bc:25:43:dd:96:f9:3a: db:c2:e5:fd:9c:72:16:b2:62:25:f0:8c:17:a1:d4:47: 72:f9:6a:3f:13:7b:17:2f:59:b7:da:35:55:e7:92:c3 Fingerprint (SHA-256): 42:87:FA:98:E2:4F:77:D0:77:76:1C:DF:5E:14:7A:4F:10:DF:BC:DB:04:02:82:3B:0C:26:5C:8B:CD:FE:10:E3 Fingerprint (SHA1): 78:18:C9:AC:64:1E:D3:7B:E1:02:E3:EC:43:E1:5A:3E:D8:23:5F:61 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #622: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #623: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #624: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #625: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204102 (0x37440306) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:44:34 2022 Not After : Tue Sep 27 20:44:34 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:67:bf:2d:47:93:0f:de:86:8f:0e:14:f2:21:23:44: 62:16:07:53:17:4e:03:c7:6b:73:57:2b:23:fb:ef:d8: a9:9a:2a:05:a5:ec:9a:68:d7:53:28:2a:cc:9e:57:cc: 4d:00:5e:67:21:5b:fb:da:b7:dc:2c:c0:b4:15:d3:33: d3:ef:58:47:6d:5c:d4:7f:51:51:26:69:dc:08:81:d3: ea:e9:ae:de:e8:e0:52:79:35:91:27:6c:de:da:f4:2d: 79:8c:2e:1e:f8:99:a8:b6:6d:44:b0:f9:ae:6f:76:91: 86:4b:0b:8e:d3:28:24:aa:ed:3b:51:22:46:d7:86:ab: e1:2f:bb:46:15:2f:5f:01:72:58:bb:a8:73:82:0b:7d: 07:96:ee:67:08:3c:c1:73:da:d0:b3:19:fd:0c:4c:3f: 3d:87:6d:64:6d:cc:67:fa:43:ec:77:00:67:0e:3b:b6: 34:49:b6:87:ff:8d:9e:49:2f:78:58:bc:00:4d:e2:c9: a5:97:8b:c0:55:6b:fc:d7:b8:7e:a9:cd:23:57:86:b9: fc:e5:de:30:9e:77:7c:5e:91:14:98:b7:41:46:bb:b6: 4a:dc:24:38:c6:1a:3f:b1:ac:17:68:0f:6c:68:57:89: a5:9f:9d:47:32:d0:a2:8c:2b:6d:d9:32:28:3f:9d:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b7:10:2a:b9:fa:44:d3:67:29:9c:96:e0:f5:2f:a8:19: 88:d2:2c:c8:a8:63:94:22:1a:e6:e1:42:fd:78:de:b3: 55:d6:a4:0b:33:2e:99:26:e6:35:54:5d:68:b7:aa:3a: 69:cd:df:ba:d3:20:4d:21:37:6e:ac:00:a6:01:43:e2: 1e:7f:37:40:e2:a6:f2:60:56:e3:a6:9b:cc:d3:b2:9d: 92:2f:92:ee:d7:a5:b0:d3:d8:09:6f:89:7e:f9:26:58: 68:0d:bd:6e:40:e8:5d:ca:23:ad:a9:e8:80:ac:3f:36: ed:1a:10:ca:b2:3f:1b:9c:28:9a:bf:36:9b:94:72:1f: 5a:a8:18:60:a4:16:88:27:de:62:d5:fb:70:31:dc:ea: 6d:d0:19:43:2e:14:1a:5b:61:51:9f:18:ad:ff:a3:e3: 57:72:22:13:8b:5b:23:97:7f:78:69:51:2b:55:3a:98: 38:8f:b1:51:91:71:2e:ad:01:da:a8:d4:cf:28:d1:0f: 91:d9:a4:24:0a:b1:ee:df:5f:5e:dc:9b:db:da:0b:04: c6:2c:1f:98:d6:3a:b5:98:3a:bc:25:43:dd:96:f9:3a: db:c2:e5:fd:9c:72:16:b2:62:25:f0:8c:17:a1:d4:47: 72:f9:6a:3f:13:7b:17:2f:59:b7:da:35:55:e7:92:c3 Fingerprint (SHA-256): 42:87:FA:98:E2:4F:77:D0:77:76:1C:DF:5E:14:7A:4F:10:DF:BC:DB:04:02:82:3B:0C:26:5C:8B:CD:FE:10:E3 Fingerprint (SHA1): 78:18:C9:AC:64:1E:D3:7B:E1:02:E3:EC:43:E1:5A:3E:D8:23:5F:61 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #626: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #627: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #628: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #629: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204109 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #630: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #631: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #632: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #633: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927204110 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #634: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #635: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #636: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #637: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927204111 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #638: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #639: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #640: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #641: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 927204112 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #642: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #643: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #644: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #645: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #646: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #647: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204109 (0x3744030d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:44:48 2022 Not After : Tue Sep 27 20:44:48 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:e3:ab:8e:8c:73:66:ea:6d:35:3c:c8:a9:83:87:97: 84:cb:ba:7f:a1:d5:70:55:63:c6:95:1d:63:1e:8b:ab: 97:30:cb:cf:83:20:ef:64:f1:f2:c4:8f:64:bb:d3:17: 3d:67:77:9a:d2:f6:56:e6:b1:c5:21:54:0b:94:cf:2a: 1f:48:9c:9b:84:bc:b2:b3:3c:50:7d:09:20:91:82:24: d3:4b:cc:b2:98:05:78:23:60:00:8f:f0:bb:fe:e8:2d: d2:34:f0:53:0c:f4:a1:a5:9e:63:0d:18:fb:bf:e4:68: c7:ff:cd:82:fb:5f:86:e3:55:e5:84:e1:7c:1e:eb:9b: d3:87:80:6c:4c:33:d8:6b:36:bc:6c:6e:27:6d:8c:c7: 8e:88:da:3f:35:ab:5e:eb:53:eb:45:63:4d:01:69:c4: 90:47:d3:6b:98:8e:10:50:79:99:25:28:cd:34:c2:65: eb:d5:54:01:9c:87:b1:02:56:5b:f5:6c:3b:05:a9:5f: db:64:5e:80:64:7c:bf:d9:f9:ad:9d:e8:22:fb:9e:cd: 1b:38:d6:00:f5:78:a1:64:c4:35:ae:a5:52:c8:61:ff: e9:ea:d9:2a:92:a1:af:0f:9f:f1:27:df:20:a4:98:6d: d4:e6:67:96:31:9a:1c:4f:7e:9f:c2:34:fd:64:ed:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9b:af:c6:b5:34:43:40:ab:c1:37:9a:80:be:f6:74:6c: 02:fa:49:24:d2:7f:22:63:76:94:73:54:d8:ee:8d:73: 99:55:f8:95:23:8e:0d:bf:bf:38:7d:6a:6d:4c:5f:40: d3:ef:10:1f:2d:7d:f7:e6:2e:e8:d2:72:d5:5a:ee:6e: 08:56:5c:c4:4c:52:e8:4c:63:a5:0b:53:04:01:87:f3: c6:f4:7a:09:ea:0b:88:5b:75:a6:07:5a:6b:51:e3:c1: 3b:ea:32:70:31:f4:a2:0d:dd:49:9f:bf:1c:2d:39:0e: 07:6a:30:56:b5:cf:06:43:66:99:06:da:6b:0f:9b:3b: 41:8f:15:2a:bd:2b:65:1a:c9:57:eb:65:7c:da:f6:2a: b2:9b:f9:26:0b:18:1a:5a:ea:93:34:7d:18:20:54:51: 26:ff:e4:dd:2d:35:3a:39:19:24:e3:15:4e:65:04:f7: 04:32:54:1f:24:1e:98:49:0a:c6:3a:e4:2a:14:4c:df: 4b:ed:56:7f:d6:38:1b:15:5a:e4:0f:59:1c:12:1e:7a: a0:82:26:bf:51:9d:2a:6d:9e:c4:c1:f5:5d:b5:94:a5: 6c:63:c4:6d:10:82:99:f1:2e:1f:d7:6e:df:e8:52:14: cc:c8:78:ba:cb:31:81:d0:3c:df:ec:61:c5:06:54:81 Fingerprint (SHA-256): D9:88:4E:FE:86:43:AF:BA:23:C6:40:13:67:C5:5C:F7:8B:68:57:C0:4B:6B:D1:1E:EE:29:0A:4F:8E:20:87:12 Fingerprint (SHA1): 19:FB:3A:ED:B5:DB:2D:72:75:9C:D7:FB:37:6B:9B:2D:3B:C8:7F:7B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #648: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #649: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #650: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204110 (0x3744030e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:44:51 2022 Not After : Mon Sep 27 20:44:51 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:bc:b0:e6:1d:6a:b0:42:d6:c1:84:4d:2c:0a:e1:43: 6b:87:19:27:7f:68:cc:7e:01:a1:d1:01:b0:9c:10:a5: 26:b9:d3:9f:0a:f2:42:e7:75:a3:fd:f8:8a:a7:0f:0e: 6b:5e:16:4b:12:2e:1a:b5:45:eb:55:df:d1:01:1c:31: d4:38:ee:c2:07:75:89:39:de:ce:8a:91:be:a5:7d:78: e8:80:f4:7a:b8:81:af:97:65:33:16:bb:e7:1e:21:95: 70:03:b1:a1:b2:16:07:36:00:d7:a0:eb:74:cc:be:8a: 63:5a:5f:ac:38:28:a0:7e:09:3b:0c:fc:49:7b:64:f0: f5:0e:68:3d:40:df:9f:f9:84:e8:84:d4:e2:8d:18:a8: 0d:3e:02:66:50:f6:99:18:be:da:2e:27:31:d6:e5:5d: 80:52:a2:e1:ad:ec:af:8e:c5:fa:33:16:24:f9:e7:8e: d9:4f:66:2e:29:d6:55:d7:87:47:61:eb:f9:c9:88:59: ab:35:7d:9d:e3:27:4c:17:8b:2a:b7:62:84:8b:02:ce: d9:cf:e9:81:b1:b2:9a:61:7b:2c:1e:97:7b:ed:e7:e0: 08:ad:66:6b:a1:fe:9a:9f:cd:e1:5c:a4:31:36:ed:7c: ca:2c:56:6c:94:61:84:b7:7a:b0:42:55:0e:29:84:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:91:ec:1f:0d:21:b1:49:1b:23:51:82:a0:bf:55:12: a7:3a:0c:b9:d5:dc:cf:7e:08:de:f9:15:d6:e8:6a:82: 63:5e:f3:a1:28:9c:fc:6d:10:33:98:e0:2a:c9:d1:fd: 19:46:7b:d8:75:9f:6f:5c:f5:c4:ff:ad:5c:2d:ac:d7: cc:47:bc:3e:e1:be:00:db:08:61:7a:bf:f1:28:37:09: 6a:f7:f4:86:fc:2e:8e:dd:8d:74:0a:ff:d4:c9:9d:16: 7e:41:5b:81:f6:8c:46:48:6a:b2:ec:25:15:6b:08:9e: 17:6a:17:1e:82:f3:ad:da:24:00:d9:af:37:24:80:ed: f6:a6:a1:88:cb:4a:f1:c7:ea:02:a7:73:ee:96:63:1b: 24:48:b3:44:cf:51:a2:07:0c:bf:a2:3e:67:20:c8:75: b5:4c:77:64:0e:91:81:62:e2:2b:27:99:79:0f:cc:57: bd:70:58:b2:a9:a6:5b:2e:56:e4:d0:06:08:b4:cf:f6: 27:3e:b0:4e:c4:53:00:47:3a:b1:17:33:97:19:f9:7f: 9c:91:70:45:5b:9d:0c:3b:31:70:6e:79:ae:32:07:fd: 23:88:e1:79:01:3d:52:86:79:ca:2e:23:8a:31:27:72: 22:90:05:25:0a:38:5e:82:eb:e7:fd:e6:f2:51:3d:cc Fingerprint (SHA-256): B2:4C:49:FC:64:2B:99:85:02:12:D6:CB:10:EB:21:C7:62:89:1E:4C:5D:53:E4:DD:0E:BB:4F:5D:34:B9:A9:A1 Fingerprint (SHA1): 97:D0:05:0C:1B:01:89:A4:52:9D:85:40:BC:6A:EF:89:02:E7:76:F5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #651: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #652: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204111 (0x3744030f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 20:44:54 2022 Not After : Mon Sep 27 20:44:54 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:a5:62:df:a5:c8:37:4c:47:93:80:08:03:52:a9:ea: 5d:86:cb:13:67:51:58:3a:4e:ce:42:49:14:db:d7:12: ce:c7:6a:87:7a:ec:bf:ba:f9:f8:81:ea:d5:33:e9:7e: b3:28:f8:cd:c2:b1:46:00:00:6c:f0:4d:e4:a0:34:c1: 5f:b4:23:de:3b:e9:a2:96:c8:f5:74:0c:ed:54:23:d1: 6d:a1:0d:46:62:00:54:ca:cd:3f:ef:e2:e8:f6:66:a9: 62:16:ce:71:41:86:5b:fe:45:7c:83:65:0d:97:56:f6: d7:b3:32:0b:fc:af:13:c6:30:6e:19:fe:8d:d0:f0:cc: 76:5f:58:e3:84:23:5d:e3:19:64:f6:7f:26:6c:04:a2: 71:35:90:c1:4a:bc:6d:e3:ad:7d:30:be:b9:a3:f6:7b: 5e:42:a1:1a:22:50:5d:28:f6:b4:e2:e7:cd:08:0d:69: 69:73:a4:78:b0:f3:ff:fb:bd:84:86:6f:5b:98:83:b4: 19:13:e1:0b:05:ef:6d:a1:ae:31:c8:7a:60:d5:e1:38: 53:58:51:0b:d7:73:d0:6e:4d:a8:58:d2:e7:80:ae:99: 98:a4:43:67:18:9a:72:0a:75:12:f5:d3:05:b7:ca:ee: 8e:27:76:92:43:14:2f:8c:7f:fa:50:9f:8f:a8:c6:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:83:f2:3d:8a:5f:be:87:ee:26:f4:39:0e:71:2d:a2: d9:bc:0a:38:34:8e:c9:16:87:a3:f3:ea:62:1c:ca:f6: b6:a2:35:9a:5b:08:2e:9b:60:54:c9:1e:c2:03:fa:83: d7:e0:b0:b4:2c:dc:00:dc:0c:d1:a9:0b:ab:5e:d3:ab: 89:ea:58:b9:b1:b4:6b:73:43:b0:22:99:c7:b9:f9:c2: 6b:e6:46:18:1b:6f:f9:46:eb:c8:56:3c:32:b6:53:53: 99:6f:1e:1e:05:8e:f6:92:9a:83:59:2e:f1:09:ff:27: b6:eb:87:08:18:4b:d4:72:98:23:9a:f5:03:bf:98:e3: a1:48:e1:66:c0:c8:ed:57:6e:60:99:6e:ab:e9:e0:ba: 6d:ff:5d:c7:46:61:ed:b1:f3:30:52:98:7c:23:b3:96: b3:b9:05:73:a1:26:0d:71:01:51:4c:97:0b:d2:50:9f: 99:b8:16:7b:d0:7e:96:5e:fe:d5:b2:9e:50:cd:84:24: bc:e6:27:f3:32:ca:a5:c6:40:e9:52:d4:03:20:07:28: 73:d2:b8:5b:51:52:cb:41:d4:2e:14:ab:f6:12:b0:47: 2a:2d:70:81:48:97:8a:8f:82:c3:42:b3:79:ab:5e:64: e2:1d:66:1c:75:b7:dc:63:d9:b6:c0:ff:66:9c:ab:b0 Fingerprint (SHA-256): 67:D1:A3:DC:5D:11:4E:38:60:FE:F5:75:70:41:C1:D4:E5:4D:67:26:60:04:BF:3B:10:1D:33:4B:D2:F7:73:6F Fingerprint (SHA1): 5F:03:CE:F1:81:D6:62:E8:02:78:76:4B:39:53:EA:0C:51:AE:CE:A1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #653: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #654: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204113 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #655: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #656: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #657: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #658: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927204114 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #659: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #660: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #661: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #662: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927204115 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #663: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #664: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #665: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #666: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 927204116 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #667: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #668: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #669: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #670: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 927204117 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #671: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #672: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #673: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #674: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #675: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #676: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #677: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204113 (0x37440311) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:44:59 2022 Not After : Tue Sep 27 20:44:59 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:d1:07:3d:f5:6d:b3:f2:63:bc:c7:3e:e2:b2:c1:b7: 80:49:8e:d3:76:ba:9a:79:18:c8:c0:a3:46:d3:2b:c6: 55:d7:d1:3d:06:27:5b:6d:40:ca:39:48:31:41:e7:4e: 1f:54:dd:e0:fe:8d:df:40:c4:b2:1d:85:53:96:75:bf: b8:88:15:22:20:3c:a3:8d:eb:97:4d:f8:9c:82:be:48: 5b:e6:a8:c3:33:0c:6c:5f:0e:b0:65:1b:c2:f0:fd:46: 88:9a:81:e7:d0:43:d7:29:f5:eb:8a:31:63:ef:d6:73: 80:fc:68:48:07:50:50:d6:6c:36:73:66:ea:c0:6f:78: 71:c9:c1:8d:10:86:89:78:4b:3f:09:c7:af:d3:7c:03: 1c:7b:1b:f6:f9:13:20:09:3c:bf:fc:96:c2:b6:2d:6a: 1e:a9:ec:a7:57:8b:d1:5c:d1:d4:69:67:c8:62:05:c1: 52:2b:c8:37:23:64:9f:a2:4c:d1:91:7c:86:61:89:f0: ae:44:7e:39:c5:d8:7a:f8:d0:4d:bf:28:a9:4a:9d:ae: 8d:b6:3c:fe:fa:f9:34:c7:a3:a9:45:20:31:e6:df:4a: 40:9c:5f:25:84:a2:6e:be:48:a8:b8:37:a5:fa:d3:1d: e0:5f:b2:0b:10:08:54:81:7a:73:64:59:55:ad:c0:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:d8:23:b6:82:82:ca:c9:6b:76:d6:1a:8d:21:8f:0c: 6d:af:f1:8f:6e:6d:12:fa:b7:a6:ef:8e:45:06:78:6a: d6:f7:dd:6e:c4:c0:33:3c:05:7f:dd:ee:69:59:c7:ea: d8:3c:72:56:c4:85:b7:99:bf:48:f0:6a:e4:4a:1f:d6: 6b:6a:16:f8:c1:32:22:07:9c:f8:d6:60:e2:cf:c6:ca: 30:d1:75:13:46:db:17:73:3a:f0:03:f5:c1:c0:68:ae: 06:68:6d:20:0c:6c:90:76:0d:95:0d:44:c5:94:55:14: 4c:32:33:15:e5:fa:5d:d2:ce:9a:c3:96:d2:67:43:de: db:60:f8:8f:fd:8a:ae:1f:93:32:e5:f6:99:68:ae:27: 80:7a:2e:2d:7a:31:c1:6a:28:d9:8f:27:60:4d:38:81: c6:c2:a7:72:28:62:07:ac:a4:ce:43:7a:97:6b:b9:c0: e5:8b:45:56:3c:e9:a2:8a:9b:5e:dd:40:c0:e1:a7:bf: c4:58:67:fe:0e:02:66:67:0d:de:30:fe:12:ad:b8:c4: 90:92:8c:8b:2e:37:a2:0b:bf:d0:a2:6e:0f:45:ae:78: e9:69:1e:b9:f8:ba:ac:3e:19:fc:34:bf:a7:91:a7:f9: d0:7e:f1:f5:7c:b1:fc:b0:26:ec:f2:8e:5c:f7:2b:52 Fingerprint (SHA-256): 26:84:C8:48:57:12:F8:10:69:01:A7:8F:7A:D8:EE:F3:FC:34:7D:CE:BB:78:5F:83:4F:E5:54:3D:9D:62:7B:3D Fingerprint (SHA1): C8:F3:F5:CC:56:27:C9:4F:49:EB:A3:24:68:72:34:54:DD:B6:31:80 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #678: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #679: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204114 (0x37440312) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:45:01 2022 Not After : Mon Sep 27 20:45:01 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:64:44:06:8d:cf:21:26:3d:ca:eb:de:d9:d7:d4:42: 27:46:b1:4b:04:2f:25:51:14:5d:19:36:54:85:aa:c8: 57:ad:2a:94:21:9f:e2:a1:13:68:66:f8:f8:69:f7:b2: d1:a8:41:16:de:db:3c:9a:c2:1f:45:d3:da:e0:3d:e6: a2:89:a4:a5:b3:ea:3e:0a:09:21:ed:9c:7d:9e:90:1e: 76:e0:c2:27:65:5e:b6:82:57:c3:d1:4e:0d:14:71:d1: da:e4:8d:21:d3:cc:40:ad:6f:bc:4e:2d:8f:be:70:f8: 98:ca:2d:3f:b3:6d:c5:75:2e:9c:79:be:2a:9e:e2:8f: e6:56:c6:cf:2b:3a:2f:04:87:96:6f:7a:06:a3:66:5d: d1:fc:10:7f:a2:d4:7d:31:cf:c2:71:38:33:2a:17:07: 9d:17:75:f8:7d:f0:ed:f9:3f:c7:57:55:9e:08:ec:98: 83:91:9e:4e:a9:23:a0:e6:8a:38:74:7f:39:cb:15:6e: 37:e9:3c:d7:24:37:04:d6:82:0c:91:bb:f6:11:bc:36: 35:14:9f:65:95:e7:cb:24:39:fb:d3:a5:02:00:75:1d: f8:03:58:95:86:c3:ab:98:60:4b:97:7e:90:df:f1:b4: 44:79:be:fa:c0:30:3a:0c:13:e2:e9:b0:c8:0a:5e:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:3f:ec:06:4b:85:f5:d9:99:b8:0c:55:a9:f0:81:1c: ad:69:d1:cc:fa:b1:d7:74:ec:3a:54:14:8e:f3:3c:d3: 16:38:18:d7:7e:18:c0:20:50:d9:d0:97:b6:3b:03:ba: 2f:29:c2:53:ad:f8:2e:73:7a:34:2d:dd:a9:d5:6e:32: 86:41:ac:14:e1:10:6b:6c:39:a5:b6:9c:d3:6d:dc:02: 9a:70:b9:a8:56:96:d5:31:be:26:98:99:36:99:49:fe: 9b:e4:e0:71:9d:c0:2e:11:8f:13:2c:16:9e:f5:68:7a: ec:5b:ab:a5:d5:37:64:34:28:24:d8:15:bd:57:f9:15: 36:7f:c1:ba:43:8f:8f:aa:fb:da:fc:24:c6:68:5e:3d: 90:43:c6:ab:46:35:89:34:94:14:16:f3:92:64:db:1c: 26:ed:33:58:93:5f:92:ed:13:99:21:73:bb:2a:74:47: d2:54:61:04:cd:71:77:fa:78:29:47:73:e2:22:02:0f: f5:7a:ee:64:e4:e1:43:40:73:64:41:7a:fc:79:c9:79: bb:ec:69:33:9b:09:b9:b4:d4:2a:ab:5e:ba:35:73:ac: bf:9c:9b:f8:f4:c4:b4:24:c1:4e:5d:c2:2b:c7:ca:d1: aa:5f:b5:ec:71:c8:87:cf:1e:66:82:7c:8b:d8:6f:d7 Fingerprint (SHA-256): E1:6C:AE:2B:99:89:C3:76:66:04:E3:7E:B9:A7:E5:BC:BE:74:F7:50:A6:78:7B:94:4A:B2:40:90:50:38:EA:21 Fingerprint (SHA1): D0:71:7C:77:D2:39:AB:B4:7E:23:74:94:2A:48:4F:6F:A9:CB:3C:61 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #680: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #681: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #682: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204115 (0x37440313) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 20:45:04 2022 Not After : Mon Sep 27 20:45:04 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:cf:8e:bb:5b:50:c0:51:25:02:47:01:59:96:65:fe: 08:0d:56:52:25:08:41:f3:a9:d4:a8:ae:82:8a:7e:3e: a9:f5:9c:00:be:e8:c0:db:5e:3e:82:cd:13:61:4c:f2: 96:4d:eb:74:bb:5a:a4:e9:b0:ce:9e:45:d2:1a:80:a9: 1a:e0:ae:05:5e:73:58:02:4c:f8:65:20:f9:6c:75:dc: d6:a7:fc:ad:2c:61:e0:c2:db:bd:12:5d:f5:25:33:86: 67:52:67:f5:ce:db:31:9f:43:bc:7a:c4:10:34:bd:99: 39:23:b8:d3:a5:f2:c2:ea:ef:5b:a0:1c:27:d8:25:cf: 27:72:0b:08:67:8c:6c:b6:07:91:85:b3:cb:9d:a5:e9: 81:46:3f:54:73:54:e9:07:52:76:81:43:f7:a0:9d:fb: d1:ad:38:63:ca:bb:11:2b:25:67:2c:34:e2:a0:f5:63: d4:3c:90:93:ec:6c:0f:11:69:c8:22:50:5b:02:5b:f3: 8a:e1:9d:9c:a1:3b:26:35:05:c4:ec:6e:5d:31:d8:d6: 72:97:dc:af:fb:39:06:84:5f:43:3a:36:84:e6:60:08: 31:6e:aa:1d:88:95:66:41:40:b4:ff:49:d9:d9:b0:c4: 47:4d:aa:c6:78:92:e2:95:c5:13:ed:b7:0d:26:2d:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:11:dd:5b:12:15:f2:db:a2:07:15:48:83:27:d8:0f: 3f:da:b7:04:5c:44:5c:9e:13:64:6d:7a:cf:bd:8c:1e: 36:36:01:0e:40:11:ac:0e:f5:03:62:63:f9:d4:21:d7: 39:2c:c8:1e:21:38:e5:2d:4f:49:fb:34:80:c4:a9:f6: e0:64:85:a9:6e:ca:0a:38:23:03:3f:0a:7d:27:52:df: 80:4d:4f:61:9f:ba:cc:10:2d:f6:d2:e1:46:02:fd:5c: 0d:49:e1:91:f3:72:d5:1c:9a:b9:b2:74:48:88:f1:4f: 4c:71:28:2e:b1:95:25:48:db:8c:64:67:71:14:d5:d4: 9b:f9:eb:0a:95:e3:7d:19:48:1e:6c:38:5c:5a:3c:a4: 9a:32:fa:c1:92:7a:8e:18:0c:c0:0c:ed:52:c4:40:34: fd:e8:f6:8b:91:b6:5d:49:24:e3:bc:50:17:a2:9e:34: 5f:a9:78:81:61:74:e0:55:2a:b2:a3:fb:16:26:7e:3d: bc:69:7d:90:2f:bc:11:28:26:c7:bb:d4:5c:ab:bd:af: d6:16:32:31:bc:7b:6b:c7:20:bf:d2:ad:bf:81:e3:ba: ca:11:2b:84:f5:db:29:31:e9:03:33:97:56:df:90:9d: 02:99:bd:90:74:1c:3b:6b:0f:c3:d9:83:72:4f:a6:d8 Fingerprint (SHA-256): B9:96:F4:07:FB:E4:8D:EA:EA:C4:EC:7D:EA:38:49:6D:95:0F:31:55:DF:EA:2C:DB:35:06:BA:A8:D9:31:5E:3B Fingerprint (SHA1): DF:EC:0A:85:63:B0:A1:6D:3A:58:0A:59:15:2D:4A:EA:B9:0A:03:BC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #683: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #684: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204118 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #685: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #686: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #687: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #688: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927204119 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #689: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #690: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #691: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #692: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927204120 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA1Root-927204011.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #693: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #694: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #695: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #696: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 927204121 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #697: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #698: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #699: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204118 (0x37440316) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:45:11 2022 Not After : Tue Sep 27 20:45:11 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:f0:cf:49:07:53:cb:77:40:66:62:3e:3a:a6:63:f8: e0:5e:50:b0:a7:2b:3e:da:a2:18:02:8a:a2:68:b6:d9: 8a:5c:92:a5:3d:51:5e:e4:1e:1d:05:09:04:fc:79:0f: 42:b0:f6:a9:b1:b2:42:8e:47:4d:7f:7e:03:d4:63:9e: ec:fc:f4:3d:70:48:94:b4:a0:41:d6:94:07:5f:e4:fe: 44:06:30:bb:3b:19:c4:56:5d:d1:cf:6e:22:b2:b2:f9: 78:ce:f9:49:ed:b8:74:d5:da:a6:e5:e9:02:43:fc:e1: 74:a5:e1:9b:d0:b9:c9:d0:19:57:c2:97:43:71:aa:d0: a7:78:23:ba:ac:6b:16:7b:5b:2a:7c:61:41:9d:ff:f3: a2:5d:a2:2f:1a:6e:2f:3b:74:8e:f6:61:9f:bb:61:9c: 25:ae:be:d0:00:0b:4f:c2:33:cf:73:ec:27:b1:d2:12: 96:0a:a8:18:bd:d9:88:e4:b2:d6:c4:b8:60:b5:46:2a: 7d:11:36:9b:77:60:dd:51:ef:48:7c:32:9d:a2:49:6e: 21:35:50:a1:76:b0:95:9b:53:5d:18:80:e4:e4:c3:e8: 59:ca:91:ce:c0:30:4e:2e:36:74:a2:45:1b:4b:65:2e: a9:49:fb:2a:fa:17:d4:28:48:2e:32:3c:ae:c8:83:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:6c:dd:6f:b3:49:4b:87:28:ab:35:c7:8e:05:6a:b2: 22:16:fc:6a:d4:fb:25:4b:07:4b:02:6c:dc:c4:52:d4: fd:60:2f:79:0b:88:c8:d8:2d:a3:5f:c8:43:eb:d8:7d: e5:fb:f7:07:95:af:b3:e7:db:d8:56:bc:35:92:31:7f: be:47:2c:09:f8:53:09:de:b6:78:64:64:42:bf:e3:d9: 6f:e2:cb:72:48:8b:82:08:c1:b9:68:cc:36:b7:5e:da: 9b:d2:74:40:03:66:8f:2e:1f:ba:c6:84:e9:6a:f3:42: 8a:dd:2b:81:f5:ef:ad:61:c2:48:3a:7f:ae:66:2e:de: 05:d3:32:9b:5b:f4:58:fc:6b:db:c2:0d:ed:f2:0f:84: a5:68:bf:1a:56:98:f3:fa:67:f5:59:fa:ad:c6:91:31: a1:9f:54:5e:a6:7d:a9:ec:45:54:63:d5:3a:3f:ca:7f: 40:05:02:e7:7e:b6:25:34:26:1f:09:ad:60:12:57:6c: df:f6:17:40:ae:18:f5:17:ac:36:a0:71:91:df:1e:e0: f0:3c:5f:fa:87:1b:2a:7b:35:8d:bf:9e:22:24:a1:0f: 47:e0:84:a7:87:a2:62:37:53:0c:08:e0:3f:2a:e3:e3: f0:3c:af:0b:46:82:94:db:a8:91:52:dc:cc:11:f9:a1 Fingerprint (SHA-256): A1:96:9A:E2:EB:B1:1F:C6:46:67:8F:E3:AF:EB:36:A7:A8:E1:8C:16:49:61:BE:09:1E:4D:16:13:D3:F6:81:C3 Fingerprint (SHA1): EB:9F:7A:86:6D:D5:E0:C9:63:A1:EC:48:19:72:C0:76:EB:25:E4:9B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #700: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #701: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204122 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #702: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #703: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #704: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204123 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #705: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #706: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #707: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #708: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 927204124 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #709: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #710: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 927204125 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #711: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #712: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #713: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #714: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #715: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 927204126 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-Bridge-927204012.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #716: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #717: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #718: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #719: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 927204127 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #720: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #721: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #722: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #723: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204123 (0x3744031b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 20:45:20 2022 Not After : Tue Sep 27 20:45:20 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:42:17:b1:46:a8:6d:39:4a:45:17:99:0c:13:36:47: e0:24:d6:95:28:6d:29:64:28:19:d5:66:4b:e0:7d:c7: 63:fa:5a:35:ef:76:7c:d0:c1:46:d3:1a:6c:b5:bb:89: 79:bf:b9:42:e4:ef:46:37:39:ae:c3:0e:cb:35:c9:32: ba:fa:02:7e:e1:22:1b:31:10:e2:22:87:ff:26:11:cd: 4d:af:a4:f5:4b:e9:69:d7:a8:fd:d6:ba:64:20:29:5c: fc:fa:2d:0f:90:42:34:ae:aa:5c:26:7b:43:80:cf:e3: 96:8f:5c:fa:21:ab:49:29:ea:11:ac:2b:b0:fa:45:75: 1d:56:39:42:01:8d:d0:bd:45:67:7b:87:b8:bf:56:e5: 75:db:ef:56:d7:05:e8:ca:c5:fc:df:f9:5d:9f:74:eb: e5:26:5e:af:3a:6f:c6:6d:60:72:8f:ee:d3:6b:29:4c: 03:78:3d:a8:15:d1:ed:86:72:39:50:25:a2:10:ec:e8: 64:41:56:ad:49:ae:18:63:04:6f:dc:9a:b7:f8:9d:1a: 6d:97:69:af:f3:50:3d:38:55:4e:f7:0a:80:86:c0:5a: ba:52:eb:3b:ef:d6:67:9d:ff:5f:a8:af:bb:05:ba:ef: 2c:27:47:c4:c3:ff:1b:89:32:84:18:09:88:30:56:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:61:cb:58:de:6f:73:94:18:75:13:46:e9:16:ae:cf: c3:66:a1:ad:08:a5:d6:14:8d:dd:58:43:e8:8e:33:28: 08:9f:c8:ec:fe:84:6d:d7:fd:b9:d6:4c:41:e2:2b:f8: df:8f:37:79:c6:96:1e:fb:59:87:fd:0b:de:00:57:0e: 70:73:87:4c:01:93:05:f4:cc:1a:67:ec:64:0a:ee:7a: 07:21:91:d4:b5:bb:23:72:6f:e0:5b:c8:5e:d4:9c:bc: 27:9a:3c:08:ba:c4:f8:13:1a:e6:bd:ec:78:67:dc:36: 23:84:1a:d6:26:78:45:99:ad:86:91:56:8c:40:70:76: 93:dc:bd:e5:51:96:40:5d:b0:51:8f:de:26:1f:af:e7: ae:0b:ea:4c:94:b6:36:33:a7:cf:4f:1e:12:fe:a8:9f: 8e:e0:ce:a2:9d:c7:c7:23:fc:30:65:a6:3d:e8:fe:32: 50:a9:cc:01:6c:fa:cc:40:22:32:19:32:24:3e:69:d9: df:ca:af:c4:21:94:3e:b3:6c:fe:e8:b2:ac:53:69:e5: 3e:d4:21:a0:66:dc:c0:0f:0f:c9:0f:48:e9:71:cc:ec: a5:6d:d3:30:4e:97:82:b3:96:59:6a:ff:c2:d4:c2:db: 61:2c:ba:2f:bf:5e:31:0a:eb:ec:5e:6b:dd:84:2d:b1 Fingerprint (SHA-256): 03:FD:78:1D:06:9B:CE:24:43:2F:4D:B0:3D:FF:F8:FF:F0:18:55:C1:BC:53:01:53:53:E9:1C:A9:A3:61:B2:81 Fingerprint (SHA1): A5:F7:4B:54:9B:56:31:E8:56:00:35:DE:E8:B9:75:CF:19:8D:F1:46 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #724: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204123 (0x3744031b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 20:45:20 2022 Not After : Tue Sep 27 20:45:20 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:42:17:b1:46:a8:6d:39:4a:45:17:99:0c:13:36:47: e0:24:d6:95:28:6d:29:64:28:19:d5:66:4b:e0:7d:c7: 63:fa:5a:35:ef:76:7c:d0:c1:46:d3:1a:6c:b5:bb:89: 79:bf:b9:42:e4:ef:46:37:39:ae:c3:0e:cb:35:c9:32: ba:fa:02:7e:e1:22:1b:31:10:e2:22:87:ff:26:11:cd: 4d:af:a4:f5:4b:e9:69:d7:a8:fd:d6:ba:64:20:29:5c: fc:fa:2d:0f:90:42:34:ae:aa:5c:26:7b:43:80:cf:e3: 96:8f:5c:fa:21:ab:49:29:ea:11:ac:2b:b0:fa:45:75: 1d:56:39:42:01:8d:d0:bd:45:67:7b:87:b8:bf:56:e5: 75:db:ef:56:d7:05:e8:ca:c5:fc:df:f9:5d:9f:74:eb: e5:26:5e:af:3a:6f:c6:6d:60:72:8f:ee:d3:6b:29:4c: 03:78:3d:a8:15:d1:ed:86:72:39:50:25:a2:10:ec:e8: 64:41:56:ad:49:ae:18:63:04:6f:dc:9a:b7:f8:9d:1a: 6d:97:69:af:f3:50:3d:38:55:4e:f7:0a:80:86:c0:5a: ba:52:eb:3b:ef:d6:67:9d:ff:5f:a8:af:bb:05:ba:ef: 2c:27:47:c4:c3:ff:1b:89:32:84:18:09:88:30:56:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:61:cb:58:de:6f:73:94:18:75:13:46:e9:16:ae:cf: c3:66:a1:ad:08:a5:d6:14:8d:dd:58:43:e8:8e:33:28: 08:9f:c8:ec:fe:84:6d:d7:fd:b9:d6:4c:41:e2:2b:f8: df:8f:37:79:c6:96:1e:fb:59:87:fd:0b:de:00:57:0e: 70:73:87:4c:01:93:05:f4:cc:1a:67:ec:64:0a:ee:7a: 07:21:91:d4:b5:bb:23:72:6f:e0:5b:c8:5e:d4:9c:bc: 27:9a:3c:08:ba:c4:f8:13:1a:e6:bd:ec:78:67:dc:36: 23:84:1a:d6:26:78:45:99:ad:86:91:56:8c:40:70:76: 93:dc:bd:e5:51:96:40:5d:b0:51:8f:de:26:1f:af:e7: ae:0b:ea:4c:94:b6:36:33:a7:cf:4f:1e:12:fe:a8:9f: 8e:e0:ce:a2:9d:c7:c7:23:fc:30:65:a6:3d:e8:fe:32: 50:a9:cc:01:6c:fa:cc:40:22:32:19:32:24:3e:69:d9: df:ca:af:c4:21:94:3e:b3:6c:fe:e8:b2:ac:53:69:e5: 3e:d4:21:a0:66:dc:c0:0f:0f:c9:0f:48:e9:71:cc:ec: a5:6d:d3:30:4e:97:82:b3:96:59:6a:ff:c2:d4:c2:db: 61:2c:ba:2f:bf:5e:31:0a:eb:ec:5e:6b:dd:84:2d:b1 Fingerprint (SHA-256): 03:FD:78:1D:06:9B:CE:24:43:2F:4D:B0:3D:FF:F8:FF:F0:18:55:C1:BC:53:01:53:53:E9:1C:A9:A3:61:B2:81 Fingerprint (SHA1): A5:F7:4B:54:9B:56:31:E8:56:00:35:DE:E8:B9:75:CF:19:8D:F1:46 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #725: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #726: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204128 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #727: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #728: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #729: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204129 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #730: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #731: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #732: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #733: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 927204130 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #734: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #735: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 927204131 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #736: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #737: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #738: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #739: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #740: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 927204132 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-Bridge-927204013.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #741: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #742: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #743: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #744: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 927204133 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #745: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #746: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #747: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #748: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 927204134 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-BridgeNavy-927204014.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #749: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #750: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #751: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #752: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 927204135 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #753: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #754: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #755: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #756: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204129 (0x37440321) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 20:45:29 2022 Not After : Tue Sep 27 20:45:29 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f0:20:ee:ce:62:22:07:60:bf:cc:8b:2e:d3:ed:43:fc: fb:c4:b4:27:3e:3c:a4:2f:c8:69:ad:cb:01:94:1e:9a: de:38:03:c4:29:e1:e1:ee:bf:c2:cc:cc:9d:b4:37:ad: 60:f8:f9:c1:24:0c:2c:c8:98:ea:92:55:b3:1d:13:19: 3f:3d:1f:97:ba:de:89:9f:fc:12:aa:5b:03:63:4b:6e: 4f:29:ff:99:93:24:61:3f:1b:e4:b6:02:4c:91:48:d3: 29:69:f6:85:88:2e:56:ef:2a:62:47:e4:9a:6b:80:ad: dd:83:69:a5:1f:31:a5:88:66:74:9b:4f:89:bb:12:08: f6:6e:cb:18:04:65:d7:d3:7e:af:b7:ff:d2:70:ec:26: 76:da:42:14:7a:bd:95:62:18:54:15:51:8f:8a:f6:f8: 8a:34:df:47:54:ec:ef:ed:88:92:ad:d4:ae:03:36:d4: 76:ab:48:ac:88:8e:96:3d:bc:f7:6e:c3:f1:a4:c7:33: 21:12:a7:f3:39:96:51:90:29:e5:90:d4:11:5a:c0:80: e9:cc:d8:90:02:2e:23:f8:5c:0f:f9:ea:54:d0:5f:6d: ef:80:e4:92:cd:58:6c:2c:6f:e9:4b:4b:51:02:10:c9: 54:da:ce:22:6a:47:f2:bb:c9:63:6e:f0:78:d1:f8:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:23:a0:f6:3b:c9:6c:fd:c3:48:6a:45:4a:9d:49:f9: fe:ad:3b:79:1c:0e:b7:63:72:fd:f9:a7:85:e3:12:fe: 15:92:fd:f3:1c:db:e9:33:05:54:fb:33:a4:c4:a2:fb: 89:dc:72:46:2e:eb:4d:b1:dd:06:ee:58:c0:99:1b:34: 53:41:8b:74:d5:e9:e6:54:80:c1:76:eb:1f:34:d2:83: ac:7b:28:bb:57:f2:9a:fa:31:d3:2a:e6:56:1a:ab:0f: 66:a1:a6:63:12:5b:e0:c5:bb:d4:68:09:aa:06:53:74: ce:47:22:67:51:77:e6:e7:24:91:f8:1a:b0:86:ee:91: cf:60:d1:a5:95:b3:80:37:4a:1e:4b:6e:3d:c6:b4:6d: 8f:93:8c:bb:ab:23:86:8f:37:a3:d4:0a:d4:c1:14:cd: f0:57:9f:9c:88:59:9a:94:49:7d:96:2a:2e:13:1d:1a: 4a:31:2f:b6:9e:52:81:1b:47:49:37:7f:6b:41:68:3c: a2:b4:0f:91:72:0e:18:47:31:74:70:03:ca:d3:5e:19: 03:78:00:d3:5e:50:ce:b9:f5:32:01:59:3c:76:f1:fe: d5:6e:fb:d4:e0:bb:08:34:48:29:bf:4a:a8:d5:08:63: d4:1f:7f:10:cb:db:9f:1f:68:fd:b9:36:18:f7:ae:77 Fingerprint (SHA-256): B1:0B:24:AE:0E:F8:F3:F5:EB:50:73:02:BF:B4:91:74:A1:5C:5F:7A:E3:2B:48:92:8C:15:D3:E5:CF:70:86:C9 Fingerprint (SHA1): BD:CD:B5:2C:4D:92:87:6F:55:98:15:BA:CF:E2:63:84:A1:50:82:03 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #757: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204129 (0x37440321) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 20:45:29 2022 Not After : Tue Sep 27 20:45:29 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f0:20:ee:ce:62:22:07:60:bf:cc:8b:2e:d3:ed:43:fc: fb:c4:b4:27:3e:3c:a4:2f:c8:69:ad:cb:01:94:1e:9a: de:38:03:c4:29:e1:e1:ee:bf:c2:cc:cc:9d:b4:37:ad: 60:f8:f9:c1:24:0c:2c:c8:98:ea:92:55:b3:1d:13:19: 3f:3d:1f:97:ba:de:89:9f:fc:12:aa:5b:03:63:4b:6e: 4f:29:ff:99:93:24:61:3f:1b:e4:b6:02:4c:91:48:d3: 29:69:f6:85:88:2e:56:ef:2a:62:47:e4:9a:6b:80:ad: dd:83:69:a5:1f:31:a5:88:66:74:9b:4f:89:bb:12:08: f6:6e:cb:18:04:65:d7:d3:7e:af:b7:ff:d2:70:ec:26: 76:da:42:14:7a:bd:95:62:18:54:15:51:8f:8a:f6:f8: 8a:34:df:47:54:ec:ef:ed:88:92:ad:d4:ae:03:36:d4: 76:ab:48:ac:88:8e:96:3d:bc:f7:6e:c3:f1:a4:c7:33: 21:12:a7:f3:39:96:51:90:29:e5:90:d4:11:5a:c0:80: e9:cc:d8:90:02:2e:23:f8:5c:0f:f9:ea:54:d0:5f:6d: ef:80:e4:92:cd:58:6c:2c:6f:e9:4b:4b:51:02:10:c9: 54:da:ce:22:6a:47:f2:bb:c9:63:6e:f0:78:d1:f8:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:23:a0:f6:3b:c9:6c:fd:c3:48:6a:45:4a:9d:49:f9: fe:ad:3b:79:1c:0e:b7:63:72:fd:f9:a7:85:e3:12:fe: 15:92:fd:f3:1c:db:e9:33:05:54:fb:33:a4:c4:a2:fb: 89:dc:72:46:2e:eb:4d:b1:dd:06:ee:58:c0:99:1b:34: 53:41:8b:74:d5:e9:e6:54:80:c1:76:eb:1f:34:d2:83: ac:7b:28:bb:57:f2:9a:fa:31:d3:2a:e6:56:1a:ab:0f: 66:a1:a6:63:12:5b:e0:c5:bb:d4:68:09:aa:06:53:74: ce:47:22:67:51:77:e6:e7:24:91:f8:1a:b0:86:ee:91: cf:60:d1:a5:95:b3:80:37:4a:1e:4b:6e:3d:c6:b4:6d: 8f:93:8c:bb:ab:23:86:8f:37:a3:d4:0a:d4:c1:14:cd: f0:57:9f:9c:88:59:9a:94:49:7d:96:2a:2e:13:1d:1a: 4a:31:2f:b6:9e:52:81:1b:47:49:37:7f:6b:41:68:3c: a2:b4:0f:91:72:0e:18:47:31:74:70:03:ca:d3:5e:19: 03:78:00:d3:5e:50:ce:b9:f5:32:01:59:3c:76:f1:fe: d5:6e:fb:d4:e0:bb:08:34:48:29:bf:4a:a8:d5:08:63: d4:1f:7f:10:cb:db:9f:1f:68:fd:b9:36:18:f7:ae:77 Fingerprint (SHA-256): B1:0B:24:AE:0E:F8:F3:F5:EB:50:73:02:BF:B4:91:74:A1:5C:5F:7A:E3:2B:48:92:8C:15:D3:E5:CF:70:86:C9 Fingerprint (SHA1): BD:CD:B5:2C:4D:92:87:6F:55:98:15:BA:CF:E2:63:84:A1:50:82:03 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #758: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #759: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204128 (0x37440320) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 20:45:28 2022 Not After : Tue Sep 27 20:45:28 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:d5:99:b4:1d:c9:8b:0b:ab:a6:08:07:e3:20:07:59: 6b:b2:43:98:88:2d:49:59:ef:38:20:a8:24:3d:44:7b: ec:6d:49:26:5e:2e:2e:2e:49:03:2d:2e:c6:26:c2:5a: 7a:bd:69:3b:a0:70:e9:3c:50:e1:2f:4a:6d:72:81:02: d3:f1:d0:69:98:4e:21:79:c5:8f:ce:0a:b2:6e:9f:53: 3c:56:fe:d7:42:ec:80:57:4d:84:a1:2e:14:9e:3b:7b: 11:43:80:a8:96:b1:b6:7c:a8:ca:9f:a3:5f:09:4b:e5: ee:06:f9:e4:c6:62:64:a3:ca:98:fe:b4:9c:60:5b:a9: cf:f0:14:d2:0d:70:b1:33:19:da:07:37:76:57:2e:ce: 6f:5a:fc:ad:7a:65:78:91:31:b1:4e:f5:b0:03:2a:c5: 16:97:23:50:ce:15:68:07:dc:d3:a3:03:7a:7a:2b:33: 16:58:d3:17:4c:18:b2:3f:47:03:c6:d8:0c:1c:11:a8: 50:a5:5a:a1:8d:9c:eb:33:d9:18:a3:b0:ed:29:9f:fe: dc:3d:24:83:37:1f:a2:d0:34:98:19:3d:3d:83:b8:a3: da:af:33:2e:8a:e8:fc:3d:af:1e:39:dd:0a:83:0a:a0: 6b:01:28:93:a4:2a:fb:a7:77:a1:41:8d:ac:5a:3e:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 58:2c:77:15:7d:82:b4:4d:31:a5:b9:82:f1:0d:17:ac: f6:56:9b:ab:45:9f:c5:90:be:bd:22:0f:52:ec:d3:fd: bc:23:d5:b7:5f:26:d0:50:cb:39:2c:84:16:7b:47:12: 84:01:aa:77:8f:5f:e0:9a:8b:f6:e3:9e:6b:b1:e0:61: a9:b7:5e:4d:ec:83:86:22:42:7e:b8:86:f3:5b:b6:eb: 06:fa:b5:4a:19:cb:fd:58:dc:b2:be:95:77:be:08:57: 62:b4:14:bf:50:ac:4e:47:d8:28:af:35:14:35:74:4b: 82:3c:8d:4d:0e:d9:da:ed:ec:69:c0:9a:43:c5:63:19: 50:a7:86:44:2b:eb:bb:49:2c:35:59:30:f3:87:9c:84: 5c:75:37:84:1d:e4:c2:6a:a5:00:f4:d5:cf:2e:03:72: 23:58:08:10:99:76:87:83:7c:3a:c0:60:0b:90:71:3f: 64:c3:68:d9:07:c9:ed:e9:05:ad:db:03:d4:b1:55:ba: bd:78:c9:89:ce:ef:59:c9:17:03:3e:6a:dc:8d:6c:ee: 7f:94:0c:9e:6e:87:e8:27:5c:ee:48:6e:47:10:2d:0d: 82:e1:57:59:44:94:1c:b1:fb:04:c7:06:05:8d:c6:99: d7:26:5d:d3:76:96:2e:0c:63:f1:80:e0:17:ff:e3:39 Fingerprint (SHA-256): 6E:E0:FB:84:B2:73:FF:83:D4:12:15:86:66:B6:BA:6C:8B:6A:08:82:39:97:DC:24:3D:CF:C5:8C:96:11:CD:ED Fingerprint (SHA1): AA:AE:2F:A5:09:A3:79:8B:AA:55:26:7C:EB:8A:44:86:45:55:E8:1E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #760: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204129 (0x37440321) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 20:45:29 2022 Not After : Tue Sep 27 20:45:29 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f0:20:ee:ce:62:22:07:60:bf:cc:8b:2e:d3:ed:43:fc: fb:c4:b4:27:3e:3c:a4:2f:c8:69:ad:cb:01:94:1e:9a: de:38:03:c4:29:e1:e1:ee:bf:c2:cc:cc:9d:b4:37:ad: 60:f8:f9:c1:24:0c:2c:c8:98:ea:92:55:b3:1d:13:19: 3f:3d:1f:97:ba:de:89:9f:fc:12:aa:5b:03:63:4b:6e: 4f:29:ff:99:93:24:61:3f:1b:e4:b6:02:4c:91:48:d3: 29:69:f6:85:88:2e:56:ef:2a:62:47:e4:9a:6b:80:ad: dd:83:69:a5:1f:31:a5:88:66:74:9b:4f:89:bb:12:08: f6:6e:cb:18:04:65:d7:d3:7e:af:b7:ff:d2:70:ec:26: 76:da:42:14:7a:bd:95:62:18:54:15:51:8f:8a:f6:f8: 8a:34:df:47:54:ec:ef:ed:88:92:ad:d4:ae:03:36:d4: 76:ab:48:ac:88:8e:96:3d:bc:f7:6e:c3:f1:a4:c7:33: 21:12:a7:f3:39:96:51:90:29:e5:90:d4:11:5a:c0:80: e9:cc:d8:90:02:2e:23:f8:5c:0f:f9:ea:54:d0:5f:6d: ef:80:e4:92:cd:58:6c:2c:6f:e9:4b:4b:51:02:10:c9: 54:da:ce:22:6a:47:f2:bb:c9:63:6e:f0:78:d1:f8:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:23:a0:f6:3b:c9:6c:fd:c3:48:6a:45:4a:9d:49:f9: fe:ad:3b:79:1c:0e:b7:63:72:fd:f9:a7:85:e3:12:fe: 15:92:fd:f3:1c:db:e9:33:05:54:fb:33:a4:c4:a2:fb: 89:dc:72:46:2e:eb:4d:b1:dd:06:ee:58:c0:99:1b:34: 53:41:8b:74:d5:e9:e6:54:80:c1:76:eb:1f:34:d2:83: ac:7b:28:bb:57:f2:9a:fa:31:d3:2a:e6:56:1a:ab:0f: 66:a1:a6:63:12:5b:e0:c5:bb:d4:68:09:aa:06:53:74: ce:47:22:67:51:77:e6:e7:24:91:f8:1a:b0:86:ee:91: cf:60:d1:a5:95:b3:80:37:4a:1e:4b:6e:3d:c6:b4:6d: 8f:93:8c:bb:ab:23:86:8f:37:a3:d4:0a:d4:c1:14:cd: f0:57:9f:9c:88:59:9a:94:49:7d:96:2a:2e:13:1d:1a: 4a:31:2f:b6:9e:52:81:1b:47:49:37:7f:6b:41:68:3c: a2:b4:0f:91:72:0e:18:47:31:74:70:03:ca:d3:5e:19: 03:78:00:d3:5e:50:ce:b9:f5:32:01:59:3c:76:f1:fe: d5:6e:fb:d4:e0:bb:08:34:48:29:bf:4a:a8:d5:08:63: d4:1f:7f:10:cb:db:9f:1f:68:fd:b9:36:18:f7:ae:77 Fingerprint (SHA-256): B1:0B:24:AE:0E:F8:F3:F5:EB:50:73:02:BF:B4:91:74:A1:5C:5F:7A:E3:2B:48:92:8C:15:D3:E5:CF:70:86:C9 Fingerprint (SHA1): BD:CD:B5:2C:4D:92:87:6F:55:98:15:BA:CF:E2:63:84:A1:50:82:03 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #761: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204129 (0x37440321) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 20:45:29 2022 Not After : Tue Sep 27 20:45:29 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f0:20:ee:ce:62:22:07:60:bf:cc:8b:2e:d3:ed:43:fc: fb:c4:b4:27:3e:3c:a4:2f:c8:69:ad:cb:01:94:1e:9a: de:38:03:c4:29:e1:e1:ee:bf:c2:cc:cc:9d:b4:37:ad: 60:f8:f9:c1:24:0c:2c:c8:98:ea:92:55:b3:1d:13:19: 3f:3d:1f:97:ba:de:89:9f:fc:12:aa:5b:03:63:4b:6e: 4f:29:ff:99:93:24:61:3f:1b:e4:b6:02:4c:91:48:d3: 29:69:f6:85:88:2e:56:ef:2a:62:47:e4:9a:6b:80:ad: dd:83:69:a5:1f:31:a5:88:66:74:9b:4f:89:bb:12:08: f6:6e:cb:18:04:65:d7:d3:7e:af:b7:ff:d2:70:ec:26: 76:da:42:14:7a:bd:95:62:18:54:15:51:8f:8a:f6:f8: 8a:34:df:47:54:ec:ef:ed:88:92:ad:d4:ae:03:36:d4: 76:ab:48:ac:88:8e:96:3d:bc:f7:6e:c3:f1:a4:c7:33: 21:12:a7:f3:39:96:51:90:29:e5:90:d4:11:5a:c0:80: e9:cc:d8:90:02:2e:23:f8:5c:0f:f9:ea:54:d0:5f:6d: ef:80:e4:92:cd:58:6c:2c:6f:e9:4b:4b:51:02:10:c9: 54:da:ce:22:6a:47:f2:bb:c9:63:6e:f0:78:d1:f8:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:23:a0:f6:3b:c9:6c:fd:c3:48:6a:45:4a:9d:49:f9: fe:ad:3b:79:1c:0e:b7:63:72:fd:f9:a7:85:e3:12:fe: 15:92:fd:f3:1c:db:e9:33:05:54:fb:33:a4:c4:a2:fb: 89:dc:72:46:2e:eb:4d:b1:dd:06:ee:58:c0:99:1b:34: 53:41:8b:74:d5:e9:e6:54:80:c1:76:eb:1f:34:d2:83: ac:7b:28:bb:57:f2:9a:fa:31:d3:2a:e6:56:1a:ab:0f: 66:a1:a6:63:12:5b:e0:c5:bb:d4:68:09:aa:06:53:74: ce:47:22:67:51:77:e6:e7:24:91:f8:1a:b0:86:ee:91: cf:60:d1:a5:95:b3:80:37:4a:1e:4b:6e:3d:c6:b4:6d: 8f:93:8c:bb:ab:23:86:8f:37:a3:d4:0a:d4:c1:14:cd: f0:57:9f:9c:88:59:9a:94:49:7d:96:2a:2e:13:1d:1a: 4a:31:2f:b6:9e:52:81:1b:47:49:37:7f:6b:41:68:3c: a2:b4:0f:91:72:0e:18:47:31:74:70:03:ca:d3:5e:19: 03:78:00:d3:5e:50:ce:b9:f5:32:01:59:3c:76:f1:fe: d5:6e:fb:d4:e0:bb:08:34:48:29:bf:4a:a8:d5:08:63: d4:1f:7f:10:cb:db:9f:1f:68:fd:b9:36:18:f7:ae:77 Fingerprint (SHA-256): B1:0B:24:AE:0E:F8:F3:F5:EB:50:73:02:BF:B4:91:74:A1:5C:5F:7A:E3:2B:48:92:8C:15:D3:E5:CF:70:86:C9 Fingerprint (SHA1): BD:CD:B5:2C:4D:92:87:6F:55:98:15:BA:CF:E2:63:84:A1:50:82:03 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #762: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #763: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204136 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #764: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #765: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #766: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204137 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #767: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #768: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #769: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #770: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 927204138 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #771: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #772: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #773: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #774: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 927204139 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #775: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #776: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #777: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #778: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 927204140 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #779: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #780: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 927204141 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #781: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #782: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #783: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #784: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #785: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 927204142 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #786: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #787: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #788: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #789: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 927204143 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #790: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #791: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #792: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #793: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 927204144 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #794: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #795: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #796: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #797: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 927204145 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #798: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #799: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #800: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204136 (0x37440328) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 20:45:42 2022 Not After : Tue Sep 27 20:45:42 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:76:6d:33:74:bf:86:16:98:98:87:a4:0c:89:67:00: cd:31:f3:5c:42:f2:92:1e:39:4d:30:74:29:6e:11:a0: 1c:f1:a7:8c:a7:0b:6f:f3:89:ef:d9:fe:22:44:a3:29: 9e:7f:cb:6b:39:25:bd:d7:50:c7:32:96:16:93:82:8d: b9:80:d0:23:ad:af:b5:d3:f7:be:c5:da:7c:1a:fc:03: b4:7e:df:1f:e8:7b:fa:ac:f5:2e:b1:59:79:3f:34:dc: 19:5b:c2:15:bd:a7:bc:8e:ec:89:4f:b1:47:22:44:b1: 57:30:b9:ed:9b:70:08:65:dd:18:f9:d8:50:1c:1d:56: 13:55:fa:08:0d:69:92:85:bc:00:6c:04:d5:ec:b3:a4: 8e:0b:63:69:c7:c7:c7:23:3e:ed:e7:90:7c:30:7c:f2: 9b:b4:86:99:59:27:91:87:e0:93:a1:4f:5a:57:e2:4b: 2e:13:e3:08:02:bf:88:7f:2c:6d:e2:6b:da:00:9b:40: f8:d6:af:bd:69:83:8e:9f:7b:4c:e7:3f:0e:f5:d6:a5: 81:ff:af:75:8f:ca:6c:d6:21:f6:5e:a7:6d:31:8c:82: 55:39:bf:54:e9:9f:f4:36:28:85:cc:58:7d:94:50:a0: dd:39:8e:05:23:15:c8:45:5b:56:20:55:ea:ed:e2:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:d9:e2:87:32:9a:ad:5e:7b:3b:c3:b0:70:9d:c7:d5: c9:2d:ab:e0:7c:c5:28:f1:f4:33:87:23:a4:7f:da:de: 0d:1e:5f:46:86:00:1f:5c:55:65:89:8a:b5:e2:47:e3: db:f9:04:83:23:a8:6d:fc:2d:11:2c:c2:7a:f6:a6:90: 13:3e:72:6f:1f:33:84:07:39:96:23:7f:04:5c:30:2a: 8b:6b:39:67:10:75:e7:5f:26:86:e2:5c:c3:d5:51:e6: b5:a3:9e:51:c3:0d:04:d5:cb:d8:cd:5f:3c:7c:90:99: 5a:e6:2b:33:75:80:b5:04:f7:7f:5d:7e:fc:2d:25:ce: 0a:f9:6a:59:39:81:82:3b:aa:e8:2f:59:74:e9:06:1c: 0c:2c:5d:cd:db:e1:0b:ca:7d:7a:62:eb:fb:01:a2:51: e3:28:3f:1d:6b:d9:67:bf:2b:80:a5:e0:cd:ed:25:bd: 48:04:40:7e:03:58:60:36:a9:0a:03:06:ae:49:92:0d: 37:e6:67:fb:35:83:f1:a0:7e:7f:a0:12:54:bb:51:65: ba:d0:5b:33:03:49:ea:bd:fb:da:f7:be:97:76:94:3d: 08:90:98:20:43:ef:20:34:d2:f2:2c:9f:8c:f8:76:f6: 08:3b:56:58:fa:1e:b5:e4:c7:c3:fb:53:49:5f:36:0f Fingerprint (SHA-256): B8:BE:69:85:C4:3D:95:E1:32:FD:82:37:C7:F4:86:0B:8A:B7:1C:C2:58:48:9A:5A:57:26:6B:6D:08:44:28:11 Fingerprint (SHA1): DA:8A:C4:C3:26:F8:20:E8:BC:7A:A3:D3:3D:FA:4B:61:13:CB:65:A8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #801: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #802: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #803: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #804: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #805: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #806: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #807: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #808: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #809: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204137 (0x37440329) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 20:45:44 2022 Not After : Tue Sep 27 20:45:44 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:98:23:fc:22:7b:64:a5:6d:fb:7c:34:cd:e3:fe:5f: 40:e4:a1:2a:8d:68:14:40:7d:6f:99:e6:a2:35:50:1e: 58:1f:e4:31:90:9f:56:9b:dd:67:04:e6:08:02:84:81: e9:a6:59:3b:37:70:3a:10:6f:bc:28:c8:e0:d2:55:bf: da:8e:7a:86:11:6a:38:16:80:7a:0b:5a:9e:02:e0:fa: 04:6d:8b:82:d9:8a:60:3a:e1:be:66:8d:ae:a8:7c:1e: b2:67:2b:11:93:13:a5:f0:75:56:9a:b3:43:c1:88:db: 7f:6e:9b:c6:4b:c6:d8:d1:5c:22:04:55:af:9d:34:c2: 63:e2:be:1b:c1:82:38:f6:eb:4f:da:99:ef:d8:75:2d: f1:59:46:98:8c:e4:14:04:ed:ab:b2:ce:cb:58:fa:0d: 9c:36:ab:de:ba:84:8a:3e:bb:74:75:5a:db:db:d3:96: 6f:f4:28:9c:a0:13:53:9b:9e:1a:ce:50:c0:93:15:03: ef:10:3e:4b:5c:34:09:b9:d6:48:a8:ff:96:4c:4c:7f: 7a:a4:97:0f:96:e2:f8:09:a5:1a:ca:f2:c4:68:52:fa: b9:99:53:52:8e:d0:d3:12:06:80:1c:49:1b:cf:6b:e5: 79:5d:19:96:3b:65:85:54:42:ef:ba:a4:74:12:b9:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:1b:ed:26:45:08:ae:c0:98:03:18:ea:c2:83:3e:22: 17:53:2f:21:ac:61:1f:18:c9:ab:5c:1d:49:53:e7:20: 40:95:43:7c:dc:2b:e0:e4:4a:eb:37:a1:e5:22:37:d0: e1:0a:03:22:be:5f:f2:38:32:26:7e:db:38:e4:a8:ec: 18:b2:bc:33:1a:0c:ef:0d:c1:fb:8d:7a:e9:84:a2:76: e9:8b:77:b9:55:09:ba:72:c7:5a:1c:5d:16:05:1b:21: 14:9d:a2:d6:d5:4d:87:22:37:07:3f:55:05:04:e8:35: b9:af:e5:b8:3b:7f:fc:77:68:95:63:f2:37:cc:cf:64: 6b:f8:45:0a:9a:24:e9:f5:27:a6:b6:a6:e4:9a:cc:8b: 51:8a:0e:4e:7f:c8:ad:be:da:56:db:c7:6e:78:2d:cb: 74:50:f0:a7:87:c4:14:a0:92:e7:5f:ea:e4:fb:bd:8e: 38:94:1a:aa:6f:45:fa:b7:85:25:45:35:1c:73:96:70: 54:2a:04:cf:e9:f8:9b:1b:6d:53:fb:96:81:fe:8d:fb: 68:61:06:69:bb:7c:3d:0b:9c:f4:44:ed:63:22:72:04: a3:1e:b7:4f:03:2a:bd:0b:25:f6:96:90:7e:7e:ee:3a: db:e6:b5:4b:9e:36:a7:28:0d:72:ff:5a:dd:3f:e5:94 Fingerprint (SHA-256): EF:B3:CE:DB:33:0A:98:B8:DA:72:91:B8:4F:8E:EE:6C:CA:BA:6D:6B:F0:1A:4E:DC:62:6B:8F:DF:8F:5A:47:6F Fingerprint (SHA1): FF:6D:A9:77:B4:E9:D6:EA:A7:48:B3:8B:BA:57:D6:48:D5:A6:2E:4E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #810: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #811: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #812: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #813: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #814: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #815: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #816: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #817: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #818: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #819: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #820: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #821: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #822: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #823: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #824: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #825: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #826: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #827: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #828: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204146 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #829: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #830: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #831: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #832: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927204147 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #833: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #834: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #835: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #836: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 927204148 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #837: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #838: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #839: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #840: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 927204149 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #841: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #842: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #843: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #844: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 927204150 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #845: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #846: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #847: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #848: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 927204151 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #849: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #850: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #851: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #852: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 927204152 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #853: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #854: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #855: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #856: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 927204153 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #857: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #858: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #859: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #860: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 927204154 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #861: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #862: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #863: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204146 (0x37440332) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:46:04 2022 Not After : Tue Sep 27 20:46:04 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 60:98:ea:60:e8:8c:3b:6a:00:db:64:fd:b1:1e:df:61: 43:32:60:7c:ce:84:4b:df:21:27:a2:66:a3:6b:1f:0d: af:8a:30:de:2a:48:90:49:5c:5b:36:f6:7c:8d:48:44: d7:ce:8a:00:2e:43:93:c8:eb:01:a4:33:16:c7:df:ae: ad:0c:a3:0e:92:68:a8:a0:89:a1:c3:65:dd:b7:6e:70: fa:b5:78:15:2b:04:55:f0:65:17:66:ee:a2:9d:31:30: 29:88:88:7b:b9:00:57:54:23:ce:c8:32:91:02:a3:31: bd:1b:dc:dd:bf:d2:39:5d:43:2b:61:87:ab:a2:44:b6: df:41:66:18:96:de:1b:26:e1:d7:81:90:eb:c4:71:3b: e7:00:4d:8d:58:34:33:d4:93:a8:7f:4b:ce:d2:f5:33: bd:c6:03:26:49:f2:31:4f:55:80:f0:32:06:d9:fe:ce: 23:4e:08:de:13:ce:72:d6:97:b8:98:73:f8:c4:ed:f0: 75:e0:53:c9:85:36:98:ab:3b:35:d6:a0:82:a1:ba:82: 16:c1:ee:46:d8:b0:a2:da:bf:e4:69:a5:c5:6d:20:26: 71:3e:83:cd:52:5b:58:5f:dd:89:be:00:43:aa:95:69: a2:1c:54:01:55:3e:42:eb:83:02:cd:fd:23:63:30:59 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:6b:9f:9a:57:39:1e:7c:85:62:da:10:b6: bf:98:45:60:75:ab:a7:5a:2e:92:95:23:d5:10:9e:75: 02:1c:40:db:11:41:94:56:86:55:2d:2f:0e:89:ae:ac: 46:65:8b:89:4b:28:26:6d:9c:ce:48:44:b5:93 Fingerprint (SHA-256): 92:C3:6A:8D:BC:80:4F:FA:FA:BC:97:62:C9:28:3E:ED:CB:AB:BD:F4:F5:97:1C:7B:06:73:C6:06:0A:8E:1A:28 Fingerprint (SHA1): E1:42:DC:3F:3F:39:B9:FD:A5:E4:E9:E9:E0:DA:A6:31:10:CC:24:30 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #864: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204146 (0x37440332) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:46:04 2022 Not After : Tue Sep 27 20:46:04 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 60:98:ea:60:e8:8c:3b:6a:00:db:64:fd:b1:1e:df:61: 43:32:60:7c:ce:84:4b:df:21:27:a2:66:a3:6b:1f:0d: af:8a:30:de:2a:48:90:49:5c:5b:36:f6:7c:8d:48:44: d7:ce:8a:00:2e:43:93:c8:eb:01:a4:33:16:c7:df:ae: ad:0c:a3:0e:92:68:a8:a0:89:a1:c3:65:dd:b7:6e:70: fa:b5:78:15:2b:04:55:f0:65:17:66:ee:a2:9d:31:30: 29:88:88:7b:b9:00:57:54:23:ce:c8:32:91:02:a3:31: bd:1b:dc:dd:bf:d2:39:5d:43:2b:61:87:ab:a2:44:b6: df:41:66:18:96:de:1b:26:e1:d7:81:90:eb:c4:71:3b: e7:00:4d:8d:58:34:33:d4:93:a8:7f:4b:ce:d2:f5:33: bd:c6:03:26:49:f2:31:4f:55:80:f0:32:06:d9:fe:ce: 23:4e:08:de:13:ce:72:d6:97:b8:98:73:f8:c4:ed:f0: 75:e0:53:c9:85:36:98:ab:3b:35:d6:a0:82:a1:ba:82: 16:c1:ee:46:d8:b0:a2:da:bf:e4:69:a5:c5:6d:20:26: 71:3e:83:cd:52:5b:58:5f:dd:89:be:00:43:aa:95:69: a2:1c:54:01:55:3e:42:eb:83:02:cd:fd:23:63:30:59 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:6b:9f:9a:57:39:1e:7c:85:62:da:10:b6: bf:98:45:60:75:ab:a7:5a:2e:92:95:23:d5:10:9e:75: 02:1c:40:db:11:41:94:56:86:55:2d:2f:0e:89:ae:ac: 46:65:8b:89:4b:28:26:6d:9c:ce:48:44:b5:93 Fingerprint (SHA-256): 92:C3:6A:8D:BC:80:4F:FA:FA:BC:97:62:C9:28:3E:ED:CB:AB:BD:F4:F5:97:1C:7B:06:73:C6:06:0A:8E:1A:28 Fingerprint (SHA1): E1:42:DC:3F:3F:39:B9:FD:A5:E4:E9:E9:E0:DA:A6:31:10:CC:24:30 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #865: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204146 (0x37440332) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:46:04 2022 Not After : Tue Sep 27 20:46:04 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 60:98:ea:60:e8:8c:3b:6a:00:db:64:fd:b1:1e:df:61: 43:32:60:7c:ce:84:4b:df:21:27:a2:66:a3:6b:1f:0d: af:8a:30:de:2a:48:90:49:5c:5b:36:f6:7c:8d:48:44: d7:ce:8a:00:2e:43:93:c8:eb:01:a4:33:16:c7:df:ae: ad:0c:a3:0e:92:68:a8:a0:89:a1:c3:65:dd:b7:6e:70: fa:b5:78:15:2b:04:55:f0:65:17:66:ee:a2:9d:31:30: 29:88:88:7b:b9:00:57:54:23:ce:c8:32:91:02:a3:31: bd:1b:dc:dd:bf:d2:39:5d:43:2b:61:87:ab:a2:44:b6: df:41:66:18:96:de:1b:26:e1:d7:81:90:eb:c4:71:3b: e7:00:4d:8d:58:34:33:d4:93:a8:7f:4b:ce:d2:f5:33: bd:c6:03:26:49:f2:31:4f:55:80:f0:32:06:d9:fe:ce: 23:4e:08:de:13:ce:72:d6:97:b8:98:73:f8:c4:ed:f0: 75:e0:53:c9:85:36:98:ab:3b:35:d6:a0:82:a1:ba:82: 16:c1:ee:46:d8:b0:a2:da:bf:e4:69:a5:c5:6d:20:26: 71:3e:83:cd:52:5b:58:5f:dd:89:be:00:43:aa:95:69: a2:1c:54:01:55:3e:42:eb:83:02:cd:fd:23:63:30:59 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:6b:9f:9a:57:39:1e:7c:85:62:da:10:b6: bf:98:45:60:75:ab:a7:5a:2e:92:95:23:d5:10:9e:75: 02:1c:40:db:11:41:94:56:86:55:2d:2f:0e:89:ae:ac: 46:65:8b:89:4b:28:26:6d:9c:ce:48:44:b5:93 Fingerprint (SHA-256): 92:C3:6A:8D:BC:80:4F:FA:FA:BC:97:62:C9:28:3E:ED:CB:AB:BD:F4:F5:97:1C:7B:06:73:C6:06:0A:8E:1A:28 Fingerprint (SHA1): E1:42:DC:3F:3F:39:B9:FD:A5:E4:E9:E9:E0:DA:A6:31:10:CC:24:30 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #866: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204146 (0x37440332) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:46:04 2022 Not After : Tue Sep 27 20:46:04 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 60:98:ea:60:e8:8c:3b:6a:00:db:64:fd:b1:1e:df:61: 43:32:60:7c:ce:84:4b:df:21:27:a2:66:a3:6b:1f:0d: af:8a:30:de:2a:48:90:49:5c:5b:36:f6:7c:8d:48:44: d7:ce:8a:00:2e:43:93:c8:eb:01:a4:33:16:c7:df:ae: ad:0c:a3:0e:92:68:a8:a0:89:a1:c3:65:dd:b7:6e:70: fa:b5:78:15:2b:04:55:f0:65:17:66:ee:a2:9d:31:30: 29:88:88:7b:b9:00:57:54:23:ce:c8:32:91:02:a3:31: bd:1b:dc:dd:bf:d2:39:5d:43:2b:61:87:ab:a2:44:b6: df:41:66:18:96:de:1b:26:e1:d7:81:90:eb:c4:71:3b: e7:00:4d:8d:58:34:33:d4:93:a8:7f:4b:ce:d2:f5:33: bd:c6:03:26:49:f2:31:4f:55:80:f0:32:06:d9:fe:ce: 23:4e:08:de:13:ce:72:d6:97:b8:98:73:f8:c4:ed:f0: 75:e0:53:c9:85:36:98:ab:3b:35:d6:a0:82:a1:ba:82: 16:c1:ee:46:d8:b0:a2:da:bf:e4:69:a5:c5:6d:20:26: 71:3e:83:cd:52:5b:58:5f:dd:89:be:00:43:aa:95:69: a2:1c:54:01:55:3e:42:eb:83:02:cd:fd:23:63:30:59 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:6b:9f:9a:57:39:1e:7c:85:62:da:10:b6: bf:98:45:60:75:ab:a7:5a:2e:92:95:23:d5:10:9e:75: 02:1c:40:db:11:41:94:56:86:55:2d:2f:0e:89:ae:ac: 46:65:8b:89:4b:28:26:6d:9c:ce:48:44:b5:93 Fingerprint (SHA-256): 92:C3:6A:8D:BC:80:4F:FA:FA:BC:97:62:C9:28:3E:ED:CB:AB:BD:F4:F5:97:1C:7B:06:73:C6:06:0A:8E:1A:28 Fingerprint (SHA1): E1:42:DC:3F:3F:39:B9:FD:A5:E4:E9:E9:E0:DA:A6:31:10:CC:24:30 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #867: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #868: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #869: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #870: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #871: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #872: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #873: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #874: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #875: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #876: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #877: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #878: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #879: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #880: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #881: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #882: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #883: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #884: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #885: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #886: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #887: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #888: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #889: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #890: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #891: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #892: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #893: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #894: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20220927204627Z nextupdate=20230927204627Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Tue Sep 27 20:46:27 2022 Next Update: Wed Sep 27 20:46:27 2023 CRL Extensions: chains.sh: #895: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220927204628Z nextupdate=20230927204628Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Sep 27 20:46:28 2022 Next Update: Wed Sep 27 20:46:28 2023 CRL Extensions: chains.sh: #896: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20220927204628Z nextupdate=20230927204628Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Tue Sep 27 20:46:28 2022 Next Update: Wed Sep 27 20:46:28 2023 CRL Extensions: chains.sh: #897: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20220927204628Z nextupdate=20230927204628Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Tue Sep 27 20:46:28 2022 Next Update: Wed Sep 27 20:46:28 2023 CRL Extensions: chains.sh: #898: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20220927204629Z addcert 14 20220927204629Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Tue Sep 27 20:46:29 2022 Next Update: Wed Sep 27 20:46:28 2023 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Tue Sep 27 20:46:29 2022 CRL Extensions: chains.sh: #899: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220927204630Z addcert 15 20220927204630Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Sep 27 20:46:30 2022 Next Update: Wed Sep 27 20:46:28 2023 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Tue Sep 27 20:46:30 2022 CRL Extensions: chains.sh: #900: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #901: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #902: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #903: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #904: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #905: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #906: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #907: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #908: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #909: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:46:17 2022 Not After : Tue Sep 27 20:46:17 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:82:dc:95:a9:c5:f5:81:ec:bb:10:09:57:9e:26:04: 4b:e1:49:fa:73:33:7b:02:1b:cb:b8:a8:ae:45:e8:e9: 43:2f:03:50:91:ca:c9:be:92:74:01:1a:e8:91:4c:75: 23:c5:37:e3:ca:0c:d8:59:fb:d1:47:f9:8d:2a:fc:a6: 2a:8b:c0:b4:57:7a:d2:60:ec:25:84:a6:58:7d:7a:56: 1f:91:21:75:cb:7f:fd:25:ab:74:88:a9:13:61:28:e0: f3:0d:c9:ea:89:71:72:83:78:b7:4e:b9:17:b4:33:3c: 2f:52:4a:81:ff:28:0c:c2:a4:fb:4f:d8:ba:d4:55:f6: ff:52:35:11:30:91:fa:f4:09:b0:cd:de:40:6e:c7:b2: bc:fe:3a:6b:38:0e:38:b1:96:10:eb:9d:14:e7:7e:73: cd:91:54:72:e3:e2:70:03:fa:07:31:18:eb:ac:b2:5d: be:cf:dc:78:e6:96:86:87:d0:67:96:27:30:dd:cc:7c: 68:f7:10:3c:22:2c:09:45:0d:31:15:1b:e4:d9:7e:4a: 6e:37:38:ab:fa:75:54:40:85:da:e6:b5:ad:c4:d2:23: 3b:b0:26:20:0c:92:c7:db:39:5c:65:3b:30:00:f7:79: d9:6e:d6:50:a7:83:55:4c:76:02:7a:6b:aa:31:5d:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:7f:c2:88:a9:d2:77:38:1e:59:f4:0c:e6:f6:1e:c9: 7b:d8:77:40:71:68:39:89:1e:f4:b6:2a:37:ff:a0:81: 92:4d:99:2e:05:2f:1f:5c:ac:bf:90:28:3e:55:2c:a9: 62:24:53:13:47:68:59:5f:af:c5:25:7e:9c:56:18:0d: 59:67:1c:f3:25:0c:d0:6e:67:11:8a:ee:11:22:f6:b9: ba:7a:f8:92:c6:f8:81:bd:b2:42:57:89:6d:24:a1:8e: 88:71:39:89:02:c1:d8:49:e1:bc:fe:1c:f8:ee:7f:98: 08:26:3e:a7:d5:65:0a:1c:c8:74:24:c7:8f:f7:05:a1: 9e:b1:7d:dc:33:59:e6:55:cc:fa:8a:62:c0:7f:eb:93: 3f:b8:7f:7b:5f:22:77:c9:bc:c5:b1:a3:20:62:fb:c0: c4:71:d6:3c:8d:30:72:e7:4c:49:65:34:b1:9f:c1:5a: 60:65:b8:6d:c5:49:44:5b:3b:40:24:e7:b8:67:f9:76: ea:ea:2d:b3:28:0a:d7:88:d5:57:be:58:ed:ef:aa:82: 1b:d0:6e:d0:4d:e6:7a:5f:ee:44:19:be:aa:f2:d2:77: 42:c1:48:ab:ce:f9:f0:f7:1e:9f:1a:d7:c3:2d:f3:41: 42:b2:2c:d1:75:4c:6b:e9:75:af:26:43:c3:f4:f6:92 Fingerprint (SHA-256): C8:D7:60:F5:71:A4:D4:B6:D7:34:7B:10:A3:18:BB:C1:7B:01:5E:18:06:62:61:2C:F0:30:28:CF:03:52:38:BA Fingerprint (SHA1): 44:C8:D2:D4:90:25:DE:D5:20:C8:53:F4:F5:8C:86:57:C0:F9:28:97 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #910: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #911: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:46:17 2022 Not After : Tue Sep 27 20:46:17 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:82:dc:95:a9:c5:f5:81:ec:bb:10:09:57:9e:26:04: 4b:e1:49:fa:73:33:7b:02:1b:cb:b8:a8:ae:45:e8:e9: 43:2f:03:50:91:ca:c9:be:92:74:01:1a:e8:91:4c:75: 23:c5:37:e3:ca:0c:d8:59:fb:d1:47:f9:8d:2a:fc:a6: 2a:8b:c0:b4:57:7a:d2:60:ec:25:84:a6:58:7d:7a:56: 1f:91:21:75:cb:7f:fd:25:ab:74:88:a9:13:61:28:e0: f3:0d:c9:ea:89:71:72:83:78:b7:4e:b9:17:b4:33:3c: 2f:52:4a:81:ff:28:0c:c2:a4:fb:4f:d8:ba:d4:55:f6: ff:52:35:11:30:91:fa:f4:09:b0:cd:de:40:6e:c7:b2: bc:fe:3a:6b:38:0e:38:b1:96:10:eb:9d:14:e7:7e:73: cd:91:54:72:e3:e2:70:03:fa:07:31:18:eb:ac:b2:5d: be:cf:dc:78:e6:96:86:87:d0:67:96:27:30:dd:cc:7c: 68:f7:10:3c:22:2c:09:45:0d:31:15:1b:e4:d9:7e:4a: 6e:37:38:ab:fa:75:54:40:85:da:e6:b5:ad:c4:d2:23: 3b:b0:26:20:0c:92:c7:db:39:5c:65:3b:30:00:f7:79: d9:6e:d6:50:a7:83:55:4c:76:02:7a:6b:aa:31:5d:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:7f:c2:88:a9:d2:77:38:1e:59:f4:0c:e6:f6:1e:c9: 7b:d8:77:40:71:68:39:89:1e:f4:b6:2a:37:ff:a0:81: 92:4d:99:2e:05:2f:1f:5c:ac:bf:90:28:3e:55:2c:a9: 62:24:53:13:47:68:59:5f:af:c5:25:7e:9c:56:18:0d: 59:67:1c:f3:25:0c:d0:6e:67:11:8a:ee:11:22:f6:b9: ba:7a:f8:92:c6:f8:81:bd:b2:42:57:89:6d:24:a1:8e: 88:71:39:89:02:c1:d8:49:e1:bc:fe:1c:f8:ee:7f:98: 08:26:3e:a7:d5:65:0a:1c:c8:74:24:c7:8f:f7:05:a1: 9e:b1:7d:dc:33:59:e6:55:cc:fa:8a:62:c0:7f:eb:93: 3f:b8:7f:7b:5f:22:77:c9:bc:c5:b1:a3:20:62:fb:c0: c4:71:d6:3c:8d:30:72:e7:4c:49:65:34:b1:9f:c1:5a: 60:65:b8:6d:c5:49:44:5b:3b:40:24:e7:b8:67:f9:76: ea:ea:2d:b3:28:0a:d7:88:d5:57:be:58:ed:ef:aa:82: 1b:d0:6e:d0:4d:e6:7a:5f:ee:44:19:be:aa:f2:d2:77: 42:c1:48:ab:ce:f9:f0:f7:1e:9f:1a:d7:c3:2d:f3:41: 42:b2:2c:d1:75:4c:6b:e9:75:af:26:43:c3:f4:f6:92 Fingerprint (SHA-256): C8:D7:60:F5:71:A4:D4:B6:D7:34:7B:10:A3:18:BB:C1:7B:01:5E:18:06:62:61:2C:F0:30:28:CF:03:52:38:BA Fingerprint (SHA1): 44:C8:D2:D4:90:25:DE:D5:20:C8:53:F4:F5:8C:86:57:C0:F9:28:97 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #912: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #913: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #914: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204155 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #915: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #916: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #917: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #918: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 927204156 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #919: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #920: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #921: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-927204031.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #922: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-927204015.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #923: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #924: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #925: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-927204031.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #926: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 927204157 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #927: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #928: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #929: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-927204031.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #930: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-927204016.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #931: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #932: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #933: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #934: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 927204158 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #935: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #936: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #937: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-927204031.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #938: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-927204017.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #939: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #940: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #941: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-927204031.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #942: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-927204018.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #943: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #944: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20220927204648Z nextupdate=20230927204648Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Tue Sep 27 20:46:48 2022 Next Update: Wed Sep 27 20:46:48 2023 CRL Extensions: chains.sh: #945: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220927204648Z nextupdate=20230927204648Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Sep 27 20:46:48 2022 Next Update: Wed Sep 27 20:46:48 2023 CRL Extensions: chains.sh: #946: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20220927204648Z nextupdate=20230927204648Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Tue Sep 27 20:46:48 2022 Next Update: Wed Sep 27 20:46:48 2023 CRL Extensions: chains.sh: #947: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20220927204648Z nextupdate=20230927204648Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Tue Sep 27 20:46:48 2022 Next Update: Wed Sep 27 20:46:48 2023 CRL Extensions: chains.sh: #948: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220927204649Z addcert 20 20220927204649Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Sep 27 20:46:49 2022 Next Update: Wed Sep 27 20:46:48 2023 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Tue Sep 27 20:46:49 2022 CRL Extensions: chains.sh: #949: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220927204650Z addcert 40 20220927204650Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Sep 27 20:46:50 2022 Next Update: Wed Sep 27 20:46:48 2023 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Tue Sep 27 20:46:49 2022 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Tue Sep 27 20:46:50 2022 CRL Extensions: chains.sh: #950: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #951: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #952: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #953: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204155 (0x3744033b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:46:35 2022 Not After : Tue Sep 27 20:46:35 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:cf:46:c0:32:25:e3:71:5d:e2:b7:b1:f7:de:8e:2e: c3:88:2d:87:1e:39:ad:42:b2:1b:4c:4c:cb:79:83:cc: 99:f0:fc:e8:30:4b:c1:78:bd:b3:eb:83:bc:d9:5e:31: 8a:00:a2:a6:df:52:0d:8b:bf:d6:f4:ee:df:bd:a9:3f: c7:e5:06:87:d5:7b:72:77:74:12:75:ce:77:3f:a5:10: 6c:f2:34:32:6c:5c:13:b7:ac:72:ef:24:1b:40:94:ad: a5:65:80:88:c8:f0:05:28:92:8c:07:08:e1:6c:b9:1a: da:22:36:d5:ff:3a:e4:1d:ac:a1:8f:83:c3:22:fd:23: a5:2a:53:1a:82:86:4e:0c:f5:e2:16:ce:8e:56:81:e9: 8b:38:f7:c2:76:a6:52:23:c9:46:b5:56:8b:c1:c4:0d: a5:8b:47:28:5d:1d:c2:9a:87:56:e8:12:2b:9c:e2:72: 92:7d:dd:d8:7d:b2:3e:ea:dc:19:20:3b:d8:3b:d7:37: 2d:1f:dc:eb:88:8b:84:6b:bb:be:5c:e2:f2:9f:b0:53: c6:d7:da:19:46:5e:0f:e6:34:b3:1a:34:bf:d0:2f:f6: 90:c3:ae:64:40:79:3e:13:fc:c8:18:a6:ab:b6:63:59: 15:89:92:30:6d:2f:ff:e1:79:4e:3f:78:74:11:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:3c:e5:2c:f1:28:87:0f:ac:7e:ae:5d:fc:5b:a9:08: fa:2f:79:f7:bb:c1:43:77:7b:88:08:de:5c:f0:01:f5: 69:61:72:5b:d8:84:46:fd:3f:24:84:6e:c3:a7:0a:37: dc:70:72:3f:76:b6:d4:de:6d:d4:f6:49:38:a2:dd:3e: 85:bf:c3:05:b1:73:89:d2:1d:77:7f:a7:c8:92:61:9f: 97:7f:30:1b:b9:c0:49:9a:16:27:26:6b:21:a5:a9:08: 39:b1:6b:2b:55:1f:85:97:ac:a4:04:3c:f9:3c:ea:79: 0c:fd:c0:8d:63:36:d1:34:48:15:ed:74:0f:a7:27:02: 12:3b:45:51:66:c3:e0:f9:c0:f4:5e:81:33:1a:b2:8c: 47:79:22:d6:e0:af:90:90:5d:bb:4b:ff:68:61:7e:f1: 7e:ad:8a:1c:32:08:09:85:19:4d:4f:1b:1a:c8:c5:8f: 3e:80:4d:02:87:d0:d5:20:9f:a3:00:cc:c1:4d:51:d1: 09:03:12:3a:64:d8:3c:4c:33:6b:f3:b1:f8:1a:70:4f: 36:5a:14:72:ba:8f:bd:6e:79:1d:94:87:35:98:cb:8e: 64:5d:09:f1:e5:4d:e5:20:5a:33:98:89:93:82:ce:43: ac:bf:53:b2:d8:32:2b:65:09:e5:a4:a4:14:12:27:12 Fingerprint (SHA-256): 36:10:71:B0:0E:A5:4F:E6:7F:57:4C:57:C0:AC:B6:C7:64:48:E7:90:AE:48:B1:44:C4:5D:B2:CC:E7:65:59:2D Fingerprint (SHA1): E7:6E:A7:FF:BD:0E:11:2F:36:FE:F6:79:1C:7B:E7:B7:58:BB:47:D7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #954: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #955: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204155 (0x3744033b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:46:35 2022 Not After : Tue Sep 27 20:46:35 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:cf:46:c0:32:25:e3:71:5d:e2:b7:b1:f7:de:8e:2e: c3:88:2d:87:1e:39:ad:42:b2:1b:4c:4c:cb:79:83:cc: 99:f0:fc:e8:30:4b:c1:78:bd:b3:eb:83:bc:d9:5e:31: 8a:00:a2:a6:df:52:0d:8b:bf:d6:f4:ee:df:bd:a9:3f: c7:e5:06:87:d5:7b:72:77:74:12:75:ce:77:3f:a5:10: 6c:f2:34:32:6c:5c:13:b7:ac:72:ef:24:1b:40:94:ad: a5:65:80:88:c8:f0:05:28:92:8c:07:08:e1:6c:b9:1a: da:22:36:d5:ff:3a:e4:1d:ac:a1:8f:83:c3:22:fd:23: a5:2a:53:1a:82:86:4e:0c:f5:e2:16:ce:8e:56:81:e9: 8b:38:f7:c2:76:a6:52:23:c9:46:b5:56:8b:c1:c4:0d: a5:8b:47:28:5d:1d:c2:9a:87:56:e8:12:2b:9c:e2:72: 92:7d:dd:d8:7d:b2:3e:ea:dc:19:20:3b:d8:3b:d7:37: 2d:1f:dc:eb:88:8b:84:6b:bb:be:5c:e2:f2:9f:b0:53: c6:d7:da:19:46:5e:0f:e6:34:b3:1a:34:bf:d0:2f:f6: 90:c3:ae:64:40:79:3e:13:fc:c8:18:a6:ab:b6:63:59: 15:89:92:30:6d:2f:ff:e1:79:4e:3f:78:74:11:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:3c:e5:2c:f1:28:87:0f:ac:7e:ae:5d:fc:5b:a9:08: fa:2f:79:f7:bb:c1:43:77:7b:88:08:de:5c:f0:01:f5: 69:61:72:5b:d8:84:46:fd:3f:24:84:6e:c3:a7:0a:37: dc:70:72:3f:76:b6:d4:de:6d:d4:f6:49:38:a2:dd:3e: 85:bf:c3:05:b1:73:89:d2:1d:77:7f:a7:c8:92:61:9f: 97:7f:30:1b:b9:c0:49:9a:16:27:26:6b:21:a5:a9:08: 39:b1:6b:2b:55:1f:85:97:ac:a4:04:3c:f9:3c:ea:79: 0c:fd:c0:8d:63:36:d1:34:48:15:ed:74:0f:a7:27:02: 12:3b:45:51:66:c3:e0:f9:c0:f4:5e:81:33:1a:b2:8c: 47:79:22:d6:e0:af:90:90:5d:bb:4b:ff:68:61:7e:f1: 7e:ad:8a:1c:32:08:09:85:19:4d:4f:1b:1a:c8:c5:8f: 3e:80:4d:02:87:d0:d5:20:9f:a3:00:cc:c1:4d:51:d1: 09:03:12:3a:64:d8:3c:4c:33:6b:f3:b1:f8:1a:70:4f: 36:5a:14:72:ba:8f:bd:6e:79:1d:94:87:35:98:cb:8e: 64:5d:09:f1:e5:4d:e5:20:5a:33:98:89:93:82:ce:43: ac:bf:53:b2:d8:32:2b:65:09:e5:a4:a4:14:12:27:12 Fingerprint (SHA-256): 36:10:71:B0:0E:A5:4F:E6:7F:57:4C:57:C0:AC:B6:C7:64:48:E7:90:AE:48:B1:44:C4:5D:B2:CC:E7:65:59:2D Fingerprint (SHA1): E7:6E:A7:FF:BD:0E:11:2F:36:FE:F6:79:1C:7B:E7:B7:58:BB:47:D7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #956: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #957: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #958: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204159 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #959: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #960: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #961: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #962: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 927204160 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #963: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #964: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #965: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #966: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927204161 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #967: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #968: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #969: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #970: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 927204162 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #971: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #972: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #973: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204163 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #974: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #975: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #976: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #977: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 927204164 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #978: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #979: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #980: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #981: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 927204165 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #982: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #983: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #984: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #985: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #986: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204159 (0x3744033f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:46:53 2022 Not After : Tue Sep 27 20:46:53 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:94:b2:a4:74:25:b9:84:c2:cf:96:a3:91:2b:b9:12: 59:2a:e6:8a:11:74:55:68:1e:1b:16:49:f6:5a:10:68: 26:e4:91:3b:38:15:e1:c6:da:dc:cc:e0:88:d0:37:03: 25:90:6b:e7:2e:25:88:d8:62:b7:64:0d:f1:cc:17:10: be:82:19:55:1d:57:4f:4c:59:7a:28:15:ed:26:d6:bf: ee:d9:36:03:3e:c9:4a:88:34:9b:0e:45:53:c7:e5:aa: 57:b9:e0:4d:44:ea:3f:35:98:a0:01:76:c7:54:36:bb: 07:31:8d:e2:a6:ca:0d:11:5e:c5:87:8d:53:3d:35:ee: 78:d9:15:ad:79:f8:91:a5:48:69:8e:0d:75:73:f7:99: 29:5b:43:58:91:d3:96:ab:76:e5:b7:da:a5:88:45:c3: 85:36:0c:cd:c9:46:1d:f8:05:39:77:62:1e:52:08:6e: eb:d2:3e:45:47:7e:69:c8:6a:91:33:df:e1:67:de:75: 38:25:3f:52:3b:5a:c8:e8:35:04:ba:83:f0:74:f1:85: 8f:67:5c:e9:85:98:3b:bc:55:d1:cb:a0:99:eb:28:eb: dd:f1:14:d9:d6:e2:c6:3f:0b:d7:98:52:c9:84:91:d0: 66:08:63:db:5e:c7:03:bf:b6:03:f5:83:17:39:fa:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c2:ca:f0:71:3d:50:36:a9:0a:2b:8f:d7:1a:de:10:f9: 70:a8:bb:34:78:fb:16:5c:58:51:fd:0a:40:e2:4a:70: 8e:f7:78:19:f4:5d:55:aa:89:5c:a7:b0:d7:bd:d3:d4: 79:46:cc:9f:cd:f2:1c:7e:fb:dc:6c:13:d8:4c:18:29: 85:96:10:39:c7:ad:4a:52:77:55:e8:24:be:7e:5d:3f: 92:4c:f2:5b:9d:4a:12:ca:b5:cc:33:a6:c0:a2:ca:65: af:12:37:75:a9:b5:ca:b2:62:bb:98:64:ce:c2:94:10: 3c:47:54:22:0e:36:61:82:0b:91:95:2e:2a:9c:56:48: ff:ee:fd:09:32:91:e1:0b:e1:25:0d:39:3c:f1:ec:d1: 33:7b:77:e9:ae:a2:9e:07:f3:b3:67:80:e2:e6:5d:db: 6c:92:8f:c6:7f:7b:b7:ac:e0:31:22:c4:48:b2:0d:34: dd:ad:df:24:3b:d7:8c:e4:c8:13:2b:2a:e8:42:33:dd: 14:a0:94:97:4d:ab:e4:b3:91:a2:73:10:d8:09:ef:b3: bb:76:8e:80:73:b7:34:21:cc:86:8c:e5:f4:62:8f:f9: c3:84:c4:cb:06:89:ba:55:d5:ae:e2:24:54:d0:c6:f2: 79:9f:7a:60:bc:5f:f3:92:a1:8f:c1:c6:af:6f:1f:6d Fingerprint (SHA-256): A4:5C:10:A2:A2:3A:56:71:51:E0:2A:AC:02:1A:73:47:C2:D9:68:D2:E7:76:79:BF:70:6C:37:9B:0C:D3:1F:05 Fingerprint (SHA1): CC:C7:38:DE:2E:22:E2:62:00:89:98:A9:AA:57:E7:33:36:BB:81:AB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #987: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204161 (0x37440341) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 20:46:58 2022 Not After : Mon Sep 27 20:46:58 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:79:1e:13:e6:de:9d:4d:4b:66:54:97:85:ee:83:71: 7a:7f:0a:c7:86:d9:fd:d4:3e:28:d5:b8:85:54:b8:17: be:66:60:8d:b2:1a:d1:4b:3a:e3:12:3c:ac:6c:a3:62: 6c:69:d0:cd:9f:ea:b9:9f:66:d2:0f:b5:fd:f9:59:a3: 97:6b:39:5c:1d:5a:f6:6c:29:89:cf:72:cf:e9:bb:2d: 90:0a:2c:64:31:a3:0f:ff:e9:33:1f:3c:a3:b0:fc:09: 95:93:63:cb:28:89:8e:03:97:f8:8a:68:62:84:d6:e1: 3d:e0:92:e2:bb:85:b8:36:90:6d:82:f2:3a:e9:ea:e3: f7:01:d1:a3:02:5e:c8:64:ce:ae:a6:72:40:cc:d3:0e: f7:2b:d7:d0:5f:6d:99:2a:96:c2:cb:19:d6:0c:7f:22: 63:ee:88:14:79:fc:cd:15:6f:7d:8f:80:6f:22:aa:b3: f0:7d:1a:15:0b:75:b5:2d:62:e7:ba:c1:bb:ae:67:bc: 94:94:be:fa:48:e2:4b:10:3b:2f:ca:fd:57:ad:a5:bb: 81:4c:1e:3e:3c:68:da:e0:12:de:24:3d:73:4b:89:ca: de:dd:39:b0:a8:d5:0f:ae:6f:6d:4d:97:44:54:28:b6: 9a:5e:3b:ac:85:39:4b:15:51:57:c4:1c:35:de:fb:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:96:d4:91:65:3a:48:f0:92:9d:fc:0a:40:ea:33:30: d0:96:02:cd:d4:db:f0:65:25:9c:b4:69:3e:6a:7b:92: f3:1a:a0:45:fb:c5:37:26:71:bf:d0:7f:29:e8:0d:f0: 2d:90:80:46:2d:e6:ce:f8:eb:3b:8a:6c:0a:13:91:da: d6:48:39:47:71:4a:1e:cc:75:9d:fe:f7:d9:d7:5f:7e: fa:4e:ea:d3:6a:47:a8:12:c5:52:15:2e:cd:d1:d5:70: c6:ae:c8:4c:2b:8a:b6:95:f8:4e:df:8e:10:37:5a:49: 9e:ad:a5:98:eb:eb:09:77:39:3d:04:a7:18:4b:6f:c9: 02:5f:df:74:cd:ba:23:f9:53:a6:60:4f:23:0f:2d:b0: 5b:d5:43:6e:96:35:76:70:52:45:e3:f9:b2:27:b1:97: 49:40:11:16:eb:85:6b:ce:51:74:cb:a2:83:f4:61:07: 49:99:b6:28:77:93:df:0c:00:57:3f:60:30:c4:bd:28: d6:a0:02:41:84:66:4a:62:8d:a5:53:f6:1a:63:8b:8f: 93:bf:78:8e:b6:64:8e:00:27:70:25:20:96:c8:1d:e1: 13:68:3c:91:44:3c:3e:49:fa:37:72:21:e9:dd:33:a4: 98:a8:85:1f:34:6c:7e:d6:63:f6:e1:c4:c4:0a:89:37 Fingerprint (SHA-256): 97:4E:08:82:76:BD:9B:91:36:DE:4F:38:DC:7E:54:6D:DC:F1:CF:B4:30:05:D1:44:C3:F5:2B:07:CE:D8:04:4F Fingerprint (SHA1): 57:B6:62:44:BF:48:63:68:14:37:8F:B6:B9:B2:7B:A9:A5:83:6A:AB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #988: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204159 (0x3744033f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:46:53 2022 Not After : Tue Sep 27 20:46:53 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:94:b2:a4:74:25:b9:84:c2:cf:96:a3:91:2b:b9:12: 59:2a:e6:8a:11:74:55:68:1e:1b:16:49:f6:5a:10:68: 26:e4:91:3b:38:15:e1:c6:da:dc:cc:e0:88:d0:37:03: 25:90:6b:e7:2e:25:88:d8:62:b7:64:0d:f1:cc:17:10: be:82:19:55:1d:57:4f:4c:59:7a:28:15:ed:26:d6:bf: ee:d9:36:03:3e:c9:4a:88:34:9b:0e:45:53:c7:e5:aa: 57:b9:e0:4d:44:ea:3f:35:98:a0:01:76:c7:54:36:bb: 07:31:8d:e2:a6:ca:0d:11:5e:c5:87:8d:53:3d:35:ee: 78:d9:15:ad:79:f8:91:a5:48:69:8e:0d:75:73:f7:99: 29:5b:43:58:91:d3:96:ab:76:e5:b7:da:a5:88:45:c3: 85:36:0c:cd:c9:46:1d:f8:05:39:77:62:1e:52:08:6e: eb:d2:3e:45:47:7e:69:c8:6a:91:33:df:e1:67:de:75: 38:25:3f:52:3b:5a:c8:e8:35:04:ba:83:f0:74:f1:85: 8f:67:5c:e9:85:98:3b:bc:55:d1:cb:a0:99:eb:28:eb: dd:f1:14:d9:d6:e2:c6:3f:0b:d7:98:52:c9:84:91:d0: 66:08:63:db:5e:c7:03:bf:b6:03:f5:83:17:39:fa:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c2:ca:f0:71:3d:50:36:a9:0a:2b:8f:d7:1a:de:10:f9: 70:a8:bb:34:78:fb:16:5c:58:51:fd:0a:40:e2:4a:70: 8e:f7:78:19:f4:5d:55:aa:89:5c:a7:b0:d7:bd:d3:d4: 79:46:cc:9f:cd:f2:1c:7e:fb:dc:6c:13:d8:4c:18:29: 85:96:10:39:c7:ad:4a:52:77:55:e8:24:be:7e:5d:3f: 92:4c:f2:5b:9d:4a:12:ca:b5:cc:33:a6:c0:a2:ca:65: af:12:37:75:a9:b5:ca:b2:62:bb:98:64:ce:c2:94:10: 3c:47:54:22:0e:36:61:82:0b:91:95:2e:2a:9c:56:48: ff:ee:fd:09:32:91:e1:0b:e1:25:0d:39:3c:f1:ec:d1: 33:7b:77:e9:ae:a2:9e:07:f3:b3:67:80:e2:e6:5d:db: 6c:92:8f:c6:7f:7b:b7:ac:e0:31:22:c4:48:b2:0d:34: dd:ad:df:24:3b:d7:8c:e4:c8:13:2b:2a:e8:42:33:dd: 14:a0:94:97:4d:ab:e4:b3:91:a2:73:10:d8:09:ef:b3: bb:76:8e:80:73:b7:34:21:cc:86:8c:e5:f4:62:8f:f9: c3:84:c4:cb:06:89:ba:55:d5:ae:e2:24:54:d0:c6:f2: 79:9f:7a:60:bc:5f:f3:92:a1:8f:c1:c6:af:6f:1f:6d Fingerprint (SHA-256): A4:5C:10:A2:A2:3A:56:71:51:E0:2A:AC:02:1A:73:47:C2:D9:68:D2:E7:76:79:BF:70:6C:37:9B:0C:D3:1F:05 Fingerprint (SHA1): CC:C7:38:DE:2E:22:E2:62:00:89:98:A9:AA:57:E7:33:36:BB:81:AB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #989: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #990: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204159 (0x3744033f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:46:53 2022 Not After : Tue Sep 27 20:46:53 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:94:b2:a4:74:25:b9:84:c2:cf:96:a3:91:2b:b9:12: 59:2a:e6:8a:11:74:55:68:1e:1b:16:49:f6:5a:10:68: 26:e4:91:3b:38:15:e1:c6:da:dc:cc:e0:88:d0:37:03: 25:90:6b:e7:2e:25:88:d8:62:b7:64:0d:f1:cc:17:10: be:82:19:55:1d:57:4f:4c:59:7a:28:15:ed:26:d6:bf: ee:d9:36:03:3e:c9:4a:88:34:9b:0e:45:53:c7:e5:aa: 57:b9:e0:4d:44:ea:3f:35:98:a0:01:76:c7:54:36:bb: 07:31:8d:e2:a6:ca:0d:11:5e:c5:87:8d:53:3d:35:ee: 78:d9:15:ad:79:f8:91:a5:48:69:8e:0d:75:73:f7:99: 29:5b:43:58:91:d3:96:ab:76:e5:b7:da:a5:88:45:c3: 85:36:0c:cd:c9:46:1d:f8:05:39:77:62:1e:52:08:6e: eb:d2:3e:45:47:7e:69:c8:6a:91:33:df:e1:67:de:75: 38:25:3f:52:3b:5a:c8:e8:35:04:ba:83:f0:74:f1:85: 8f:67:5c:e9:85:98:3b:bc:55:d1:cb:a0:99:eb:28:eb: dd:f1:14:d9:d6:e2:c6:3f:0b:d7:98:52:c9:84:91:d0: 66:08:63:db:5e:c7:03:bf:b6:03:f5:83:17:39:fa:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c2:ca:f0:71:3d:50:36:a9:0a:2b:8f:d7:1a:de:10:f9: 70:a8:bb:34:78:fb:16:5c:58:51:fd:0a:40:e2:4a:70: 8e:f7:78:19:f4:5d:55:aa:89:5c:a7:b0:d7:bd:d3:d4: 79:46:cc:9f:cd:f2:1c:7e:fb:dc:6c:13:d8:4c:18:29: 85:96:10:39:c7:ad:4a:52:77:55:e8:24:be:7e:5d:3f: 92:4c:f2:5b:9d:4a:12:ca:b5:cc:33:a6:c0:a2:ca:65: af:12:37:75:a9:b5:ca:b2:62:bb:98:64:ce:c2:94:10: 3c:47:54:22:0e:36:61:82:0b:91:95:2e:2a:9c:56:48: ff:ee:fd:09:32:91:e1:0b:e1:25:0d:39:3c:f1:ec:d1: 33:7b:77:e9:ae:a2:9e:07:f3:b3:67:80:e2:e6:5d:db: 6c:92:8f:c6:7f:7b:b7:ac:e0:31:22:c4:48:b2:0d:34: dd:ad:df:24:3b:d7:8c:e4:c8:13:2b:2a:e8:42:33:dd: 14:a0:94:97:4d:ab:e4:b3:91:a2:73:10:d8:09:ef:b3: bb:76:8e:80:73:b7:34:21:cc:86:8c:e5:f4:62:8f:f9: c3:84:c4:cb:06:89:ba:55:d5:ae:e2:24:54:d0:c6:f2: 79:9f:7a:60:bc:5f:f3:92:a1:8f:c1:c6:af:6f:1f:6d Fingerprint (SHA-256): A4:5C:10:A2:A2:3A:56:71:51:E0:2A:AC:02:1A:73:47:C2:D9:68:D2:E7:76:79:BF:70:6C:37:9B:0C:D3:1F:05 Fingerprint (SHA1): CC:C7:38:DE:2E:22:E2:62:00:89:98:A9:AA:57:E7:33:36:BB:81:AB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #991: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204161 (0x37440341) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 20:46:58 2022 Not After : Mon Sep 27 20:46:58 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:79:1e:13:e6:de:9d:4d:4b:66:54:97:85:ee:83:71: 7a:7f:0a:c7:86:d9:fd:d4:3e:28:d5:b8:85:54:b8:17: be:66:60:8d:b2:1a:d1:4b:3a:e3:12:3c:ac:6c:a3:62: 6c:69:d0:cd:9f:ea:b9:9f:66:d2:0f:b5:fd:f9:59:a3: 97:6b:39:5c:1d:5a:f6:6c:29:89:cf:72:cf:e9:bb:2d: 90:0a:2c:64:31:a3:0f:ff:e9:33:1f:3c:a3:b0:fc:09: 95:93:63:cb:28:89:8e:03:97:f8:8a:68:62:84:d6:e1: 3d:e0:92:e2:bb:85:b8:36:90:6d:82:f2:3a:e9:ea:e3: f7:01:d1:a3:02:5e:c8:64:ce:ae:a6:72:40:cc:d3:0e: f7:2b:d7:d0:5f:6d:99:2a:96:c2:cb:19:d6:0c:7f:22: 63:ee:88:14:79:fc:cd:15:6f:7d:8f:80:6f:22:aa:b3: f0:7d:1a:15:0b:75:b5:2d:62:e7:ba:c1:bb:ae:67:bc: 94:94:be:fa:48:e2:4b:10:3b:2f:ca:fd:57:ad:a5:bb: 81:4c:1e:3e:3c:68:da:e0:12:de:24:3d:73:4b:89:ca: de:dd:39:b0:a8:d5:0f:ae:6f:6d:4d:97:44:54:28:b6: 9a:5e:3b:ac:85:39:4b:15:51:57:c4:1c:35:de:fb:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:96:d4:91:65:3a:48:f0:92:9d:fc:0a:40:ea:33:30: d0:96:02:cd:d4:db:f0:65:25:9c:b4:69:3e:6a:7b:92: f3:1a:a0:45:fb:c5:37:26:71:bf:d0:7f:29:e8:0d:f0: 2d:90:80:46:2d:e6:ce:f8:eb:3b:8a:6c:0a:13:91:da: d6:48:39:47:71:4a:1e:cc:75:9d:fe:f7:d9:d7:5f:7e: fa:4e:ea:d3:6a:47:a8:12:c5:52:15:2e:cd:d1:d5:70: c6:ae:c8:4c:2b:8a:b6:95:f8:4e:df:8e:10:37:5a:49: 9e:ad:a5:98:eb:eb:09:77:39:3d:04:a7:18:4b:6f:c9: 02:5f:df:74:cd:ba:23:f9:53:a6:60:4f:23:0f:2d:b0: 5b:d5:43:6e:96:35:76:70:52:45:e3:f9:b2:27:b1:97: 49:40:11:16:eb:85:6b:ce:51:74:cb:a2:83:f4:61:07: 49:99:b6:28:77:93:df:0c:00:57:3f:60:30:c4:bd:28: d6:a0:02:41:84:66:4a:62:8d:a5:53:f6:1a:63:8b:8f: 93:bf:78:8e:b6:64:8e:00:27:70:25:20:96:c8:1d:e1: 13:68:3c:91:44:3c:3e:49:fa:37:72:21:e9:dd:33:a4: 98:a8:85:1f:34:6c:7e:d6:63:f6:e1:c4:c4:0a:89:37 Fingerprint (SHA-256): 97:4E:08:82:76:BD:9B:91:36:DE:4F:38:DC:7E:54:6D:DC:F1:CF:B4:30:05:D1:44:C3:F5:2B:07:CE:D8:04:4F Fingerprint (SHA1): 57:B6:62:44:BF:48:63:68:14:37:8F:B6:B9:B2:7B:A9:A5:83:6A:AB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #992: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #993: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #994: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #995: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204159 (0x3744033f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:46:53 2022 Not After : Tue Sep 27 20:46:53 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:94:b2:a4:74:25:b9:84:c2:cf:96:a3:91:2b:b9:12: 59:2a:e6:8a:11:74:55:68:1e:1b:16:49:f6:5a:10:68: 26:e4:91:3b:38:15:e1:c6:da:dc:cc:e0:88:d0:37:03: 25:90:6b:e7:2e:25:88:d8:62:b7:64:0d:f1:cc:17:10: be:82:19:55:1d:57:4f:4c:59:7a:28:15:ed:26:d6:bf: ee:d9:36:03:3e:c9:4a:88:34:9b:0e:45:53:c7:e5:aa: 57:b9:e0:4d:44:ea:3f:35:98:a0:01:76:c7:54:36:bb: 07:31:8d:e2:a6:ca:0d:11:5e:c5:87:8d:53:3d:35:ee: 78:d9:15:ad:79:f8:91:a5:48:69:8e:0d:75:73:f7:99: 29:5b:43:58:91:d3:96:ab:76:e5:b7:da:a5:88:45:c3: 85:36:0c:cd:c9:46:1d:f8:05:39:77:62:1e:52:08:6e: eb:d2:3e:45:47:7e:69:c8:6a:91:33:df:e1:67:de:75: 38:25:3f:52:3b:5a:c8:e8:35:04:ba:83:f0:74:f1:85: 8f:67:5c:e9:85:98:3b:bc:55:d1:cb:a0:99:eb:28:eb: dd:f1:14:d9:d6:e2:c6:3f:0b:d7:98:52:c9:84:91:d0: 66:08:63:db:5e:c7:03:bf:b6:03:f5:83:17:39:fa:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c2:ca:f0:71:3d:50:36:a9:0a:2b:8f:d7:1a:de:10:f9: 70:a8:bb:34:78:fb:16:5c:58:51:fd:0a:40:e2:4a:70: 8e:f7:78:19:f4:5d:55:aa:89:5c:a7:b0:d7:bd:d3:d4: 79:46:cc:9f:cd:f2:1c:7e:fb:dc:6c:13:d8:4c:18:29: 85:96:10:39:c7:ad:4a:52:77:55:e8:24:be:7e:5d:3f: 92:4c:f2:5b:9d:4a:12:ca:b5:cc:33:a6:c0:a2:ca:65: af:12:37:75:a9:b5:ca:b2:62:bb:98:64:ce:c2:94:10: 3c:47:54:22:0e:36:61:82:0b:91:95:2e:2a:9c:56:48: ff:ee:fd:09:32:91:e1:0b:e1:25:0d:39:3c:f1:ec:d1: 33:7b:77:e9:ae:a2:9e:07:f3:b3:67:80:e2:e6:5d:db: 6c:92:8f:c6:7f:7b:b7:ac:e0:31:22:c4:48:b2:0d:34: dd:ad:df:24:3b:d7:8c:e4:c8:13:2b:2a:e8:42:33:dd: 14:a0:94:97:4d:ab:e4:b3:91:a2:73:10:d8:09:ef:b3: bb:76:8e:80:73:b7:34:21:cc:86:8c:e5:f4:62:8f:f9: c3:84:c4:cb:06:89:ba:55:d5:ae:e2:24:54:d0:c6:f2: 79:9f:7a:60:bc:5f:f3:92:a1:8f:c1:c6:af:6f:1f:6d Fingerprint (SHA-256): A4:5C:10:A2:A2:3A:56:71:51:E0:2A:AC:02:1A:73:47:C2:D9:68:D2:E7:76:79:BF:70:6C:37:9B:0C:D3:1F:05 Fingerprint (SHA1): CC:C7:38:DE:2E:22:E2:62:00:89:98:A9:AA:57:E7:33:36:BB:81:AB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #996: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204163 (0x37440343) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Tue Sep 27 20:47:01 2022 Not After : Tue Sep 27 20:47:01 2072 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:27:15:e4:21:75:6e:71:89:fc:bf:d4:1c:21:73:69: d7:e8:f4:ee:2c:72:5b:80:3a:5b:ba:ea:d2:cd:1c:7a: ae:8f:2c:4e:de:f0:da:9a:8a:36:eb:e0:e4:70:a3:12: 5b:d7:8d:0f:cf:37:2c:e9:5a:70:a0:2f:bc:07:d4:11: df:67:5c:cb:f2:20:3c:ff:f0:82:16:26:71:dc:9d:3f: bc:f9:c2:98:d8:9c:2d:ff:a8:d4:b5:c5:cd:11:73:54: de:8b:7f:f4:92:5a:88:67:a8:4a:3b:f6:cb:76:d5:e1: 06:5e:4c:5b:15:04:96:d0:5d:72:b2:a2:1c:1b:24:cd: 7d:b5:da:94:3f:7f:da:37:5c:14:45:13:39:91:5a:01: af:25:c0:0e:c6:f7:ba:e3:0a:75:31:0c:40:e9:51:7c: 7b:d6:8b:90:6d:96:4f:87:e0:46:1e:0c:92:0b:f4:1a: 81:cc:08:66:8c:d0:b9:18:83:92:67:53:eb:c8:4a:55: b4:c5:31:5f:4b:e8:79:aa:ca:df:3e:c6:da:7a:88:1c: 0a:ab:a0:a9:f2:4c:48:05:e3:72:f0:da:18:9d:b4:aa: 74:6b:77:fc:58:e3:2c:3a:fa:45:6e:ab:b4:07:f9:c7: e2:ff:86:6f:c5:01:dc:04:50:97:46:92:67:cf:b1:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:6a:e2:5b:9b:54:a8:b0:6c:ae:91:2b:4a:98:11:1f: 55:59:18:0d:90:bd:21:72:4e:47:ee:a9:44:e8:1b:a4: db:7d:f3:45:d1:1d:b6:8a:df:da:4d:d6:01:07:af:46: fe:12:68:b8:ad:fb:c9:1c:a6:e1:21:3d:a6:45:ec:42: 81:cd:55:bb:7b:ec:28:fa:98:d7:bf:4f:11:b5:9b:49: 95:47:55:80:61:dc:42:0b:1a:97:4a:32:ef:bd:ae:49: 33:f0:fc:7c:c1:b9:4e:15:10:cb:7d:46:06:10:42:3f: 91:2b:f9:3b:0a:85:5a:c1:a2:37:50:4c:86:55:56:1f: 4e:ea:a7:ae:ef:56:24:3f:d7:d6:9b:65:35:d9:f7:89: 66:d8:36:37:ec:cf:c8:cc:94:48:a6:c3:da:f0:3f:bc: 19:e1:60:2e:d9:9f:72:7e:76:25:65:91:f3:94:e8:15: 25:4c:ac:d2:ac:c7:58:4a:95:e6:58:c1:89:40:6a:75: 84:35:68:f6:fd:0e:15:78:8d:70:13:a4:30:8a:ce:6a: 6c:91:e1:63:fa:9f:c2:c1:d8:63:07:36:3d:39:9e:9e: 83:64:08:89:a1:c8:3d:10:61:c6:ee:d1:06:45:f4:ce: 4b:dd:dd:9b:23:86:ab:fa:4d:c8:d9:a2:62:eb:df:25 Fingerprint (SHA-256): F7:7F:40:49:FB:46:71:82:83:FA:CD:9D:51:EE:15:92:DF:10:3A:2A:27:9F:51:8E:CF:AE:57:05:D5:E4:23:6E Fingerprint (SHA1): CF:BC:61:C8:AA:9C:B3:C7:37:21:F0:BD:35:80:0B:8F:C2:72:00:22 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #997: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204159 (0x3744033f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:46:53 2022 Not After : Tue Sep 27 20:46:53 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:94:b2:a4:74:25:b9:84:c2:cf:96:a3:91:2b:b9:12: 59:2a:e6:8a:11:74:55:68:1e:1b:16:49:f6:5a:10:68: 26:e4:91:3b:38:15:e1:c6:da:dc:cc:e0:88:d0:37:03: 25:90:6b:e7:2e:25:88:d8:62:b7:64:0d:f1:cc:17:10: be:82:19:55:1d:57:4f:4c:59:7a:28:15:ed:26:d6:bf: ee:d9:36:03:3e:c9:4a:88:34:9b:0e:45:53:c7:e5:aa: 57:b9:e0:4d:44:ea:3f:35:98:a0:01:76:c7:54:36:bb: 07:31:8d:e2:a6:ca:0d:11:5e:c5:87:8d:53:3d:35:ee: 78:d9:15:ad:79:f8:91:a5:48:69:8e:0d:75:73:f7:99: 29:5b:43:58:91:d3:96:ab:76:e5:b7:da:a5:88:45:c3: 85:36:0c:cd:c9:46:1d:f8:05:39:77:62:1e:52:08:6e: eb:d2:3e:45:47:7e:69:c8:6a:91:33:df:e1:67:de:75: 38:25:3f:52:3b:5a:c8:e8:35:04:ba:83:f0:74:f1:85: 8f:67:5c:e9:85:98:3b:bc:55:d1:cb:a0:99:eb:28:eb: dd:f1:14:d9:d6:e2:c6:3f:0b:d7:98:52:c9:84:91:d0: 66:08:63:db:5e:c7:03:bf:b6:03:f5:83:17:39:fa:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c2:ca:f0:71:3d:50:36:a9:0a:2b:8f:d7:1a:de:10:f9: 70:a8:bb:34:78:fb:16:5c:58:51:fd:0a:40:e2:4a:70: 8e:f7:78:19:f4:5d:55:aa:89:5c:a7:b0:d7:bd:d3:d4: 79:46:cc:9f:cd:f2:1c:7e:fb:dc:6c:13:d8:4c:18:29: 85:96:10:39:c7:ad:4a:52:77:55:e8:24:be:7e:5d:3f: 92:4c:f2:5b:9d:4a:12:ca:b5:cc:33:a6:c0:a2:ca:65: af:12:37:75:a9:b5:ca:b2:62:bb:98:64:ce:c2:94:10: 3c:47:54:22:0e:36:61:82:0b:91:95:2e:2a:9c:56:48: ff:ee:fd:09:32:91:e1:0b:e1:25:0d:39:3c:f1:ec:d1: 33:7b:77:e9:ae:a2:9e:07:f3:b3:67:80:e2:e6:5d:db: 6c:92:8f:c6:7f:7b:b7:ac:e0:31:22:c4:48:b2:0d:34: dd:ad:df:24:3b:d7:8c:e4:c8:13:2b:2a:e8:42:33:dd: 14:a0:94:97:4d:ab:e4:b3:91:a2:73:10:d8:09:ef:b3: bb:76:8e:80:73:b7:34:21:cc:86:8c:e5:f4:62:8f:f9: c3:84:c4:cb:06:89:ba:55:d5:ae:e2:24:54:d0:c6:f2: 79:9f:7a:60:bc:5f:f3:92:a1:8f:c1:c6:af:6f:1f:6d Fingerprint (SHA-256): A4:5C:10:A2:A2:3A:56:71:51:E0:2A:AC:02:1A:73:47:C2:D9:68:D2:E7:76:79:BF:70:6C:37:9B:0C:D3:1F:05 Fingerprint (SHA1): CC:C7:38:DE:2E:22:E2:62:00:89:98:A9:AA:57:E7:33:36:BB:81:AB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #998: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #999: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1000: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1001: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1002: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1003: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204164 (0x37440344) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Tue Sep 27 20:47:04 2022 Not After : Mon Sep 27 20:47:04 2027 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:9a:ed:c6:62:1c:39:0b:40:54:06:8e:39:0c:6e:eb: 57:2a:df:36:92:a3:e0:5f:c4:51:d9:12:10:d8:76:8d: 85:c2:75:e5:b9:5d:ff:32:f3:03:74:96:6b:02:ad:3f: 1f:9c:db:e8:4c:7e:52:e0:a6:82:31:95:b2:5f:56:64: bb:0d:79:fd:c9:9e:4f:7c:89:05:bc:dd:af:8d:cf:09: 1f:de:b6:92:4a:9f:be:7e:50:d1:71:cc:8e:d4:88:08: 4b:b8:4e:87:7a:a5:ad:9a:2f:4c:60:b2:65:12:2d:7a: e6:49:ee:05:0b:1c:1a:66:ae:8d:9a:9e:f8:28:66:79: 58:25:41:47:a5:a2:25:cf:3e:a3:03:0f:30:3b:15:69: ba:9b:de:fc:0f:7a:5c:87:23:e7:10:60:40:8f:a6:29: 2b:4a:73:b9:7d:29:0e:30:82:bd:46:dc:50:c4:ba:92: 60:f7:12:14:8c:ad:c2:2a:62:4f:e8:ea:6d:af:b9:a4: bc:27:94:6e:b7:ac:b8:07:d9:fb:39:dd:40:d9:cf:e6: d7:42:36:3b:1a:8e:b5:ca:7c:55:15:ec:09:8f:95:29: ca:24:32:08:5e:06:05:72:11:6c:cb:76:b3:3d:78:61: 78:20:2e:99:91:59:b2:74:7a:b7:59:cc:e2:58:a4:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:33:09:92:c4:bd:06:9b:a3:8c:34:d0:1f:d4:a6:7e: 88:df:84:41:a3:5f:db:0f:00:f0:0f:bd:9a:75:1f:e7: 49:24:3f:0f:a5:2b:ca:9f:55:26:98:e6:39:c0:ee:b7: 50:14:ce:ed:da:39:1b:14:66:2e:40:66:e6:36:86:ac: c1:e4:fc:33:ae:42:23:d5:ae:d4:ee:33:26:d9:ef:6e: c1:a4:54:39:d7:24:07:77:2c:dc:13:11:bc:84:88:de: 0c:2a:9a:41:57:1f:7e:ef:cc:72:80:59:6d:85:38:48: 9b:f5:b5:0b:2a:37:19:c1:63:24:53:d2:fb:d3:97:26: 61:bc:7d:b3:4b:3c:fd:34:b7:c3:5c:e8:ab:d3:c3:66: d5:c8:6e:4f:ad:f5:21:92:3c:28:04:f7:74:c9:0e:d5: b7:d2:52:cb:ba:24:51:30:62:68:17:2c:69:53:f1:4a: ac:4e:29:61:87:7c:f2:8d:88:72:2a:c4:ae:b3:b3:6d: d9:72:22:d8:30:18:84:b1:52:fe:eb:07:1b:14:c1:de: 7d:ad:65:b6:f1:7c:68:d1:d7:1a:93:be:98:90:8a:43: 18:6e:f0:32:3b:f1:43:59:71:32:e7:f7:f1:99:e9:a8: 54:32:3f:29:73:de:49:83:be:87:3b:ca:21:c0:6a:ce Fingerprint (SHA-256): 6C:0D:3E:B5:9C:F5:A7:A9:49:C6:56:5A:89:C3:43:9A:71:9F:C3:81:9C:DE:F1:B5:68:5B:72:D4:80:70:B7:27 Fingerprint (SHA1): C1:8F:38:11:DA:B5:53:75:8F:0F:5B:AB:1C:CF:C1:25:29:48:A8:66 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1004: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1005: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1006: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1007: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1008: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1009: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1010: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1011: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1012: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1013: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1014: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1015: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1016: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1017: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1018: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1019: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1020: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1021: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1022: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1023: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1024: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1025: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1026: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1027: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1028: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1029: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 32360 at Tue Sep 27 20:47:18 UTC 2022 kill -USR1 32360 httpserv: normal termination httpserv -b -p 9233 2>/dev/null; httpserv with PID 32360 killed at Tue Sep 27 20:47:18 UTC 2022 httpserv starting at Tue Sep 27 20:47:18 UTC 2022 httpserv -D -p 9233 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/aiahttp/http_pid.3122 & trying to connect to httpserv at Tue Sep 27 20:47:18 UTC 2022 tstclnt -4 -p 9233 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9233 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 44735 >/dev/null 2>/dev/null httpserv with PID 44735 found at Tue Sep 27 20:47:19 UTC 2022 httpserv with PID 44735 started at Tue Sep 27 20:47:19 UTC 2022 chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 vfychain -d trustanchorsDB -pp -vv -u 12 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1030: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1031: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204166 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1032: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1033: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1034: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204167 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1035: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1036: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1037: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1038: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 927204168 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1039: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1040: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 927204169 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1041: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1042: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1043: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1044: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1045: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 927204170 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1046: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1047: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1048: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #1049: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #1050: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204167 (0x37440347) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 20:47:22 2022 Not After : Tue Sep 27 20:47:22 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:c3:b9:ca:f6:dd:f9:6e:46:89:0a:db:d8:57:aa:d3: 12:72:ff:c9:1e:c9:c2:0a:b2:fe:5a:65:1f:f9:78:3c: 98:93:4a:89:cc:14:eb:7e:e4:1d:77:da:93:7c:28:56: 4e:f7:a8:6f:cd:f7:55:b9:d8:26:8d:1b:62:e1:3c:3e: 47:e1:1b:2f:94:9b:b8:ba:96:18:86:27:15:7a:e8:04: 94:64:cc:b4:a7:35:91:bf:87:12:01:fa:34:0b:8b:d3: dd:3d:31:cd:91:75:98:99:44:5f:72:52:5d:a9:43:d5: 9e:00:a7:b2:1d:66:f1:7b:51:b1:a4:a0:fd:2f:9d:ff: 34:77:b4:f4:fa:43:2f:ff:b9:5d:3a:eb:82:d3:fe:4d: d9:05:1d:f4:d9:36:f3:cc:21:00:86:24:24:ba:6b:9f: fd:3d:74:90:21:1f:fb:99:2d:24:bd:07:a2:8f:52:c1: 52:ac:08:ae:00:45:2e:fb:c6:1c:d6:78:07:3a:4d:60: db:e2:99:32:91:94:2f:b5:88:8b:c6:b3:04:45:06:c0: 2f:5a:8e:03:00:ce:f9:2c:a4:f7:3b:0c:f8:5c:67:e0: 8e:d4:c1:b7:45:2e:56:fd:54:4e:05:4d:21:a9:a8:30: e4:01:dc:d4:07:20:59:f4:8e:98:c5:ba:9b:40:5f:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:5f:bb:b8:ca:b7:c9:2b:dd:14:8f:e3:5c:dd:84:a1: 38:d9:45:5b:70:9f:2e:51:5b:2c:3f:ff:aa:19:ee:ea: ad:91:32:d5:f0:50:80:19:96:31:ac:30:c3:25:e4:06: 3f:7c:38:28:49:00:90:76:72:3a:32:a9:32:ad:78:82: 43:a8:fa:8c:bc:0e:3b:b2:84:df:75:91:a9:85:ef:e5: a0:4e:02:4e:bc:d5:61:44:f0:3d:36:d4:5d:a8:96:35: 1b:8a:66:5e:c8:f7:e4:be:a6:e6:ca:ae:7d:5f:db:92: 01:6f:bc:e2:d3:46:70:d2:cd:d4:15:15:1c:2b:2d:be: b3:3b:4e:fd:38:1d:27:18:21:15:c3:b4:be:19:8d:1e: b5:71:52:5e:c5:9f:2c:87:5f:73:af:14:19:fd:fc:22: 22:bb:f3:d3:af:f6:e2:2f:51:33:d0:0d:88:fa:3a:18: 10:f7:5f:6a:6e:70:6f:06:fd:77:06:ce:57:64:d5:f2: 3b:4d:bc:b2:1d:19:16:85:8c:34:9e:e7:f6:4c:b6:73: 55:b6:d7:12:ab:7c:28:45:0b:7a:a2:0c:aa:0b:7c:14: ac:ee:0f:d2:6d:7a:29:7c:25:5d:7f:d3:25:d1:71:34: c4:f3:04:62:9e:48:11:97:6c:c7:65:35:ff:9e:10:4d Fingerprint (SHA-256): 0D:60:3B:25:DE:9E:46:A8:3D:B2:1D:17:FA:2F:AB:7B:4A:70:C3:AD:96:01:65:C2:49:86:43:B7:60:18:3D:9E Fingerprint (SHA1): A9:85:26:8C:62:74:97:D2:79:F1:B1:BF:90:47:D8:F1:F9:EB:EC:07 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1051: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204166 (0x37440346) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 20:47:20 2022 Not After : Tue Sep 27 20:47:20 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:53:d2:ec:10:84:01:4c:4c:14:e0:d3:9c:3a:f1:70: 70:d2:4f:99:3d:19:57:dd:f7:01:a6:aa:ac:85:b4:2a: 0d:51:79:6e:d6:a9:da:59:9f:1f:c6:f6:38:41:0a:83: fb:49:4b:42:80:5e:b5:3c:8f:55:8a:d9:dd:a8:dc:c1: 2a:88:7d:79:dc:88:33:46:5e:b4:85:e5:0b:86:42:34: ce:b7:8c:14:7b:2e:4d:ab:2b:2d:47:81:17:a5:fe:51: 1f:6c:41:2e:ed:a3:c3:59:4c:a2:a1:8b:02:f9:2f:25: 67:48:85:54:89:1a:00:44:39:04:83:ed:2b:9e:75:7d: 8a:78:fb:06:2b:26:d6:b5:59:80:58:34:f5:7f:c1:a7: 0d:f7:39:c6:f4:42:2f:00:b7:3a:25:e8:c8:f9:4b:89: ac:05:93:81:73:d0:fd:cd:12:ee:08:cb:b5:72:a3:b9: bb:58:63:0f:9c:54:30:ed:20:0f:d6:13:64:56:1c:d3: 3e:c9:7d:8e:49:81:d0:7a:3f:d3:df:f3:3f:14:09:74: 04:78:b7:64:86:33:71:ff:d3:95:db:5c:56:7f:3c:ec: 95:f8:02:60:a6:22:b9:01:44:ca:02:82:1e:1c:cd:8d: dc:88:c6:fa:6d:e6:de:ff:35:eb:46:59:eb:ee:c6:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:f0:4a:21:db:06:18:ef:f7:4c:6b:b6:90:0e:b7:bd: 39:18:e3:f4:da:b6:75:03:60:2c:44:a0:04:26:51:d5: 77:4c:0d:36:2f:f8:cc:1a:96:3f:9a:2e:00:eb:01:f2: 2d:3d:56:69:21:53:c2:e5:c4:cd:41:f3:b6:d6:2a:ee: 3b:8e:af:d4:13:60:96:0f:c7:de:ea:82:00:23:53:ed: be:fc:ca:65:45:d2:52:d1:27:ff:3f:b1:3a:7f:c5:a2: a1:d9:c9:4f:d9:2f:83:4a:19:9b:54:0e:a8:9b:83:5f: 29:ee:71:0b:43:0d:ad:1b:22:f2:4e:1a:73:01:2c:48: 0b:b5:2c:43:48:08:1b:7e:1a:0f:02:76:72:31:47:e3: 11:be:39:cf:06:9c:19:e7:d0:fe:b1:40:99:0f:25:bd: db:6d:30:fc:29:4b:04:37:d5:7e:6a:e6:16:b7:7f:68: 5c:45:54:96:88:ce:08:27:c9:ff:f9:73:e8:15:9c:61: 1a:fe:08:d4:02:0a:a1:d0:64:b3:27:2b:bc:cb:a5:b2: 91:bf:8c:50:97:7f:cb:a2:50:fe:46:b5:e6:28:f6:8a: c1:f7:b8:88:d9:ef:0f:d2:f6:78:aa:c9:c4:19:5a:96: 75:1e:94:c0:c9:28:38:d3:29:8f:8d:3c:64:0b:bf:23 Fingerprint (SHA-256): 4D:4B:B2:2B:9B:4E:73:91:C8:16:F1:E1:08:A8:65:A6:9C:24:F0:5F:32:B5:47:DC:98:2F:3D:B3:DD:8F:AE:51 Fingerprint (SHA1): 36:28:94:B1:A2:BC:AC:CB:84:B7:20:9B:91:82:6F:2E:99:F6:EF:18 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1052: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1053: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #1054: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #1055: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204166 (0x37440346) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 20:47:20 2022 Not After : Tue Sep 27 20:47:20 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:53:d2:ec:10:84:01:4c:4c:14:e0:d3:9c:3a:f1:70: 70:d2:4f:99:3d:19:57:dd:f7:01:a6:aa:ac:85:b4:2a: 0d:51:79:6e:d6:a9:da:59:9f:1f:c6:f6:38:41:0a:83: fb:49:4b:42:80:5e:b5:3c:8f:55:8a:d9:dd:a8:dc:c1: 2a:88:7d:79:dc:88:33:46:5e:b4:85:e5:0b:86:42:34: ce:b7:8c:14:7b:2e:4d:ab:2b:2d:47:81:17:a5:fe:51: 1f:6c:41:2e:ed:a3:c3:59:4c:a2:a1:8b:02:f9:2f:25: 67:48:85:54:89:1a:00:44:39:04:83:ed:2b:9e:75:7d: 8a:78:fb:06:2b:26:d6:b5:59:80:58:34:f5:7f:c1:a7: 0d:f7:39:c6:f4:42:2f:00:b7:3a:25:e8:c8:f9:4b:89: ac:05:93:81:73:d0:fd:cd:12:ee:08:cb:b5:72:a3:b9: bb:58:63:0f:9c:54:30:ed:20:0f:d6:13:64:56:1c:d3: 3e:c9:7d:8e:49:81:d0:7a:3f:d3:df:f3:3f:14:09:74: 04:78:b7:64:86:33:71:ff:d3:95:db:5c:56:7f:3c:ec: 95:f8:02:60:a6:22:b9:01:44:ca:02:82:1e:1c:cd:8d: dc:88:c6:fa:6d:e6:de:ff:35:eb:46:59:eb:ee:c6:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:f0:4a:21:db:06:18:ef:f7:4c:6b:b6:90:0e:b7:bd: 39:18:e3:f4:da:b6:75:03:60:2c:44:a0:04:26:51:d5: 77:4c:0d:36:2f:f8:cc:1a:96:3f:9a:2e:00:eb:01:f2: 2d:3d:56:69:21:53:c2:e5:c4:cd:41:f3:b6:d6:2a:ee: 3b:8e:af:d4:13:60:96:0f:c7:de:ea:82:00:23:53:ed: be:fc:ca:65:45:d2:52:d1:27:ff:3f:b1:3a:7f:c5:a2: a1:d9:c9:4f:d9:2f:83:4a:19:9b:54:0e:a8:9b:83:5f: 29:ee:71:0b:43:0d:ad:1b:22:f2:4e:1a:73:01:2c:48: 0b:b5:2c:43:48:08:1b:7e:1a:0f:02:76:72:31:47:e3: 11:be:39:cf:06:9c:19:e7:d0:fe:b1:40:99:0f:25:bd: db:6d:30:fc:29:4b:04:37:d5:7e:6a:e6:16:b7:7f:68: 5c:45:54:96:88:ce:08:27:c9:ff:f9:73:e8:15:9c:61: 1a:fe:08:d4:02:0a:a1:d0:64:b3:27:2b:bc:cb:a5:b2: 91:bf:8c:50:97:7f:cb:a2:50:fe:46:b5:e6:28:f6:8a: c1:f7:b8:88:d9:ef:0f:d2:f6:78:aa:c9:c4:19:5a:96: 75:1e:94:c0:c9:28:38:d3:29:8f:8d:3c:64:0b:bf:23 Fingerprint (SHA-256): 4D:4B:B2:2B:9B:4E:73:91:C8:16:F1:E1:08:A8:65:A6:9C:24:F0:5F:32:B5:47:DC:98:2F:3D:B3:DD:8F:AE:51 Fingerprint (SHA1): 36:28:94:B1:A2:BC:AC:CB:84:B7:20:9B:91:82:6F:2E:99:F6:EF:18 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1056: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204167 (0x37440347) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 20:47:22 2022 Not After : Tue Sep 27 20:47:22 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:c3:b9:ca:f6:dd:f9:6e:46:89:0a:db:d8:57:aa:d3: 12:72:ff:c9:1e:c9:c2:0a:b2:fe:5a:65:1f:f9:78:3c: 98:93:4a:89:cc:14:eb:7e:e4:1d:77:da:93:7c:28:56: 4e:f7:a8:6f:cd:f7:55:b9:d8:26:8d:1b:62:e1:3c:3e: 47:e1:1b:2f:94:9b:b8:ba:96:18:86:27:15:7a:e8:04: 94:64:cc:b4:a7:35:91:bf:87:12:01:fa:34:0b:8b:d3: dd:3d:31:cd:91:75:98:99:44:5f:72:52:5d:a9:43:d5: 9e:00:a7:b2:1d:66:f1:7b:51:b1:a4:a0:fd:2f:9d:ff: 34:77:b4:f4:fa:43:2f:ff:b9:5d:3a:eb:82:d3:fe:4d: d9:05:1d:f4:d9:36:f3:cc:21:00:86:24:24:ba:6b:9f: fd:3d:74:90:21:1f:fb:99:2d:24:bd:07:a2:8f:52:c1: 52:ac:08:ae:00:45:2e:fb:c6:1c:d6:78:07:3a:4d:60: db:e2:99:32:91:94:2f:b5:88:8b:c6:b3:04:45:06:c0: 2f:5a:8e:03:00:ce:f9:2c:a4:f7:3b:0c:f8:5c:67:e0: 8e:d4:c1:b7:45:2e:56:fd:54:4e:05:4d:21:a9:a8:30: e4:01:dc:d4:07:20:59:f4:8e:98:c5:ba:9b:40:5f:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:5f:bb:b8:ca:b7:c9:2b:dd:14:8f:e3:5c:dd:84:a1: 38:d9:45:5b:70:9f:2e:51:5b:2c:3f:ff:aa:19:ee:ea: ad:91:32:d5:f0:50:80:19:96:31:ac:30:c3:25:e4:06: 3f:7c:38:28:49:00:90:76:72:3a:32:a9:32:ad:78:82: 43:a8:fa:8c:bc:0e:3b:b2:84:df:75:91:a9:85:ef:e5: a0:4e:02:4e:bc:d5:61:44:f0:3d:36:d4:5d:a8:96:35: 1b:8a:66:5e:c8:f7:e4:be:a6:e6:ca:ae:7d:5f:db:92: 01:6f:bc:e2:d3:46:70:d2:cd:d4:15:15:1c:2b:2d:be: b3:3b:4e:fd:38:1d:27:18:21:15:c3:b4:be:19:8d:1e: b5:71:52:5e:c5:9f:2c:87:5f:73:af:14:19:fd:fc:22: 22:bb:f3:d3:af:f6:e2:2f:51:33:d0:0d:88:fa:3a:18: 10:f7:5f:6a:6e:70:6f:06:fd:77:06:ce:57:64:d5:f2: 3b:4d:bc:b2:1d:19:16:85:8c:34:9e:e7:f6:4c:b6:73: 55:b6:d7:12:ab:7c:28:45:0b:7a:a2:0c:aa:0b:7c:14: ac:ee:0f:d2:6d:7a:29:7c:25:5d:7f:d3:25:d1:71:34: c4:f3:04:62:9e:48:11:97:6c:c7:65:35:ff:9e:10:4d Fingerprint (SHA-256): 0D:60:3B:25:DE:9E:46:A8:3D:B2:1D:17:FA:2F:AB:7B:4A:70:C3:AD:96:01:65:C2:49:86:43:B7:60:18:3D:9E Fingerprint (SHA1): A9:85:26:8C:62:74:97:D2:79:F1:B1:BF:90:47:D8:F1:F9:EB:EC:07 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1057: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #1058: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #1059: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1060: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1061: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1062: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204167 (0x37440347) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 20:47:22 2022 Not After : Tue Sep 27 20:47:22 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:c3:b9:ca:f6:dd:f9:6e:46:89:0a:db:d8:57:aa:d3: 12:72:ff:c9:1e:c9:c2:0a:b2:fe:5a:65:1f:f9:78:3c: 98:93:4a:89:cc:14:eb:7e:e4:1d:77:da:93:7c:28:56: 4e:f7:a8:6f:cd:f7:55:b9:d8:26:8d:1b:62:e1:3c:3e: 47:e1:1b:2f:94:9b:b8:ba:96:18:86:27:15:7a:e8:04: 94:64:cc:b4:a7:35:91:bf:87:12:01:fa:34:0b:8b:d3: dd:3d:31:cd:91:75:98:99:44:5f:72:52:5d:a9:43:d5: 9e:00:a7:b2:1d:66:f1:7b:51:b1:a4:a0:fd:2f:9d:ff: 34:77:b4:f4:fa:43:2f:ff:b9:5d:3a:eb:82:d3:fe:4d: d9:05:1d:f4:d9:36:f3:cc:21:00:86:24:24:ba:6b:9f: fd:3d:74:90:21:1f:fb:99:2d:24:bd:07:a2:8f:52:c1: 52:ac:08:ae:00:45:2e:fb:c6:1c:d6:78:07:3a:4d:60: db:e2:99:32:91:94:2f:b5:88:8b:c6:b3:04:45:06:c0: 2f:5a:8e:03:00:ce:f9:2c:a4:f7:3b:0c:f8:5c:67:e0: 8e:d4:c1:b7:45:2e:56:fd:54:4e:05:4d:21:a9:a8:30: e4:01:dc:d4:07:20:59:f4:8e:98:c5:ba:9b:40:5f:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:5f:bb:b8:ca:b7:c9:2b:dd:14:8f:e3:5c:dd:84:a1: 38:d9:45:5b:70:9f:2e:51:5b:2c:3f:ff:aa:19:ee:ea: ad:91:32:d5:f0:50:80:19:96:31:ac:30:c3:25:e4:06: 3f:7c:38:28:49:00:90:76:72:3a:32:a9:32:ad:78:82: 43:a8:fa:8c:bc:0e:3b:b2:84:df:75:91:a9:85:ef:e5: a0:4e:02:4e:bc:d5:61:44:f0:3d:36:d4:5d:a8:96:35: 1b:8a:66:5e:c8:f7:e4:be:a6:e6:ca:ae:7d:5f:db:92: 01:6f:bc:e2:d3:46:70:d2:cd:d4:15:15:1c:2b:2d:be: b3:3b:4e:fd:38:1d:27:18:21:15:c3:b4:be:19:8d:1e: b5:71:52:5e:c5:9f:2c:87:5f:73:af:14:19:fd:fc:22: 22:bb:f3:d3:af:f6:e2:2f:51:33:d0:0d:88:fa:3a:18: 10:f7:5f:6a:6e:70:6f:06:fd:77:06:ce:57:64:d5:f2: 3b:4d:bc:b2:1d:19:16:85:8c:34:9e:e7:f6:4c:b6:73: 55:b6:d7:12:ab:7c:28:45:0b:7a:a2:0c:aa:0b:7c:14: ac:ee:0f:d2:6d:7a:29:7c:25:5d:7f:d3:25:d1:71:34: c4:f3:04:62:9e:48:11:97:6c:c7:65:35:ff:9e:10:4d Fingerprint (SHA-256): 0D:60:3B:25:DE:9E:46:A8:3D:B2:1D:17:FA:2F:AB:7B:4A:70:C3:AD:96:01:65:C2:49:86:43:B7:60:18:3D:9E Fingerprint (SHA1): A9:85:26:8C:62:74:97:D2:79:F1:B1:BF:90:47:D8:F1:F9:EB:EC:07 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1063: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204167 (0x37440347) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 20:47:22 2022 Not After : Tue Sep 27 20:47:22 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:c3:b9:ca:f6:dd:f9:6e:46:89:0a:db:d8:57:aa:d3: 12:72:ff:c9:1e:c9:c2:0a:b2:fe:5a:65:1f:f9:78:3c: 98:93:4a:89:cc:14:eb:7e:e4:1d:77:da:93:7c:28:56: 4e:f7:a8:6f:cd:f7:55:b9:d8:26:8d:1b:62:e1:3c:3e: 47:e1:1b:2f:94:9b:b8:ba:96:18:86:27:15:7a:e8:04: 94:64:cc:b4:a7:35:91:bf:87:12:01:fa:34:0b:8b:d3: dd:3d:31:cd:91:75:98:99:44:5f:72:52:5d:a9:43:d5: 9e:00:a7:b2:1d:66:f1:7b:51:b1:a4:a0:fd:2f:9d:ff: 34:77:b4:f4:fa:43:2f:ff:b9:5d:3a:eb:82:d3:fe:4d: d9:05:1d:f4:d9:36:f3:cc:21:00:86:24:24:ba:6b:9f: fd:3d:74:90:21:1f:fb:99:2d:24:bd:07:a2:8f:52:c1: 52:ac:08:ae:00:45:2e:fb:c6:1c:d6:78:07:3a:4d:60: db:e2:99:32:91:94:2f:b5:88:8b:c6:b3:04:45:06:c0: 2f:5a:8e:03:00:ce:f9:2c:a4:f7:3b:0c:f8:5c:67:e0: 8e:d4:c1:b7:45:2e:56:fd:54:4e:05:4d:21:a9:a8:30: e4:01:dc:d4:07:20:59:f4:8e:98:c5:ba:9b:40:5f:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:5f:bb:b8:ca:b7:c9:2b:dd:14:8f:e3:5c:dd:84:a1: 38:d9:45:5b:70:9f:2e:51:5b:2c:3f:ff:aa:19:ee:ea: ad:91:32:d5:f0:50:80:19:96:31:ac:30:c3:25:e4:06: 3f:7c:38:28:49:00:90:76:72:3a:32:a9:32:ad:78:82: 43:a8:fa:8c:bc:0e:3b:b2:84:df:75:91:a9:85:ef:e5: a0:4e:02:4e:bc:d5:61:44:f0:3d:36:d4:5d:a8:96:35: 1b:8a:66:5e:c8:f7:e4:be:a6:e6:ca:ae:7d:5f:db:92: 01:6f:bc:e2:d3:46:70:d2:cd:d4:15:15:1c:2b:2d:be: b3:3b:4e:fd:38:1d:27:18:21:15:c3:b4:be:19:8d:1e: b5:71:52:5e:c5:9f:2c:87:5f:73:af:14:19:fd:fc:22: 22:bb:f3:d3:af:f6:e2:2f:51:33:d0:0d:88:fa:3a:18: 10:f7:5f:6a:6e:70:6f:06:fd:77:06:ce:57:64:d5:f2: 3b:4d:bc:b2:1d:19:16:85:8c:34:9e:e7:f6:4c:b6:73: 55:b6:d7:12:ab:7c:28:45:0b:7a:a2:0c:aa:0b:7c:14: ac:ee:0f:d2:6d:7a:29:7c:25:5d:7f:d3:25:d1:71:34: c4:f3:04:62:9e:48:11:97:6c:c7:65:35:ff:9e:10:4d Fingerprint (SHA-256): 0D:60:3B:25:DE:9E:46:A8:3D:B2:1D:17:FA:2F:AB:7B:4A:70:C3:AD:96:01:65:C2:49:86:43:B7:60:18:3D:9E Fingerprint (SHA1): A9:85:26:8C:62:74:97:D2:79:F1:B1:BF:90:47:D8:F1:F9:EB:EC:07 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1064: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #1065: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #1066: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1067: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1068: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1069: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204166 (0x37440346) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 20:47:20 2022 Not After : Tue Sep 27 20:47:20 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:53:d2:ec:10:84:01:4c:4c:14:e0:d3:9c:3a:f1:70: 70:d2:4f:99:3d:19:57:dd:f7:01:a6:aa:ac:85:b4:2a: 0d:51:79:6e:d6:a9:da:59:9f:1f:c6:f6:38:41:0a:83: fb:49:4b:42:80:5e:b5:3c:8f:55:8a:d9:dd:a8:dc:c1: 2a:88:7d:79:dc:88:33:46:5e:b4:85:e5:0b:86:42:34: ce:b7:8c:14:7b:2e:4d:ab:2b:2d:47:81:17:a5:fe:51: 1f:6c:41:2e:ed:a3:c3:59:4c:a2:a1:8b:02:f9:2f:25: 67:48:85:54:89:1a:00:44:39:04:83:ed:2b:9e:75:7d: 8a:78:fb:06:2b:26:d6:b5:59:80:58:34:f5:7f:c1:a7: 0d:f7:39:c6:f4:42:2f:00:b7:3a:25:e8:c8:f9:4b:89: ac:05:93:81:73:d0:fd:cd:12:ee:08:cb:b5:72:a3:b9: bb:58:63:0f:9c:54:30:ed:20:0f:d6:13:64:56:1c:d3: 3e:c9:7d:8e:49:81:d0:7a:3f:d3:df:f3:3f:14:09:74: 04:78:b7:64:86:33:71:ff:d3:95:db:5c:56:7f:3c:ec: 95:f8:02:60:a6:22:b9:01:44:ca:02:82:1e:1c:cd:8d: dc:88:c6:fa:6d:e6:de:ff:35:eb:46:59:eb:ee:c6:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:f0:4a:21:db:06:18:ef:f7:4c:6b:b6:90:0e:b7:bd: 39:18:e3:f4:da:b6:75:03:60:2c:44:a0:04:26:51:d5: 77:4c:0d:36:2f:f8:cc:1a:96:3f:9a:2e:00:eb:01:f2: 2d:3d:56:69:21:53:c2:e5:c4:cd:41:f3:b6:d6:2a:ee: 3b:8e:af:d4:13:60:96:0f:c7:de:ea:82:00:23:53:ed: be:fc:ca:65:45:d2:52:d1:27:ff:3f:b1:3a:7f:c5:a2: a1:d9:c9:4f:d9:2f:83:4a:19:9b:54:0e:a8:9b:83:5f: 29:ee:71:0b:43:0d:ad:1b:22:f2:4e:1a:73:01:2c:48: 0b:b5:2c:43:48:08:1b:7e:1a:0f:02:76:72:31:47:e3: 11:be:39:cf:06:9c:19:e7:d0:fe:b1:40:99:0f:25:bd: db:6d:30:fc:29:4b:04:37:d5:7e:6a:e6:16:b7:7f:68: 5c:45:54:96:88:ce:08:27:c9:ff:f9:73:e8:15:9c:61: 1a:fe:08:d4:02:0a:a1:d0:64:b3:27:2b:bc:cb:a5:b2: 91:bf:8c:50:97:7f:cb:a2:50:fe:46:b5:e6:28:f6:8a: c1:f7:b8:88:d9:ef:0f:d2:f6:78:aa:c9:c4:19:5a:96: 75:1e:94:c0:c9:28:38:d3:29:8f:8d:3c:64:0b:bf:23 Fingerprint (SHA-256): 4D:4B:B2:2B:9B:4E:73:91:C8:16:F1:E1:08:A8:65:A6:9C:24:F0:5F:32:B5:47:DC:98:2F:3D:B3:DD:8F:AE:51 Fingerprint (SHA1): 36:28:94:B1:A2:BC:AC:CB:84:B7:20:9B:91:82:6F:2E:99:F6:EF:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1070: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204166 (0x37440346) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 20:47:20 2022 Not After : Tue Sep 27 20:47:20 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:53:d2:ec:10:84:01:4c:4c:14:e0:d3:9c:3a:f1:70: 70:d2:4f:99:3d:19:57:dd:f7:01:a6:aa:ac:85:b4:2a: 0d:51:79:6e:d6:a9:da:59:9f:1f:c6:f6:38:41:0a:83: fb:49:4b:42:80:5e:b5:3c:8f:55:8a:d9:dd:a8:dc:c1: 2a:88:7d:79:dc:88:33:46:5e:b4:85:e5:0b:86:42:34: ce:b7:8c:14:7b:2e:4d:ab:2b:2d:47:81:17:a5:fe:51: 1f:6c:41:2e:ed:a3:c3:59:4c:a2:a1:8b:02:f9:2f:25: 67:48:85:54:89:1a:00:44:39:04:83:ed:2b:9e:75:7d: 8a:78:fb:06:2b:26:d6:b5:59:80:58:34:f5:7f:c1:a7: 0d:f7:39:c6:f4:42:2f:00:b7:3a:25:e8:c8:f9:4b:89: ac:05:93:81:73:d0:fd:cd:12:ee:08:cb:b5:72:a3:b9: bb:58:63:0f:9c:54:30:ed:20:0f:d6:13:64:56:1c:d3: 3e:c9:7d:8e:49:81:d0:7a:3f:d3:df:f3:3f:14:09:74: 04:78:b7:64:86:33:71:ff:d3:95:db:5c:56:7f:3c:ec: 95:f8:02:60:a6:22:b9:01:44:ca:02:82:1e:1c:cd:8d: dc:88:c6:fa:6d:e6:de:ff:35:eb:46:59:eb:ee:c6:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:f0:4a:21:db:06:18:ef:f7:4c:6b:b6:90:0e:b7:bd: 39:18:e3:f4:da:b6:75:03:60:2c:44:a0:04:26:51:d5: 77:4c:0d:36:2f:f8:cc:1a:96:3f:9a:2e:00:eb:01:f2: 2d:3d:56:69:21:53:c2:e5:c4:cd:41:f3:b6:d6:2a:ee: 3b:8e:af:d4:13:60:96:0f:c7:de:ea:82:00:23:53:ed: be:fc:ca:65:45:d2:52:d1:27:ff:3f:b1:3a:7f:c5:a2: a1:d9:c9:4f:d9:2f:83:4a:19:9b:54:0e:a8:9b:83:5f: 29:ee:71:0b:43:0d:ad:1b:22:f2:4e:1a:73:01:2c:48: 0b:b5:2c:43:48:08:1b:7e:1a:0f:02:76:72:31:47:e3: 11:be:39:cf:06:9c:19:e7:d0:fe:b1:40:99:0f:25:bd: db:6d:30:fc:29:4b:04:37:d5:7e:6a:e6:16:b7:7f:68: 5c:45:54:96:88:ce:08:27:c9:ff:f9:73:e8:15:9c:61: 1a:fe:08:d4:02:0a:a1:d0:64:b3:27:2b:bc:cb:a5:b2: 91:bf:8c:50:97:7f:cb:a2:50:fe:46:b5:e6:28:f6:8a: c1:f7:b8:88:d9:ef:0f:d2:f6:78:aa:c9:c4:19:5a:96: 75:1e:94:c0:c9:28:38:d3:29:8f:8d:3c:64:0b:bf:23 Fingerprint (SHA-256): 4D:4B:B2:2B:9B:4E:73:91:C8:16:F1:E1:08:A8:65:A6:9C:24:F0:5F:32:B5:47:DC:98:2F:3D:B3:DD:8F:AE:51 Fingerprint (SHA1): 36:28:94:B1:A2:BC:AC:CB:84:B7:20:9B:91:82:6F:2E:99:F6:EF:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1071: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #1072: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204171 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1073: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #1074: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #1075: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204172 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1076: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #1077: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #1078: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204173 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1079: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #1080: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #1081: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204174 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1082: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #1083: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #1084: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204175 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1085: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #1086: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #1087: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204176 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1088: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #1089: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #1090: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204177 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1091: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #1092: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #1093: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204178 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1094: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #1095: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #1096: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204179 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1097: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #1098: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #1099: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1100: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 927204180 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1101: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1102: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 927204181 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1103: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1104: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 927204182 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1105: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1106: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #1107: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #1108: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1109: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 927204183 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1110: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1111: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 927204184 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1112: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1113: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 927204185 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1114: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1115: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #1116: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #1117: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1118: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 927204186 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1119: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1120: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 927204187 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1121: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1122: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 927204188 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1123: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1124: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #1125: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #1126: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1127: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 927204189 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1128: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1129: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 927204190 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1130: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1131: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 927204191 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1132: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1133: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #1134: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1135: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1136: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 927204192 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1137: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1138: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1139: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1140: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 927204193 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1141: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1142: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204171 (0x3744034b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Tue Sep 27 20:47:34 2022 Not After : Tue Sep 27 20:47:34 2072 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:b1:46:2f:c8:28:c9:77:72:08:9d:6c:99:1f:d0:3a: a0:3e:ad:1a:d0:03:e3:f7:9e:9a:8f:56:e7:b4:57:ce: e0:0b:0f:86:cb:7a:d8:43:ec:20:25:43:ab:89:c8:d1: cf:47:60:52:31:87:ea:91:eb:e8:8a:9f:70:69:d2:9e: 2f:0d:95:fb:a2:1d:68:9c:83:00:18:19:50:ed:91:85: b6:f9:bf:04:81:45:7b:01:57:b7:1c:6b:3c:96:6f:7a: 56:e9:e3:6d:6f:ee:e3:9d:cd:39:69:9c:62:07:63:34: 24:62:57:af:53:f4:9e:a2:8e:6d:66:e4:d6:29:3e:5e: 9e:e0:15:f4:51:2f:aa:62:58:4d:7b:50:f7:ec:18:c7: 6d:49:ee:7e:4c:3d:03:04:2a:04:23:f5:ef:9b:63:d2: a3:86:a0:29:6d:a1:6a:57:fb:d9:d8:84:1e:d7:85:a2: 37:63:1d:69:64:5f:49:ad:b3:fd:e2:e8:95:63:7c:e2: c6:a6:50:08:42:29:16:50:fa:89:a0:7a:31:1a:1e:fe: e3:74:e1:da:3d:a3:35:fc:5a:08:a5:63:9d:03:5e:73: 3c:96:42:68:0f:12:df:24:5c:e7:1d:e8:85:bf:1f:65: 24:04:a4:d7:70:16:7c:58:fe:51:c0:a8:4b:fc:bc:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2b:e5:45:8e:cd:f9:ba:e6:34:83:f9:f6:4e:75:c5:64: e0:5c:03:55:2f:cf:be:cf:59:94:e6:66:fc:b4:a0:95: 29:43:05:a2:a4:19:c0:4c:08:92:ef:19:26:e2:2e:a6: ac:3d:b3:d4:3c:a4:b4:fb:d3:5c:80:8f:31:66:cd:52: 46:ff:ff:72:a5:3a:25:0b:e8:aa:f2:40:e2:1f:59:5f: 90:f0:eb:6d:1c:43:b2:1f:cc:83:a7:a9:9d:be:d9:dc: 2a:09:29:ad:86:5d:69:e9:61:0f:1b:62:9c:04:aa:08: 6a:c7:98:bf:4f:dc:98:72:27:e1:1a:27:aa:28:3a:2a: e6:b5:c9:9d:30:36:3e:fb:5d:89:cd:8d:45:5d:25:68: d8:db:a6:99:e8:89:55:46:37:c5:a1:33:5d:46:bf:b4: a1:37:9d:be:16:90:48:e4:d5:62:db:70:47:f5:74:11: 0a:a6:d2:ee:32:1a:f3:2d:bd:a3:89:e9:61:08:da:7f: ee:89:7b:15:b2:f9:a0:5d:99:b4:55:fe:47:a4:24:5a: 60:6c:52:3e:af:a5:28:a5:82:e4:7e:48:20:d5:e5:15: 80:30:4c:33:cc:bc:fc:c5:68:8c:d2:4f:4c:0b:96:e7: 0d:1a:fd:d7:19:69:3d:c8:d5:43:87:2e:f2:2b:2b:79 Fingerprint (SHA-256): E8:38:BF:44:92:6A:0E:B6:9D:AD:7D:5E:AE:E0:5B:5B:BD:75:AE:01:84:61:1A:8A:2C:11:BE:24:12:37:9A:08 Fingerprint (SHA1): 48:3F:85:1B:24:25:67:A2:5B:9A:37:72:9C:B7:D6:FF:5B:07:25:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1143: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204172 (0x3744034c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Tue Sep 27 20:47:36 2022 Not After : Tue Sep 27 20:47:36 2072 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:4a:51:66:1c:fc:e9:a4:9d:36:3c:96:23:e6:af:ec: 97:d5:0e:fa:aa:bf:ab:0a:c9:2f:67:b8:94:0e:e9:52: ac:3f:91:95:e5:97:05:8d:cd:e2:b4:0c:99:eb:83:1b: 90:59:a0:1a:ab:64:76:96:a1:7c:cd:18:e9:d7:d0:9e: 7c:37:01:82:79:1d:62:7f:c6:84:3a:33:48:f0:57:f8: 9a:71:9e:55:3d:e2:39:e9:76:8e:8d:4f:af:76:2b:5b: 5e:e7:a5:a2:0f:03:d9:ff:5b:32:f2:41:c3:96:cf:f6: 5e:34:70:46:95:c1:ef:48:06:98:11:8f:5e:5d:bb:21: c5:7e:96:6a:c2:f2:cb:73:1a:ab:6b:aa:6f:d2:01:13: 4a:97:a9:3b:d1:63:b6:d0:93:fc:d7:3a:a4:84:53:12: c1:78:df:46:dd:b9:71:74:ca:12:d9:c6:40:0d:37:f2: fd:77:6c:43:c7:d6:11:9b:14:c3:74:1b:ef:3f:fa:22: 33:4a:a3:ee:64:e3:02:e3:28:60:21:82:c1:f9:63:72: 99:c8:00:6d:60:56:7a:69:f1:a5:7f:c4:d1:5d:e5:5c: ad:98:3a:c0:d9:45:87:c6:a1:d1:e4:c9:2a:59:e7:78: 0e:bb:35:f4:18:54:8f:30:29:bf:ab:ef:4c:90:07:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:99:ff:9a:3f:45:af:69:aa:7d:87:b0:1c:20:52:26: 8e:df:4d:4a:b5:59:71:3f:16:9e:a7:07:c2:dd:ce:08: 05:1d:a5:04:4b:ef:cf:ad:dc:ca:3c:5d:d7:c3:ba:45: 59:0c:67:d7:06:33:28:5f:95:05:c3:ae:af:70:e0:7a: 9b:f1:c8:8b:b1:65:da:3b:ce:96:1a:3f:f3:6a:d8:ce: 0d:51:59:a1:e2:40:bc:1a:a5:9a:7b:7a:91:d5:7f:b1: 02:7a:01:55:aa:e5:df:13:e7:d9:8c:84:7c:f8:2f:45: c1:ef:18:18:43:e4:30:ea:0f:02:e2:70:42:77:a1:de: 2c:4e:98:72:77:62:a8:67:ec:45:2c:a1:07:66:27:1c: 4c:72:6a:35:42:2b:d2:6a:5c:e3:62:fe:a6:0d:f1:f2: 95:14:5c:8a:ac:3b:ca:b3:c1:07:00:f0:d1:8c:ee:cd: 10:2e:eb:5d:23:d1:96:74:8a:20:5c:b6:3f:98:e7:83: 81:ad:56:8c:44:4b:95:4c:ff:67:c8:69:3e:ea:1f:36: 33:a5:0a:f2:95:57:7e:7c:c6:b8:c0:a7:9f:d7:0e:f5: a0:d1:d7:37:cf:7e:b8:01:8b:39:50:db:42:b0:65:1d: fb:36:f5:59:87:41:c0:b6:df:5e:ee:4e:c2:94:76:bd Fingerprint (SHA-256): B9:95:CA:2D:E7:A2:7E:29:F7:0C:00:54:19:87:5F:73:14:01:1B:50:0D:C2:AC:8D:7F:44:B7:32:2D:24:25:C8 Fingerprint (SHA1): 93:13:4E:8B:BB:41:8D:F9:F6:78:84:6E:9E:CD:FE:C8:AE:15:94:5F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1144: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204173 (0x3744034d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Tue Sep 27 20:47:37 2022 Not After : Tue Sep 27 20:47:37 2072 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:a2:e4:69:24:04:c7:88:d3:05:05:81:c2:e3:9c:eb: 2d:0d:16:ba:a9:f6:39:3b:b2:40:65:20:3e:6b:31:0e: fd:9f:8e:cc:b2:6a:c3:3c:8b:8c:8f:b3:35:a0:94:ce: fa:bf:d8:07:5c:cb:10:fe:68:41:c9:83:31:27:88:9d: 15:22:42:fe:7c:aa:e4:61:78:63:68:e1:50:ea:14:83: 00:dd:b4:0f:4c:57:d9:fb:9d:b3:59:e7:5d:82:5f:32: 8f:fd:f6:c7:02:10:f5:d7:a2:4e:fc:91:11:6c:54:19: a2:6d:f1:1d:44:26:60:90:ff:ee:ab:99:5e:95:75:23: b3:b4:c7:d8:3b:07:b2:44:1a:ab:5b:4d:74:10:ec:3b: e1:27:f7:b5:36:b2:7c:89:9f:cd:06:f2:22:3e:37:7e: c6:59:26:f5:2c:0f:54:6a:99:fb:45:1a:df:21:c0:7e: b3:c4:5b:5d:6d:0f:5b:e4:4f:ff:74:ea:de:26:58:77: b3:6c:67:2b:81:89:24:98:7f:22:bb:b0:ac:20:1e:b9: a1:e4:62:6c:09:9e:fb:7e:ce:11:75:a1:fd:78:15:49: 07:74:ab:64:8f:9f:68:d2:87:09:72:46:a2:01:22:c3: be:89:d0:1e:15:4f:5f:d8:94:04:8b:5d:26:b4:44:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:e8:0b:2f:f3:16:95:62:95:fe:65:0d:11:03:58:8b: ce:be:76:a6:dd:79:bd:15:52:ac:db:a3:ce:b9:77:56: 99:01:77:98:2b:fb:02:8c:1f:5c:00:8e:3c:89:da:fa: 01:b9:a3:ce:98:a1:16:28:d8:10:f9:16:25:db:b1:f3: f7:3b:14:95:0c:b7:2d:9c:0b:47:57:99:a6:b8:01:75: 92:34:11:fb:21:64:6e:be:15:e7:a4:7d:d8:da:ab:fd: 2b:28:02:65:30:7b:5c:37:59:05:54:a7:0a:61:f1:dc: 5e:24:f9:27:26:0b:d7:66:59:da:8d:70:a0:21:83:8a: 0b:70:62:84:7e:bd:aa:a1:a8:a7:ba:dc:fd:d1:6a:e0: 96:77:b5:7c:95:c6:e9:d7:54:2e:95:e7:d7:ba:44:49: bb:07:0d:2a:6b:c5:f7:fa:af:8f:d1:49:c1:ad:25:91: 3a:97:13:54:57:3f:0a:2e:7c:96:b9:9a:fc:2a:c2:00: 7a:94:f6:0a:87:66:c2:28:3b:9e:7c:97:21:a5:e0:00: cc:27:0a:c6:3e:51:71:ce:b0:93:05:64:c0:84:57:94: a6:fd:60:86:02:52:8f:5e:ec:ef:18:58:d2:2b:6a:44: 26:00:d2:ef:ef:7f:cb:d3:99:b3:61:ca:f3:38:b2:5d Fingerprint (SHA-256): A2:2A:DF:06:82:A5:0D:72:11:79:85:45:9E:B5:66:AB:8C:F0:9B:8E:0B:BD:46:44:EA:45:B2:F5:AF:B1:32:51 Fingerprint (SHA1): 7F:98:88:1E:29:60:FB:78:32:C8:1C:45:9D:5D:DB:C7:2F:79:E6:94 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1145: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204174 (0x3744034e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Tue Sep 27 20:47:38 2022 Not After : Tue Sep 27 20:47:38 2072 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:15:bf:9d:2f:49:28:be:70:7f:2b:ba:64:9b:89:74: 36:fa:45:dc:c8:87:63:13:c2:5a:f1:c9:f1:fd:aa:cd: a2:65:5f:05:5d:4e:38:84:a2:80:bd:22:ce:49:18:2a: 91:af:a0:d5:e4:e2:e1:17:25:1d:25:f4:27:df:ec:ee: 27:73:ab:9b:6d:24:fd:26:17:dd:58:3a:4d:dc:fa:cc: 6d:ce:96:39:5a:11:d2:3d:2f:0a:04:8d:ea:ba:4f:d1: 07:e0:27:e1:3e:34:be:30:69:f9:f1:91:14:8e:3c:52: 0e:e2:5b:61:c6:cf:52:c6:7f:1d:4e:44:37:c2:03:b7: fc:84:8d:c0:5c:0a:5a:4f:10:8d:21:3c:ff:e0:93:79: 54:78:8e:ee:7b:22:f2:71:db:87:08:07:b4:af:1b:20: 47:e9:f6:f5:24:05:b2:03:51:47:d1:cd:9d:29:fb:cc: f0:16:1c:2a:13:f7:f9:53:4b:f3:52:c4:7d:38:ab:07: 41:fa:c6:67:59:92:88:77:d4:eb:07:85:8f:1b:9e:cd: 62:46:f9:38:95:1d:7c:70:ba:f2:26:09:7d:80:a6:0b: 8a:40:64:16:db:da:9b:57:9e:23:95:94:7b:e9:8e:5b: c3:37:29:57:97:c8:50:60:17:1a:2c:b8:55:65:0b:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:b9:11:fd:52:72:07:e7:d4:63:f6:1d:8d:ca:3f:f4: 87:00:b7:a4:37:05:9d:47:c5:bd:41:57:02:38:e2:10: 07:f3:39:b2:a4:78:cf:30:8f:35:18:3e:7a:ef:70:30: 29:1f:46:21:ad:f8:2b:f6:54:92:09:f9:3f:68:31:04: b0:a2:6f:87:2f:9c:fc:f7:18:e8:c4:21:d8:dc:3c:b7: 12:46:62:b8:c7:e4:89:c7:bd:23:10:bf:ea:5f:b1:00: 15:50:d1:1d:02:5d:dd:ce:e5:34:51:10:31:f2:cb:9d: 79:a0:6e:30:64:26:63:7e:04:3a:8c:1b:8f:db:60:c6: 5e:39:b9:9d:63:04:04:a2:c0:c8:34:84:b6:a1:6d:0a: 04:8b:e8:7a:43:17:b0:b0:a2:fe:f9:1d:ca:95:66:f2: 84:92:98:a6:b6:76:ef:38:f4:86:85:e0:0f:28:15:93: a4:90:3e:c1:2d:43:e8:c5:21:b8:c9:19:7f:89:ae:c5: 33:90:5e:d6:dd:43:a2:d7:bd:22:ee:b4:81:01:23:b0: 18:3d:0e:4b:dc:b1:5a:92:f7:7e:1b:8d:7d:e6:c5:6d: 35:32:86:d5:f3:e9:0b:4c:42:98:47:af:1f:30:c0:f1: 5b:4d:c5:a4:cc:0f:4e:6b:46:fa:c5:65:cf:55:67:9b Fingerprint (SHA-256): 41:A8:03:87:27:28:2D:87:87:B2:81:8A:4C:6A:CA:66:FC:F2:73:11:5E:03:B3:46:29:6E:A1:60:10:F6:6E:02 Fingerprint (SHA1): 0A:6E:E2:4D:0A:73:87:29:C0:0B:97:9D:95:1B:87:32:F5:61:2F:26 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1146: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204175 (0x3744034f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Tue Sep 27 20:47:39 2022 Not After : Tue Sep 27 20:47:39 2072 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:82:f4:7b:f2:29:40:1e:f8:55:7d:aa:aa:71:3d:ae: 4d:f5:37:ac:4e:2a:18:53:4f:fd:fd:48:25:86:17:1b: aa:15:b9:0e:8d:e8:11:5d:bd:3f:18:ce:17:25:60:4c: 2d:4f:62:31:9e:4c:3b:25:53:d7:3d:3c:5a:ee:3b:6a: 2c:30:94:ef:86:29:48:09:36:e3:63:57:61:86:69:61: 74:a8:80:e5:7c:1a:45:bf:f7:f1:7a:d0:67:23:31:05: f0:97:0b:0a:2a:f2:97:2f:2d:7c:73:e4:d7:80:6f:ec: 74:68:e2:64:4f:88:7e:c1:20:8d:d7:3f:da:f4:e1:78: ab:3b:f3:8e:94:ef:61:e1:58:bd:4a:a6:56:5a:6d:a7: 5c:66:d5:52:3f:3c:12:82:8a:e7:e7:90:94:ab:eb:dc: 10:7c:e1:a6:aa:7a:28:c7:43:7b:01:a3:51:55:c4:5f: 0c:8b:24:9a:dc:e5:cd:e7:bd:f4:37:82:c6:4d:3b:fd: 4f:71:4b:c0:30:d7:07:ed:bc:ee:90:c5:13:90:e4:eb: f0:cf:1f:66:e7:ae:e0:a5:8a:91:62:fb:1e:78:8d:6a: c0:ee:e0:15:bd:4e:dd:e1:69:8c:a0:28:66:51:e1:f8: 63:62:11:0c:f1:23:bb:39:a2:07:17:6e:81:41:6a:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:21:4f:d7:21:5f:e2:8a:a5:16:8c:8d:d1:b5:4c:c7: 42:b0:c8:ca:89:81:78:dc:33:fd:6f:ce:71:2d:83:f7: 7f:c4:5f:d8:c5:87:4c:5d:43:06:5d:e3:71:07:bc:3f: c4:f0:29:f6:e6:12:5b:9f:d6:a9:10:16:63:dd:df:fd: d6:9e:ed:a5:22:dc:4a:ed:eb:7d:de:aa:8d:f0:6d:ac: 9a:ab:18:7d:63:5a:8b:62:55:ce:16:d2:0d:e7:0a:b0: 5b:af:7d:3b:bd:77:60:7d:12:3f:ab:ef:ac:68:18:ef: d7:88:fb:16:cc:85:d3:c4:c8:16:50:7b:b5:57:f2:8a: 16:13:cb:81:de:fc:83:56:c9:6b:34:a8:04:01:e7:ee: 52:be:e6:3e:94:36:1d:3a:54:68:78:98:98:f6:07:d8: 21:70:ac:93:48:64:23:36:be:6a:f7:01:33:da:c3:27: 24:bb:48:e7:9e:02:48:33:9e:43:e6:f2:6b:7d:db:c0: 01:39:03:9c:ea:62:d0:23:d9:8c:6d:c0:b2:e2:f1:0b: 65:8c:97:1a:3c:67:80:60:9e:07:77:a9:62:aa:6c:c3: e7:1b:5a:7d:ba:f1:d7:6a:4c:cc:c8:29:d8:32:8c:b3: a0:e4:70:90:a6:78:6c:2a:0a:e5:82:e2:3c:4a:d3:87 Fingerprint (SHA-256): 8D:30:CC:91:4C:D8:BC:04:9A:8C:8B:9E:19:49:BA:41:73:65:5B:B4:72:44:2F:24:31:FA:A4:9E:49:8A:32:4C Fingerprint (SHA1): B5:66:FF:10:24:BA:89:AC:93:14:1B:17:04:9B:9C:4E:5B:0C:86:95 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1147: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204176 (0x37440350) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Tue Sep 27 20:47:41 2022 Not After : Tue Sep 27 20:47:41 2072 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:7b:a5:1f:77:a8:01:4d:d4:0c:4c:32:7a:c8:c4:10: a9:be:1c:fb:fc:20:c8:12:83:7e:4c:29:dc:f5:cd:f0: a6:e2:93:01:af:c4:3c:37:4e:13:26:26:60:50:01:54: e1:6b:6f:ea:00:bf:09:b4:c6:86:79:e0:46:93:57:b8: 1c:b9:e3:4b:c9:b9:42:7a:9e:12:5b:c5:71:51:b3:91: ce:dc:21:22:b5:c7:66:87:f8:5f:1a:b6:39:db:af:74: 84:9a:b8:63:ce:17:49:3c:00:05:fc:72:2e:6b:fe:0b: 4c:c1:50:d1:38:49:c9:d9:8c:18:6e:b3:c5:e8:4d:b2: 84:12:3f:44:d4:ad:40:1b:3c:d0:86:ac:8e:e3:a7:2b: ba:41:9c:70:8d:92:96:46:5c:30:08:88:42:16:eb:04: 81:02:00:57:67:0d:e8:70:50:ae:12:8c:2e:a7:5a:fe: 6a:82:f3:45:a6:f2:b8:e3:3c:fa:05:e8:d5:30:79:67: 2b:82:68:1f:fd:7d:ef:fb:6d:39:23:63:02:1e:ea:d8: f1:74:7d:37:90:23:69:c1:d4:15:27:96:7b:64:ea:80: 80:1c:2a:a5:59:5b:77:9b:35:6f:96:97:83:3a:0b:f3: 85:a8:10:b9:0c:09:97:a3:c8:74:fe:60:41:63:2c:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:1e:2e:43:8c:b0:96:81:aa:d5:bf:98:69:40:4d:e3: f4:9c:2b:b7:f0:20:9b:0c:7e:be:b3:2b:ca:e0:69:d3: 75:38:45:94:71:d5:74:a1:92:de:dd:4c:c2:ea:04:c5: be:c1:ad:24:ca:bf:43:d4:2a:df:84:de:ba:9e:46:72: 56:1c:a9:c2:34:b1:65:68:e1:93:b0:f4:2f:95:9a:4d: 8f:ac:76:bf:1b:db:e0:77:c2:66:83:39:3c:b3:25:92: 16:12:98:41:5f:bf:bb:33:73:9a:9b:62:8a:c0:62:9e: 57:ed:a1:5a:03:6a:ad:44:5e:b8:e0:97:f1:3b:8d:60: 65:29:c8:85:8b:6e:3d:50:64:4d:c4:c0:3f:65:2c:e6: 0a:3d:8f:2b:8b:54:ce:de:a1:ef:f9:8c:ec:53:15:cd: 37:24:c6:4d:b5:da:de:c5:5b:ce:35:77:8c:40:a4:e1: 09:51:91:5e:52:53:ff:94:cf:17:47:11:c0:ca:73:fa: b7:c2:51:1d:a3:d6:d4:3f:60:de:a9:82:c0:d6:ec:58: a9:de:6a:73:c0:1c:ed:47:b6:38:d8:06:c1:98:08:60: 83:11:27:73:d2:00:33:57:75:0e:8b:22:e7:0f:d2:05: 7c:da:65:8f:eb:d9:b6:52:f3:81:79:26:5b:55:77:ed Fingerprint (SHA-256): FF:8A:EC:B2:14:9F:3C:9E:76:31:E5:63:B5:19:A5:81:09:E2:12:1C:F9:55:32:EE:87:BA:5F:14:4C:8D:D7:49 Fingerprint (SHA1): A9:9A:41:5F:04:74:C9:98:C6:1D:2E:BB:95:7E:9C:A7:E7:21:83:5D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1148: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204177 (0x37440351) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Tue Sep 27 20:47:42 2022 Not After : Tue Sep 27 20:47:42 2072 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:7a:ed:cd:e0:78:a0:7d:2f:ba:54:9f:36:17:01:b1: 7f:30:ea:a4:ca:25:06:21:31:2d:0c:d8:3c:09:ef:9c: 88:3f:8a:a7:f5:29:81:af:d9:d8:60:8c:ce:19:82:62: 96:8c:5c:2c:64:fe:73:9c:4b:65:da:2f:7a:90:2e:d4: f2:eb:48:ca:4e:fe:70:a7:b3:f5:00:b5:fc:6b:ef:1b: ea:8d:5b:2b:41:7f:1b:49:a9:c9:ad:01:ae:dd:47:2f: 5c:06:fe:96:74:91:19:e5:52:b3:0e:38:46:f4:5a:84: 76:9e:ce:f1:49:31:7a:ab:91:c3:f8:dd:e8:ac:4f:dd: 5f:16:b4:92:f5:ac:a9:13:b3:39:ff:0a:9d:5f:03:83: 96:3c:cd:a7:09:58:4e:52:5f:75:22:d5:e3:7d:92:82: f9:c3:59:a9:02:fd:64:61:b6:59:95:5d:db:53:d8:5f: 2c:47:38:1f:49:4c:12:74:45:a6:13:c9:3c:62:f8:07: 41:5c:39:dc:9f:d7:12:4e:ea:e5:8a:de:f6:b0:cf:a3: 0c:69:03:71:bf:0d:ad:58:d3:ab:5a:3c:cd:99:f2:93: 6b:2e:98:7a:97:6c:a0:52:72:aa:0b:bd:09:05:15:11: 68:c6:12:51:6d:10:04:64:c8:70:5e:fa:0f:e8:bf:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:f9:3a:28:1e:37:cb:91:25:9d:d2:89:16:8b:67:5d: a4:3f:79:a0:ad:21:3b:77:bb:36:2b:f2:77:30:32:a6: 36:7e:fd:31:aa:28:f5:95:d5:a0:a1:f4:3b:13:68:cd: 53:72:34:75:01:3f:ef:93:53:9b:22:6d:c8:26:21:49: 46:35:5d:14:a3:66:8d:fc:47:51:d9:3e:c2:fb:ca:cb: 60:15:4f:d2:27:a3:f9:74:92:ad:f6:46:95:d5:48:b6: 0f:d9:81:db:cc:84:0d:99:60:4f:3f:b2:03:cd:fe:a2: 58:15:56:70:1e:c0:0a:3e:91:12:e6:05:0d:7c:5e:55: 72:5d:00:30:5c:48:82:1e:ce:2d:dd:c8:ab:77:97:65: 03:a6:ab:be:3f:4c:8d:f9:31:29:c9:1b:57:3d:9d:c4: 5f:f2:18:ad:3a:c2:da:c5:51:64:94:29:0a:5e:82:e5: d3:1b:97:b3:c8:6a:65:ab:a0:2b:de:3f:7b:24:77:bf: a2:10:8f:b8:ec:15:8d:2b:70:92:f7:b3:34:97:ac:62: 32:3a:b9:eb:8d:b5:99:98:fc:8b:fc:ba:77:d8:bc:b2: 60:cb:32:b2:72:a3:a3:eb:4b:a9:35:5c:4d:94:4e:70: 97:81:1c:26:5a:88:6e:da:86:30:c2:19:df:7a:6d:22 Fingerprint (SHA-256): 00:C3:1C:89:BD:61:AF:AD:5E:89:45:C4:5D:BD:E4:79:29:3A:DE:D3:E5:98:3B:67:13:A5:34:D3:2E:CD:A5:87 Fingerprint (SHA1): C7:40:7F:34:5D:7D:A4:12:1A:8A:31:CE:C3:75:53:FD:F2:BC:20:59 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1149: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204178 (0x37440352) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Tue Sep 27 20:47:44 2022 Not After : Tue Sep 27 20:47:44 2072 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:d7:29:7f:0d:bd:ad:a1:cb:4b:ad:b8:b2:b1:55:e3: ab:39:95:30:e4:f4:21:37:82:78:ba:a3:7a:25:be:ae: 4a:b0:94:fd:7f:85:c0:cd:41:01:7e:27:1f:4c:9d:9c: 56:26:e9:70:7b:4d:0e:1a:53:71:c5:39:dd:ea:38:d9: b4:14:32:73:93:d9:bb:53:c7:54:f4:0e:2d:6e:4e:08: 0b:5e:21:74:bf:81:f7:61:16:c4:15:b8:fa:02:3c:bc: 9d:1a:44:80:74:c6:c5:bb:11:3a:58:9d:30:c4:dc:70: 20:79:a8:8d:e4:06:b0:dd:8a:22:f4:2f:ff:d8:5b:51: f3:c2:3e:5f:d8:5a:c3:54:16:81:51:73:db:8d:c4:7e: 73:89:4a:c5:e9:79:02:d3:88:b6:53:cc:20:d3:e4:42: 86:78:a0:9e:b5:86:d2:c9:0a:a1:3d:53:5a:eb:f7:24: 07:ed:12:73:db:b9:95:0c:77:32:a1:29:5e:5f:f6:cd: 2f:41:bf:b1:d7:47:be:18:80:04:d2:47:d6:84:23:4d: 9a:b2:ef:4f:42:c9:fb:36:87:c1:e7:53:d3:43:93:0c: 72:84:75:b5:90:ba:3e:59:ec:10:ef:30:88:7e:98:c7: f9:bd:43:65:7e:30:50:62:ef:e2:b6:35:a1:06:ac:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:5b:67:c3:35:2d:3e:20:97:c5:9d:61:69:8e:f9:4f: fb:fe:52:c6:1d:87:73:d0:c6:6e:c1:7a:52:34:b9:0d: 99:b2:d3:6b:69:86:86:81:a3:f0:58:58:4a:34:27:f3: b8:b9:4b:38:13:6a:3b:e0:9c:a0:9c:6a:11:c1:3b:ea: 0c:57:4d:4e:e9:12:d7:91:57:9a:2c:7f:3a:a0:7c:4e: 91:b2:2c:60:4d:55:f4:12:9a:e4:40:ae:d6:9c:e6:70: 71:c4:5c:28:14:cc:5e:48:4c:48:a1:aa:66:e3:77:8d: 8d:12:fc:0f:b6:21:6b:5e:55:6b:15:81:cb:c6:3a:6a: de:79:7a:34:25:2d:94:9f:94:5b:ac:37:44:8f:0e:e5: 04:f7:7c:ce:de:95:6b:e5:34:ed:6d:32:ad:b6:87:48: d8:23:90:6f:0b:4e:6a:71:d6:0c:94:a0:d5:8d:a0:7b: 90:75:74:9d:a7:a0:42:1f:54:03:8d:9e:fb:76:55:3b: 87:fb:44:15:c1:c5:ed:2f:29:cc:2f:2d:45:53:2c:f3: 9c:15:24:79:da:da:be:97:89:69:3a:4f:1e:bf:a6:1e: 19:a9:e0:10:53:5b:21:82:21:77:69:80:d2:05:57:78: 1e:7d:3f:89:f4:46:42:29:9b:5d:67:03:76:80:53:b8 Fingerprint (SHA-256): A0:1E:D3:0B:1F:E4:EB:83:E2:75:AD:6D:52:9B:03:6E:D0:09:3B:E4:E2:F9:35:8B:5F:E7:5E:5E:F8:F3:C2:54 Fingerprint (SHA1): 16:B8:61:91:8E:33:97:04:E4:2C:E0:66:80:96:AD:91:A4:1F:9D:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1150: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204179 (0x37440353) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Tue Sep 27 20:47:46 2022 Not After : Tue Sep 27 20:47:46 2072 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:d7:2d:ab:11:19:12:4f:1e:00:ca:d0:f8:c1:e5:07: a4:58:8c:c9:ad:b0:76:43:c7:95:14:35:f2:ab:0f:64: b1:a1:ac:a5:ec:df:c3:dd:03:cb:dd:d5:8c:6a:18:ca: 5d:57:9c:56:b5:98:d6:26:ab:1b:78:fe:e6:ee:34:f7: cb:1c:69:1b:ec:6b:de:ea:18:83:3a:e5:02:43:b1:b5: 69:97:43:e7:d1:a4:d1:3f:79:d0:b7:20:0e:6d:0e:0f: 51:25:2d:82:82:ac:8a:1c:75:64:29:df:60:b2:a9:46: 41:7a:1c:30:35:25:b5:73:8d:87:2d:25:df:4e:ba:06: 5b:9f:d9:9d:5c:4e:3a:10:5e:e0:f6:6a:f1:02:ac:36: 96:9a:be:9e:53:96:1a:a4:11:1d:e9:40:01:42:55:e7: cf:2d:67:a4:c3:f0:54:88:9c:2d:d6:c6:0b:f2:7f:45: e4:88:e9:60:b7:21:6f:34:b1:14:58:70:7d:0b:f8:c9: ff:5d:8f:40:eb:6b:9f:69:66:4e:e3:a5:42:a2:a1:af: d6:51:b6:09:4d:bd:ab:62:a6:c8:29:94:a9:91:ef:f5: 72:e1:a5:16:2c:ff:13:f0:f8:ae:37:32:6a:ad:6a:95: b3:1b:4f:95:3b:f3:0c:af:98:87:8b:05:27:3f:73:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:cb:eb:e4:49:e5:fb:ac:42:8f:0b:2d:2a:4e:ab:c6: ac:7a:58:b0:a2:f4:fc:9d:a4:40:fe:87:08:8f:6a:5b: d5:98:4e:ad:8c:5e:51:6b:1b:88:dc:01:2a:13:2c:7d: 13:4c:91:f3:ff:fd:41:cd:5d:8c:aa:82:e2:4b:d3:21: 2f:ea:dc:e4:40:1b:44:e2:64:6c:eb:e3:ab:aa:04:42: 50:da:60:ee:66:30:15:1d:a8:75:d3:90:47:cb:f2:93: 79:27:ea:74:d5:ba:25:1a:07:b7:bf:83:b9:18:c7:50: 83:57:5b:1c:ce:b1:f1:ae:1a:4b:04:8d:23:a5:f0:0b: 11:08:ef:42:63:6d:1e:92:34:51:1d:36:0b:23:16:8c: 18:0e:43:1b:b2:f8:4e:ae:60:f9:63:4e:79:01:56:a2: 92:da:bf:4d:df:78:22:4d:64:47:a1:b7:b5:01:3b:49: 3d:00:d6:5c:11:f9:4b:7d:e9:0e:a5:28:58:29:88:94: 00:56:a4:61:2b:cb:95:69:d5:02:14:c6:81:d1:7c:40: a6:4d:e9:29:3f:77:30:0c:69:51:53:f6:e1:8c:7a:c9: ad:13:af:96:d9:2f:9f:97:e2:b6:64:9f:d7:59:62:21: ae:38:e7:ac:a6:ee:34:8f:33:da:1b:73:4f:b4:e8:4f Fingerprint (SHA-256): BA:E5:5E:9A:D5:9D:00:B1:B2:87:E0:0F:57:21:25:81:87:97:25:D1:61:74:BB:3A:89:41:DA:19:F7:C6:EA:0A Fingerprint (SHA1): 3B:6B:7D:AF:23:B1:A6:A4:52:58:6A:39:07:4C:51:81:5A:F6:09:0B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1151: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1152: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204194 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1153: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1154: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1155: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1156: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927204195 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1157: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1158: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1159: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1160: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927204196 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1161: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1162: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1163: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1164: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 927204197 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1165: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1166: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1167: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204194 (0x37440362) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:48:06 2022 Not After : Tue Sep 27 20:48:06 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:6e:dc:a6:d4:96:1f:1a:8f:87:c9:d8:f5:1c:b8:95: 37:61:c8:fb:dd:b2:8a:2d:71:11:b3:af:c5:3c:2d:97: f2:90:a4:e2:a9:5f:27:9d:7d:aa:3b:65:c8:7a:c8:94: 8f:cf:f6:c1:0c:80:dc:38:a2:03:3f:1b:8d:98:77:50: df:40:24:7f:cb:91:15:7a:97:0f:79:af:91:20:a9:e9: 9c:06:02:a1:63:fa:35:d4:21:25:97:87:72:ee:a2:37: ea:e8:02:22:81:f2:a8:22:10:e2:31:39:ad:9c:fe:51: 74:62:78:5d:71:8d:c7:2d:3c:29:48:ee:80:8b:f7:6a: 47:85:52:17:09:f4:97:f3:e4:d6:39:f0:b4:3c:13:64: f1:9a:67:60:64:6e:7f:49:9c:14:ad:ab:78:8c:63:2d: 45:15:e4:5a:fc:39:8b:da:4f:4b:e5:0f:b0:d9:45:28: d9:78:ed:09:10:f0:c2:11:34:34:93:43:e4:21:ec:b2: 20:d1:42:71:9a:48:c4:7e:7c:d5:11:61:f0:4e:ec:4f: 5e:b5:27:24:10:ad:d6:40:3f:b0:eb:2e:9f:a3:e5:84: cf:e2:22:e8:ed:73:49:92:cd:5c:3e:6e:9a:2e:c5:ed: ac:68:2d:97:0e:2a:55:d5:fe:38:31:50:d7:0f:1d:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:f2:a1:ce:20:e1:e5:58:ad:16:5f:67:78:25:79:fa: 81:e6:eb:b6:c5:a0:a5:a6:1e:9b:5b:f8:d7:a7:f8:ce: 67:3f:c5:e7:6d:04:7a:51:18:37:55:b4:c9:73:cb:52: 17:d9:42:20:c5:2a:af:b1:32:db:10:34:51:9b:f6:e9: 1b:4f:ce:1f:37:3a:83:ab:6a:9b:4a:76:33:5b:b5:d5: 5a:a5:3e:14:a1:15:54:db:24:d9:d9:2b:99:e0:77:5d: c4:9a:cb:ed:b5:bb:a8:97:28:3c:96:e5:40:0b:d3:5a: 99:ac:5b:bd:e1:72:42:ea:61:e5:66:13:10:4d:d8:8a: 59:0a:dc:63:c8:08:23:b6:a4:54:53:0f:77:a1:14:31: c4:94:da:19:23:1d:eb:fe:10:c9:6d:0a:76:8d:4a:4d: 02:71:75:f9:4a:6b:09:7d:d7:79:01:af:cf:39:ce:fd: a0:59:c4:cd:2d:4e:04:dd:bf:10:b4:13:bb:7a:9f:5b: 51:8c:e0:c5:2f:0d:c7:cf:b1:d1:84:4f:b8:00:ff:5b: be:e2:6b:58:2a:63:4d:19:97:8a:ff:ed:70:1a:82:d4: ab:58:41:a7:be:38:27:a4:bc:fa:81:45:35:0c:c3:8b: e8:0e:a0:dc:3d:c8:1c:76:45:3d:aa:2a:8c:62:40:f1 Fingerprint (SHA-256): AB:1B:5D:4D:23:2D:43:EE:0A:6E:DC:35:AD:7A:D7:59:67:11:AC:D8:54:C8:40:FA:55:6E:F4:5A:B8:43:A7:E3 Fingerprint (SHA1): E7:88:61:DA:93:56:E8:46:73:5D:C0:15:78:F4:B3:D6:51:6F:56:50 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1168: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1169: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204195 (0x37440363) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:48:08 2022 Not After : Mon Sep 27 20:48:08 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:3b:cd:6b:94:6a:da:8c:7c:13:26:8b:7e:91:c6:91: 86:74:e8:0c:67:66:59:ff:68:ba:9b:3e:89:c7:dd:19: 41:55:58:6c:40:b8:f0:9c:65:a6:6d:22:80:b9:10:8c: b6:72:f1:7c:25:8f:56:d6:35:0c:c5:aa:a8:18:7f:ab: fd:93:a8:04:44:03:38:c1:75:1e:4f:7b:ea:c3:e9:e6: a0:af:44:2f:ed:a8:b0:cd:1b:ba:80:f2:eb:df:0c:3d: ab:cf:db:60:dc:25:39:ce:63:13:cb:21:f8:97:53:fb: e2:79:fc:7e:ae:4b:ab:88:d1:fd:f7:4a:d6:ef:3f:44: d6:52:8f:f0:e4:67:3f:fe:2e:ac:3a:5f:7f:f1:24:c7: 42:c6:d0:d6:5c:cb:c9:45:54:5c:de:5c:e5:eb:4f:73: 76:88:b0:37:11:0e:96:b1:38:ac:af:84:ab:30:6a:bd: 94:07:16:d8:32:ee:8f:2e:e4:2c:63:d1:05:68:6c:cc: fb:88:f3:6f:7e:52:a4:5b:c4:9d:14:7f:53:3f:61:83: 06:d6:cc:ea:e5:1b:62:9d:c8:9a:4d:b3:3b:12:9b:6a: 7c:0b:91:2e:07:59:8a:39:b9:d7:06:c8:58:62:7b:3b: d4:eb:f2:64:ae:e7:f0:75:c7:46:ef:25:dc:bf:60:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 22:a0:b4:e6:2b:bb:9b:9d:24:73:6e:0b:85:81:40:59: f8:3d:7d:55:7e:74:98:1c:7e:c5:51:a5:e6:36:f3:3c: 3b:fd:6d:48:4c:3a:c2:33:03:49:ed:e2:16:7d:7a:29: 70:9d:52:cf:7b:15:32:ab:4c:48:de:7f:29:dd:bf:08: 73:20:68:fb:73:a4:d1:f4:8b:16:da:ab:f5:c8:a4:8d: 91:8c:96:27:15:9e:5e:57:0f:bb:72:dc:25:58:6f:c3: 5f:a4:a4:a9:4c:af:c0:7d:00:ab:ba:74:26:2c:35:b6: b2:7e:8e:27:eb:25:bd:ab:a6:d8:de:50:85:eb:f9:9a: 53:11:20:a2:68:8c:8f:f4:e7:6e:b7:5e:d7:31:55:dc: 9d:df:0c:e0:e8:34:f7:0b:1b:05:91:4e:06:28:6f:fd: 67:51:48:e7:ec:8a:f7:12:71:62:2b:68:d7:c8:a9:3c: 0f:8b:00:90:a1:14:89:b3:ac:17:be:45:17:d4:24:38: cd:f4:10:3a:d2:aa:bb:04:0b:2d:9d:0c:b0:6b:3c:19: a5:21:a8:23:8a:b5:9a:08:05:94:d0:21:ae:51:65:f4: 98:34:e1:dd:3d:73:ab:f5:72:7c:29:a0:b4:84:f1:4e: 71:eb:b8:4c:05:f0:76:c1:ab:47:05:35:b5:57:2b:1f Fingerprint (SHA-256): C9:2F:45:CC:A8:0B:8A:3B:29:AF:7E:F8:BC:7D:6A:7C:DF:53:4B:E8:13:29:DC:A1:B9:3E:48:8F:89:1E:07:C9 Fingerprint (SHA1): 76:20:83:0F:30:A4:77:20:F6:A6:D7:DC:E8:9D:26:6B:BF:37:3C:1D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1170: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1171: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204196 (0x37440364) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 20:48:10 2022 Not After : Mon Sep 27 20:48:10 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:72:ee:f4:9b:24:8d:1b:57:75:21:44:e5:b9:3e:72: 67:96:25:21:a0:72:08:20:de:04:68:db:15:7c:c2:4e: 57:70:dc:99:83:42:96:67:be:d8:80:97:72:74:77:93: ec:60:1e:9b:5a:40:3e:6d:16:cd:cd:92:78:f0:b0:d9: b2:90:c7:39:0e:23:2e:03:cf:e9:8a:24:86:16:d4:e9: f0:78:57:75:e8:64:fd:b1:4b:ec:69:6a:b4:cb:19:9e: 87:97:cf:ca:c2:53:0f:d1:d3:4f:47:34:aa:0f:01:a7: d8:83:f6:55:2b:eb:5b:5e:dd:c0:50:8d:2c:41:e9:d2: bd:9c:37:b8:7d:c6:3a:52:5e:a4:48:64:83:40:a0:5b: 43:5f:82:62:ed:39:d4:31:85:30:fb:cd:b4:79:6d:6f: 59:e0:5f:71:72:0a:3f:42:e3:5f:0d:d7:80:8f:f7:5c: 52:b4:ee:20:06:26:de:15:c9:ee:fc:4d:79:d5:27:6d: bf:2f:59:25:67:ea:60:2a:ac:58:4e:1f:2d:9a:de:e0: ff:d0:93:20:59:3e:5b:15:03:d5:76:ad:37:3a:8c:1f: e0:b0:02:19:68:49:c9:7b:91:d0:78:6c:88:6b:33:c9: 73:d8:4f:69:42:28:5a:36:c9:6c:61:ec:40:f5:c5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:97:20:90:10:98:62:89:d0:ab:21:2f:33:d9:5a:45: 9e:ae:74:39:b9:1f:b4:b5:9e:3f:b1:29:90:1a:f5:f9: b0:43:8b:16:8c:45:69:7d:f2:17:ce:42:87:73:ba:db: ba:8e:1f:52:5e:f7:e1:1d:fc:3b:57:89:16:99:ef:36: 79:af:b8:7c:39:bd:a1:f2:e3:b9:4b:37:86:b3:6e:e3: d0:36:17:ee:45:47:92:a5:d9:81:67:cf:82:20:4a:a6: 4d:80:86:bd:ba:6a:64:37:10:b8:a4:9c:72:b9:09:9c: db:9c:86:0b:6e:d9:43:65:65:38:54:3d:fc:bb:0f:16: 7a:87:7a:d6:a6:4e:9a:87:92:f0:db:b3:3b:0e:5a:65: 81:3f:f5:59:da:ff:6d:ba:ce:34:67:25:65:23:ca:78: ea:cb:7c:6a:ae:53:55:5a:4d:5e:55:a9:a8:c9:29:6c: 62:89:f9:4c:89:da:72:99:b7:61:1b:e1:d2:e4:29:a1: 35:40:be:b1:a3:23:f6:cd:b8:11:e6:88:46:10:c9:5c: a7:5d:4f:f1:e5:1d:3b:c6:a1:ec:ef:ac:ab:f7:47:b6: 71:c4:85:4b:9b:82:91:d0:75:2f:26:4b:82:7d:03:1b: 20:9a:84:a6:5f:69:3e:8f:3d:dc:12:81:32:d0:55:9b Fingerprint (SHA-256): FD:C8:C2:21:49:5E:4F:7A:89:E2:4B:6D:65:80:FD:79:B6:14:04:CC:E7:E8:0D:7B:55:1B:80:4A:2E:AD:2B:32 Fingerprint (SHA1): D8:93:CC:34:BD:F5:E0:4A:B4:88:74:C0:FB:8A:6E:EB:A1:4D:32:E0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1172: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1173: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1174: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1175: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1176: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204194 (0x37440362) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:48:06 2022 Not After : Tue Sep 27 20:48:06 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:6e:dc:a6:d4:96:1f:1a:8f:87:c9:d8:f5:1c:b8:95: 37:61:c8:fb:dd:b2:8a:2d:71:11:b3:af:c5:3c:2d:97: f2:90:a4:e2:a9:5f:27:9d:7d:aa:3b:65:c8:7a:c8:94: 8f:cf:f6:c1:0c:80:dc:38:a2:03:3f:1b:8d:98:77:50: df:40:24:7f:cb:91:15:7a:97:0f:79:af:91:20:a9:e9: 9c:06:02:a1:63:fa:35:d4:21:25:97:87:72:ee:a2:37: ea:e8:02:22:81:f2:a8:22:10:e2:31:39:ad:9c:fe:51: 74:62:78:5d:71:8d:c7:2d:3c:29:48:ee:80:8b:f7:6a: 47:85:52:17:09:f4:97:f3:e4:d6:39:f0:b4:3c:13:64: f1:9a:67:60:64:6e:7f:49:9c:14:ad:ab:78:8c:63:2d: 45:15:e4:5a:fc:39:8b:da:4f:4b:e5:0f:b0:d9:45:28: d9:78:ed:09:10:f0:c2:11:34:34:93:43:e4:21:ec:b2: 20:d1:42:71:9a:48:c4:7e:7c:d5:11:61:f0:4e:ec:4f: 5e:b5:27:24:10:ad:d6:40:3f:b0:eb:2e:9f:a3:e5:84: cf:e2:22:e8:ed:73:49:92:cd:5c:3e:6e:9a:2e:c5:ed: ac:68:2d:97:0e:2a:55:d5:fe:38:31:50:d7:0f:1d:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:f2:a1:ce:20:e1:e5:58:ad:16:5f:67:78:25:79:fa: 81:e6:eb:b6:c5:a0:a5:a6:1e:9b:5b:f8:d7:a7:f8:ce: 67:3f:c5:e7:6d:04:7a:51:18:37:55:b4:c9:73:cb:52: 17:d9:42:20:c5:2a:af:b1:32:db:10:34:51:9b:f6:e9: 1b:4f:ce:1f:37:3a:83:ab:6a:9b:4a:76:33:5b:b5:d5: 5a:a5:3e:14:a1:15:54:db:24:d9:d9:2b:99:e0:77:5d: c4:9a:cb:ed:b5:bb:a8:97:28:3c:96:e5:40:0b:d3:5a: 99:ac:5b:bd:e1:72:42:ea:61:e5:66:13:10:4d:d8:8a: 59:0a:dc:63:c8:08:23:b6:a4:54:53:0f:77:a1:14:31: c4:94:da:19:23:1d:eb:fe:10:c9:6d:0a:76:8d:4a:4d: 02:71:75:f9:4a:6b:09:7d:d7:79:01:af:cf:39:ce:fd: a0:59:c4:cd:2d:4e:04:dd:bf:10:b4:13:bb:7a:9f:5b: 51:8c:e0:c5:2f:0d:c7:cf:b1:d1:84:4f:b8:00:ff:5b: be:e2:6b:58:2a:63:4d:19:97:8a:ff:ed:70:1a:82:d4: ab:58:41:a7:be:38:27:a4:bc:fa:81:45:35:0c:c3:8b: e8:0e:a0:dc:3d:c8:1c:76:45:3d:aa:2a:8c:62:40:f1 Fingerprint (SHA-256): AB:1B:5D:4D:23:2D:43:EE:0A:6E:DC:35:AD:7A:D7:59:67:11:AC:D8:54:C8:40:FA:55:6E:F4:5A:B8:43:A7:E3 Fingerprint (SHA1): E7:88:61:DA:93:56:E8:46:73:5D:C0:15:78:F4:B3:D6:51:6F:56:50 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1177: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1178: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204195 (0x37440363) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:48:08 2022 Not After : Mon Sep 27 20:48:08 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:3b:cd:6b:94:6a:da:8c:7c:13:26:8b:7e:91:c6:91: 86:74:e8:0c:67:66:59:ff:68:ba:9b:3e:89:c7:dd:19: 41:55:58:6c:40:b8:f0:9c:65:a6:6d:22:80:b9:10:8c: b6:72:f1:7c:25:8f:56:d6:35:0c:c5:aa:a8:18:7f:ab: fd:93:a8:04:44:03:38:c1:75:1e:4f:7b:ea:c3:e9:e6: a0:af:44:2f:ed:a8:b0:cd:1b:ba:80:f2:eb:df:0c:3d: ab:cf:db:60:dc:25:39:ce:63:13:cb:21:f8:97:53:fb: e2:79:fc:7e:ae:4b:ab:88:d1:fd:f7:4a:d6:ef:3f:44: d6:52:8f:f0:e4:67:3f:fe:2e:ac:3a:5f:7f:f1:24:c7: 42:c6:d0:d6:5c:cb:c9:45:54:5c:de:5c:e5:eb:4f:73: 76:88:b0:37:11:0e:96:b1:38:ac:af:84:ab:30:6a:bd: 94:07:16:d8:32:ee:8f:2e:e4:2c:63:d1:05:68:6c:cc: fb:88:f3:6f:7e:52:a4:5b:c4:9d:14:7f:53:3f:61:83: 06:d6:cc:ea:e5:1b:62:9d:c8:9a:4d:b3:3b:12:9b:6a: 7c:0b:91:2e:07:59:8a:39:b9:d7:06:c8:58:62:7b:3b: d4:eb:f2:64:ae:e7:f0:75:c7:46:ef:25:dc:bf:60:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 22:a0:b4:e6:2b:bb:9b:9d:24:73:6e:0b:85:81:40:59: f8:3d:7d:55:7e:74:98:1c:7e:c5:51:a5:e6:36:f3:3c: 3b:fd:6d:48:4c:3a:c2:33:03:49:ed:e2:16:7d:7a:29: 70:9d:52:cf:7b:15:32:ab:4c:48:de:7f:29:dd:bf:08: 73:20:68:fb:73:a4:d1:f4:8b:16:da:ab:f5:c8:a4:8d: 91:8c:96:27:15:9e:5e:57:0f:bb:72:dc:25:58:6f:c3: 5f:a4:a4:a9:4c:af:c0:7d:00:ab:ba:74:26:2c:35:b6: b2:7e:8e:27:eb:25:bd:ab:a6:d8:de:50:85:eb:f9:9a: 53:11:20:a2:68:8c:8f:f4:e7:6e:b7:5e:d7:31:55:dc: 9d:df:0c:e0:e8:34:f7:0b:1b:05:91:4e:06:28:6f:fd: 67:51:48:e7:ec:8a:f7:12:71:62:2b:68:d7:c8:a9:3c: 0f:8b:00:90:a1:14:89:b3:ac:17:be:45:17:d4:24:38: cd:f4:10:3a:d2:aa:bb:04:0b:2d:9d:0c:b0:6b:3c:19: a5:21:a8:23:8a:b5:9a:08:05:94:d0:21:ae:51:65:f4: 98:34:e1:dd:3d:73:ab:f5:72:7c:29:a0:b4:84:f1:4e: 71:eb:b8:4c:05:f0:76:c1:ab:47:05:35:b5:57:2b:1f Fingerprint (SHA-256): C9:2F:45:CC:A8:0B:8A:3B:29:AF:7E:F8:BC:7D:6A:7C:DF:53:4B:E8:13:29:DC:A1:B9:3E:48:8F:89:1E:07:C9 Fingerprint (SHA1): 76:20:83:0F:30:A4:77:20:F6:A6:D7:DC:E8:9D:26:6B:BF:37:3C:1D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1179: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1180: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204196 (0x37440364) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 20:48:10 2022 Not After : Mon Sep 27 20:48:10 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:72:ee:f4:9b:24:8d:1b:57:75:21:44:e5:b9:3e:72: 67:96:25:21:a0:72:08:20:de:04:68:db:15:7c:c2:4e: 57:70:dc:99:83:42:96:67:be:d8:80:97:72:74:77:93: ec:60:1e:9b:5a:40:3e:6d:16:cd:cd:92:78:f0:b0:d9: b2:90:c7:39:0e:23:2e:03:cf:e9:8a:24:86:16:d4:e9: f0:78:57:75:e8:64:fd:b1:4b:ec:69:6a:b4:cb:19:9e: 87:97:cf:ca:c2:53:0f:d1:d3:4f:47:34:aa:0f:01:a7: d8:83:f6:55:2b:eb:5b:5e:dd:c0:50:8d:2c:41:e9:d2: bd:9c:37:b8:7d:c6:3a:52:5e:a4:48:64:83:40:a0:5b: 43:5f:82:62:ed:39:d4:31:85:30:fb:cd:b4:79:6d:6f: 59:e0:5f:71:72:0a:3f:42:e3:5f:0d:d7:80:8f:f7:5c: 52:b4:ee:20:06:26:de:15:c9:ee:fc:4d:79:d5:27:6d: bf:2f:59:25:67:ea:60:2a:ac:58:4e:1f:2d:9a:de:e0: ff:d0:93:20:59:3e:5b:15:03:d5:76:ad:37:3a:8c:1f: e0:b0:02:19:68:49:c9:7b:91:d0:78:6c:88:6b:33:c9: 73:d8:4f:69:42:28:5a:36:c9:6c:61:ec:40:f5:c5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:97:20:90:10:98:62:89:d0:ab:21:2f:33:d9:5a:45: 9e:ae:74:39:b9:1f:b4:b5:9e:3f:b1:29:90:1a:f5:f9: b0:43:8b:16:8c:45:69:7d:f2:17:ce:42:87:73:ba:db: ba:8e:1f:52:5e:f7:e1:1d:fc:3b:57:89:16:99:ef:36: 79:af:b8:7c:39:bd:a1:f2:e3:b9:4b:37:86:b3:6e:e3: d0:36:17:ee:45:47:92:a5:d9:81:67:cf:82:20:4a:a6: 4d:80:86:bd:ba:6a:64:37:10:b8:a4:9c:72:b9:09:9c: db:9c:86:0b:6e:d9:43:65:65:38:54:3d:fc:bb:0f:16: 7a:87:7a:d6:a6:4e:9a:87:92:f0:db:b3:3b:0e:5a:65: 81:3f:f5:59:da:ff:6d:ba:ce:34:67:25:65:23:ca:78: ea:cb:7c:6a:ae:53:55:5a:4d:5e:55:a9:a8:c9:29:6c: 62:89:f9:4c:89:da:72:99:b7:61:1b:e1:d2:e4:29:a1: 35:40:be:b1:a3:23:f6:cd:b8:11:e6:88:46:10:c9:5c: a7:5d:4f:f1:e5:1d:3b:c6:a1:ec:ef:ac:ab:f7:47:b6: 71:c4:85:4b:9b:82:91:d0:75:2f:26:4b:82:7d:03:1b: 20:9a:84:a6:5f:69:3e:8f:3d:dc:12:81:32:d0:55:9b Fingerprint (SHA-256): FD:C8:C2:21:49:5E:4F:7A:89:E2:4B:6D:65:80:FD:79:B6:14:04:CC:E7:E8:0D:7B:55:1B:80:4A:2E:AD:2B:32 Fingerprint (SHA1): D8:93:CC:34:BD:F5:E0:4A:B4:88:74:C0:FB:8A:6E:EB:A1:4D:32:E0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1181: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1182: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1183: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204198 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1184: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1185: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1186: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1187: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927204199 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1188: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1189: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1190: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1191: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927204200 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1192: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1193: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1194: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1195: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 927204201 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1196: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1197: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1198: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1199: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 927204202 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1200: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1201: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1202: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204198 (0x37440366) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:48:17 2022 Not After : Tue Sep 27 20:48:17 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:4d:09:3c:83:cb:cf:d6:aa:b0:66:29:0a:a0:41:3b: 60:f7:3f:9c:bc:27:f6:c9:3f:b6:04:33:0e:6f:ca:f2: c8:f0:88:d1:cb:56:18:3c:29:6c:89:90:91:f9:4e:21: d1:68:58:cb:ca:4f:80:4c:24:d2:c5:72:ba:1f:37:74: cd:c8:81:ee:c4:38:42:1b:42:22:86:5d:c0:21:1c:97: d4:d2:c4:a2:68:78:6f:b6:6b:5b:3b:16:2b:a3:b0:6a: 88:e7:55:41:e1:87:8c:74:c3:ec:59:3b:6c:fb:3f:ba: 15:85:26:ba:54:3f:7b:0c:bf:2b:05:68:a2:10:33:c1: 77:f6:46:83:ae:e5:67:b9:8b:d9:4c:5e:cc:2c:04:81: 53:04:83:d7:cf:0e:ad:58:53:d3:dd:ae:f4:60:6d:b8: 30:1b:33:48:c1:ef:90:9a:b1:ba:46:8f:47:fd:12:f1: df:55:bf:96:5f:17:0a:49:fb:6d:49:e0:f0:b0:d9:e1: b0:27:7f:90:26:ae:d0:0c:2e:0c:5e:b1:86:22:a8:8b: 3e:3c:6f:82:ef:07:d6:0f:a5:07:a8:16:1e:4e:db:2f: f4:ee:f0:89:63:40:71:fa:08:5a:f5:08:49:aa:70:d8: 9d:f9:18:7c:55:6c:ff:e7:a2:98:2a:b5:b1:1e:a5:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:e8:0f:32:18:71:ae:aa:a5:53:34:55:a0:8e:9f:05: a0:f0:1f:ae:c7:2a:50:ad:c3:7c:d2:0f:7c:23:b6:c1: a3:cd:ed:cb:9a:c9:1e:4c:c8:49:41:87:fa:16:c4:f9: 32:78:95:00:52:57:0e:13:21:1f:ce:9d:49:4f:23:70: 67:54:7e:59:4f:21:a8:c9:f4:c0:f7:87:9b:f1:d5:88: 64:9f:8b:3e:01:4c:4f:b6:c3:e5:3b:53:f9:f5:4d:76: 75:e0:d2:a6:25:86:22:44:d1:69:a4:69:86:07:b8:44: 95:b0:17:b9:97:fd:b5:5f:59:a0:13:b2:d7:57:82:dd: 27:70:b5:28:e0:e8:13:ed:d8:c3:3f:b6:3b:23:62:3a: ac:45:99:29:a1:f7:c1:48:b4:5d:80:ac:13:43:cd:dd: 6a:c4:c7:7c:d4:25:fe:79:92:00:d2:64:56:30:f1:cd: 17:82:cb:d9:95:92:8a:1d:c2:29:60:09:a3:84:bb:5c: 3c:74:c4:9a:69:96:e9:d3:dc:fe:95:1f:9f:9d:ac:66: f3:37:7e:5a:9e:d7:06:e3:e7:24:85:96:9a:f9:46:ce: 4a:b1:cd:c0:40:d9:27:d9:b0:a9:3d:ed:91:2a:75:e8: 0f:29:3f:85:6a:f6:8e:21:63:cd:00:59:9b:94:d3:73 Fingerprint (SHA-256): 90:DE:FC:E0:11:B3:16:AF:5C:3B:E5:24:58:9E:E2:E3:A9:AE:6C:55:1C:B9:13:45:67:37:D3:F5:F4:92:FA:40 Fingerprint (SHA1): 1C:67:31:B6:64:31:A0:68:0E:FA:06:77:73:CE:08:CF:DF:F8:36:B8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1203: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1204: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204199 (0x37440367) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:48:19 2022 Not After : Mon Sep 27 20:48:19 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:9e:8d:62:5b:e9:bf:01:9b:36:a1:df:af:ee:d0:8e: 20:40:90:32:9a:8f:9a:87:c7:c2:cb:27:d5:ec:71:12: 4a:9d:d7:7b:cf:b8:09:fb:be:2c:64:53:1d:bc:a8:20: a2:32:8e:1e:2a:7f:0e:ac:b2:9a:97:10:1c:38:be:fd: 11:a6:8c:60:fa:50:b4:c8:e3:d0:1c:59:07:4c:9a:66: 6d:08:3a:62:83:5c:a4:68:ff:bc:4a:ac:7b:44:10:b6: 02:f5:dc:8b:49:73:a6:63:ef:ee:dc:1d:b9:c7:4c:d7: 47:15:aa:d2:28:4f:8f:4d:bf:87:77:a3:74:ae:9b:d8: 09:08:9b:0d:3b:35:0d:b9:30:53:39:2d:29:bd:9c:4a: 08:1b:30:42:32:3c:13:36:be:4e:49:b8:e2:2c:89:b0: 1e:5d:61:3d:78:78:97:03:ce:55:80:34:e1:b4:f3:eb: 2b:4e:e5:b1:f2:74:5d:d5:28:cf:86:37:50:d2:8c:f0: 32:78:b6:06:b1:1c:b9:a4:b4:f8:4a:59:d2:e1:e7:eb: 5a:08:d8:e7:a3:1d:76:8a:33:db:93:83:ee:6a:eb:85: ee:29:8d:65:48:17:5f:f3:22:a9:f6:b0:15:83:68:cb: ec:06:8f:55:2e:5a:1a:4c:90:c7:50:28:79:a7:fa:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:e3:e7:7d:a9:88:74:ef:fb:c6:b6:aa:76:e3:26:a7: 62:5b:c5:7f:30:22:fa:31:ce:12:01:bb:9d:32:1c:71: 46:95:68:ea:42:52:5e:b3:35:5d:0a:29:43:2a:6b:2f: 3e:a2:9c:ed:ce:df:93:70:00:1c:19:27:4a:89:aa:85: 97:0e:2b:0a:5f:6b:a4:b3:66:e1:e1:b4:85:a7:b5:e1: ee:cf:fe:c5:f9:19:29:db:d1:62:cc:94:ee:ad:82:0d: dc:ab:f0:10:86:1a:e5:a6:26:3f:80:dc:59:c5:b7:0e: c1:aa:de:17:0f:19:6c:18:ad:82:e4:a3:27:4f:44:aa: 45:fb:d7:c2:21:69:27:43:2b:f4:f3:55:ac:cb:0a:1e: 74:8a:32:19:09:37:d3:d5:e8:08:40:2d:fc:28:f4:85: eb:21:fe:bd:af:1d:56:e0:89:90:48:3b:fd:6f:58:8b: 52:d5:fc:a9:a0:90:49:52:37:df:f1:75:58:2b:b0:ef: cb:04:60:c6:31:ca:a9:7d:c0:43:a8:29:ce:9b:90:60: 73:dd:49:5b:d6:21:5d:c1:30:a7:bb:27:37:0a:77:5d: ec:ea:41:6f:d3:86:d2:fa:c8:b4:3c:b8:71:b0:93:1d: ee:4d:5b:22:0a:be:74:e1:17:0a:c0:9e:47:8f:1e:b7 Fingerprint (SHA-256): 52:00:28:55:57:B2:1B:90:94:99:7F:9D:86:6A:7B:D9:07:27:17:E3:CD:4D:F2:A0:1C:8B:3D:DF:D1:1B:86:A0 Fingerprint (SHA1): B7:67:59:49:29:BD:FE:78:B4:27:F3:48:65:A4:B7:2D:23:48:94:CC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1205: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1206: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204200 (0x37440368) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 20:48:20 2022 Not After : Mon Sep 27 20:48:20 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f3:a7:f0:d6:4a:0d:73:9c:ee:3b:2e:9c:96:35:88:13: 80:da:3c:1e:4a:5d:2b:c0:84:09:c4:c5:4f:b7:0d:7e: 59:c8:ed:3b:a9:90:c5:46:55:49:01:59:88:6b:15:c2: cd:37:09:4d:bf:34:93:ab:8b:04:2e:8f:b3:a2:c2:a5: b6:c5:37:5f:b1:b1:3b:c4:80:31:c3:be:5a:68:02:5a: 43:b2:ba:fb:d1:fb:1f:d3:3c:df:53:67:a7:b3:77:a2: 43:03:49:85:e5:1c:0e:3e:41:92:c5:72:8d:c1:50:3c: d7:81:f5:8d:57:a9:9b:b4:33:81:6c:4c:bc:3d:16:47: 40:3f:88:4f:39:a5:f6:f1:03:7c:fb:90:cc:16:a6:42: 3d:c4:44:66:55:1f:19:db:88:a7:2c:83:28:44:25:c1: 88:eb:64:ea:3b:ed:a9:9c:8d:46:c1:49:9a:16:7b:8c: 29:af:86:09:3d:a0:98:1a:18:2e:c7:08:75:4f:31:6b: a7:4b:16:f9:f1:2f:cf:34:08:6f:3d:40:cc:d6:fe:d3: 9c:4f:b2:6f:be:b2:f9:35:93:5a:5d:cc:2e:4b:37:bd: fd:d7:b2:35:5b:4f:7b:e8:9a:8e:2e:00:db:a9:cb:99: f1:a2:49:ed:33:57:85:2e:01:ab:94:5c:99:30:1e:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:d5:69:fe:ac:c8:ca:40:40:f9:f1:f9:11:66:d9:3e: 0a:b3:7a:7c:14:be:aa:d9:fb:15:1c:ba:83:c3:2d:12: 8a:01:a5:45:f6:42:fe:11:40:17:80:e5:64:d9:d0:81: b4:d0:73:19:bc:99:92:b0:b2:89:84:6e:b6:07:7d:37: 32:77:e7:42:f4:30:0e:b7:40:ed:22:e5:5c:d6:bb:8d: 6a:87:a9:5e:b3:06:b1:42:e5:e0:9d:f1:34:08:3b:84: 3e:16:31:18:c1:fa:ec:31:c4:26:20:8e:a6:b0:af:cd: cd:2f:f0:79:b4:54:26:39:53:d7:0f:9f:2d:64:32:4e: f9:de:15:b0:7a:72:6e:06:7b:40:70:4e:a8:03:19:77: e7:35:dc:df:49:3e:0e:16:e5:4c:10:40:78:c2:66:df: d8:c4:84:93:b1:53:40:65:9f:12:22:05:db:bd:fe:d9: d1:62:73:f0:2e:96:c5:14:c2:ee:c7:80:da:08:95:da: 0d:66:2d:96:ba:ac:c6:c2:51:8d:e8:a4:e9:7f:3d:dd: 0c:5d:5f:14:35:8d:40:00:0f:22:5b:7c:4c:0c:f9:d3: bb:de:c1:e2:1d:54:2d:4b:24:24:c3:c8:d1:20:4e:9e: 68:b4:75:b6:54:61:37:33:57:44:de:dc:51:e7:27:01 Fingerprint (SHA-256): 74:49:68:EA:F5:DE:94:08:CF:04:15:D6:0A:5B:6A:D4:E6:9B:35:23:63:DA:8A:8B:7A:E7:99:B4:AF:CE:8E:67 Fingerprint (SHA1): 00:D0:84:0E:79:C1:3E:21:5E:72:92:14:B1:C9:3A:7A:C9:64:05:EC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1207: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1208: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1209: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1210: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1211: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204198 (0x37440366) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:48:17 2022 Not After : Tue Sep 27 20:48:17 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:4d:09:3c:83:cb:cf:d6:aa:b0:66:29:0a:a0:41:3b: 60:f7:3f:9c:bc:27:f6:c9:3f:b6:04:33:0e:6f:ca:f2: c8:f0:88:d1:cb:56:18:3c:29:6c:89:90:91:f9:4e:21: d1:68:58:cb:ca:4f:80:4c:24:d2:c5:72:ba:1f:37:74: cd:c8:81:ee:c4:38:42:1b:42:22:86:5d:c0:21:1c:97: d4:d2:c4:a2:68:78:6f:b6:6b:5b:3b:16:2b:a3:b0:6a: 88:e7:55:41:e1:87:8c:74:c3:ec:59:3b:6c:fb:3f:ba: 15:85:26:ba:54:3f:7b:0c:bf:2b:05:68:a2:10:33:c1: 77:f6:46:83:ae:e5:67:b9:8b:d9:4c:5e:cc:2c:04:81: 53:04:83:d7:cf:0e:ad:58:53:d3:dd:ae:f4:60:6d:b8: 30:1b:33:48:c1:ef:90:9a:b1:ba:46:8f:47:fd:12:f1: df:55:bf:96:5f:17:0a:49:fb:6d:49:e0:f0:b0:d9:e1: b0:27:7f:90:26:ae:d0:0c:2e:0c:5e:b1:86:22:a8:8b: 3e:3c:6f:82:ef:07:d6:0f:a5:07:a8:16:1e:4e:db:2f: f4:ee:f0:89:63:40:71:fa:08:5a:f5:08:49:aa:70:d8: 9d:f9:18:7c:55:6c:ff:e7:a2:98:2a:b5:b1:1e:a5:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:e8:0f:32:18:71:ae:aa:a5:53:34:55:a0:8e:9f:05: a0:f0:1f:ae:c7:2a:50:ad:c3:7c:d2:0f:7c:23:b6:c1: a3:cd:ed:cb:9a:c9:1e:4c:c8:49:41:87:fa:16:c4:f9: 32:78:95:00:52:57:0e:13:21:1f:ce:9d:49:4f:23:70: 67:54:7e:59:4f:21:a8:c9:f4:c0:f7:87:9b:f1:d5:88: 64:9f:8b:3e:01:4c:4f:b6:c3:e5:3b:53:f9:f5:4d:76: 75:e0:d2:a6:25:86:22:44:d1:69:a4:69:86:07:b8:44: 95:b0:17:b9:97:fd:b5:5f:59:a0:13:b2:d7:57:82:dd: 27:70:b5:28:e0:e8:13:ed:d8:c3:3f:b6:3b:23:62:3a: ac:45:99:29:a1:f7:c1:48:b4:5d:80:ac:13:43:cd:dd: 6a:c4:c7:7c:d4:25:fe:79:92:00:d2:64:56:30:f1:cd: 17:82:cb:d9:95:92:8a:1d:c2:29:60:09:a3:84:bb:5c: 3c:74:c4:9a:69:96:e9:d3:dc:fe:95:1f:9f:9d:ac:66: f3:37:7e:5a:9e:d7:06:e3:e7:24:85:96:9a:f9:46:ce: 4a:b1:cd:c0:40:d9:27:d9:b0:a9:3d:ed:91:2a:75:e8: 0f:29:3f:85:6a:f6:8e:21:63:cd:00:59:9b:94:d3:73 Fingerprint (SHA-256): 90:DE:FC:E0:11:B3:16:AF:5C:3B:E5:24:58:9E:E2:E3:A9:AE:6C:55:1C:B9:13:45:67:37:D3:F5:F4:92:FA:40 Fingerprint (SHA1): 1C:67:31:B6:64:31:A0:68:0E:FA:06:77:73:CE:08:CF:DF:F8:36:B8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1212: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1213: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204199 (0x37440367) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:48:19 2022 Not After : Mon Sep 27 20:48:19 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:9e:8d:62:5b:e9:bf:01:9b:36:a1:df:af:ee:d0:8e: 20:40:90:32:9a:8f:9a:87:c7:c2:cb:27:d5:ec:71:12: 4a:9d:d7:7b:cf:b8:09:fb:be:2c:64:53:1d:bc:a8:20: a2:32:8e:1e:2a:7f:0e:ac:b2:9a:97:10:1c:38:be:fd: 11:a6:8c:60:fa:50:b4:c8:e3:d0:1c:59:07:4c:9a:66: 6d:08:3a:62:83:5c:a4:68:ff:bc:4a:ac:7b:44:10:b6: 02:f5:dc:8b:49:73:a6:63:ef:ee:dc:1d:b9:c7:4c:d7: 47:15:aa:d2:28:4f:8f:4d:bf:87:77:a3:74:ae:9b:d8: 09:08:9b:0d:3b:35:0d:b9:30:53:39:2d:29:bd:9c:4a: 08:1b:30:42:32:3c:13:36:be:4e:49:b8:e2:2c:89:b0: 1e:5d:61:3d:78:78:97:03:ce:55:80:34:e1:b4:f3:eb: 2b:4e:e5:b1:f2:74:5d:d5:28:cf:86:37:50:d2:8c:f0: 32:78:b6:06:b1:1c:b9:a4:b4:f8:4a:59:d2:e1:e7:eb: 5a:08:d8:e7:a3:1d:76:8a:33:db:93:83:ee:6a:eb:85: ee:29:8d:65:48:17:5f:f3:22:a9:f6:b0:15:83:68:cb: ec:06:8f:55:2e:5a:1a:4c:90:c7:50:28:79:a7:fa:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:e3:e7:7d:a9:88:74:ef:fb:c6:b6:aa:76:e3:26:a7: 62:5b:c5:7f:30:22:fa:31:ce:12:01:bb:9d:32:1c:71: 46:95:68:ea:42:52:5e:b3:35:5d:0a:29:43:2a:6b:2f: 3e:a2:9c:ed:ce:df:93:70:00:1c:19:27:4a:89:aa:85: 97:0e:2b:0a:5f:6b:a4:b3:66:e1:e1:b4:85:a7:b5:e1: ee:cf:fe:c5:f9:19:29:db:d1:62:cc:94:ee:ad:82:0d: dc:ab:f0:10:86:1a:e5:a6:26:3f:80:dc:59:c5:b7:0e: c1:aa:de:17:0f:19:6c:18:ad:82:e4:a3:27:4f:44:aa: 45:fb:d7:c2:21:69:27:43:2b:f4:f3:55:ac:cb:0a:1e: 74:8a:32:19:09:37:d3:d5:e8:08:40:2d:fc:28:f4:85: eb:21:fe:bd:af:1d:56:e0:89:90:48:3b:fd:6f:58:8b: 52:d5:fc:a9:a0:90:49:52:37:df:f1:75:58:2b:b0:ef: cb:04:60:c6:31:ca:a9:7d:c0:43:a8:29:ce:9b:90:60: 73:dd:49:5b:d6:21:5d:c1:30:a7:bb:27:37:0a:77:5d: ec:ea:41:6f:d3:86:d2:fa:c8:b4:3c:b8:71:b0:93:1d: ee:4d:5b:22:0a:be:74:e1:17:0a:c0:9e:47:8f:1e:b7 Fingerprint (SHA-256): 52:00:28:55:57:B2:1B:90:94:99:7F:9D:86:6A:7B:D9:07:27:17:E3:CD:4D:F2:A0:1C:8B:3D:DF:D1:1B:86:A0 Fingerprint (SHA1): B7:67:59:49:29:BD:FE:78:B4:27:F3:48:65:A4:B7:2D:23:48:94:CC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1214: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1215: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204200 (0x37440368) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 20:48:20 2022 Not After : Mon Sep 27 20:48:20 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f3:a7:f0:d6:4a:0d:73:9c:ee:3b:2e:9c:96:35:88:13: 80:da:3c:1e:4a:5d:2b:c0:84:09:c4:c5:4f:b7:0d:7e: 59:c8:ed:3b:a9:90:c5:46:55:49:01:59:88:6b:15:c2: cd:37:09:4d:bf:34:93:ab:8b:04:2e:8f:b3:a2:c2:a5: b6:c5:37:5f:b1:b1:3b:c4:80:31:c3:be:5a:68:02:5a: 43:b2:ba:fb:d1:fb:1f:d3:3c:df:53:67:a7:b3:77:a2: 43:03:49:85:e5:1c:0e:3e:41:92:c5:72:8d:c1:50:3c: d7:81:f5:8d:57:a9:9b:b4:33:81:6c:4c:bc:3d:16:47: 40:3f:88:4f:39:a5:f6:f1:03:7c:fb:90:cc:16:a6:42: 3d:c4:44:66:55:1f:19:db:88:a7:2c:83:28:44:25:c1: 88:eb:64:ea:3b:ed:a9:9c:8d:46:c1:49:9a:16:7b:8c: 29:af:86:09:3d:a0:98:1a:18:2e:c7:08:75:4f:31:6b: a7:4b:16:f9:f1:2f:cf:34:08:6f:3d:40:cc:d6:fe:d3: 9c:4f:b2:6f:be:b2:f9:35:93:5a:5d:cc:2e:4b:37:bd: fd:d7:b2:35:5b:4f:7b:e8:9a:8e:2e:00:db:a9:cb:99: f1:a2:49:ed:33:57:85:2e:01:ab:94:5c:99:30:1e:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:d5:69:fe:ac:c8:ca:40:40:f9:f1:f9:11:66:d9:3e: 0a:b3:7a:7c:14:be:aa:d9:fb:15:1c:ba:83:c3:2d:12: 8a:01:a5:45:f6:42:fe:11:40:17:80:e5:64:d9:d0:81: b4:d0:73:19:bc:99:92:b0:b2:89:84:6e:b6:07:7d:37: 32:77:e7:42:f4:30:0e:b7:40:ed:22:e5:5c:d6:bb:8d: 6a:87:a9:5e:b3:06:b1:42:e5:e0:9d:f1:34:08:3b:84: 3e:16:31:18:c1:fa:ec:31:c4:26:20:8e:a6:b0:af:cd: cd:2f:f0:79:b4:54:26:39:53:d7:0f:9f:2d:64:32:4e: f9:de:15:b0:7a:72:6e:06:7b:40:70:4e:a8:03:19:77: e7:35:dc:df:49:3e:0e:16:e5:4c:10:40:78:c2:66:df: d8:c4:84:93:b1:53:40:65:9f:12:22:05:db:bd:fe:d9: d1:62:73:f0:2e:96:c5:14:c2:ee:c7:80:da:08:95:da: 0d:66:2d:96:ba:ac:c6:c2:51:8d:e8:a4:e9:7f:3d:dd: 0c:5d:5f:14:35:8d:40:00:0f:22:5b:7c:4c:0c:f9:d3: bb:de:c1:e2:1d:54:2d:4b:24:24:c3:c8:d1:20:4e:9e: 68:b4:75:b6:54:61:37:33:57:44:de:dc:51:e7:27:01 Fingerprint (SHA-256): 74:49:68:EA:F5:DE:94:08:CF:04:15:D6:0A:5B:6A:D4:E6:9B:35:23:63:DA:8A:8B:7A:E7:99:B4:AF:CE:8E:67 Fingerprint (SHA1): 00:D0:84:0E:79:C1:3E:21:5E:72:92:14:B1:C9:3A:7A:C9:64:05:EC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1216: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1217: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204198 (0x37440366) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:48:17 2022 Not After : Tue Sep 27 20:48:17 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:4d:09:3c:83:cb:cf:d6:aa:b0:66:29:0a:a0:41:3b: 60:f7:3f:9c:bc:27:f6:c9:3f:b6:04:33:0e:6f:ca:f2: c8:f0:88:d1:cb:56:18:3c:29:6c:89:90:91:f9:4e:21: d1:68:58:cb:ca:4f:80:4c:24:d2:c5:72:ba:1f:37:74: cd:c8:81:ee:c4:38:42:1b:42:22:86:5d:c0:21:1c:97: d4:d2:c4:a2:68:78:6f:b6:6b:5b:3b:16:2b:a3:b0:6a: 88:e7:55:41:e1:87:8c:74:c3:ec:59:3b:6c:fb:3f:ba: 15:85:26:ba:54:3f:7b:0c:bf:2b:05:68:a2:10:33:c1: 77:f6:46:83:ae:e5:67:b9:8b:d9:4c:5e:cc:2c:04:81: 53:04:83:d7:cf:0e:ad:58:53:d3:dd:ae:f4:60:6d:b8: 30:1b:33:48:c1:ef:90:9a:b1:ba:46:8f:47:fd:12:f1: df:55:bf:96:5f:17:0a:49:fb:6d:49:e0:f0:b0:d9:e1: b0:27:7f:90:26:ae:d0:0c:2e:0c:5e:b1:86:22:a8:8b: 3e:3c:6f:82:ef:07:d6:0f:a5:07:a8:16:1e:4e:db:2f: f4:ee:f0:89:63:40:71:fa:08:5a:f5:08:49:aa:70:d8: 9d:f9:18:7c:55:6c:ff:e7:a2:98:2a:b5:b1:1e:a5:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:e8:0f:32:18:71:ae:aa:a5:53:34:55:a0:8e:9f:05: a0:f0:1f:ae:c7:2a:50:ad:c3:7c:d2:0f:7c:23:b6:c1: a3:cd:ed:cb:9a:c9:1e:4c:c8:49:41:87:fa:16:c4:f9: 32:78:95:00:52:57:0e:13:21:1f:ce:9d:49:4f:23:70: 67:54:7e:59:4f:21:a8:c9:f4:c0:f7:87:9b:f1:d5:88: 64:9f:8b:3e:01:4c:4f:b6:c3:e5:3b:53:f9:f5:4d:76: 75:e0:d2:a6:25:86:22:44:d1:69:a4:69:86:07:b8:44: 95:b0:17:b9:97:fd:b5:5f:59:a0:13:b2:d7:57:82:dd: 27:70:b5:28:e0:e8:13:ed:d8:c3:3f:b6:3b:23:62:3a: ac:45:99:29:a1:f7:c1:48:b4:5d:80:ac:13:43:cd:dd: 6a:c4:c7:7c:d4:25:fe:79:92:00:d2:64:56:30:f1:cd: 17:82:cb:d9:95:92:8a:1d:c2:29:60:09:a3:84:bb:5c: 3c:74:c4:9a:69:96:e9:d3:dc:fe:95:1f:9f:9d:ac:66: f3:37:7e:5a:9e:d7:06:e3:e7:24:85:96:9a:f9:46:ce: 4a:b1:cd:c0:40:d9:27:d9:b0:a9:3d:ed:91:2a:75:e8: 0f:29:3f:85:6a:f6:8e:21:63:cd:00:59:9b:94:d3:73 Fingerprint (SHA-256): 90:DE:FC:E0:11:B3:16:AF:5C:3B:E5:24:58:9E:E2:E3:A9:AE:6C:55:1C:B9:13:45:67:37:D3:F5:F4:92:FA:40 Fingerprint (SHA1): 1C:67:31:B6:64:31:A0:68:0E:FA:06:77:73:CE:08:CF:DF:F8:36:B8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1218: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204198 (0x37440366) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:48:17 2022 Not After : Tue Sep 27 20:48:17 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:4d:09:3c:83:cb:cf:d6:aa:b0:66:29:0a:a0:41:3b: 60:f7:3f:9c:bc:27:f6:c9:3f:b6:04:33:0e:6f:ca:f2: c8:f0:88:d1:cb:56:18:3c:29:6c:89:90:91:f9:4e:21: d1:68:58:cb:ca:4f:80:4c:24:d2:c5:72:ba:1f:37:74: cd:c8:81:ee:c4:38:42:1b:42:22:86:5d:c0:21:1c:97: d4:d2:c4:a2:68:78:6f:b6:6b:5b:3b:16:2b:a3:b0:6a: 88:e7:55:41:e1:87:8c:74:c3:ec:59:3b:6c:fb:3f:ba: 15:85:26:ba:54:3f:7b:0c:bf:2b:05:68:a2:10:33:c1: 77:f6:46:83:ae:e5:67:b9:8b:d9:4c:5e:cc:2c:04:81: 53:04:83:d7:cf:0e:ad:58:53:d3:dd:ae:f4:60:6d:b8: 30:1b:33:48:c1:ef:90:9a:b1:ba:46:8f:47:fd:12:f1: df:55:bf:96:5f:17:0a:49:fb:6d:49:e0:f0:b0:d9:e1: b0:27:7f:90:26:ae:d0:0c:2e:0c:5e:b1:86:22:a8:8b: 3e:3c:6f:82:ef:07:d6:0f:a5:07:a8:16:1e:4e:db:2f: f4:ee:f0:89:63:40:71:fa:08:5a:f5:08:49:aa:70:d8: 9d:f9:18:7c:55:6c:ff:e7:a2:98:2a:b5:b1:1e:a5:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:e8:0f:32:18:71:ae:aa:a5:53:34:55:a0:8e:9f:05: a0:f0:1f:ae:c7:2a:50:ad:c3:7c:d2:0f:7c:23:b6:c1: a3:cd:ed:cb:9a:c9:1e:4c:c8:49:41:87:fa:16:c4:f9: 32:78:95:00:52:57:0e:13:21:1f:ce:9d:49:4f:23:70: 67:54:7e:59:4f:21:a8:c9:f4:c0:f7:87:9b:f1:d5:88: 64:9f:8b:3e:01:4c:4f:b6:c3:e5:3b:53:f9:f5:4d:76: 75:e0:d2:a6:25:86:22:44:d1:69:a4:69:86:07:b8:44: 95:b0:17:b9:97:fd:b5:5f:59:a0:13:b2:d7:57:82:dd: 27:70:b5:28:e0:e8:13:ed:d8:c3:3f:b6:3b:23:62:3a: ac:45:99:29:a1:f7:c1:48:b4:5d:80:ac:13:43:cd:dd: 6a:c4:c7:7c:d4:25:fe:79:92:00:d2:64:56:30:f1:cd: 17:82:cb:d9:95:92:8a:1d:c2:29:60:09:a3:84:bb:5c: 3c:74:c4:9a:69:96:e9:d3:dc:fe:95:1f:9f:9d:ac:66: f3:37:7e:5a:9e:d7:06:e3:e7:24:85:96:9a:f9:46:ce: 4a:b1:cd:c0:40:d9:27:d9:b0:a9:3d:ed:91:2a:75:e8: 0f:29:3f:85:6a:f6:8e:21:63:cd:00:59:9b:94:d3:73 Fingerprint (SHA-256): 90:DE:FC:E0:11:B3:16:AF:5C:3B:E5:24:58:9E:E2:E3:A9:AE:6C:55:1C:B9:13:45:67:37:D3:F5:F4:92:FA:40 Fingerprint (SHA1): 1C:67:31:B6:64:31:A0:68:0E:FA:06:77:73:CE:08:CF:DF:F8:36:B8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1219: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204199 (0x37440367) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:48:19 2022 Not After : Mon Sep 27 20:48:19 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:9e:8d:62:5b:e9:bf:01:9b:36:a1:df:af:ee:d0:8e: 20:40:90:32:9a:8f:9a:87:c7:c2:cb:27:d5:ec:71:12: 4a:9d:d7:7b:cf:b8:09:fb:be:2c:64:53:1d:bc:a8:20: a2:32:8e:1e:2a:7f:0e:ac:b2:9a:97:10:1c:38:be:fd: 11:a6:8c:60:fa:50:b4:c8:e3:d0:1c:59:07:4c:9a:66: 6d:08:3a:62:83:5c:a4:68:ff:bc:4a:ac:7b:44:10:b6: 02:f5:dc:8b:49:73:a6:63:ef:ee:dc:1d:b9:c7:4c:d7: 47:15:aa:d2:28:4f:8f:4d:bf:87:77:a3:74:ae:9b:d8: 09:08:9b:0d:3b:35:0d:b9:30:53:39:2d:29:bd:9c:4a: 08:1b:30:42:32:3c:13:36:be:4e:49:b8:e2:2c:89:b0: 1e:5d:61:3d:78:78:97:03:ce:55:80:34:e1:b4:f3:eb: 2b:4e:e5:b1:f2:74:5d:d5:28:cf:86:37:50:d2:8c:f0: 32:78:b6:06:b1:1c:b9:a4:b4:f8:4a:59:d2:e1:e7:eb: 5a:08:d8:e7:a3:1d:76:8a:33:db:93:83:ee:6a:eb:85: ee:29:8d:65:48:17:5f:f3:22:a9:f6:b0:15:83:68:cb: ec:06:8f:55:2e:5a:1a:4c:90:c7:50:28:79:a7:fa:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:e3:e7:7d:a9:88:74:ef:fb:c6:b6:aa:76:e3:26:a7: 62:5b:c5:7f:30:22:fa:31:ce:12:01:bb:9d:32:1c:71: 46:95:68:ea:42:52:5e:b3:35:5d:0a:29:43:2a:6b:2f: 3e:a2:9c:ed:ce:df:93:70:00:1c:19:27:4a:89:aa:85: 97:0e:2b:0a:5f:6b:a4:b3:66:e1:e1:b4:85:a7:b5:e1: ee:cf:fe:c5:f9:19:29:db:d1:62:cc:94:ee:ad:82:0d: dc:ab:f0:10:86:1a:e5:a6:26:3f:80:dc:59:c5:b7:0e: c1:aa:de:17:0f:19:6c:18:ad:82:e4:a3:27:4f:44:aa: 45:fb:d7:c2:21:69:27:43:2b:f4:f3:55:ac:cb:0a:1e: 74:8a:32:19:09:37:d3:d5:e8:08:40:2d:fc:28:f4:85: eb:21:fe:bd:af:1d:56:e0:89:90:48:3b:fd:6f:58:8b: 52:d5:fc:a9:a0:90:49:52:37:df:f1:75:58:2b:b0:ef: cb:04:60:c6:31:ca:a9:7d:c0:43:a8:29:ce:9b:90:60: 73:dd:49:5b:d6:21:5d:c1:30:a7:bb:27:37:0a:77:5d: ec:ea:41:6f:d3:86:d2:fa:c8:b4:3c:b8:71:b0:93:1d: ee:4d:5b:22:0a:be:74:e1:17:0a:c0:9e:47:8f:1e:b7 Fingerprint (SHA-256): 52:00:28:55:57:B2:1B:90:94:99:7F:9D:86:6A:7B:D9:07:27:17:E3:CD:4D:F2:A0:1C:8B:3D:DF:D1:1B:86:A0 Fingerprint (SHA1): B7:67:59:49:29:BD:FE:78:B4:27:F3:48:65:A4:B7:2D:23:48:94:CC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1220: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204199 (0x37440367) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:48:19 2022 Not After : Mon Sep 27 20:48:19 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:9e:8d:62:5b:e9:bf:01:9b:36:a1:df:af:ee:d0:8e: 20:40:90:32:9a:8f:9a:87:c7:c2:cb:27:d5:ec:71:12: 4a:9d:d7:7b:cf:b8:09:fb:be:2c:64:53:1d:bc:a8:20: a2:32:8e:1e:2a:7f:0e:ac:b2:9a:97:10:1c:38:be:fd: 11:a6:8c:60:fa:50:b4:c8:e3:d0:1c:59:07:4c:9a:66: 6d:08:3a:62:83:5c:a4:68:ff:bc:4a:ac:7b:44:10:b6: 02:f5:dc:8b:49:73:a6:63:ef:ee:dc:1d:b9:c7:4c:d7: 47:15:aa:d2:28:4f:8f:4d:bf:87:77:a3:74:ae:9b:d8: 09:08:9b:0d:3b:35:0d:b9:30:53:39:2d:29:bd:9c:4a: 08:1b:30:42:32:3c:13:36:be:4e:49:b8:e2:2c:89:b0: 1e:5d:61:3d:78:78:97:03:ce:55:80:34:e1:b4:f3:eb: 2b:4e:e5:b1:f2:74:5d:d5:28:cf:86:37:50:d2:8c:f0: 32:78:b6:06:b1:1c:b9:a4:b4:f8:4a:59:d2:e1:e7:eb: 5a:08:d8:e7:a3:1d:76:8a:33:db:93:83:ee:6a:eb:85: ee:29:8d:65:48:17:5f:f3:22:a9:f6:b0:15:83:68:cb: ec:06:8f:55:2e:5a:1a:4c:90:c7:50:28:79:a7:fa:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:e3:e7:7d:a9:88:74:ef:fb:c6:b6:aa:76:e3:26:a7: 62:5b:c5:7f:30:22:fa:31:ce:12:01:bb:9d:32:1c:71: 46:95:68:ea:42:52:5e:b3:35:5d:0a:29:43:2a:6b:2f: 3e:a2:9c:ed:ce:df:93:70:00:1c:19:27:4a:89:aa:85: 97:0e:2b:0a:5f:6b:a4:b3:66:e1:e1:b4:85:a7:b5:e1: ee:cf:fe:c5:f9:19:29:db:d1:62:cc:94:ee:ad:82:0d: dc:ab:f0:10:86:1a:e5:a6:26:3f:80:dc:59:c5:b7:0e: c1:aa:de:17:0f:19:6c:18:ad:82:e4:a3:27:4f:44:aa: 45:fb:d7:c2:21:69:27:43:2b:f4:f3:55:ac:cb:0a:1e: 74:8a:32:19:09:37:d3:d5:e8:08:40:2d:fc:28:f4:85: eb:21:fe:bd:af:1d:56:e0:89:90:48:3b:fd:6f:58:8b: 52:d5:fc:a9:a0:90:49:52:37:df:f1:75:58:2b:b0:ef: cb:04:60:c6:31:ca:a9:7d:c0:43:a8:29:ce:9b:90:60: 73:dd:49:5b:d6:21:5d:c1:30:a7:bb:27:37:0a:77:5d: ec:ea:41:6f:d3:86:d2:fa:c8:b4:3c:b8:71:b0:93:1d: ee:4d:5b:22:0a:be:74:e1:17:0a:c0:9e:47:8f:1e:b7 Fingerprint (SHA-256): 52:00:28:55:57:B2:1B:90:94:99:7F:9D:86:6A:7B:D9:07:27:17:E3:CD:4D:F2:A0:1C:8B:3D:DF:D1:1B:86:A0 Fingerprint (SHA1): B7:67:59:49:29:BD:FE:78:B4:27:F3:48:65:A4:B7:2D:23:48:94:CC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1221: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204200 (0x37440368) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 20:48:20 2022 Not After : Mon Sep 27 20:48:20 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f3:a7:f0:d6:4a:0d:73:9c:ee:3b:2e:9c:96:35:88:13: 80:da:3c:1e:4a:5d:2b:c0:84:09:c4:c5:4f:b7:0d:7e: 59:c8:ed:3b:a9:90:c5:46:55:49:01:59:88:6b:15:c2: cd:37:09:4d:bf:34:93:ab:8b:04:2e:8f:b3:a2:c2:a5: b6:c5:37:5f:b1:b1:3b:c4:80:31:c3:be:5a:68:02:5a: 43:b2:ba:fb:d1:fb:1f:d3:3c:df:53:67:a7:b3:77:a2: 43:03:49:85:e5:1c:0e:3e:41:92:c5:72:8d:c1:50:3c: d7:81:f5:8d:57:a9:9b:b4:33:81:6c:4c:bc:3d:16:47: 40:3f:88:4f:39:a5:f6:f1:03:7c:fb:90:cc:16:a6:42: 3d:c4:44:66:55:1f:19:db:88:a7:2c:83:28:44:25:c1: 88:eb:64:ea:3b:ed:a9:9c:8d:46:c1:49:9a:16:7b:8c: 29:af:86:09:3d:a0:98:1a:18:2e:c7:08:75:4f:31:6b: a7:4b:16:f9:f1:2f:cf:34:08:6f:3d:40:cc:d6:fe:d3: 9c:4f:b2:6f:be:b2:f9:35:93:5a:5d:cc:2e:4b:37:bd: fd:d7:b2:35:5b:4f:7b:e8:9a:8e:2e:00:db:a9:cb:99: f1:a2:49:ed:33:57:85:2e:01:ab:94:5c:99:30:1e:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:d5:69:fe:ac:c8:ca:40:40:f9:f1:f9:11:66:d9:3e: 0a:b3:7a:7c:14:be:aa:d9:fb:15:1c:ba:83:c3:2d:12: 8a:01:a5:45:f6:42:fe:11:40:17:80:e5:64:d9:d0:81: b4:d0:73:19:bc:99:92:b0:b2:89:84:6e:b6:07:7d:37: 32:77:e7:42:f4:30:0e:b7:40:ed:22:e5:5c:d6:bb:8d: 6a:87:a9:5e:b3:06:b1:42:e5:e0:9d:f1:34:08:3b:84: 3e:16:31:18:c1:fa:ec:31:c4:26:20:8e:a6:b0:af:cd: cd:2f:f0:79:b4:54:26:39:53:d7:0f:9f:2d:64:32:4e: f9:de:15:b0:7a:72:6e:06:7b:40:70:4e:a8:03:19:77: e7:35:dc:df:49:3e:0e:16:e5:4c:10:40:78:c2:66:df: d8:c4:84:93:b1:53:40:65:9f:12:22:05:db:bd:fe:d9: d1:62:73:f0:2e:96:c5:14:c2:ee:c7:80:da:08:95:da: 0d:66:2d:96:ba:ac:c6:c2:51:8d:e8:a4:e9:7f:3d:dd: 0c:5d:5f:14:35:8d:40:00:0f:22:5b:7c:4c:0c:f9:d3: bb:de:c1:e2:1d:54:2d:4b:24:24:c3:c8:d1:20:4e:9e: 68:b4:75:b6:54:61:37:33:57:44:de:dc:51:e7:27:01 Fingerprint (SHA-256): 74:49:68:EA:F5:DE:94:08:CF:04:15:D6:0A:5B:6A:D4:E6:9B:35:23:63:DA:8A:8B:7A:E7:99:B4:AF:CE:8E:67 Fingerprint (SHA1): 00:D0:84:0E:79:C1:3E:21:5E:72:92:14:B1:C9:3A:7A:C9:64:05:EC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1222: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204200 (0x37440368) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 20:48:20 2022 Not After : Mon Sep 27 20:48:20 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f3:a7:f0:d6:4a:0d:73:9c:ee:3b:2e:9c:96:35:88:13: 80:da:3c:1e:4a:5d:2b:c0:84:09:c4:c5:4f:b7:0d:7e: 59:c8:ed:3b:a9:90:c5:46:55:49:01:59:88:6b:15:c2: cd:37:09:4d:bf:34:93:ab:8b:04:2e:8f:b3:a2:c2:a5: b6:c5:37:5f:b1:b1:3b:c4:80:31:c3:be:5a:68:02:5a: 43:b2:ba:fb:d1:fb:1f:d3:3c:df:53:67:a7:b3:77:a2: 43:03:49:85:e5:1c:0e:3e:41:92:c5:72:8d:c1:50:3c: d7:81:f5:8d:57:a9:9b:b4:33:81:6c:4c:bc:3d:16:47: 40:3f:88:4f:39:a5:f6:f1:03:7c:fb:90:cc:16:a6:42: 3d:c4:44:66:55:1f:19:db:88:a7:2c:83:28:44:25:c1: 88:eb:64:ea:3b:ed:a9:9c:8d:46:c1:49:9a:16:7b:8c: 29:af:86:09:3d:a0:98:1a:18:2e:c7:08:75:4f:31:6b: a7:4b:16:f9:f1:2f:cf:34:08:6f:3d:40:cc:d6:fe:d3: 9c:4f:b2:6f:be:b2:f9:35:93:5a:5d:cc:2e:4b:37:bd: fd:d7:b2:35:5b:4f:7b:e8:9a:8e:2e:00:db:a9:cb:99: f1:a2:49:ed:33:57:85:2e:01:ab:94:5c:99:30:1e:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:d5:69:fe:ac:c8:ca:40:40:f9:f1:f9:11:66:d9:3e: 0a:b3:7a:7c:14:be:aa:d9:fb:15:1c:ba:83:c3:2d:12: 8a:01:a5:45:f6:42:fe:11:40:17:80:e5:64:d9:d0:81: b4:d0:73:19:bc:99:92:b0:b2:89:84:6e:b6:07:7d:37: 32:77:e7:42:f4:30:0e:b7:40:ed:22:e5:5c:d6:bb:8d: 6a:87:a9:5e:b3:06:b1:42:e5:e0:9d:f1:34:08:3b:84: 3e:16:31:18:c1:fa:ec:31:c4:26:20:8e:a6:b0:af:cd: cd:2f:f0:79:b4:54:26:39:53:d7:0f:9f:2d:64:32:4e: f9:de:15:b0:7a:72:6e:06:7b:40:70:4e:a8:03:19:77: e7:35:dc:df:49:3e:0e:16:e5:4c:10:40:78:c2:66:df: d8:c4:84:93:b1:53:40:65:9f:12:22:05:db:bd:fe:d9: d1:62:73:f0:2e:96:c5:14:c2:ee:c7:80:da:08:95:da: 0d:66:2d:96:ba:ac:c6:c2:51:8d:e8:a4:e9:7f:3d:dd: 0c:5d:5f:14:35:8d:40:00:0f:22:5b:7c:4c:0c:f9:d3: bb:de:c1:e2:1d:54:2d:4b:24:24:c3:c8:d1:20:4e:9e: 68:b4:75:b6:54:61:37:33:57:44:de:dc:51:e7:27:01 Fingerprint (SHA-256): 74:49:68:EA:F5:DE:94:08:CF:04:15:D6:0A:5B:6A:D4:E6:9B:35:23:63:DA:8A:8B:7A:E7:99:B4:AF:CE:8E:67 Fingerprint (SHA1): 00:D0:84:0E:79:C1:3E:21:5E:72:92:14:B1:C9:3A:7A:C9:64:05:EC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1223: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1224: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204203 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1225: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1226: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1227: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1228: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 927204204 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1229: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1230: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1231: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1232: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927204205 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1233: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1234: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1235: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1236: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 927204206 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1237: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1238: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1239: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1240: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 927204207 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1241: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1242: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1243: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1244: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 927204208 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1245: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1246: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #1247: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1248: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 927204209 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1249: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1250: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1251: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #1252: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #1253: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1254: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #1255: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204203 (0x3744036b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:48:33 2022 Not After : Tue Sep 27 20:48:33 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:44:2a:5f:01:bc:06:53:a1:d9:f2:80:6d:7d:f0:62: c3:5f:4e:e4:1f:c2:be:fd:f0:f8:21:54:c2:4c:ab:76: 6f:27:cb:da:63:3b:27:e8:81:38:87:ea:14:f6:d1:4d: fe:73:ea:60:b6:18:cb:e7:79:3f:a1:fc:4a:81:28:6a: 68:87:12:df:22:33:d1:eb:be:76:dc:91:6e:27:97:6a: 0f:8b:5a:eb:75:ff:e7:04:01:48:63:7c:81:39:4b:81: 4c:05:c2:d6:f1:93:a1:06:47:d3:43:31:0b:89:f1:2d: 99:ba:ef:f2:b3:f5:a2:91:94:25:40:a2:a3:e1:90:df: c4:d0:5e:0c:c9:fe:5c:e2:13:e5:ca:5b:a3:67:de:92: ae:95:a7:ac:e0:ee:6b:e8:63:be:df:8e:83:6d:5f:49: 50:c8:9a:82:a2:28:c2:55:27:b7:b5:6a:ad:0d:e6:40: f0:0f:fc:8c:a8:0b:70:f6:79:1c:24:18:ae:b7:4c:b9: f4:a1:2a:a1:3b:cc:a7:80:af:3d:ed:9d:0b:fd:ce:3c: 28:2d:81:c1:28:c1:86:ec:a5:eb:89:f0:58:cd:02:ff: 13:7a:12:22:af:0a:92:ba:30:58:4b:03:b0:3c:bd:86: ca:c7:7e:b7:ac:fc:00:b5:ca:74:46:0c:1b:eb:2c:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:f6:52:3c:92:b2:f7:d0:7d:7f:bc:9b:bb:9b:e3:f4: a2:a8:24:cb:6b:8f:5c:0c:d1:4d:dd:94:e4:54:d7:4a: 71:09:e3:03:08:0f:b6:57:c2:2c:c4:45:34:5b:c1:79: 0a:01:ab:cc:82:a1:43:29:76:d4:0d:04:f8:17:b6:51: 91:ee:c1:27:a0:5a:ca:d9:dc:ec:f9:5b:9e:ac:52:9c: 81:f1:30:02:9f:ef:11:2f:1f:89:74:1f:06:73:d1:7a: 2a:02:a4:5e:62:cf:15:4a:1e:c6:3b:21:d1:f5:df:05: 23:df:7e:7e:46:8e:b8:9e:ce:73:d7:2a:41:4f:8f:a1: 3a:fb:b1:97:6f:71:24:e1:22:8c:4a:e3:38:ba:10:25: 02:98:e2:77:c8:51:d0:70:8a:07:2d:3c:03:b8:e1:0c: cd:04:0f:e1:00:08:9a:50:1f:fa:19:15:9d:8c:53:ad: 55:b2:5c:32:5e:8a:1f:62:c8:99:48:ba:86:25:6b:7b: 00:4c:98:74:2e:f6:52:cf:4c:d8:f3:43:b6:6f:19:f7: 50:a9:7b:32:fd:c9:64:48:cf:7b:d7:80:fa:ea:7c:ad: 88:c6:cf:59:7b:60:f2:00:40:66:64:98:ac:50:22:a8: 44:1b:de:14:ee:23:9b:f3:9d:f5:3f:c7:4d:61:0f:f7 Fingerprint (SHA-256): 6E:71:40:C2:84:E4:F9:A4:D6:A1:45:B3:16:CF:20:B7:7F:63:4E:7D:93:5A:38:64:B5:CB:4D:69:EF:FF:62:23 Fingerprint (SHA1): 97:39:F2:FB:05:F3:BB:E0:AC:60:90:27:1B:4F:10:EF:38:3C:49:52 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1256: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1257: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1258: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1259: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204203 (0x3744036b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:48:33 2022 Not After : Tue Sep 27 20:48:33 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:44:2a:5f:01:bc:06:53:a1:d9:f2:80:6d:7d:f0:62: c3:5f:4e:e4:1f:c2:be:fd:f0:f8:21:54:c2:4c:ab:76: 6f:27:cb:da:63:3b:27:e8:81:38:87:ea:14:f6:d1:4d: fe:73:ea:60:b6:18:cb:e7:79:3f:a1:fc:4a:81:28:6a: 68:87:12:df:22:33:d1:eb:be:76:dc:91:6e:27:97:6a: 0f:8b:5a:eb:75:ff:e7:04:01:48:63:7c:81:39:4b:81: 4c:05:c2:d6:f1:93:a1:06:47:d3:43:31:0b:89:f1:2d: 99:ba:ef:f2:b3:f5:a2:91:94:25:40:a2:a3:e1:90:df: c4:d0:5e:0c:c9:fe:5c:e2:13:e5:ca:5b:a3:67:de:92: ae:95:a7:ac:e0:ee:6b:e8:63:be:df:8e:83:6d:5f:49: 50:c8:9a:82:a2:28:c2:55:27:b7:b5:6a:ad:0d:e6:40: f0:0f:fc:8c:a8:0b:70:f6:79:1c:24:18:ae:b7:4c:b9: f4:a1:2a:a1:3b:cc:a7:80:af:3d:ed:9d:0b:fd:ce:3c: 28:2d:81:c1:28:c1:86:ec:a5:eb:89:f0:58:cd:02:ff: 13:7a:12:22:af:0a:92:ba:30:58:4b:03:b0:3c:bd:86: ca:c7:7e:b7:ac:fc:00:b5:ca:74:46:0c:1b:eb:2c:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:f6:52:3c:92:b2:f7:d0:7d:7f:bc:9b:bb:9b:e3:f4: a2:a8:24:cb:6b:8f:5c:0c:d1:4d:dd:94:e4:54:d7:4a: 71:09:e3:03:08:0f:b6:57:c2:2c:c4:45:34:5b:c1:79: 0a:01:ab:cc:82:a1:43:29:76:d4:0d:04:f8:17:b6:51: 91:ee:c1:27:a0:5a:ca:d9:dc:ec:f9:5b:9e:ac:52:9c: 81:f1:30:02:9f:ef:11:2f:1f:89:74:1f:06:73:d1:7a: 2a:02:a4:5e:62:cf:15:4a:1e:c6:3b:21:d1:f5:df:05: 23:df:7e:7e:46:8e:b8:9e:ce:73:d7:2a:41:4f:8f:a1: 3a:fb:b1:97:6f:71:24:e1:22:8c:4a:e3:38:ba:10:25: 02:98:e2:77:c8:51:d0:70:8a:07:2d:3c:03:b8:e1:0c: cd:04:0f:e1:00:08:9a:50:1f:fa:19:15:9d:8c:53:ad: 55:b2:5c:32:5e:8a:1f:62:c8:99:48:ba:86:25:6b:7b: 00:4c:98:74:2e:f6:52:cf:4c:d8:f3:43:b6:6f:19:f7: 50:a9:7b:32:fd:c9:64:48:cf:7b:d7:80:fa:ea:7c:ad: 88:c6:cf:59:7b:60:f2:00:40:66:64:98:ac:50:22:a8: 44:1b:de:14:ee:23:9b:f3:9d:f5:3f:c7:4d:61:0f:f7 Fingerprint (SHA-256): 6E:71:40:C2:84:E4:F9:A4:D6:A1:45:B3:16:CF:20:B7:7F:63:4E:7D:93:5A:38:64:B5:CB:4D:69:EF:FF:62:23 Fingerprint (SHA1): 97:39:F2:FB:05:F3:BB:E0:AC:60:90:27:1B:4F:10:EF:38:3C:49:52 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1260: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1261: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1262: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204210 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1263: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1264: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1265: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1266: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 927204211 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1267: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1268: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #1269: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1270: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 927204212 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1271: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1272: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #1273: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1274: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 927204213 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1275: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1276: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1277: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1278: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 927204214 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1279: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1280: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #1281: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1282: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 927204215 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1283: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1284: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #1285: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1286: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 927204216 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1287: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1288: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1289: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1290: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 927204217 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1291: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1292: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #1293: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1294: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 927204218 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1295: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1296: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #1297: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1298: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 927204219 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1299: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1300: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1301: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1302: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 927204220 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1303: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1304: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #1305: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1306: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 927204221 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1307: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1308: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #1309: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1310: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 927204222 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1311: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1312: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1313: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1314: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 927204223 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1315: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1316: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #1317: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1318: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 927204224 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1319: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1320: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #1321: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1322: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 927204225 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1323: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1324: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #1325: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1326: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 927204226 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1327: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1328: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #1329: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1330: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 927204227 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1331: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1332: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #1333: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1334: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 927204228 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1335: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1336: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #1337: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1338: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 927204229 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1339: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1340: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #1341: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1342: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 927204230 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1343: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1344: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #1345: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1346: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 927204231 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1347: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1348: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #1349: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1350: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 927204232 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1351: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1352: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #1353: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1354: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 927204233 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1355: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1356: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #1357: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1358: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 927204234 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1359: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1360: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #1361: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1362: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 927204235 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1363: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1364: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #1365: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1366: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 927204236 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1367: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1368: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #1369: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1370: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 927204237 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1371: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1372: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #1373: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1374: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 927204238 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1375: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1376: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #1377: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1378: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 927204239 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1379: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1380: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1381: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204210 (0x37440372) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:48:47 2022 Not After : Tue Sep 27 20:48:47 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:fc:bf:35:84:7d:ef:2d:3d:d5:e7:c5:61:fe:3a:3b: ee:f5:95:19:b5:d8:ca:a3:a0:3d:19:cc:32:c7:3e:c1: f9:3b:62:be:28:d2:0e:fe:39:2b:cf:d5:da:69:3d:33: e4:86:33:89:d9:45:37:cc:e3:7f:1d:1e:50:1f:af:fe: 50:05:e5:e3:6b:8a:ad:6e:4c:c7:fe:e0:20:c9:a0:8e: 17:f9:c4:87:01:9f:51:04:34:24:d8:c0:11:83:c2:95: 22:d5:90:55:35:86:31:bc:80:d2:91:ec:a0:b7:0c:ca: 56:bf:69:0d:8b:aa:15:99:c8:82:5e:9f:54:d3:9c:2c: a9:b0:a9:be:9b:ac:ed:fe:b6:bb:26:03:2c:b5:cf:33: 06:6d:40:6d:45:e4:97:f8:48:3f:fa:fc:f3:e5:dd:97: 67:3e:02:4d:c5:da:83:57:19:6f:72:da:6d:14:f1:a0: 80:04:a3:6e:13:65:bd:61:3d:da:47:5e:26:e7:8b:0f: 5e:22:de:c2:04:78:31:77:82:e2:ec:d6:de:4f:29:2e: 2c:74:39:ca:e1:07:54:9e:0e:4b:44:71:55:d4:5f:d6: 42:4a:04:d9:35:5d:40:5e:f2:9a:1a:2d:61:cf:9d:7b: 95:05:b9:0a:ba:2d:2f:d5:5a:87:96:a4:9f:02:ff:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:8c:37:1a:ba:39:6a:dc:8d:5d:b6:ab:3b:99:25:97: ab:39:e1:59:fb:44:1c:2a:cc:00:ab:97:ce:20:f9:c1: f1:ba:53:0c:30:42:d2:81:f8:ee:12:b1:42:6b:d6:84: 76:51:cd:7f:d3:a2:00:3e:96:22:03:5b:da:c6:5c:da: 5c:f5:6f:65:11:29:9f:18:b9:b8:34:c0:a9:a0:41:6c: 92:6a:c5:b2:bb:44:bb:90:27:e1:5b:e1:7b:17:79:84: cc:6f:bf:74:da:15:18:24:ca:80:c5:3f:a6:45:7f:02: 16:4d:92:8c:11:ab:f5:b3:ef:eb:ac:09:c7:b4:75:48: 33:25:de:a1:e5:6b:85:9d:ac:c2:10:fe:8b:19:6e:a3: 99:7e:43:fc:51:52:1b:9a:e7:07:ac:8e:f6:59:fa:ad: 24:1a:e4:37:73:19:cd:fd:8b:c1:c6:13:a0:12:9c:ea: 62:5a:c2:70:4c:04:13:37:6e:0a:18:2c:c3:61:99:43: c9:d5:8e:3c:52:1b:19:17:25:68:3a:3f:02:16:d5:fd: c4:cf:57:e2:cd:b4:e1:c1:55:41:a4:4a:68:8e:f7:58: a8:4c:68:b9:8c:2a:0a:78:6e:2d:75:c2:23:07:4b:3f: 2d:80:bd:b3:1d:41:2a:44:0b:83:53:10:4f:0b:b9:7d Fingerprint (SHA-256): F1:05:97:B9:09:98:38:53:5B:53:D4:27:22:17:44:E9:F6:02:DA:DC:0B:0F:01:81:FB:5D:79:1C:C0:DC:BE:BD Fingerprint (SHA1): 0C:68:39:39:06:99:D3:53:BD:85:94:52:14:9E:F0:4F:17:65:00:EE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1382: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1383: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204210 (0x37440372) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:48:47 2022 Not After : Tue Sep 27 20:48:47 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:fc:bf:35:84:7d:ef:2d:3d:d5:e7:c5:61:fe:3a:3b: ee:f5:95:19:b5:d8:ca:a3:a0:3d:19:cc:32:c7:3e:c1: f9:3b:62:be:28:d2:0e:fe:39:2b:cf:d5:da:69:3d:33: e4:86:33:89:d9:45:37:cc:e3:7f:1d:1e:50:1f:af:fe: 50:05:e5:e3:6b:8a:ad:6e:4c:c7:fe:e0:20:c9:a0:8e: 17:f9:c4:87:01:9f:51:04:34:24:d8:c0:11:83:c2:95: 22:d5:90:55:35:86:31:bc:80:d2:91:ec:a0:b7:0c:ca: 56:bf:69:0d:8b:aa:15:99:c8:82:5e:9f:54:d3:9c:2c: a9:b0:a9:be:9b:ac:ed:fe:b6:bb:26:03:2c:b5:cf:33: 06:6d:40:6d:45:e4:97:f8:48:3f:fa:fc:f3:e5:dd:97: 67:3e:02:4d:c5:da:83:57:19:6f:72:da:6d:14:f1:a0: 80:04:a3:6e:13:65:bd:61:3d:da:47:5e:26:e7:8b:0f: 5e:22:de:c2:04:78:31:77:82:e2:ec:d6:de:4f:29:2e: 2c:74:39:ca:e1:07:54:9e:0e:4b:44:71:55:d4:5f:d6: 42:4a:04:d9:35:5d:40:5e:f2:9a:1a:2d:61:cf:9d:7b: 95:05:b9:0a:ba:2d:2f:d5:5a:87:96:a4:9f:02:ff:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:8c:37:1a:ba:39:6a:dc:8d:5d:b6:ab:3b:99:25:97: ab:39:e1:59:fb:44:1c:2a:cc:00:ab:97:ce:20:f9:c1: f1:ba:53:0c:30:42:d2:81:f8:ee:12:b1:42:6b:d6:84: 76:51:cd:7f:d3:a2:00:3e:96:22:03:5b:da:c6:5c:da: 5c:f5:6f:65:11:29:9f:18:b9:b8:34:c0:a9:a0:41:6c: 92:6a:c5:b2:bb:44:bb:90:27:e1:5b:e1:7b:17:79:84: cc:6f:bf:74:da:15:18:24:ca:80:c5:3f:a6:45:7f:02: 16:4d:92:8c:11:ab:f5:b3:ef:eb:ac:09:c7:b4:75:48: 33:25:de:a1:e5:6b:85:9d:ac:c2:10:fe:8b:19:6e:a3: 99:7e:43:fc:51:52:1b:9a:e7:07:ac:8e:f6:59:fa:ad: 24:1a:e4:37:73:19:cd:fd:8b:c1:c6:13:a0:12:9c:ea: 62:5a:c2:70:4c:04:13:37:6e:0a:18:2c:c3:61:99:43: c9:d5:8e:3c:52:1b:19:17:25:68:3a:3f:02:16:d5:fd: c4:cf:57:e2:cd:b4:e1:c1:55:41:a4:4a:68:8e:f7:58: a8:4c:68:b9:8c:2a:0a:78:6e:2d:75:c2:23:07:4b:3f: 2d:80:bd:b3:1d:41:2a:44:0b:83:53:10:4f:0b:b9:7d Fingerprint (SHA-256): F1:05:97:B9:09:98:38:53:5B:53:D4:27:22:17:44:E9:F6:02:DA:DC:0B:0F:01:81:FB:5D:79:1C:C0:DC:BE:BD Fingerprint (SHA1): 0C:68:39:39:06:99:D3:53:BD:85:94:52:14:9E:F0:4F:17:65:00:EE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1384: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1385: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1386: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1387: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204210 (0x37440372) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:48:47 2022 Not After : Tue Sep 27 20:48:47 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:fc:bf:35:84:7d:ef:2d:3d:d5:e7:c5:61:fe:3a:3b: ee:f5:95:19:b5:d8:ca:a3:a0:3d:19:cc:32:c7:3e:c1: f9:3b:62:be:28:d2:0e:fe:39:2b:cf:d5:da:69:3d:33: e4:86:33:89:d9:45:37:cc:e3:7f:1d:1e:50:1f:af:fe: 50:05:e5:e3:6b:8a:ad:6e:4c:c7:fe:e0:20:c9:a0:8e: 17:f9:c4:87:01:9f:51:04:34:24:d8:c0:11:83:c2:95: 22:d5:90:55:35:86:31:bc:80:d2:91:ec:a0:b7:0c:ca: 56:bf:69:0d:8b:aa:15:99:c8:82:5e:9f:54:d3:9c:2c: a9:b0:a9:be:9b:ac:ed:fe:b6:bb:26:03:2c:b5:cf:33: 06:6d:40:6d:45:e4:97:f8:48:3f:fa:fc:f3:e5:dd:97: 67:3e:02:4d:c5:da:83:57:19:6f:72:da:6d:14:f1:a0: 80:04:a3:6e:13:65:bd:61:3d:da:47:5e:26:e7:8b:0f: 5e:22:de:c2:04:78:31:77:82:e2:ec:d6:de:4f:29:2e: 2c:74:39:ca:e1:07:54:9e:0e:4b:44:71:55:d4:5f:d6: 42:4a:04:d9:35:5d:40:5e:f2:9a:1a:2d:61:cf:9d:7b: 95:05:b9:0a:ba:2d:2f:d5:5a:87:96:a4:9f:02:ff:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:8c:37:1a:ba:39:6a:dc:8d:5d:b6:ab:3b:99:25:97: ab:39:e1:59:fb:44:1c:2a:cc:00:ab:97:ce:20:f9:c1: f1:ba:53:0c:30:42:d2:81:f8:ee:12:b1:42:6b:d6:84: 76:51:cd:7f:d3:a2:00:3e:96:22:03:5b:da:c6:5c:da: 5c:f5:6f:65:11:29:9f:18:b9:b8:34:c0:a9:a0:41:6c: 92:6a:c5:b2:bb:44:bb:90:27:e1:5b:e1:7b:17:79:84: cc:6f:bf:74:da:15:18:24:ca:80:c5:3f:a6:45:7f:02: 16:4d:92:8c:11:ab:f5:b3:ef:eb:ac:09:c7:b4:75:48: 33:25:de:a1:e5:6b:85:9d:ac:c2:10:fe:8b:19:6e:a3: 99:7e:43:fc:51:52:1b:9a:e7:07:ac:8e:f6:59:fa:ad: 24:1a:e4:37:73:19:cd:fd:8b:c1:c6:13:a0:12:9c:ea: 62:5a:c2:70:4c:04:13:37:6e:0a:18:2c:c3:61:99:43: c9:d5:8e:3c:52:1b:19:17:25:68:3a:3f:02:16:d5:fd: c4:cf:57:e2:cd:b4:e1:c1:55:41:a4:4a:68:8e:f7:58: a8:4c:68:b9:8c:2a:0a:78:6e:2d:75:c2:23:07:4b:3f: 2d:80:bd:b3:1d:41:2a:44:0b:83:53:10:4f:0b:b9:7d Fingerprint (SHA-256): F1:05:97:B9:09:98:38:53:5B:53:D4:27:22:17:44:E9:F6:02:DA:DC:0B:0F:01:81:FB:5D:79:1C:C0:DC:BE:BD Fingerprint (SHA1): 0C:68:39:39:06:99:D3:53:BD:85:94:52:14:9E:F0:4F:17:65:00:EE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1388: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1389: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1390: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1391: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204210 (0x37440372) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:48:47 2022 Not After : Tue Sep 27 20:48:47 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:fc:bf:35:84:7d:ef:2d:3d:d5:e7:c5:61:fe:3a:3b: ee:f5:95:19:b5:d8:ca:a3:a0:3d:19:cc:32:c7:3e:c1: f9:3b:62:be:28:d2:0e:fe:39:2b:cf:d5:da:69:3d:33: e4:86:33:89:d9:45:37:cc:e3:7f:1d:1e:50:1f:af:fe: 50:05:e5:e3:6b:8a:ad:6e:4c:c7:fe:e0:20:c9:a0:8e: 17:f9:c4:87:01:9f:51:04:34:24:d8:c0:11:83:c2:95: 22:d5:90:55:35:86:31:bc:80:d2:91:ec:a0:b7:0c:ca: 56:bf:69:0d:8b:aa:15:99:c8:82:5e:9f:54:d3:9c:2c: a9:b0:a9:be:9b:ac:ed:fe:b6:bb:26:03:2c:b5:cf:33: 06:6d:40:6d:45:e4:97:f8:48:3f:fa:fc:f3:e5:dd:97: 67:3e:02:4d:c5:da:83:57:19:6f:72:da:6d:14:f1:a0: 80:04:a3:6e:13:65:bd:61:3d:da:47:5e:26:e7:8b:0f: 5e:22:de:c2:04:78:31:77:82:e2:ec:d6:de:4f:29:2e: 2c:74:39:ca:e1:07:54:9e:0e:4b:44:71:55:d4:5f:d6: 42:4a:04:d9:35:5d:40:5e:f2:9a:1a:2d:61:cf:9d:7b: 95:05:b9:0a:ba:2d:2f:d5:5a:87:96:a4:9f:02:ff:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:8c:37:1a:ba:39:6a:dc:8d:5d:b6:ab:3b:99:25:97: ab:39:e1:59:fb:44:1c:2a:cc:00:ab:97:ce:20:f9:c1: f1:ba:53:0c:30:42:d2:81:f8:ee:12:b1:42:6b:d6:84: 76:51:cd:7f:d3:a2:00:3e:96:22:03:5b:da:c6:5c:da: 5c:f5:6f:65:11:29:9f:18:b9:b8:34:c0:a9:a0:41:6c: 92:6a:c5:b2:bb:44:bb:90:27:e1:5b:e1:7b:17:79:84: cc:6f:bf:74:da:15:18:24:ca:80:c5:3f:a6:45:7f:02: 16:4d:92:8c:11:ab:f5:b3:ef:eb:ac:09:c7:b4:75:48: 33:25:de:a1:e5:6b:85:9d:ac:c2:10:fe:8b:19:6e:a3: 99:7e:43:fc:51:52:1b:9a:e7:07:ac:8e:f6:59:fa:ad: 24:1a:e4:37:73:19:cd:fd:8b:c1:c6:13:a0:12:9c:ea: 62:5a:c2:70:4c:04:13:37:6e:0a:18:2c:c3:61:99:43: c9:d5:8e:3c:52:1b:19:17:25:68:3a:3f:02:16:d5:fd: c4:cf:57:e2:cd:b4:e1:c1:55:41:a4:4a:68:8e:f7:58: a8:4c:68:b9:8c:2a:0a:78:6e:2d:75:c2:23:07:4b:3f: 2d:80:bd:b3:1d:41:2a:44:0b:83:53:10:4f:0b:b9:7d Fingerprint (SHA-256): F1:05:97:B9:09:98:38:53:5B:53:D4:27:22:17:44:E9:F6:02:DA:DC:0B:0F:01:81:FB:5D:79:1C:C0:DC:BE:BD Fingerprint (SHA1): 0C:68:39:39:06:99:D3:53:BD:85:94:52:14:9E:F0:4F:17:65:00:EE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1392: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204210 (0x37440372) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:48:47 2022 Not After : Tue Sep 27 20:48:47 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:fc:bf:35:84:7d:ef:2d:3d:d5:e7:c5:61:fe:3a:3b: ee:f5:95:19:b5:d8:ca:a3:a0:3d:19:cc:32:c7:3e:c1: f9:3b:62:be:28:d2:0e:fe:39:2b:cf:d5:da:69:3d:33: e4:86:33:89:d9:45:37:cc:e3:7f:1d:1e:50:1f:af:fe: 50:05:e5:e3:6b:8a:ad:6e:4c:c7:fe:e0:20:c9:a0:8e: 17:f9:c4:87:01:9f:51:04:34:24:d8:c0:11:83:c2:95: 22:d5:90:55:35:86:31:bc:80:d2:91:ec:a0:b7:0c:ca: 56:bf:69:0d:8b:aa:15:99:c8:82:5e:9f:54:d3:9c:2c: a9:b0:a9:be:9b:ac:ed:fe:b6:bb:26:03:2c:b5:cf:33: 06:6d:40:6d:45:e4:97:f8:48:3f:fa:fc:f3:e5:dd:97: 67:3e:02:4d:c5:da:83:57:19:6f:72:da:6d:14:f1:a0: 80:04:a3:6e:13:65:bd:61:3d:da:47:5e:26:e7:8b:0f: 5e:22:de:c2:04:78:31:77:82:e2:ec:d6:de:4f:29:2e: 2c:74:39:ca:e1:07:54:9e:0e:4b:44:71:55:d4:5f:d6: 42:4a:04:d9:35:5d:40:5e:f2:9a:1a:2d:61:cf:9d:7b: 95:05:b9:0a:ba:2d:2f:d5:5a:87:96:a4:9f:02:ff:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:8c:37:1a:ba:39:6a:dc:8d:5d:b6:ab:3b:99:25:97: ab:39:e1:59:fb:44:1c:2a:cc:00:ab:97:ce:20:f9:c1: f1:ba:53:0c:30:42:d2:81:f8:ee:12:b1:42:6b:d6:84: 76:51:cd:7f:d3:a2:00:3e:96:22:03:5b:da:c6:5c:da: 5c:f5:6f:65:11:29:9f:18:b9:b8:34:c0:a9:a0:41:6c: 92:6a:c5:b2:bb:44:bb:90:27:e1:5b:e1:7b:17:79:84: cc:6f:bf:74:da:15:18:24:ca:80:c5:3f:a6:45:7f:02: 16:4d:92:8c:11:ab:f5:b3:ef:eb:ac:09:c7:b4:75:48: 33:25:de:a1:e5:6b:85:9d:ac:c2:10:fe:8b:19:6e:a3: 99:7e:43:fc:51:52:1b:9a:e7:07:ac:8e:f6:59:fa:ad: 24:1a:e4:37:73:19:cd:fd:8b:c1:c6:13:a0:12:9c:ea: 62:5a:c2:70:4c:04:13:37:6e:0a:18:2c:c3:61:99:43: c9:d5:8e:3c:52:1b:19:17:25:68:3a:3f:02:16:d5:fd: c4:cf:57:e2:cd:b4:e1:c1:55:41:a4:4a:68:8e:f7:58: a8:4c:68:b9:8c:2a:0a:78:6e:2d:75:c2:23:07:4b:3f: 2d:80:bd:b3:1d:41:2a:44:0b:83:53:10:4f:0b:b9:7d Fingerprint (SHA-256): F1:05:97:B9:09:98:38:53:5B:53:D4:27:22:17:44:E9:F6:02:DA:DC:0B:0F:01:81:FB:5D:79:1C:C0:DC:BE:BD Fingerprint (SHA1): 0C:68:39:39:06:99:D3:53:BD:85:94:52:14:9E:F0:4F:17:65:00:EE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1393: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1394: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204210 (0x37440372) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:48:47 2022 Not After : Tue Sep 27 20:48:47 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:fc:bf:35:84:7d:ef:2d:3d:d5:e7:c5:61:fe:3a:3b: ee:f5:95:19:b5:d8:ca:a3:a0:3d:19:cc:32:c7:3e:c1: f9:3b:62:be:28:d2:0e:fe:39:2b:cf:d5:da:69:3d:33: e4:86:33:89:d9:45:37:cc:e3:7f:1d:1e:50:1f:af:fe: 50:05:e5:e3:6b:8a:ad:6e:4c:c7:fe:e0:20:c9:a0:8e: 17:f9:c4:87:01:9f:51:04:34:24:d8:c0:11:83:c2:95: 22:d5:90:55:35:86:31:bc:80:d2:91:ec:a0:b7:0c:ca: 56:bf:69:0d:8b:aa:15:99:c8:82:5e:9f:54:d3:9c:2c: a9:b0:a9:be:9b:ac:ed:fe:b6:bb:26:03:2c:b5:cf:33: 06:6d:40:6d:45:e4:97:f8:48:3f:fa:fc:f3:e5:dd:97: 67:3e:02:4d:c5:da:83:57:19:6f:72:da:6d:14:f1:a0: 80:04:a3:6e:13:65:bd:61:3d:da:47:5e:26:e7:8b:0f: 5e:22:de:c2:04:78:31:77:82:e2:ec:d6:de:4f:29:2e: 2c:74:39:ca:e1:07:54:9e:0e:4b:44:71:55:d4:5f:d6: 42:4a:04:d9:35:5d:40:5e:f2:9a:1a:2d:61:cf:9d:7b: 95:05:b9:0a:ba:2d:2f:d5:5a:87:96:a4:9f:02:ff:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:8c:37:1a:ba:39:6a:dc:8d:5d:b6:ab:3b:99:25:97: ab:39:e1:59:fb:44:1c:2a:cc:00:ab:97:ce:20:f9:c1: f1:ba:53:0c:30:42:d2:81:f8:ee:12:b1:42:6b:d6:84: 76:51:cd:7f:d3:a2:00:3e:96:22:03:5b:da:c6:5c:da: 5c:f5:6f:65:11:29:9f:18:b9:b8:34:c0:a9:a0:41:6c: 92:6a:c5:b2:bb:44:bb:90:27:e1:5b:e1:7b:17:79:84: cc:6f:bf:74:da:15:18:24:ca:80:c5:3f:a6:45:7f:02: 16:4d:92:8c:11:ab:f5:b3:ef:eb:ac:09:c7:b4:75:48: 33:25:de:a1:e5:6b:85:9d:ac:c2:10:fe:8b:19:6e:a3: 99:7e:43:fc:51:52:1b:9a:e7:07:ac:8e:f6:59:fa:ad: 24:1a:e4:37:73:19:cd:fd:8b:c1:c6:13:a0:12:9c:ea: 62:5a:c2:70:4c:04:13:37:6e:0a:18:2c:c3:61:99:43: c9:d5:8e:3c:52:1b:19:17:25:68:3a:3f:02:16:d5:fd: c4:cf:57:e2:cd:b4:e1:c1:55:41:a4:4a:68:8e:f7:58: a8:4c:68:b9:8c:2a:0a:78:6e:2d:75:c2:23:07:4b:3f: 2d:80:bd:b3:1d:41:2a:44:0b:83:53:10:4f:0b:b9:7d Fingerprint (SHA-256): F1:05:97:B9:09:98:38:53:5B:53:D4:27:22:17:44:E9:F6:02:DA:DC:0B:0F:01:81:FB:5D:79:1C:C0:DC:BE:BD Fingerprint (SHA1): 0C:68:39:39:06:99:D3:53:BD:85:94:52:14:9E:F0:4F:17:65:00:EE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1395: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1396: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1397: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1398: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204210 (0x37440372) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:48:47 2022 Not After : Tue Sep 27 20:48:47 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:fc:bf:35:84:7d:ef:2d:3d:d5:e7:c5:61:fe:3a:3b: ee:f5:95:19:b5:d8:ca:a3:a0:3d:19:cc:32:c7:3e:c1: f9:3b:62:be:28:d2:0e:fe:39:2b:cf:d5:da:69:3d:33: e4:86:33:89:d9:45:37:cc:e3:7f:1d:1e:50:1f:af:fe: 50:05:e5:e3:6b:8a:ad:6e:4c:c7:fe:e0:20:c9:a0:8e: 17:f9:c4:87:01:9f:51:04:34:24:d8:c0:11:83:c2:95: 22:d5:90:55:35:86:31:bc:80:d2:91:ec:a0:b7:0c:ca: 56:bf:69:0d:8b:aa:15:99:c8:82:5e:9f:54:d3:9c:2c: a9:b0:a9:be:9b:ac:ed:fe:b6:bb:26:03:2c:b5:cf:33: 06:6d:40:6d:45:e4:97:f8:48:3f:fa:fc:f3:e5:dd:97: 67:3e:02:4d:c5:da:83:57:19:6f:72:da:6d:14:f1:a0: 80:04:a3:6e:13:65:bd:61:3d:da:47:5e:26:e7:8b:0f: 5e:22:de:c2:04:78:31:77:82:e2:ec:d6:de:4f:29:2e: 2c:74:39:ca:e1:07:54:9e:0e:4b:44:71:55:d4:5f:d6: 42:4a:04:d9:35:5d:40:5e:f2:9a:1a:2d:61:cf:9d:7b: 95:05:b9:0a:ba:2d:2f:d5:5a:87:96:a4:9f:02:ff:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:8c:37:1a:ba:39:6a:dc:8d:5d:b6:ab:3b:99:25:97: ab:39:e1:59:fb:44:1c:2a:cc:00:ab:97:ce:20:f9:c1: f1:ba:53:0c:30:42:d2:81:f8:ee:12:b1:42:6b:d6:84: 76:51:cd:7f:d3:a2:00:3e:96:22:03:5b:da:c6:5c:da: 5c:f5:6f:65:11:29:9f:18:b9:b8:34:c0:a9:a0:41:6c: 92:6a:c5:b2:bb:44:bb:90:27:e1:5b:e1:7b:17:79:84: cc:6f:bf:74:da:15:18:24:ca:80:c5:3f:a6:45:7f:02: 16:4d:92:8c:11:ab:f5:b3:ef:eb:ac:09:c7:b4:75:48: 33:25:de:a1:e5:6b:85:9d:ac:c2:10:fe:8b:19:6e:a3: 99:7e:43:fc:51:52:1b:9a:e7:07:ac:8e:f6:59:fa:ad: 24:1a:e4:37:73:19:cd:fd:8b:c1:c6:13:a0:12:9c:ea: 62:5a:c2:70:4c:04:13:37:6e:0a:18:2c:c3:61:99:43: c9:d5:8e:3c:52:1b:19:17:25:68:3a:3f:02:16:d5:fd: c4:cf:57:e2:cd:b4:e1:c1:55:41:a4:4a:68:8e:f7:58: a8:4c:68:b9:8c:2a:0a:78:6e:2d:75:c2:23:07:4b:3f: 2d:80:bd:b3:1d:41:2a:44:0b:83:53:10:4f:0b:b9:7d Fingerprint (SHA-256): F1:05:97:B9:09:98:38:53:5B:53:D4:27:22:17:44:E9:F6:02:DA:DC:0B:0F:01:81:FB:5D:79:1C:C0:DC:BE:BD Fingerprint (SHA1): 0C:68:39:39:06:99:D3:53:BD:85:94:52:14:9E:F0:4F:17:65:00:EE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1399: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204210 (0x37440372) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:48:47 2022 Not After : Tue Sep 27 20:48:47 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:fc:bf:35:84:7d:ef:2d:3d:d5:e7:c5:61:fe:3a:3b: ee:f5:95:19:b5:d8:ca:a3:a0:3d:19:cc:32:c7:3e:c1: f9:3b:62:be:28:d2:0e:fe:39:2b:cf:d5:da:69:3d:33: e4:86:33:89:d9:45:37:cc:e3:7f:1d:1e:50:1f:af:fe: 50:05:e5:e3:6b:8a:ad:6e:4c:c7:fe:e0:20:c9:a0:8e: 17:f9:c4:87:01:9f:51:04:34:24:d8:c0:11:83:c2:95: 22:d5:90:55:35:86:31:bc:80:d2:91:ec:a0:b7:0c:ca: 56:bf:69:0d:8b:aa:15:99:c8:82:5e:9f:54:d3:9c:2c: a9:b0:a9:be:9b:ac:ed:fe:b6:bb:26:03:2c:b5:cf:33: 06:6d:40:6d:45:e4:97:f8:48:3f:fa:fc:f3:e5:dd:97: 67:3e:02:4d:c5:da:83:57:19:6f:72:da:6d:14:f1:a0: 80:04:a3:6e:13:65:bd:61:3d:da:47:5e:26:e7:8b:0f: 5e:22:de:c2:04:78:31:77:82:e2:ec:d6:de:4f:29:2e: 2c:74:39:ca:e1:07:54:9e:0e:4b:44:71:55:d4:5f:d6: 42:4a:04:d9:35:5d:40:5e:f2:9a:1a:2d:61:cf:9d:7b: 95:05:b9:0a:ba:2d:2f:d5:5a:87:96:a4:9f:02:ff:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:8c:37:1a:ba:39:6a:dc:8d:5d:b6:ab:3b:99:25:97: ab:39:e1:59:fb:44:1c:2a:cc:00:ab:97:ce:20:f9:c1: f1:ba:53:0c:30:42:d2:81:f8:ee:12:b1:42:6b:d6:84: 76:51:cd:7f:d3:a2:00:3e:96:22:03:5b:da:c6:5c:da: 5c:f5:6f:65:11:29:9f:18:b9:b8:34:c0:a9:a0:41:6c: 92:6a:c5:b2:bb:44:bb:90:27:e1:5b:e1:7b:17:79:84: cc:6f:bf:74:da:15:18:24:ca:80:c5:3f:a6:45:7f:02: 16:4d:92:8c:11:ab:f5:b3:ef:eb:ac:09:c7:b4:75:48: 33:25:de:a1:e5:6b:85:9d:ac:c2:10:fe:8b:19:6e:a3: 99:7e:43:fc:51:52:1b:9a:e7:07:ac:8e:f6:59:fa:ad: 24:1a:e4:37:73:19:cd:fd:8b:c1:c6:13:a0:12:9c:ea: 62:5a:c2:70:4c:04:13:37:6e:0a:18:2c:c3:61:99:43: c9:d5:8e:3c:52:1b:19:17:25:68:3a:3f:02:16:d5:fd: c4:cf:57:e2:cd:b4:e1:c1:55:41:a4:4a:68:8e:f7:58: a8:4c:68:b9:8c:2a:0a:78:6e:2d:75:c2:23:07:4b:3f: 2d:80:bd:b3:1d:41:2a:44:0b:83:53:10:4f:0b:b9:7d Fingerprint (SHA-256): F1:05:97:B9:09:98:38:53:5B:53:D4:27:22:17:44:E9:F6:02:DA:DC:0B:0F:01:81:FB:5D:79:1C:C0:DC:BE:BD Fingerprint (SHA1): 0C:68:39:39:06:99:D3:53:BD:85:94:52:14:9E:F0:4F:17:65:00:EE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1400: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204210 (0x37440372) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:48:47 2022 Not After : Tue Sep 27 20:48:47 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:fc:bf:35:84:7d:ef:2d:3d:d5:e7:c5:61:fe:3a:3b: ee:f5:95:19:b5:d8:ca:a3:a0:3d:19:cc:32:c7:3e:c1: f9:3b:62:be:28:d2:0e:fe:39:2b:cf:d5:da:69:3d:33: e4:86:33:89:d9:45:37:cc:e3:7f:1d:1e:50:1f:af:fe: 50:05:e5:e3:6b:8a:ad:6e:4c:c7:fe:e0:20:c9:a0:8e: 17:f9:c4:87:01:9f:51:04:34:24:d8:c0:11:83:c2:95: 22:d5:90:55:35:86:31:bc:80:d2:91:ec:a0:b7:0c:ca: 56:bf:69:0d:8b:aa:15:99:c8:82:5e:9f:54:d3:9c:2c: a9:b0:a9:be:9b:ac:ed:fe:b6:bb:26:03:2c:b5:cf:33: 06:6d:40:6d:45:e4:97:f8:48:3f:fa:fc:f3:e5:dd:97: 67:3e:02:4d:c5:da:83:57:19:6f:72:da:6d:14:f1:a0: 80:04:a3:6e:13:65:bd:61:3d:da:47:5e:26:e7:8b:0f: 5e:22:de:c2:04:78:31:77:82:e2:ec:d6:de:4f:29:2e: 2c:74:39:ca:e1:07:54:9e:0e:4b:44:71:55:d4:5f:d6: 42:4a:04:d9:35:5d:40:5e:f2:9a:1a:2d:61:cf:9d:7b: 95:05:b9:0a:ba:2d:2f:d5:5a:87:96:a4:9f:02:ff:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:8c:37:1a:ba:39:6a:dc:8d:5d:b6:ab:3b:99:25:97: ab:39:e1:59:fb:44:1c:2a:cc:00:ab:97:ce:20:f9:c1: f1:ba:53:0c:30:42:d2:81:f8:ee:12:b1:42:6b:d6:84: 76:51:cd:7f:d3:a2:00:3e:96:22:03:5b:da:c6:5c:da: 5c:f5:6f:65:11:29:9f:18:b9:b8:34:c0:a9:a0:41:6c: 92:6a:c5:b2:bb:44:bb:90:27:e1:5b:e1:7b:17:79:84: cc:6f:bf:74:da:15:18:24:ca:80:c5:3f:a6:45:7f:02: 16:4d:92:8c:11:ab:f5:b3:ef:eb:ac:09:c7:b4:75:48: 33:25:de:a1:e5:6b:85:9d:ac:c2:10:fe:8b:19:6e:a3: 99:7e:43:fc:51:52:1b:9a:e7:07:ac:8e:f6:59:fa:ad: 24:1a:e4:37:73:19:cd:fd:8b:c1:c6:13:a0:12:9c:ea: 62:5a:c2:70:4c:04:13:37:6e:0a:18:2c:c3:61:99:43: c9:d5:8e:3c:52:1b:19:17:25:68:3a:3f:02:16:d5:fd: c4:cf:57:e2:cd:b4:e1:c1:55:41:a4:4a:68:8e:f7:58: a8:4c:68:b9:8c:2a:0a:78:6e:2d:75:c2:23:07:4b:3f: 2d:80:bd:b3:1d:41:2a:44:0b:83:53:10:4f:0b:b9:7d Fingerprint (SHA-256): F1:05:97:B9:09:98:38:53:5B:53:D4:27:22:17:44:E9:F6:02:DA:DC:0B:0F:01:81:FB:5D:79:1C:C0:DC:BE:BD Fingerprint (SHA1): 0C:68:39:39:06:99:D3:53:BD:85:94:52:14:9E:F0:4F:17:65:00:EE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1401: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204210 (0x37440372) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:48:47 2022 Not After : Tue Sep 27 20:48:47 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:fc:bf:35:84:7d:ef:2d:3d:d5:e7:c5:61:fe:3a:3b: ee:f5:95:19:b5:d8:ca:a3:a0:3d:19:cc:32:c7:3e:c1: f9:3b:62:be:28:d2:0e:fe:39:2b:cf:d5:da:69:3d:33: e4:86:33:89:d9:45:37:cc:e3:7f:1d:1e:50:1f:af:fe: 50:05:e5:e3:6b:8a:ad:6e:4c:c7:fe:e0:20:c9:a0:8e: 17:f9:c4:87:01:9f:51:04:34:24:d8:c0:11:83:c2:95: 22:d5:90:55:35:86:31:bc:80:d2:91:ec:a0:b7:0c:ca: 56:bf:69:0d:8b:aa:15:99:c8:82:5e:9f:54:d3:9c:2c: a9:b0:a9:be:9b:ac:ed:fe:b6:bb:26:03:2c:b5:cf:33: 06:6d:40:6d:45:e4:97:f8:48:3f:fa:fc:f3:e5:dd:97: 67:3e:02:4d:c5:da:83:57:19:6f:72:da:6d:14:f1:a0: 80:04:a3:6e:13:65:bd:61:3d:da:47:5e:26:e7:8b:0f: 5e:22:de:c2:04:78:31:77:82:e2:ec:d6:de:4f:29:2e: 2c:74:39:ca:e1:07:54:9e:0e:4b:44:71:55:d4:5f:d6: 42:4a:04:d9:35:5d:40:5e:f2:9a:1a:2d:61:cf:9d:7b: 95:05:b9:0a:ba:2d:2f:d5:5a:87:96:a4:9f:02:ff:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:8c:37:1a:ba:39:6a:dc:8d:5d:b6:ab:3b:99:25:97: ab:39:e1:59:fb:44:1c:2a:cc:00:ab:97:ce:20:f9:c1: f1:ba:53:0c:30:42:d2:81:f8:ee:12:b1:42:6b:d6:84: 76:51:cd:7f:d3:a2:00:3e:96:22:03:5b:da:c6:5c:da: 5c:f5:6f:65:11:29:9f:18:b9:b8:34:c0:a9:a0:41:6c: 92:6a:c5:b2:bb:44:bb:90:27:e1:5b:e1:7b:17:79:84: cc:6f:bf:74:da:15:18:24:ca:80:c5:3f:a6:45:7f:02: 16:4d:92:8c:11:ab:f5:b3:ef:eb:ac:09:c7:b4:75:48: 33:25:de:a1:e5:6b:85:9d:ac:c2:10:fe:8b:19:6e:a3: 99:7e:43:fc:51:52:1b:9a:e7:07:ac:8e:f6:59:fa:ad: 24:1a:e4:37:73:19:cd:fd:8b:c1:c6:13:a0:12:9c:ea: 62:5a:c2:70:4c:04:13:37:6e:0a:18:2c:c3:61:99:43: c9:d5:8e:3c:52:1b:19:17:25:68:3a:3f:02:16:d5:fd: c4:cf:57:e2:cd:b4:e1:c1:55:41:a4:4a:68:8e:f7:58: a8:4c:68:b9:8c:2a:0a:78:6e:2d:75:c2:23:07:4b:3f: 2d:80:bd:b3:1d:41:2a:44:0b:83:53:10:4f:0b:b9:7d Fingerprint (SHA-256): F1:05:97:B9:09:98:38:53:5B:53:D4:27:22:17:44:E9:F6:02:DA:DC:0B:0F:01:81:FB:5D:79:1C:C0:DC:BE:BD Fingerprint (SHA1): 0C:68:39:39:06:99:D3:53:BD:85:94:52:14:9E:F0:4F:17:65:00:EE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1402: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204210 (0x37440372) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:48:47 2022 Not After : Tue Sep 27 20:48:47 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:fc:bf:35:84:7d:ef:2d:3d:d5:e7:c5:61:fe:3a:3b: ee:f5:95:19:b5:d8:ca:a3:a0:3d:19:cc:32:c7:3e:c1: f9:3b:62:be:28:d2:0e:fe:39:2b:cf:d5:da:69:3d:33: e4:86:33:89:d9:45:37:cc:e3:7f:1d:1e:50:1f:af:fe: 50:05:e5:e3:6b:8a:ad:6e:4c:c7:fe:e0:20:c9:a0:8e: 17:f9:c4:87:01:9f:51:04:34:24:d8:c0:11:83:c2:95: 22:d5:90:55:35:86:31:bc:80:d2:91:ec:a0:b7:0c:ca: 56:bf:69:0d:8b:aa:15:99:c8:82:5e:9f:54:d3:9c:2c: a9:b0:a9:be:9b:ac:ed:fe:b6:bb:26:03:2c:b5:cf:33: 06:6d:40:6d:45:e4:97:f8:48:3f:fa:fc:f3:e5:dd:97: 67:3e:02:4d:c5:da:83:57:19:6f:72:da:6d:14:f1:a0: 80:04:a3:6e:13:65:bd:61:3d:da:47:5e:26:e7:8b:0f: 5e:22:de:c2:04:78:31:77:82:e2:ec:d6:de:4f:29:2e: 2c:74:39:ca:e1:07:54:9e:0e:4b:44:71:55:d4:5f:d6: 42:4a:04:d9:35:5d:40:5e:f2:9a:1a:2d:61:cf:9d:7b: 95:05:b9:0a:ba:2d:2f:d5:5a:87:96:a4:9f:02:ff:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:8c:37:1a:ba:39:6a:dc:8d:5d:b6:ab:3b:99:25:97: ab:39:e1:59:fb:44:1c:2a:cc:00:ab:97:ce:20:f9:c1: f1:ba:53:0c:30:42:d2:81:f8:ee:12:b1:42:6b:d6:84: 76:51:cd:7f:d3:a2:00:3e:96:22:03:5b:da:c6:5c:da: 5c:f5:6f:65:11:29:9f:18:b9:b8:34:c0:a9:a0:41:6c: 92:6a:c5:b2:bb:44:bb:90:27:e1:5b:e1:7b:17:79:84: cc:6f:bf:74:da:15:18:24:ca:80:c5:3f:a6:45:7f:02: 16:4d:92:8c:11:ab:f5:b3:ef:eb:ac:09:c7:b4:75:48: 33:25:de:a1:e5:6b:85:9d:ac:c2:10:fe:8b:19:6e:a3: 99:7e:43:fc:51:52:1b:9a:e7:07:ac:8e:f6:59:fa:ad: 24:1a:e4:37:73:19:cd:fd:8b:c1:c6:13:a0:12:9c:ea: 62:5a:c2:70:4c:04:13:37:6e:0a:18:2c:c3:61:99:43: c9:d5:8e:3c:52:1b:19:17:25:68:3a:3f:02:16:d5:fd: c4:cf:57:e2:cd:b4:e1:c1:55:41:a4:4a:68:8e:f7:58: a8:4c:68:b9:8c:2a:0a:78:6e:2d:75:c2:23:07:4b:3f: 2d:80:bd:b3:1d:41:2a:44:0b:83:53:10:4f:0b:b9:7d Fingerprint (SHA-256): F1:05:97:B9:09:98:38:53:5B:53:D4:27:22:17:44:E9:F6:02:DA:DC:0B:0F:01:81:FB:5D:79:1C:C0:DC:BE:BD Fingerprint (SHA1): 0C:68:39:39:06:99:D3:53:BD:85:94:52:14:9E:F0:4F:17:65:00:EE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1403: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204210 (0x37440372) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:48:47 2022 Not After : Tue Sep 27 20:48:47 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:fc:bf:35:84:7d:ef:2d:3d:d5:e7:c5:61:fe:3a:3b: ee:f5:95:19:b5:d8:ca:a3:a0:3d:19:cc:32:c7:3e:c1: f9:3b:62:be:28:d2:0e:fe:39:2b:cf:d5:da:69:3d:33: e4:86:33:89:d9:45:37:cc:e3:7f:1d:1e:50:1f:af:fe: 50:05:e5:e3:6b:8a:ad:6e:4c:c7:fe:e0:20:c9:a0:8e: 17:f9:c4:87:01:9f:51:04:34:24:d8:c0:11:83:c2:95: 22:d5:90:55:35:86:31:bc:80:d2:91:ec:a0:b7:0c:ca: 56:bf:69:0d:8b:aa:15:99:c8:82:5e:9f:54:d3:9c:2c: a9:b0:a9:be:9b:ac:ed:fe:b6:bb:26:03:2c:b5:cf:33: 06:6d:40:6d:45:e4:97:f8:48:3f:fa:fc:f3:e5:dd:97: 67:3e:02:4d:c5:da:83:57:19:6f:72:da:6d:14:f1:a0: 80:04:a3:6e:13:65:bd:61:3d:da:47:5e:26:e7:8b:0f: 5e:22:de:c2:04:78:31:77:82:e2:ec:d6:de:4f:29:2e: 2c:74:39:ca:e1:07:54:9e:0e:4b:44:71:55:d4:5f:d6: 42:4a:04:d9:35:5d:40:5e:f2:9a:1a:2d:61:cf:9d:7b: 95:05:b9:0a:ba:2d:2f:d5:5a:87:96:a4:9f:02:ff:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:8c:37:1a:ba:39:6a:dc:8d:5d:b6:ab:3b:99:25:97: ab:39:e1:59:fb:44:1c:2a:cc:00:ab:97:ce:20:f9:c1: f1:ba:53:0c:30:42:d2:81:f8:ee:12:b1:42:6b:d6:84: 76:51:cd:7f:d3:a2:00:3e:96:22:03:5b:da:c6:5c:da: 5c:f5:6f:65:11:29:9f:18:b9:b8:34:c0:a9:a0:41:6c: 92:6a:c5:b2:bb:44:bb:90:27:e1:5b:e1:7b:17:79:84: cc:6f:bf:74:da:15:18:24:ca:80:c5:3f:a6:45:7f:02: 16:4d:92:8c:11:ab:f5:b3:ef:eb:ac:09:c7:b4:75:48: 33:25:de:a1:e5:6b:85:9d:ac:c2:10:fe:8b:19:6e:a3: 99:7e:43:fc:51:52:1b:9a:e7:07:ac:8e:f6:59:fa:ad: 24:1a:e4:37:73:19:cd:fd:8b:c1:c6:13:a0:12:9c:ea: 62:5a:c2:70:4c:04:13:37:6e:0a:18:2c:c3:61:99:43: c9:d5:8e:3c:52:1b:19:17:25:68:3a:3f:02:16:d5:fd: c4:cf:57:e2:cd:b4:e1:c1:55:41:a4:4a:68:8e:f7:58: a8:4c:68:b9:8c:2a:0a:78:6e:2d:75:c2:23:07:4b:3f: 2d:80:bd:b3:1d:41:2a:44:0b:83:53:10:4f:0b:b9:7d Fingerprint (SHA-256): F1:05:97:B9:09:98:38:53:5B:53:D4:27:22:17:44:E9:F6:02:DA:DC:0B:0F:01:81:FB:5D:79:1C:C0:DC:BE:BD Fingerprint (SHA1): 0C:68:39:39:06:99:D3:53:BD:85:94:52:14:9E:F0:4F:17:65:00:EE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1404: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1405: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1406: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204240 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1407: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1408: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #1409: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1410: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 927204241 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1411: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1412: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #1413: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1414: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 927204242 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1415: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1416: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #1417: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1418: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 927204243 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1419: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1420: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #1421: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1422: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 927204244 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1423: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1424: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #1425: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1426: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 927204245 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1427: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1428: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #1429: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1430: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 927204246 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1431: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1432: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1433: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204240 (0x37440390) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:49:51 2022 Not After : Tue Sep 27 20:49:51 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:71:54:2f:71:4a:e8:ad:d4:cd:ce:c6:1c:92:45:96: e0:b4:4d:52:1c:55:f5:36:78:df:d9:9a:c6:ab:cf:7e: 9d:35:bb:88:0f:61:ea:66:91:f1:ff:42:4f:b0:13:02: 3a:5c:e7:bc:f8:c2:b4:44:d1:08:6b:c6:4b:5e:52:f7: 40:b7:55:ae:ca:d8:b7:15:f5:5d:1d:6c:74:71:57:56: 98:a4:33:ea:07:6d:a7:2c:70:30:1e:7a:be:db:b5:0b: 60:90:d2:ae:40:ee:45:8e:47:6e:66:d4:9d:12:96:bf: 44:b2:2a:01:e0:65:06:53:fd:74:3e:ce:e7:7b:44:c3: 84:be:e8:2d:08:c4:4b:f7:71:d6:14:ca:5f:60:56:dd: 24:94:ec:26:00:44:4c:49:a9:73:49:39:d2:25:d1:6d: a5:45:ab:66:a9:18:fb:e1:6b:ed:c2:5e:92:c7:3b:2b: 03:c4:4a:e4:8e:d7:af:3a:76:bc:ca:de:a8:f3:61:f8: 94:8c:8d:95:d8:ec:1d:eb:9f:6e:55:d3:49:9a:74:99: 24:7e:c0:1e:d7:01:e4:15:c1:ca:b6:6d:d1:34:6a:eb: 07:09:a8:51:7f:1e:1a:b8:d7:86:f6:20:32:88:53:8c: 36:f2:6e:ea:3b:b7:1e:95:c4:56:fc:a8:35:d2:f3:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 58:60:ec:df:e6:6b:aa:27:29:dc:92:f3:19:7f:77:75: 2f:07:aa:5f:60:93:4e:a9:6e:c7:e4:25:86:74:f8:04: 90:f3:39:1c:2b:0a:5f:da:39:93:d8:39:5f:b9:14:86: 47:04:6a:52:64:7d:04:9e:79:34:47:cf:7a:70:97:7b: 18:e1:4d:de:c5:f7:ba:80:9b:b0:0d:57:50:6d:d7:73: 2d:08:0d:e3:6f:69:57:d3:24:f1:05:04:9b:68:78:33: 4b:7b:62:7b:de:7d:a4:d8:a5:b1:d0:31:21:65:a2:30: 3a:3b:b0:90:8b:e4:f3:64:20:1a:1f:b1:3d:b9:13:e3: 22:2e:00:21:6a:9b:db:38:0f:6d:ec:3f:25:ce:b7:6b: 3c:8f:7a:e0:b6:33:01:1b:80:3f:30:a9:18:4e:a0:b8: 91:32:41:9e:3e:30:2f:a7:ca:fa:56:f8:92:c2:cb:2a: 2c:57:8e:9d:c3:d3:b7:33:57:b4:e2:3e:0e:c5:fc:8b: 39:91:00:2f:2e:15:71:f6:2d:e2:66:28:db:a8:40:41: ce:80:2d:b0:20:9d:7e:22:ea:ce:4b:a2:86:b8:5b:86: b0:4a:8b:4e:48:c4:96:65:7a:14:0c:da:fa:64:1f:09: 6a:4f:63:60:c9:16:e9:ba:cd:b6:0c:49:4d:89:44:ca Fingerprint (SHA-256): B3:2D:3D:2C:3B:45:1A:3C:84:AC:84:62:4A:A1:05:C0:E4:23:9E:C7:EA:8C:18:50:60:E2:17:87:15:B0:B5:38 Fingerprint (SHA1): B7:B3:4A:35:40:AD:7E:C2:03:19:99:2E:DF:55:A8:3B:37:F9:0D:51 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1434: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1435: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1436: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1437: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204240 (0x37440390) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:49:51 2022 Not After : Tue Sep 27 20:49:51 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:71:54:2f:71:4a:e8:ad:d4:cd:ce:c6:1c:92:45:96: e0:b4:4d:52:1c:55:f5:36:78:df:d9:9a:c6:ab:cf:7e: 9d:35:bb:88:0f:61:ea:66:91:f1:ff:42:4f:b0:13:02: 3a:5c:e7:bc:f8:c2:b4:44:d1:08:6b:c6:4b:5e:52:f7: 40:b7:55:ae:ca:d8:b7:15:f5:5d:1d:6c:74:71:57:56: 98:a4:33:ea:07:6d:a7:2c:70:30:1e:7a:be:db:b5:0b: 60:90:d2:ae:40:ee:45:8e:47:6e:66:d4:9d:12:96:bf: 44:b2:2a:01:e0:65:06:53:fd:74:3e:ce:e7:7b:44:c3: 84:be:e8:2d:08:c4:4b:f7:71:d6:14:ca:5f:60:56:dd: 24:94:ec:26:00:44:4c:49:a9:73:49:39:d2:25:d1:6d: a5:45:ab:66:a9:18:fb:e1:6b:ed:c2:5e:92:c7:3b:2b: 03:c4:4a:e4:8e:d7:af:3a:76:bc:ca:de:a8:f3:61:f8: 94:8c:8d:95:d8:ec:1d:eb:9f:6e:55:d3:49:9a:74:99: 24:7e:c0:1e:d7:01:e4:15:c1:ca:b6:6d:d1:34:6a:eb: 07:09:a8:51:7f:1e:1a:b8:d7:86:f6:20:32:88:53:8c: 36:f2:6e:ea:3b:b7:1e:95:c4:56:fc:a8:35:d2:f3:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 58:60:ec:df:e6:6b:aa:27:29:dc:92:f3:19:7f:77:75: 2f:07:aa:5f:60:93:4e:a9:6e:c7:e4:25:86:74:f8:04: 90:f3:39:1c:2b:0a:5f:da:39:93:d8:39:5f:b9:14:86: 47:04:6a:52:64:7d:04:9e:79:34:47:cf:7a:70:97:7b: 18:e1:4d:de:c5:f7:ba:80:9b:b0:0d:57:50:6d:d7:73: 2d:08:0d:e3:6f:69:57:d3:24:f1:05:04:9b:68:78:33: 4b:7b:62:7b:de:7d:a4:d8:a5:b1:d0:31:21:65:a2:30: 3a:3b:b0:90:8b:e4:f3:64:20:1a:1f:b1:3d:b9:13:e3: 22:2e:00:21:6a:9b:db:38:0f:6d:ec:3f:25:ce:b7:6b: 3c:8f:7a:e0:b6:33:01:1b:80:3f:30:a9:18:4e:a0:b8: 91:32:41:9e:3e:30:2f:a7:ca:fa:56:f8:92:c2:cb:2a: 2c:57:8e:9d:c3:d3:b7:33:57:b4:e2:3e:0e:c5:fc:8b: 39:91:00:2f:2e:15:71:f6:2d:e2:66:28:db:a8:40:41: ce:80:2d:b0:20:9d:7e:22:ea:ce:4b:a2:86:b8:5b:86: b0:4a:8b:4e:48:c4:96:65:7a:14:0c:da:fa:64:1f:09: 6a:4f:63:60:c9:16:e9:ba:cd:b6:0c:49:4d:89:44:ca Fingerprint (SHA-256): B3:2D:3D:2C:3B:45:1A:3C:84:AC:84:62:4A:A1:05:C0:E4:23:9E:C7:EA:8C:18:50:60:E2:17:87:15:B0:B5:38 Fingerprint (SHA1): B7:B3:4A:35:40:AD:7E:C2:03:19:99:2E:DF:55:A8:3B:37:F9:0D:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1438: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1439: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1440: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1441: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204247 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1442: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1443: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1444: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1445: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927204248 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1446: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1447: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1448: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1449: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927204249 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1450: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1451: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1452: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1453: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 927204250 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1454: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1455: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1456: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1457: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1458: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1459: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204247 (0x37440397) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:50:06 2022 Not After : Tue Sep 27 20:50:06 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:83:06:99:fa:b4:83:b6:f1:71:28:21:c1:3e:99:fe: 7b:d3:22:45:cd:4a:87:fe:9e:5f:cb:fe:e7:a0:93:b1: e8:79:03:4d:ea:74:ac:9e:67:57:73:57:31:7c:20:94: be:16:3d:11:38:12:12:9d:71:c2:0e:ab:82:db:a7:13: 3d:00:92:c0:f1:ab:84:40:5d:55:cc:b0:d5:37:fa:89: dd:5b:87:43:6b:db:26:53:fc:9e:f6:06:54:64:17:8c: 64:7a:f8:7d:54:7e:6e:6d:30:a6:14:3f:e1:35:4d:99: 0a:94:2b:13:ab:42:5e:9c:0d:6c:2a:99:63:ad:5d:c0: 2a:fe:f8:5c:83:25:17:dd:9b:56:b1:36:87:cd:8a:33: 81:b1:dd:69:e4:9e:36:25:71:64:cb:82:c4:f5:20:d9: 23:a8:97:8c:b1:fa:c3:16:d1:95:8b:f5:20:b9:8d:6d: 88:2c:f8:65:4c:bc:40:16:4f:04:5d:14:b6:4d:44:13: 81:b5:ab:27:78:88:cf:64:94:e9:ad:e3:ab:51:3c:e5: a2:30:34:51:2b:42:3d:f4:56:38:6c:1d:ae:18:50:ed: e8:f1:c8:79:db:eb:f7:8c:37:fb:33:ab:55:68:0e:83: b8:9e:bf:d9:6a:e8:e8:81:69:2a:73:2e:96:ae:ba:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:86:76:f1:ff:d4:26:58:39:80:06:62:88:5b:e9:cd: ca:c9:12:d0:89:94:d8:85:5f:26:8a:43:fc:36:7b:5d: 5b:93:d7:29:24:7a:66:77:18:ff:6f:c8:b0:d1:ff:8e: 6c:c5:1f:df:81:ea:73:60:a6:50:b6:68:74:7b:12:d7: 78:04:1f:c2:c1:8d:f1:2d:8d:14:cb:27:7c:79:b3:28: 89:3f:db:2f:98:93:be:b9:d4:2b:a5:22:df:26:19:8c: 1e:e7:18:bd:3f:a7:1a:7c:79:97:94:c6:17:75:24:f8: ba:60:4c:b9:49:4a:e0:98:8a:60:3f:41:1c:1d:9e:a3: 55:35:09:8f:c1:cf:66:85:ff:ff:24:1d:33:f8:76:6d: 9a:84:4c:5f:06:37:29:f3:9e:9d:02:0d:ea:40:be:1d: 80:7d:d1:7a:fb:85:a2:66:9d:1a:99:18:3c:9c:32:d5: 21:20:03:68:6c:51:44:9e:46:fa:61:ea:30:a3:cf:8c: b9:7a:fc:2e:3b:23:62:5f:70:96:81:ea:b3:a0:35:c3: 28:1f:9c:08:d3:69:ca:55:00:e2:a6:b0:1c:4a:8b:a8: e0:d9:81:49:c5:0e:0c:81:29:d9:bf:de:94:86:27:0d: f6:3f:5a:18:a0:1b:70:fd:b2:1d:02:7c:9e:06:7b:a9 Fingerprint (SHA-256): 75:23:25:5E:25:91:FA:E3:D5:36:98:B5:2A:53:82:0F:1F:7F:F3:FC:73:AD:B1:C7:9C:22:45:C9:83:7C:12:C1 Fingerprint (SHA1): 3E:4D:23:34:AD:E8:81:81:F6:B8:F4:04:7F:CB:B2:50:FC:C7:AF:9B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1460: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1461: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1462: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204248 (0x37440398) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:50:07 2022 Not After : Mon Sep 27 20:50:07 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:fc:3a:61:2d:03:60:1d:75:68:a2:ef:12:d2:7e:cb: 5e:ad:cd:ea:31:10:62:6a:07:39:4a:d3:4b:db:d8:1d: 79:8c:a4:76:08:b2:f9:fa:98:37:63:97:5a:ea:71:ce: ed:13:e5:e1:73:3f:ff:1b:2d:5a:9c:90:32:17:aa:e3: 95:ad:43:f1:dc:1e:c8:35:d1:8a:fb:a8:8d:76:85:3a: b8:d8:d0:95:05:bf:73:be:7f:3c:9d:90:ee:42:98:14: 1c:fd:50:e6:8e:b2:59:62:29:ea:c4:6e:49:db:2d:44: 79:8a:b1:1f:a1:27:5f:c1:47:5f:5d:d0:3c:6c:a4:a6: f1:ef:34:36:2b:ae:38:7e:34:bd:e9:82:5e:1b:16:db: e9:aa:cb:01:ef:d0:37:19:a2:a4:03:45:a8:2c:71:9a: 9b:b2:56:d0:08:76:c6:76:af:4e:5b:bd:99:44:42:ad: 2c:2e:3e:9d:7f:44:16:02:e8:d8:e4:c8:96:02:a9:2c: cc:0f:c7:d3:17:ac:e3:e6:2e:bc:bd:e8:fb:03:b1:9c: b5:e6:f9:85:c5:85:c1:e9:ba:e9:ca:da:4b:fb:32:77: f5:33:ae:24:c6:fa:df:e1:52:01:14:45:ff:a1:6f:19: a3:1a:ca:92:ee:6f:60:b8:26:93:e2:88:ed:65:95:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:37:7f:28:c4:8b:94:3e:2d:02:a9:e5:f6:3c:70:c0: a8:9a:70:55:e9:aa:84:ee:0f:3a:7e:12:23:0d:f9:1e: cf:e1:c9:e6:0a:11:04:cd:e2:17:a4:63:a4:50:e3:ee: 99:a6:eb:6a:5a:97:fe:ed:13:62:cd:01:23:d1:dc:de: c9:5f:a1:ce:21:4e:d8:ff:4d:ca:0d:47:ca:ed:75:8c: 76:4f:12:1e:d2:ab:e9:93:b9:59:a4:41:56:4d:4b:03: a8:17:42:09:e9:f7:3f:e4:7d:38:b2:6b:ef:27:98:63: a3:bf:fe:fa:0f:9e:4a:22:cb:f8:6e:2f:e9:d0:4c:6d: de:af:e5:67:ce:ef:cb:b3:d2:55:b5:21:97:78:a4:01: 19:8a:51:9a:75:f4:9a:52:77:2e:6d:23:c9:47:a9:04: ba:2f:a7:06:e2:9d:b5:49:87:b0:d1:3b:e2:b4:5e:6d: 09:8f:cf:21:fe:3c:cc:a3:27:fd:8b:f6:a3:28:50:a0: e4:f0:c4:c8:e5:9d:06:45:f8:d4:7b:36:d8:71:ec:38: 5f:f4:6a:02:3a:f3:31:5f:f5:39:dc:4c:c9:c5:ec:a1: f7:c9:1a:e1:a8:1f:ff:c6:a9:08:fe:9a:da:04:37:21: 43:cb:76:ef:a1:43:a9:bc:f4:a6:30:6b:24:f1:af:3b Fingerprint (SHA-256): B6:83:6A:A3:94:FF:72:23:F0:FD:03:06:14:64:76:E3:4E:97:3A:1A:53:AB:99:64:8B:87:77:47:71:EA:3D:0A Fingerprint (SHA1): 71:EE:37:46:F8:02:C4:24:66:7E:7C:C6:35:CB:79:5B:E8:2B:B4:8B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1463: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1464: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204249 (0x37440399) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 20:50:10 2022 Not After : Mon Sep 27 20:50:10 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:b1:74:0c:62:6a:ce:cd:f4:56:ce:62:be:93:aa:9b: bb:6b:05:c3:6f:45:a6:27:d3:be:36:5d:a4:03:df:c5: 9d:8c:1c:fb:ec:7b:54:af:1d:0e:c2:c0:fa:7c:05:26: ae:23:ee:36:8e:6a:37:0b:a6:d1:94:22:e5:04:15:ad: 0d:b2:bd:e7:37:a5:0a:30:2c:b1:15:24:20:b4:c0:3d: df:7e:da:13:f7:b8:e8:a4:d7:43:56:a4:d2:21:60:8f: f4:29:1e:74:dc:cc:d9:a7:de:f2:86:c2:f9:5b:3b:b0: cf:50:a1:00:68:30:06:e1:cb:af:74:37:d0:cf:e7:62: f2:88:c8:8c:71:d6:8b:de:d2:e3:c9:58:45:57:79:7b: 49:7b:71:ad:25:32:bb:0b:72:5b:4c:82:04:31:f5:43: dc:16:05:e0:97:ea:e6:84:bd:35:2f:b8:e6:58:79:ff: 46:79:67:9a:11:5b:92:cc:dd:26:d1:ed:41:12:f1:40: af:1f:6b:01:9e:cc:dd:7a:4f:c6:46:eb:49:90:6e:1f: 56:be:fd:c0:6d:cb:ce:6e:ed:14:e0:4c:bb:6b:c1:19: e2:43:a0:fd:1b:5d:2a:65:9c:76:ac:78:97:78:32:9e: fe:69:00:67:9c:88:55:9e:a1:cf:04:61:6b:d9:3a:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:3e:8d:4f:d0:82:3a:37:65:e8:95:4b:83:88:76:eb: 5e:8b:e6:1c:41:75:10:c3:7f:34:83:c1:95:c4:f9:d1: 6f:1c:2c:88:b2:dc:b9:c8:f0:04:54:f0:3a:20:26:6b: 06:be:7c:f3:ea:52:4c:b5:91:70:ee:8e:28:e3:62:bc: c2:90:b1:08:b3:8a:aa:e4:61:ad:ec:ee:9b:7c:de:64: ab:04:05:f0:c6:e2:f5:f6:b6:fa:64:a1:dc:e9:ae:3a: 50:d0:b8:79:6b:63:b2:9e:5c:51:90:77:95:30:7a:3b: de:4c:8a:ab:75:fa:9b:d1:86:54:18:62:e7:f3:3e:63: a9:25:57:9c:58:49:ec:2c:2a:73:11:06:69:92:a6:49: 11:43:a9:0e:43:f6:be:28:a7:1e:ff:be:a3:4b:70:7c: 79:fd:94:6c:cd:d1:59:22:76:77:b7:d2:b9:dc:98:8b: 0e:43:42:3d:31:e7:c9:ff:08:5b:e7:67:7e:05:66:5b: 11:e8:76:c2:0b:5c:3b:5a:49:63:d5:dc:d8:0b:89:f5: a9:2f:11:a6:38:e5:00:01:ed:48:f7:15:e5:75:ff:62: a1:64:37:31:6f:2a:77:31:c4:aa:6c:38:e4:9d:c3:45: 97:15:6a:0f:23:a0:5f:69:20:bd:19:60:be:de:18:df Fingerprint (SHA-256): 95:A0:B1:DB:80:C1:2B:F8:04:0E:0B:39:43:AF:66:C0:9A:AA:62:F5:02:E3:7D:E0:0F:DA:80:73:32:2D:C2:CB Fingerprint (SHA1): EB:34:E7:75:E0:4B:A4:0A:3A:F2:19:06:A6:80:0A:4A:07:BF:56:FE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1465: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1466: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204251 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1467: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1468: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1469: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1470: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927204252 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1471: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1472: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1473: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1474: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927204253 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1475: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1476: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1477: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1478: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 927204254 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1479: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1480: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1481: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1482: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 927204255 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1483: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1484: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1485: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1486: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1487: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1488: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #1489: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204251 (0x3744039b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:50:16 2022 Not After : Tue Sep 27 20:50:16 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:ff:b2:2d:90:e1:d9:f6:6d:30:a0:ea:45:e7:9b:16: 51:95:80:00:3c:5b:99:aa:65:c1:4c:98:2c:47:02:0d: 18:38:a2:4c:ac:52:8b:f8:a0:1e:e4:20:b6:fc:72:3f: 2f:86:53:39:73:2e:83:fe:3e:8a:d6:8d:5e:ad:71:58: b1:72:1d:18:14:fc:0a:92:a9:78:de:fb:59:eb:c8:f4: 18:a1:99:c7:fe:2a:3f:fa:73:03:46:2e:a1:4e:3e:15: 84:57:63:8f:3b:b1:ac:87:89:2d:d0:8b:f4:3f:46:4f: 67:bb:c4:ea:e5:5f:c9:d4:60:ff:03:3f:43:94:bd:74: b1:21:c4:bc:14:18:00:f0:03:d4:61:df:52:10:41:87: b1:4c:6f:60:41:5e:6a:60:ca:d6:18:9f:c8:6e:3e:13: ae:a8:7b:29:8d:5e:61:ff:13:98:0c:43:6c:40:7f:a7: 3b:41:8a:ad:22:e7:7e:15:03:d2:6d:f2:98:1a:37:18: c8:c3:91:d1:fb:e2:68:dd:c2:b8:29:c0:ed:7b:19:a2: 7d:d8:8d:3a:6b:24:71:b7:24:4a:45:d4:05:0a:67:5b: b7:d0:f5:c2:44:e6:59:df:f4:b5:d2:10:ec:cf:f4:7e: 8d:5e:43:a1:fa:b7:74:f8:3a:61:bc:59:33:dd:08:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:1d:12:c7:e9:fb:bd:57:da:09:59:42:d9:69:cd:51: 2c:4c:63:f3:8a:72:b5:ad:01:d6:15:b3:c9:f4:0d:c4: e0:9e:0a:6b:40:6d:9c:24:17:d1:dd:63:af:c8:3a:87: ca:56:e8:8b:39:61:0e:24:b9:f9:0a:99:7c:09:66:e7: fd:b2:e0:bc:34:12:c3:c3:80:10:39:41:1c:59:14:01: 65:56:c7:ef:ac:bf:10:68:d9:2d:b1:37:bb:0f:45:2c: b0:cf:1b:3d:9d:87:8c:2e:95:a8:d0:29:11:f3:e2:e0: f9:10:8b:91:bb:80:54:91:b4:d8:69:8d:0e:46:0b:5e: 6e:e3:3e:34:77:d0:7f:e5:a4:ce:f3:5c:5c:96:92:09: ca:1b:7a:01:31:ee:8d:20:56:15:0e:b4:92:48:12:da: 1f:c5:03:7d:34:15:44:bb:9a:a8:e1:89:8a:e0:52:3b: 77:b3:88:fa:cd:47:93:de:82:9f:6c:4b:17:32:93:2c: 6b:f8:0c:77:22:f4:17:5a:af:09:5d:4e:27:19:8b:36: 1c:88:fb:73:1e:95:cd:1d:0b:34:7f:da:d4:3d:9e:49: 1b:80:17:3e:90:12:5d:1a:ef:08:f9:3a:cb:69:7f:17: 24:1a:61:7d:c5:1c:2c:a3:d4:2f:a4:d0:5f:65:94:37 Fingerprint (SHA-256): 36:D1:F1:3D:91:14:C9:F3:9C:8F:4C:EC:98:BA:23:24:EC:4E:92:76:51:1B:EE:BA:7F:34:D3:5A:51:52:FA:7C Fingerprint (SHA1): 4D:A9:66:61:34:A1:4F:44:C9:FC:92:F0:28:20:7B:1E:09:1D:A7:F3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1490: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1491: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204252 (0x3744039c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:50:17 2022 Not After : Mon Sep 27 20:50:17 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:bf:d5:2f:a1:ac:94:61:0f:c9:45:58:62:61:df:39: f2:b6:d1:c2:b0:cc:9d:53:a1:d6:d7:2a:34:22:9a:cd: ee:dd:68:d5:9f:2d:3d:5d:a1:e6:8a:99:11:4c:93:00: cd:44:9c:61:ec:3d:e4:42:c4:3d:cc:03:78:95:0f:3d: 8d:b7:3c:44:08:a4:d8:1f:c7:6a:82:18:57:db:92:92: 59:81:01:a5:20:79:42:e0:cd:a5:37:6e:7b:95:ce:9b: f2:94:8d:ac:e3:62:ec:bf:0c:d7:19:ec:66:8e:e9:64: 08:fe:12:a5:14:81:64:74:a2:99:47:b1:e9:88:e5:47: 43:6f:34:63:68:2d:ea:31:ae:36:9d:64:8d:36:66:9e: 07:97:4b:78:af:b1:f7:83:a7:fe:34:db:11:05:4d:3d: 1e:b7:c2:9e:07:5d:ec:b6:19:b9:8e:cb:c0:2e:f5:4d: 3b:36:8a:2d:83:61:6e:99:78:69:e3:cf:2a:e9:a2:1e: ae:97:f8:56:c5:ea:3f:55:bd:ba:fa:3f:79:25:46:de: b7:d9:58:c0:2e:49:8c:7d:de:86:92:f9:fe:da:03:65: 50:79:93:ae:9c:e3:74:24:f0:60:c9:9e:d0:b5:76:ff: a9:04:16:fa:19:6e:50:c4:1e:64:de:a5:67:27:db:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:a5:5a:98:e5:fb:91:05:b1:9e:bc:be:ef:05:c8:f0: 95:d1:79:c0:50:8c:57:bf:98:aa:5d:30:ea:9e:b8:cc: 58:6d:12:6e:48:49:38:67:c5:81:a8:8d:e0:14:9d:85: 72:30:62:e1:80:da:ba:9b:79:fb:ba:2f:9b:3a:db:47: 2a:5c:b9:e6:c5:dc:c6:7c:83:f7:68:8c:7d:b1:7d:38: 3a:46:1e:13:41:e6:e7:2b:a7:0d:5a:9b:87:b3:ef:08: 39:18:ef:c4:2e:65:67:95:ec:7a:01:59:c9:64:f6:9b: 28:1e:ee:cc:89:5f:02:b1:1f:ce:cd:4c:97:f1:06:46: 52:88:ab:92:3a:6d:19:79:65:1d:8c:c5:55:96:3c:1c: 33:e6:4c:17:20:7b:ac:b5:61:ee:27:c9:31:97:87:16: c3:6a:39:1d:d6:7c:8a:94:e2:29:21:7a:f7:24:51:e3: 79:54:37:f3:f0:be:e5:3e:57:94:db:c2:08:7b:3c:9f: 09:4f:12:95:36:5c:42:ba:25:93:1f:3b:87:bd:af:ed: a8:75:c8:c0:d6:34:91:6e:eb:3e:3f:21:4c:6f:76:db: 0d:57:4b:3d:e7:0d:3a:e6:34:f0:84:8f:4b:8f:25:f6: 50:d7:e9:90:81:a3:72:6d:27:60:c5:e5:83:8c:b9:62 Fingerprint (SHA-256): D9:E3:1B:23:81:E3:D9:1D:DD:C3:8F:57:9C:80:64:5B:E1:B1:55:78:A8:37:3B:2F:6F:03:BE:D1:94:05:B6:00 Fingerprint (SHA1): A4:49:6F:18:C8:69:06:6B:96:EA:38:5A:02:1C:49:B4:B7:E9:85:1D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1492: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1493: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1494: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204253 (0x3744039d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 20:50:19 2022 Not After : Mon Sep 27 20:50:19 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:7e:88:c6:54:81:7c:6a:0a:00:ba:0b:78:63:e4:1f: e5:20:f6:83:92:0b:17:8e:f7:1e:0d:37:b9:d4:bd:2c: 8e:f9:90:78:e6:e4:9a:70:0b:b1:80:73:6d:8d:01:b2: b6:4a:0d:26:56:b9:0e:c3:e9:85:01:ff:3c:ec:0f:2f: e1:51:23:8e:fc:9c:20:fa:9e:d8:52:dc:81:20:83:2d: 04:82:8c:ea:74:2a:d4:cf:72:02:96:d4:62:51:85:15: d0:1b:8a:0c:62:9a:52:44:be:dd:29:60:7b:41:74:1b: ec:45:90:f2:c9:f0:c0:10:6b:53:39:32:cb:40:42:ee: 47:18:08:68:b1:33:7c:4a:ff:3d:96:85:18:5c:ae:7a: e6:26:f1:42:35:d7:ea:9f:bb:14:31:d6:47:6c:e2:9f: ce:9a:9d:77:5c:85:cf:86:f5:90:72:7d:44:e1:61:ef: f4:fe:a5:b9:c4:1d:30:0b:2c:45:a0:a6:fc:da:e1:15: 66:b9:db:62:1e:c3:03:2b:c1:6d:85:ed:0b:88:91:b1: c2:00:1e:54:71:d5:ec:97:b2:87:31:c9:6e:47:59:78: 24:b4:74:80:f3:ac:39:07:5c:d0:50:ad:76:ec:23:da: 49:15:f5:0f:22:1b:be:0c:eb:58:d2:c2:eb:e1:a7:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:50:9e:0b:2e:4e:76:a7:4f:fa:e3:c4:f5:8c:72:d6: 26:71:1f:18:28:14:ed:a7:bb:1f:d9:28:5f:85:74:64: 06:56:8e:4b:b5:86:33:49:3f:f6:b1:e6:d5:00:80:e7: dc:29:7a:09:4c:09:35:44:25:01:1f:92:04:86:83:af: 66:61:58:6c:08:77:d2:80:d1:99:97:28:23:1c:c3:c5: 0e:7e:96:91:e1:67:52:85:01:77:0f:a8:e3:24:e0:93: 60:00:20:1d:fb:ad:b8:11:25:7c:ab:32:b3:67:53:0d: c8:29:bb:4d:71:95:c1:41:c6:86:57:f0:9a:39:62:46: 71:ba:77:64:87:5a:be:75:ed:fd:4e:e8:39:a8:af:fc: 3e:95:7f:e4:80:21:db:c9:0f:8c:cd:e1:84:99:be:c8: 6f:66:2d:9e:4b:c5:0c:eb:29:af:1b:c0:19:79:c6:58: e8:4f:c7:e8:9c:84:9e:71:c0:03:ac:ce:a6:e9:a1:c3: 7d:6e:e4:6f:e9:f1:5f:3f:3e:81:dc:8b:a6:1c:c2:b8: 0b:3d:57:bc:41:a0:20:65:3b:cc:98:ea:66:71:11:a6: ca:6b:63:43:e9:d3:5a:ac:f9:65:73:a5:07:05:1c:8d: 1a:ea:8c:b4:83:16:02:03:fb:4e:62:56:5f:98:07:8c Fingerprint (SHA-256): FD:94:09:64:DE:70:19:51:63:46:55:2F:7C:2C:42:40:E2:7B:B5:8B:8C:19:15:FD:DA:9F:91:FF:E6:35:23:B3 Fingerprint (SHA1): 8B:53:A3:63:4E:DB:1E:57:0F:27:82:96:30:39:FE:15:07:19:A4:EC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1495: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1496: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204256 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1497: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1498: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1499: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1500: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927204257 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1501: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1502: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1503: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1504: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927204258 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA1Root-927204019.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1505: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1506: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1507: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1508: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 927204259 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1509: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1510: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #1511: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204256 (0x374403a0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:50:26 2022 Not After : Tue Sep 27 20:50:26 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:34:46:68:6d:23:3c:d8:ff:b3:be:e0:23:9b:fd:ed: 93:34:69:12:89:c9:f0:45:f6:a8:d0:83:99:08:95:f5: 8b:22:37:2d:8c:06:9b:37:e8:31:e1:03:2a:19:4c:e4: 4a:fe:00:ee:29:5f:39:92:d8:fc:b8:c2:03:de:2b:b7: b0:27:69:8b:20:55:4e:6b:9b:f9:f4:e9:c2:fe:e6:f8: 0a:91:c2:f2:d7:d3:64:db:dc:b8:a0:29:ab:14:15:b7: 38:fa:f1:13:5d:3b:db:c3:9a:aa:da:51:ac:57:d4:82: 4c:e7:24:ed:87:aa:62:23:e3:a2:52:7c:11:e7:dc:2d: 78:58:89:25:e9:4d:fb:00:5b:68:08:3c:6c:d7:1e:ac: ec:3d:33:9a:0c:85:76:c9:a1:49:c2:72:fb:10:c7:a2: b7:84:46:7d:17:37:c0:66:b2:2f:a2:35:c3:cf:a5:71: de:52:ac:6e:8a:40:63:24:ab:31:e6:5c:44:fb:b5:f5: 31:fb:66:ec:d8:a6:98:8d:ba:ab:a1:e0:46:03:eb:1a: 2f:a5:c9:d3:09:15:43:46:fb:02:44:9b:05:66:72:bb: c4:61:42:7e:3b:6a:b7:27:74:fc:2b:31:3e:a2:48:13: 61:20:f5:6a:d6:f8:65:fa:b5:67:d9:e2:88:7e:5a:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:77:77:0d:f1:af:89:06:21:aa:e1:e6:5e:39:9b:dc: 14:cc:52:41:6e:92:d7:49:e0:d2:29:d0:d6:49:90:94: fd:70:22:01:04:86:7f:1c:9b:41:d3:eb:21:ca:3d:5b: 27:05:a5:ab:40:98:11:14:d1:83:07:a6:e6:a8:b6:c3: 7d:77:b9:91:34:8c:99:27:54:3f:03:32:f7:c1:6e:4b: 16:9a:8f:71:44:03:3d:ab:01:f6:a6:06:17:af:af:f2: 5d:0d:a0:13:85:f0:a8:fd:e5:0b:30:8e:90:30:1b:70: 64:03:9c:67:19:2d:5c:75:dd:08:ca:48:84:5d:ca:e6: af:f3:04:2a:9e:64:fc:e0:04:17:30:53:c1:8f:1e:05: 0f:ed:38:32:ac:f3:62:b8:a9:89:37:1e:30:ac:c9:df: db:0b:53:64:dc:6a:8d:7f:a0:41:5e:d9:2c:79:ed:5c: 86:36:4c:69:99:c5:9b:18:ac:2c:05:fc:8a:3d:08:c3: f3:39:7c:30:4d:b4:cf:b8:b6:fa:2a:d5:b1:03:1d:21: c7:e1:31:26:c2:cc:4f:bd:79:e7:fe:bb:1f:ba:9c:a0: 89:ce:76:fe:33:d5:41:4e:0b:f2:f7:d0:11:a2:9b:a7: 9f:ce:51:a2:ee:29:f4:9a:1c:eb:f8:88:82:d4:16:31 Fingerprint (SHA-256): 33:BA:2D:F6:95:FC:E3:CF:C9:05:1A:32:27:86:E8:86:77:6B:35:0E:F2:BA:71:14:91:05:01:59:6C:BD:FB:57 Fingerprint (SHA1): 56:58:5E:E3:3C:6F:45:7B:08:8A:5C:3F:3A:B1:65:FC:C9:ED:85:B3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1512: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1513: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204260 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1514: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1515: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1516: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204261 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1517: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1518: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1519: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1520: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 927204262 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1521: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1522: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 927204263 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1523: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1524: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1525: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1526: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1527: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 927204264 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-Bridge-927204020.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1528: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1529: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1530: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1531: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 927204265 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1532: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1533: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1534: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1535: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204261 (0x374403a5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 20:50:35 2022 Not After : Tue Sep 27 20:50:35 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:98:2d:f0:58:26:44:cc:20:3c:b1:98:c5:bc:cb:84: 84:f6:69:da:43:56:17:1b:0a:71:08:c6:bb:23:fd:af: 64:07:40:da:75:71:08:ab:25:1a:8d:ec:6e:0b:fb:b3: 74:a8:c4:94:0c:64:f6:5e:45:98:87:dc:80:21:2a:c3: 0e:8e:ed:4f:c4:a4:d6:b6:9b:6c:de:af:83:6d:0a:33: 83:e2:19:60:f8:29:ec:64:13:6f:19:5a:aa:a3:53:b0: 51:a4:27:85:e5:92:85:c7:0b:3f:2d:60:fb:02:72:9a: e3:7f:ef:2f:d3:9d:a8:2b:c6:d6:fb:56:29:d8:e3:d0: 98:95:df:62:22:1f:60:6b:df:af:4b:f3:f8:0b:47:22: 15:15:5a:59:ba:dd:da:f6:85:d9:df:23:88:dd:44:ee: 9c:c6:a9:e2:f6:e7:bb:a3:2d:4c:89:e6:21:d4:58:64: 6a:90:c8:19:50:10:b3:1c:a7:eb:3e:65:eb:53:fa:a5: 72:71:78:bf:9c:46:d3:54:a9:e5:71:44:fe:36:03:49: 33:31:1d:34:87:e5:3c:26:11:23:c1:99:db:17:7a:01: ad:98:9f:96:b4:3a:79:0f:ac:33:79:b1:ec:31:54:7c: 01:56:54:e3:f9:4e:ac:4c:f5:c7:8b:0f:01:43:55:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:41:4e:c2:12:8e:a5:87:14:e1:bb:91:b2:b7:5f:e6: ed:a7:d0:d8:c0:f4:5d:84:db:5d:d9:03:44:cc:74:39: ca:b0:20:3c:91:99:d5:f8:d0:40:a3:90:c7:97:bf:43: fc:34:1c:4a:ca:33:e6:e9:b3:ef:39:5f:77:90:4b:f5: b2:5b:e7:88:64:34:f4:ab:99:d1:02:84:91:7f:db:fb: d8:c5:59:fa:f6:2d:08:ca:75:f0:b4:04:dd:f7:03:3a: c8:71:46:e8:20:a8:74:8d:75:c0:9e:ad:cb:71:d4:73: 06:e3:e4:b8:ad:5a:50:f7:79:86:b6:cc:2d:f9:63:59: 44:1a:39:f1:d4:78:68:ea:61:43:10:b4:b0:83:e4:fa: e3:6b:95:75:29:7c:ae:ee:cd:8f:10:c3:c2:3f:c4:26: fb:30:c2:02:1d:87:e4:56:1c:e0:4d:31:1d:4b:96:d0: 8d:68:e5:0b:3a:f2:f4:ba:66:85:4c:56:a4:2d:a5:33: a3:a6:1a:f1:82:1e:64:d1:1e:91:f8:94:53:6d:a0:78: 87:a2:a3:b2:c9:09:54:9f:e7:ca:77:b1:26:00:ee:c3: 73:00:86:5e:6e:40:12:69:ad:6e:31:c0:c0:2a:71:d4: 81:5a:c5:7a:7f:2d:b9:45:98:c0:ba:95:a0:a5:b2:79 Fingerprint (SHA-256): 9D:DE:88:F9:0B:55:FF:37:3C:DA:B2:20:F5:7D:32:77:3F:7F:5D:08:8B:FD:9A:DB:54:AC:95:DC:8C:B4:13:32 Fingerprint (SHA1): 45:12:29:12:7B:3E:C0:9C:E3:09:F3:D6:0B:AD:E0:5D:9C:D5:D4:B0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1536: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204261 (0x374403a5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 20:50:35 2022 Not After : Tue Sep 27 20:50:35 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:98:2d:f0:58:26:44:cc:20:3c:b1:98:c5:bc:cb:84: 84:f6:69:da:43:56:17:1b:0a:71:08:c6:bb:23:fd:af: 64:07:40:da:75:71:08:ab:25:1a:8d:ec:6e:0b:fb:b3: 74:a8:c4:94:0c:64:f6:5e:45:98:87:dc:80:21:2a:c3: 0e:8e:ed:4f:c4:a4:d6:b6:9b:6c:de:af:83:6d:0a:33: 83:e2:19:60:f8:29:ec:64:13:6f:19:5a:aa:a3:53:b0: 51:a4:27:85:e5:92:85:c7:0b:3f:2d:60:fb:02:72:9a: e3:7f:ef:2f:d3:9d:a8:2b:c6:d6:fb:56:29:d8:e3:d0: 98:95:df:62:22:1f:60:6b:df:af:4b:f3:f8:0b:47:22: 15:15:5a:59:ba:dd:da:f6:85:d9:df:23:88:dd:44:ee: 9c:c6:a9:e2:f6:e7:bb:a3:2d:4c:89:e6:21:d4:58:64: 6a:90:c8:19:50:10:b3:1c:a7:eb:3e:65:eb:53:fa:a5: 72:71:78:bf:9c:46:d3:54:a9:e5:71:44:fe:36:03:49: 33:31:1d:34:87:e5:3c:26:11:23:c1:99:db:17:7a:01: ad:98:9f:96:b4:3a:79:0f:ac:33:79:b1:ec:31:54:7c: 01:56:54:e3:f9:4e:ac:4c:f5:c7:8b:0f:01:43:55:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:41:4e:c2:12:8e:a5:87:14:e1:bb:91:b2:b7:5f:e6: ed:a7:d0:d8:c0:f4:5d:84:db:5d:d9:03:44:cc:74:39: ca:b0:20:3c:91:99:d5:f8:d0:40:a3:90:c7:97:bf:43: fc:34:1c:4a:ca:33:e6:e9:b3:ef:39:5f:77:90:4b:f5: b2:5b:e7:88:64:34:f4:ab:99:d1:02:84:91:7f:db:fb: d8:c5:59:fa:f6:2d:08:ca:75:f0:b4:04:dd:f7:03:3a: c8:71:46:e8:20:a8:74:8d:75:c0:9e:ad:cb:71:d4:73: 06:e3:e4:b8:ad:5a:50:f7:79:86:b6:cc:2d:f9:63:59: 44:1a:39:f1:d4:78:68:ea:61:43:10:b4:b0:83:e4:fa: e3:6b:95:75:29:7c:ae:ee:cd:8f:10:c3:c2:3f:c4:26: fb:30:c2:02:1d:87:e4:56:1c:e0:4d:31:1d:4b:96:d0: 8d:68:e5:0b:3a:f2:f4:ba:66:85:4c:56:a4:2d:a5:33: a3:a6:1a:f1:82:1e:64:d1:1e:91:f8:94:53:6d:a0:78: 87:a2:a3:b2:c9:09:54:9f:e7:ca:77:b1:26:00:ee:c3: 73:00:86:5e:6e:40:12:69:ad:6e:31:c0:c0:2a:71:d4: 81:5a:c5:7a:7f:2d:b9:45:98:c0:ba:95:a0:a5:b2:79 Fingerprint (SHA-256): 9D:DE:88:F9:0B:55:FF:37:3C:DA:B2:20:F5:7D:32:77:3F:7F:5D:08:8B:FD:9A:DB:54:AC:95:DC:8C:B4:13:32 Fingerprint (SHA1): 45:12:29:12:7B:3E:C0:9C:E3:09:F3:D6:0B:AD:E0:5D:9C:D5:D4:B0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1537: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1538: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204266 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1539: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1540: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1541: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204267 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1542: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1543: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1544: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1545: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 927204268 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1546: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1547: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 927204269 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1548: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1549: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1550: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1551: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1552: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 927204270 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-Bridge-927204021.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1553: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1554: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1555: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1556: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 927204271 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1557: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1558: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1559: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1560: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 927204272 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-BridgeNavy-927204022.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1561: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1562: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1563: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1564: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 927204273 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1565: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1566: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1567: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1568: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204267 (0x374403ab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 20:50:44 2022 Not After : Tue Sep 27 20:50:44 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:53:ad:9e:7f:ac:52:b2:8a:3e:01:74:86:da:72:42: 12:f0:f3:a8:8e:7e:42:9e:dc:02:50:a2:d5:50:4e:dd: 9b:c7:9c:27:8d:b0:fd:85:0b:5d:d9:42:ee:68:2d:6f: d3:32:81:79:21:33:b9:e9:cd:f0:ff:ea:28:c6:cb:7a: bd:04:b8:3f:5f:68:2e:2c:4c:d3:c9:13:30:f2:77:2b: 9d:44:32:2f:0a:e5:59:47:53:38:b7:ef:9a:5f:78:a9: 91:75:bf:7e:26:0e:9a:b0:5a:be:64:a3:48:b2:b0:f1: f9:39:86:93:9e:07:d3:82:11:f2:12:0f:65:1c:e1:62: 27:03:72:74:3f:52:a4:92:09:ee:ed:16:43:09:45:a3: 28:b5:59:68:1e:bf:d1:85:9d:b4:b6:ca:df:80:ed:fa: 1f:aa:92:64:d2:f9:60:9b:cb:38:2c:f5:ce:b8:0a:0b: 1c:2f:d7:06:48:ae:dd:87:0e:e5:61:85:95:23:8c:d9: 32:7d:39:ea:1a:17:c5:e5:16:4f:ef:b0:87:f2:0b:93: 33:4f:c9:8a:48:aa:f2:d0:ef:73:10:cb:84:8c:15:59: c4:6b:01:2f:0e:2e:e0:74:65:fd:a6:59:23:8b:62:1a: 11:04:ad:d8:67:c4:e9:78:c6:fa:43:b2:8f:a6:13:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d2:b7:92:c5:2c:83:f7:89:b6:4d:a1:7b:93:80:18:cb: 5e:9a:fe:e8:5d:5f:a0:84:15:6f:6f:29:5f:3a:c6:6c: 09:72:1b:93:cf:dc:34:2b:5e:63:69:53:0c:08:60:bd: 5b:49:0b:42:9d:6e:5a:c9:89:f6:63:e0:5f:d6:a5:5a: 0b:ce:d9:f1:83:7f:99:45:e7:9e:c2:34:5d:46:ed:bc: 2a:66:2f:cd:45:76:54:55:13:0b:06:4f:0b:f4:21:77: 96:61:e5:17:28:a4:1b:fb:85:16:64:e5:5b:d8:9c:b0: c6:bd:d0:68:2c:b4:cb:3d:6e:c7:5d:49:d7:32:92:ce: b6:35:cd:54:83:a4:c5:98:79:00:94:db:ee:69:43:9c: d7:a6:08:a1:f1:95:9d:9c:da:6b:cb:4b:57:2a:da:79: 22:c3:c0:d3:3c:01:af:a1:f1:55:d6:3c:9d:ae:16:ac: 2f:a3:04:45:4e:83:62:7c:34:67:62:b0:bd:25:66:aa: 13:50:c4:e8:35:44:db:80:d6:a4:2a:cc:50:85:4b:88: 46:50:a9:4f:54:ab:df:2b:4d:c8:0b:23:59:76:5f:d3: 13:29:aa:34:1b:32:80:93:19:9e:3c:86:05:2d:91:78: 77:5e:a2:63:61:67:9f:84:f7:ca:8a:64:d3:c2:60:ed Fingerprint (SHA-256): 3F:0A:98:86:E9:E2:6F:A9:29:79:45:8D:18:C8:B9:D0:B9:E2:3F:EF:A6:A5:18:91:6E:1F:63:D6:B0:16:33:9D Fingerprint (SHA1): FD:FC:39:42:75:32:7A:39:63:0E:48:4B:BE:4C:03:EB:CB:F4:03:01 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1569: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204267 (0x374403ab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 20:50:44 2022 Not After : Tue Sep 27 20:50:44 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:53:ad:9e:7f:ac:52:b2:8a:3e:01:74:86:da:72:42: 12:f0:f3:a8:8e:7e:42:9e:dc:02:50:a2:d5:50:4e:dd: 9b:c7:9c:27:8d:b0:fd:85:0b:5d:d9:42:ee:68:2d:6f: d3:32:81:79:21:33:b9:e9:cd:f0:ff:ea:28:c6:cb:7a: bd:04:b8:3f:5f:68:2e:2c:4c:d3:c9:13:30:f2:77:2b: 9d:44:32:2f:0a:e5:59:47:53:38:b7:ef:9a:5f:78:a9: 91:75:bf:7e:26:0e:9a:b0:5a:be:64:a3:48:b2:b0:f1: f9:39:86:93:9e:07:d3:82:11:f2:12:0f:65:1c:e1:62: 27:03:72:74:3f:52:a4:92:09:ee:ed:16:43:09:45:a3: 28:b5:59:68:1e:bf:d1:85:9d:b4:b6:ca:df:80:ed:fa: 1f:aa:92:64:d2:f9:60:9b:cb:38:2c:f5:ce:b8:0a:0b: 1c:2f:d7:06:48:ae:dd:87:0e:e5:61:85:95:23:8c:d9: 32:7d:39:ea:1a:17:c5:e5:16:4f:ef:b0:87:f2:0b:93: 33:4f:c9:8a:48:aa:f2:d0:ef:73:10:cb:84:8c:15:59: c4:6b:01:2f:0e:2e:e0:74:65:fd:a6:59:23:8b:62:1a: 11:04:ad:d8:67:c4:e9:78:c6:fa:43:b2:8f:a6:13:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d2:b7:92:c5:2c:83:f7:89:b6:4d:a1:7b:93:80:18:cb: 5e:9a:fe:e8:5d:5f:a0:84:15:6f:6f:29:5f:3a:c6:6c: 09:72:1b:93:cf:dc:34:2b:5e:63:69:53:0c:08:60:bd: 5b:49:0b:42:9d:6e:5a:c9:89:f6:63:e0:5f:d6:a5:5a: 0b:ce:d9:f1:83:7f:99:45:e7:9e:c2:34:5d:46:ed:bc: 2a:66:2f:cd:45:76:54:55:13:0b:06:4f:0b:f4:21:77: 96:61:e5:17:28:a4:1b:fb:85:16:64:e5:5b:d8:9c:b0: c6:bd:d0:68:2c:b4:cb:3d:6e:c7:5d:49:d7:32:92:ce: b6:35:cd:54:83:a4:c5:98:79:00:94:db:ee:69:43:9c: d7:a6:08:a1:f1:95:9d:9c:da:6b:cb:4b:57:2a:da:79: 22:c3:c0:d3:3c:01:af:a1:f1:55:d6:3c:9d:ae:16:ac: 2f:a3:04:45:4e:83:62:7c:34:67:62:b0:bd:25:66:aa: 13:50:c4:e8:35:44:db:80:d6:a4:2a:cc:50:85:4b:88: 46:50:a9:4f:54:ab:df:2b:4d:c8:0b:23:59:76:5f:d3: 13:29:aa:34:1b:32:80:93:19:9e:3c:86:05:2d:91:78: 77:5e:a2:63:61:67:9f:84:f7:ca:8a:64:d3:c2:60:ed Fingerprint (SHA-256): 3F:0A:98:86:E9:E2:6F:A9:29:79:45:8D:18:C8:B9:D0:B9:E2:3F:EF:A6:A5:18:91:6E:1F:63:D6:B0:16:33:9D Fingerprint (SHA1): FD:FC:39:42:75:32:7A:39:63:0E:48:4B:BE:4C:03:EB:CB:F4:03:01 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1570: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #1571: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204266 (0x374403aa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 20:50:43 2022 Not After : Tue Sep 27 20:50:43 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:fd:65:7f:b2:41:e0:e9:ba:ba:88:24:84:c9:26:bc: 65:91:3a:37:e9:c8:f6:2c:e4:70:22:58:9f:49:e9:2c: 27:69:87:60:9f:8a:2a:7b:2c:e8:ac:cb:56:a6:a1:a0: 0f:02:2b:e3:f2:70:9b:d7:95:13:1a:19:1e:48:72:3a: ae:a9:56:53:e4:8e:6a:8b:f9:0d:62:5f:c0:48:8f:61: 57:26:eb:25:7a:07:1a:36:e9:95:d6:40:e5:c7:7b:04: d2:dc:d0:38:2c:76:f4:85:df:b7:21:ca:1e:60:85:81: da:13:0b:6a:e7:68:e9:12:c5:24:97:93:1f:29:41:70: f9:5c:56:4f:d3:05:65:82:ef:d1:26:b8:47:b3:e7:31: 08:87:68:6b:60:53:37:97:f6:d2:e0:6e:e1:c2:77:c9: b1:c9:a9:3d:64:31:ec:47:a7:4b:4e:33:c2:aa:32:97: cc:19:6d:59:6f:20:3b:b1:b7:bd:7f:f8:65:20:b0:8a: 28:e7:00:35:79:a1:ca:b7:06:69:4c:26:12:96:dd:ba: 09:54:c9:92:f2:c3:42:99:36:c0:24:f6:11:1c:a0:36: 45:74:1b:f9:df:15:76:86:3c:c9:84:19:af:77:b3:32: c8:84:1f:92:ea:99:ab:ac:98:c6:b0:9c:e1:a8:3c:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:18:5e:e1:b0:9a:0c:2a:4c:90:f6:a3:1d:95:6b:96: 6e:c4:f0:46:70:fc:84:a3:f4:0b:5d:4a:21:ab:09:28: a7:fb:d4:52:a0:16:b6:23:54:fc:85:06:63:ad:18:ca: 90:ba:ad:54:58:18:b0:de:da:1c:01:e1:73:e8:3b:74: 15:23:f5:90:25:af:5b:ff:c5:26:d0:f2:57:fa:e1:2f: 03:39:42:e7:b7:08:59:44:32:6a:52:d9:67:05:55:2f: 51:7f:c6:60:4a:6e:51:aa:ff:20:ac:f2:c8:af:57:94: 04:49:5d:39:7a:ad:0b:a1:b2:a1:70:68:83:87:ad:da: ab:2b:a8:10:7d:11:16:cf:03:ee:e0:48:f6:15:63:35: d5:89:3d:4b:e9:b7:4b:c7:03:1d:f9:c4:b1:38:28:b8: d6:0f:65:5b:34:36:64:07:10:c4:4d:b9:54:6a:ee:37: 8e:56:e7:03:73:0f:79:2a:9b:2d:42:1b:ce:20:67:2d: eb:73:74:9e:a7:d4:62:ad:5d:5e:12:6b:50:02:7e:76: 2e:39:2a:ba:4d:a0:94:d2:2e:b8:1f:4f:59:a3:42:53: 14:ee:bb:1a:16:7c:60:9b:45:8a:a2:ad:3c:8f:a6:94: 2f:f9:a7:9e:c5:a0:e5:02:2f:cd:9b:a9:5b:5d:bf:d0 Fingerprint (SHA-256): 80:05:C4:5C:3D:C2:76:6F:2F:58:FA:87:FD:37:58:80:5F:5E:DD:89:09:34:0B:AF:98:BA:F9:CD:1F:94:FE:BD Fingerprint (SHA1): C0:AF:00:51:CD:E4:8F:80:F6:77:3D:F8:C3:BA:7E:8B:ED:84:F7:12 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1572: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204267 (0x374403ab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 20:50:44 2022 Not After : Tue Sep 27 20:50:44 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:53:ad:9e:7f:ac:52:b2:8a:3e:01:74:86:da:72:42: 12:f0:f3:a8:8e:7e:42:9e:dc:02:50:a2:d5:50:4e:dd: 9b:c7:9c:27:8d:b0:fd:85:0b:5d:d9:42:ee:68:2d:6f: d3:32:81:79:21:33:b9:e9:cd:f0:ff:ea:28:c6:cb:7a: bd:04:b8:3f:5f:68:2e:2c:4c:d3:c9:13:30:f2:77:2b: 9d:44:32:2f:0a:e5:59:47:53:38:b7:ef:9a:5f:78:a9: 91:75:bf:7e:26:0e:9a:b0:5a:be:64:a3:48:b2:b0:f1: f9:39:86:93:9e:07:d3:82:11:f2:12:0f:65:1c:e1:62: 27:03:72:74:3f:52:a4:92:09:ee:ed:16:43:09:45:a3: 28:b5:59:68:1e:bf:d1:85:9d:b4:b6:ca:df:80:ed:fa: 1f:aa:92:64:d2:f9:60:9b:cb:38:2c:f5:ce:b8:0a:0b: 1c:2f:d7:06:48:ae:dd:87:0e:e5:61:85:95:23:8c:d9: 32:7d:39:ea:1a:17:c5:e5:16:4f:ef:b0:87:f2:0b:93: 33:4f:c9:8a:48:aa:f2:d0:ef:73:10:cb:84:8c:15:59: c4:6b:01:2f:0e:2e:e0:74:65:fd:a6:59:23:8b:62:1a: 11:04:ad:d8:67:c4:e9:78:c6:fa:43:b2:8f:a6:13:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d2:b7:92:c5:2c:83:f7:89:b6:4d:a1:7b:93:80:18:cb: 5e:9a:fe:e8:5d:5f:a0:84:15:6f:6f:29:5f:3a:c6:6c: 09:72:1b:93:cf:dc:34:2b:5e:63:69:53:0c:08:60:bd: 5b:49:0b:42:9d:6e:5a:c9:89:f6:63:e0:5f:d6:a5:5a: 0b:ce:d9:f1:83:7f:99:45:e7:9e:c2:34:5d:46:ed:bc: 2a:66:2f:cd:45:76:54:55:13:0b:06:4f:0b:f4:21:77: 96:61:e5:17:28:a4:1b:fb:85:16:64:e5:5b:d8:9c:b0: c6:bd:d0:68:2c:b4:cb:3d:6e:c7:5d:49:d7:32:92:ce: b6:35:cd:54:83:a4:c5:98:79:00:94:db:ee:69:43:9c: d7:a6:08:a1:f1:95:9d:9c:da:6b:cb:4b:57:2a:da:79: 22:c3:c0:d3:3c:01:af:a1:f1:55:d6:3c:9d:ae:16:ac: 2f:a3:04:45:4e:83:62:7c:34:67:62:b0:bd:25:66:aa: 13:50:c4:e8:35:44:db:80:d6:a4:2a:cc:50:85:4b:88: 46:50:a9:4f:54:ab:df:2b:4d:c8:0b:23:59:76:5f:d3: 13:29:aa:34:1b:32:80:93:19:9e:3c:86:05:2d:91:78: 77:5e:a2:63:61:67:9f:84:f7:ca:8a:64:d3:c2:60:ed Fingerprint (SHA-256): 3F:0A:98:86:E9:E2:6F:A9:29:79:45:8D:18:C8:B9:D0:B9:E2:3F:EF:A6:A5:18:91:6E:1F:63:D6:B0:16:33:9D Fingerprint (SHA1): FD:FC:39:42:75:32:7A:39:63:0E:48:4B:BE:4C:03:EB:CB:F4:03:01 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1573: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204267 (0x374403ab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 20:50:44 2022 Not After : Tue Sep 27 20:50:44 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:53:ad:9e:7f:ac:52:b2:8a:3e:01:74:86:da:72:42: 12:f0:f3:a8:8e:7e:42:9e:dc:02:50:a2:d5:50:4e:dd: 9b:c7:9c:27:8d:b0:fd:85:0b:5d:d9:42:ee:68:2d:6f: d3:32:81:79:21:33:b9:e9:cd:f0:ff:ea:28:c6:cb:7a: bd:04:b8:3f:5f:68:2e:2c:4c:d3:c9:13:30:f2:77:2b: 9d:44:32:2f:0a:e5:59:47:53:38:b7:ef:9a:5f:78:a9: 91:75:bf:7e:26:0e:9a:b0:5a:be:64:a3:48:b2:b0:f1: f9:39:86:93:9e:07:d3:82:11:f2:12:0f:65:1c:e1:62: 27:03:72:74:3f:52:a4:92:09:ee:ed:16:43:09:45:a3: 28:b5:59:68:1e:bf:d1:85:9d:b4:b6:ca:df:80:ed:fa: 1f:aa:92:64:d2:f9:60:9b:cb:38:2c:f5:ce:b8:0a:0b: 1c:2f:d7:06:48:ae:dd:87:0e:e5:61:85:95:23:8c:d9: 32:7d:39:ea:1a:17:c5:e5:16:4f:ef:b0:87:f2:0b:93: 33:4f:c9:8a:48:aa:f2:d0:ef:73:10:cb:84:8c:15:59: c4:6b:01:2f:0e:2e:e0:74:65:fd:a6:59:23:8b:62:1a: 11:04:ad:d8:67:c4:e9:78:c6:fa:43:b2:8f:a6:13:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d2:b7:92:c5:2c:83:f7:89:b6:4d:a1:7b:93:80:18:cb: 5e:9a:fe:e8:5d:5f:a0:84:15:6f:6f:29:5f:3a:c6:6c: 09:72:1b:93:cf:dc:34:2b:5e:63:69:53:0c:08:60:bd: 5b:49:0b:42:9d:6e:5a:c9:89:f6:63:e0:5f:d6:a5:5a: 0b:ce:d9:f1:83:7f:99:45:e7:9e:c2:34:5d:46:ed:bc: 2a:66:2f:cd:45:76:54:55:13:0b:06:4f:0b:f4:21:77: 96:61:e5:17:28:a4:1b:fb:85:16:64:e5:5b:d8:9c:b0: c6:bd:d0:68:2c:b4:cb:3d:6e:c7:5d:49:d7:32:92:ce: b6:35:cd:54:83:a4:c5:98:79:00:94:db:ee:69:43:9c: d7:a6:08:a1:f1:95:9d:9c:da:6b:cb:4b:57:2a:da:79: 22:c3:c0:d3:3c:01:af:a1:f1:55:d6:3c:9d:ae:16:ac: 2f:a3:04:45:4e:83:62:7c:34:67:62:b0:bd:25:66:aa: 13:50:c4:e8:35:44:db:80:d6:a4:2a:cc:50:85:4b:88: 46:50:a9:4f:54:ab:df:2b:4d:c8:0b:23:59:76:5f:d3: 13:29:aa:34:1b:32:80:93:19:9e:3c:86:05:2d:91:78: 77:5e:a2:63:61:67:9f:84:f7:ca:8a:64:d3:c2:60:ed Fingerprint (SHA-256): 3F:0A:98:86:E9:E2:6F:A9:29:79:45:8D:18:C8:B9:D0:B9:E2:3F:EF:A6:A5:18:91:6E:1F:63:D6:B0:16:33:9D Fingerprint (SHA1): FD:FC:39:42:75:32:7A:39:63:0E:48:4B:BE:4C:03:EB:CB:F4:03:01 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1574: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1575: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204274 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1576: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1577: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1578: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204275 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1579: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1580: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #1581: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1582: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 927204276 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1583: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1584: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #1585: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1586: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 927204277 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1587: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1588: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1589: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1590: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 927204278 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1591: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1592: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 927204279 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1593: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1594: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #1595: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1596: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1597: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 927204280 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1598: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1599: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1600: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1601: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 927204281 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1602: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1603: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1604: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1605: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 927204282 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1606: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1607: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1608: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1609: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 927204283 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1610: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1611: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1612: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204274 (0x374403b2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 20:50:58 2022 Not After : Tue Sep 27 20:50:58 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:62:d9:2b:82:1c:35:12:71:21:ee:34:30:d5:80:d7: 90:75:36:d7:2e:f1:17:f4:07:a9:e8:43:ef:d4:90:fb: a9:91:74:95:3d:6b:78:e8:5f:90:74:26:77:e7:a5:ab: e1:60:49:f5:3f:74:fb:b6:31:e6:6e:bf:f5:b6:88:c3: 7e:70:d3:b5:f8:3a:05:1d:9d:a1:18:02:48:ff:94:85: 95:26:31:e2:68:df:09:90:cd:dd:76:20:99:50:89:68: e0:38:de:b8:f5:b0:06:f7:60:8e:97:d2:97:44:f4:6b: 42:b3:02:56:c9:f4:e1:4f:ec:2f:d5:3f:a0:02:9e:95: 8c:a9:af:e8:4f:04:17:de:d8:19:28:dc:7f:ec:f3:cf: c2:38:ca:44:be:6f:e5:d0:ef:85:d9:a4:81:af:b4:4e: ba:c4:29:b3:4c:17:93:aa:51:01:68:33:84:01:f3:2e: 9e:36:06:ad:18:92:e8:7c:44:bc:2a:80:7e:e5:64:4b: 93:26:24:13:4f:27:57:ff:57:a9:b6:b5:56:b0:6b:e2: 3b:0e:93:e2:f0:c7:5a:1c:5a:30:1a:78:01:fb:e7:d1: 2c:af:5a:39:fc:5b:0e:c3:aa:0b:12:c0:95:d7:c2:b8: a9:73:a7:56:d1:6f:2b:b9:81:2b:59:0b:52:e6:83:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:9f:87:c3:eb:75:a2:81:f4:e8:5a:41:0e:eb:52:17: 68:cb:56:93:33:ae:23:46:67:b0:77:de:c4:b2:65:1a: d5:fa:ae:a4:85:65:19:28:c4:35:76:11:7c:e4:a5:b5: 8e:36:06:b2:b6:80:9c:23:1d:91:83:c6:5e:62:73:b1: 70:6a:24:a8:2e:ad:ff:4e:98:05:a5:00:d9:63:39:dc: 8b:35:04:84:07:64:5e:c1:3a:2b:61:ac:1d:24:82:49: 0b:4f:28:85:7f:3b:93:1e:79:e7:bb:01:fb:ad:93:16: 18:8b:1a:fd:10:1a:c1:36:21:0d:3b:0f:53:4c:c8:42: e9:c4:06:61:18:51:39:e5:cf:ee:96:9a:6c:57:20:b6: 1f:1f:93:b9:fc:31:9c:02:15:36:2b:5f:83:64:70:4a: b0:38:c5:ec:e9:34:c0:1a:5e:b2:78:44:f8:fe:e7:7e: 27:28:43:17:97:36:7d:80:73:85:f0:50:c7:1f:4b:9a: 98:8e:df:9d:ee:35:9c:79:47:da:da:4e:9e:b6:61:1a: 96:50:d9:24:cb:e4:0d:1f:73:95:ff:a1:f8:bf:9a:a8: 0b:9b:5f:14:8b:f9:88:97:c4:dd:1d:73:96:83:ff:09: fd:5b:97:2b:a7:03:17:ea:ed:e4:e9:f2:8f:20:27:a3 Fingerprint (SHA-256): C0:F7:72:A9:D6:7E:57:33:E8:4F:13:CF:F4:A6:59:D0:90:57:0D:70:88:D4:03:2E:AE:A0:3C:5C:3A:BE:27:6C Fingerprint (SHA1): EB:57:48:BF:14:89:03:CA:32:76:08:E8:B6:BF:A0:76:8B:E9:C8:D0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #1613: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1614: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1615: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1616: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1617: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1618: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1619: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1620: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1621: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204275 (0x374403b3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 20:51:00 2022 Not After : Tue Sep 27 20:51:00 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:ae:6f:17:83:46:5c:97:68:a4:11:e3:71:4c:1a:79: 37:78:45:c9:52:4e:d2:1e:df:6c:dd:d7:3c:a8:05:9f: b3:47:a2:0a:6f:68:3a:ec:ff:4c:43:55:b2:9e:96:ee: e3:6c:f8:b0:6b:49:9e:5a:a3:98:1e:f2:ff:3a:ed:e2: 56:d1:47:fe:23:02:ab:a2:d6:d7:ef:5f:13:6d:59:5b: 2c:1d:fe:bb:21:69:22:fb:73:0c:df:3f:8d:8a:cf:de: e9:35:25:ba:52:17:3f:c5:69:44:74:a4:54:db:3d:8d: 7f:1e:ea:25:79:58:62:fe:56:15:99:a4:83:80:b6:0d: 7f:f0:b7:da:b0:08:21:2f:67:26:f5:fb:3a:97:27:7c: 78:ab:4a:17:4e:a3:05:89:18:4d:61:02:79:1b:5c:20: 1f:e1:f7:f9:44:94:50:78:b6:49:f4:b2:21:55:e1:67: b7:32:67:29:f8:3f:b5:02:26:02:d6:1c:9b:0c:7f:49: f3:46:f0:09:86:38:7e:d4:f0:99:75:bc:47:d8:fb:ea: 96:a4:9c:38:d8:10:fa:a8:7c:62:42:03:2b:0b:bd:dc: e4:50:94:fc:d9:d0:3a:0c:f5:23:7a:69:6d:8f:4d:31: 6f:0c:e1:b2:8d:c5:8a:c9:16:83:92:f7:77:4c:36:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:85:a5:cb:c9:2d:9b:d2:72:36:2e:b1:df:e1:e7:d4: cf:d2:b8:77:1c:97:2d:b8:fc:b7:0a:fa:c9:eb:b0:8a: 6b:67:23:a3:b3:f4:87:02:4e:ca:90:7f:0a:90:59:23: dd:38:d3:a6:91:d9:b7:21:e3:1f:55:84:36:4b:9e:f4: a8:aa:91:51:92:3f:b2:fe:4d:da:46:96:14:1b:84:17: cf:96:9d:e8:30:0c:7a:e0:33:48:26:79:b4:59:2b:f2: a9:16:92:4e:6d:9a:b5:4d:ff:3f:4a:50:9b:f3:c2:44: 61:4a:46:e7:1d:1b:f2:68:49:c2:4b:8d:19:3f:77:48: 8f:cb:b9:13:e4:fe:cb:8d:24:35:9d:39:91:4c:ea:bf: 8c:b2:94:bf:25:c1:e3:db:7c:5b:fb:79:c9:a8:36:64: 89:97:84:1b:34:e8:a1:15:a5:70:51:61:65:5d:05:fc: 5b:b8:ad:35:14:b8:b2:10:c5:dd:d0:0b:b9:4a:f0:c5: c7:1b:1a:fc:63:c0:05:a6:11:ff:32:43:25:f0:c0:b9: e1:75:3b:b2:c3:a6:ef:ad:e6:1f:75:52:e0:4b:d4:ff: 86:27:70:53:1e:c4:8b:c7:80:85:89:a9:0c:53:9d:3f: e2:93:df:97:c5:e8:80:0b:97:4d:93:e9:bf:44:e9:1d Fingerprint (SHA-256): 9B:44:1D:85:B8:B1:F1:E7:EE:0C:BD:B2:CA:FA:8E:8D:BC:1B:AB:FA:B9:8D:E5:FD:F5:EC:F7:1A:98:88:1B:B5 Fingerprint (SHA1): 45:1B:5A:BF:0B:3D:AA:43:09:29:EE:7B:F8:1A:40:FF:CC:54:F0:C7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #1622: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1623: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1624: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1625: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1626: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1627: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1628: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #1629: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #1630: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #1631: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #1632: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #1633: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #1634: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #1635: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1636: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1637: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #1638: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1639: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1640: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204284 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1641: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1642: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1643: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1644: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927204285 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1645: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1646: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1647: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1648: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 927204286 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1649: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1650: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1651: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1652: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 927204287 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1653: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1654: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1655: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1656: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 927204288 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1657: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1658: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1659: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1660: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 927204289 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1661: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1662: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1663: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1664: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 927204290 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1665: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1666: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #1667: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1668: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 927204291 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1669: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1670: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1671: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1672: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 927204292 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1673: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1674: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1675: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204284 (0x374403bc) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:51:19 2022 Not After : Tue Sep 27 20:51:19 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 05:83:d7:b5:ab:97:0b:8f:46:5e:14:3b:70:ca:44:80: 72:1b:16:53:3d:e6:36:29:7e:cf:2c:17:96:ad:dd:b0: c3:84:63:17:2f:c2:b3:98:e8:ea:0c:72:29:a2:15:cc: 13:54:4c:f9:42:fd:a6:6b:c3:13:17:c3:12:da:4f:0e: bc:0d:60:bb:12:96:9c:d3:1f:cb:73:dc:63:54:71:b7: 65:dc:00:bb:74:d3:9e:13:a7:38:60:85:a8:03:53:3c: 66:c4:4b:76:55:61:7d:fd:ea:c1:5b:c5:48:59:ab:86: 2d:4d:07:66:54:87:9b:79:1c:6b:f7:0a:f9:d6:91:b8: 18:31:bc:b2:e6:3f:ca:dd:ec:a4:5b:6b:6c:83:35:81: 5b:ef:ab:18:4c:31:c2:58:7d:b2:88:c6:5b:dd:a9:2b: 9a:87:06:db:89:20:fc:a1:77:bb:41:d0:0c:81:37:8c: 15:45:eb:d4:aa:96:3a:1c:4f:2b:61:3c:a8:ee:e6:63: a7:76:10:d4:2a:56:47:75:aa:9b:5d:a4:47:f6:d9:5c: 8f:d6:54:a6:6f:9d:b5:84:31:1f:32:b8:02:c4:57:a0: 5b:e7:66:5e:84:e4:c6:ae:8b:38:1e:95:eb:26:38:7e: 5d:2e:ca:ca:3f:8d:d5:6d:5d:e5:39:6f:61:d2:79:22 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:12:02:61:de:02:75:55:11:2b:bb:91:c6: 57:68:af:6a:4b:b4:ca:ac:af:6b:fe:b1:d3:a4:6f:9c: 02:1c:42:ed:e2:36:ca:ea:50:fd:73:f6:2f:d0:5a:89: d3:2e:1d:df:9d:6a:7d:9c:93:49:77:fd:62:39 Fingerprint (SHA-256): FA:75:90:77:7E:25:19:8C:51:09:5F:14:EC:5A:73:27:7A:95:09:F5:30:26:1D:AC:30:12:44:2B:2B:9B:18:E3 Fingerprint (SHA1): 68:DC:FC:66:B6:A0:9A:52:B2:21:0B:5F:EE:B7:90:B0:9A:8E:2E:00 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1676: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204284 (0x374403bc) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:51:19 2022 Not After : Tue Sep 27 20:51:19 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 05:83:d7:b5:ab:97:0b:8f:46:5e:14:3b:70:ca:44:80: 72:1b:16:53:3d:e6:36:29:7e:cf:2c:17:96:ad:dd:b0: c3:84:63:17:2f:c2:b3:98:e8:ea:0c:72:29:a2:15:cc: 13:54:4c:f9:42:fd:a6:6b:c3:13:17:c3:12:da:4f:0e: bc:0d:60:bb:12:96:9c:d3:1f:cb:73:dc:63:54:71:b7: 65:dc:00:bb:74:d3:9e:13:a7:38:60:85:a8:03:53:3c: 66:c4:4b:76:55:61:7d:fd:ea:c1:5b:c5:48:59:ab:86: 2d:4d:07:66:54:87:9b:79:1c:6b:f7:0a:f9:d6:91:b8: 18:31:bc:b2:e6:3f:ca:dd:ec:a4:5b:6b:6c:83:35:81: 5b:ef:ab:18:4c:31:c2:58:7d:b2:88:c6:5b:dd:a9:2b: 9a:87:06:db:89:20:fc:a1:77:bb:41:d0:0c:81:37:8c: 15:45:eb:d4:aa:96:3a:1c:4f:2b:61:3c:a8:ee:e6:63: a7:76:10:d4:2a:56:47:75:aa:9b:5d:a4:47:f6:d9:5c: 8f:d6:54:a6:6f:9d:b5:84:31:1f:32:b8:02:c4:57:a0: 5b:e7:66:5e:84:e4:c6:ae:8b:38:1e:95:eb:26:38:7e: 5d:2e:ca:ca:3f:8d:d5:6d:5d:e5:39:6f:61:d2:79:22 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:12:02:61:de:02:75:55:11:2b:bb:91:c6: 57:68:af:6a:4b:b4:ca:ac:af:6b:fe:b1:d3:a4:6f:9c: 02:1c:42:ed:e2:36:ca:ea:50:fd:73:f6:2f:d0:5a:89: d3:2e:1d:df:9d:6a:7d:9c:93:49:77:fd:62:39 Fingerprint (SHA-256): FA:75:90:77:7E:25:19:8C:51:09:5F:14:EC:5A:73:27:7A:95:09:F5:30:26:1D:AC:30:12:44:2B:2B:9B:18:E3 Fingerprint (SHA1): 68:DC:FC:66:B6:A0:9A:52:B2:21:0B:5F:EE:B7:90:B0:9A:8E:2E:00 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1677: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204284 (0x374403bc) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:51:19 2022 Not After : Tue Sep 27 20:51:19 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 05:83:d7:b5:ab:97:0b:8f:46:5e:14:3b:70:ca:44:80: 72:1b:16:53:3d:e6:36:29:7e:cf:2c:17:96:ad:dd:b0: c3:84:63:17:2f:c2:b3:98:e8:ea:0c:72:29:a2:15:cc: 13:54:4c:f9:42:fd:a6:6b:c3:13:17:c3:12:da:4f:0e: bc:0d:60:bb:12:96:9c:d3:1f:cb:73:dc:63:54:71:b7: 65:dc:00:bb:74:d3:9e:13:a7:38:60:85:a8:03:53:3c: 66:c4:4b:76:55:61:7d:fd:ea:c1:5b:c5:48:59:ab:86: 2d:4d:07:66:54:87:9b:79:1c:6b:f7:0a:f9:d6:91:b8: 18:31:bc:b2:e6:3f:ca:dd:ec:a4:5b:6b:6c:83:35:81: 5b:ef:ab:18:4c:31:c2:58:7d:b2:88:c6:5b:dd:a9:2b: 9a:87:06:db:89:20:fc:a1:77:bb:41:d0:0c:81:37:8c: 15:45:eb:d4:aa:96:3a:1c:4f:2b:61:3c:a8:ee:e6:63: a7:76:10:d4:2a:56:47:75:aa:9b:5d:a4:47:f6:d9:5c: 8f:d6:54:a6:6f:9d:b5:84:31:1f:32:b8:02:c4:57:a0: 5b:e7:66:5e:84:e4:c6:ae:8b:38:1e:95:eb:26:38:7e: 5d:2e:ca:ca:3f:8d:d5:6d:5d:e5:39:6f:61:d2:79:22 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:12:02:61:de:02:75:55:11:2b:bb:91:c6: 57:68:af:6a:4b:b4:ca:ac:af:6b:fe:b1:d3:a4:6f:9c: 02:1c:42:ed:e2:36:ca:ea:50:fd:73:f6:2f:d0:5a:89: d3:2e:1d:df:9d:6a:7d:9c:93:49:77:fd:62:39 Fingerprint (SHA-256): FA:75:90:77:7E:25:19:8C:51:09:5F:14:EC:5A:73:27:7A:95:09:F5:30:26:1D:AC:30:12:44:2B:2B:9B:18:E3 Fingerprint (SHA1): 68:DC:FC:66:B6:A0:9A:52:B2:21:0B:5F:EE:B7:90:B0:9A:8E:2E:00 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1678: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204284 (0x374403bc) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:51:19 2022 Not After : Tue Sep 27 20:51:19 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 05:83:d7:b5:ab:97:0b:8f:46:5e:14:3b:70:ca:44:80: 72:1b:16:53:3d:e6:36:29:7e:cf:2c:17:96:ad:dd:b0: c3:84:63:17:2f:c2:b3:98:e8:ea:0c:72:29:a2:15:cc: 13:54:4c:f9:42:fd:a6:6b:c3:13:17:c3:12:da:4f:0e: bc:0d:60:bb:12:96:9c:d3:1f:cb:73:dc:63:54:71:b7: 65:dc:00:bb:74:d3:9e:13:a7:38:60:85:a8:03:53:3c: 66:c4:4b:76:55:61:7d:fd:ea:c1:5b:c5:48:59:ab:86: 2d:4d:07:66:54:87:9b:79:1c:6b:f7:0a:f9:d6:91:b8: 18:31:bc:b2:e6:3f:ca:dd:ec:a4:5b:6b:6c:83:35:81: 5b:ef:ab:18:4c:31:c2:58:7d:b2:88:c6:5b:dd:a9:2b: 9a:87:06:db:89:20:fc:a1:77:bb:41:d0:0c:81:37:8c: 15:45:eb:d4:aa:96:3a:1c:4f:2b:61:3c:a8:ee:e6:63: a7:76:10:d4:2a:56:47:75:aa:9b:5d:a4:47:f6:d9:5c: 8f:d6:54:a6:6f:9d:b5:84:31:1f:32:b8:02:c4:57:a0: 5b:e7:66:5e:84:e4:c6:ae:8b:38:1e:95:eb:26:38:7e: 5d:2e:ca:ca:3f:8d:d5:6d:5d:e5:39:6f:61:d2:79:22 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:12:02:61:de:02:75:55:11:2b:bb:91:c6: 57:68:af:6a:4b:b4:ca:ac:af:6b:fe:b1:d3:a4:6f:9c: 02:1c:42:ed:e2:36:ca:ea:50:fd:73:f6:2f:d0:5a:89: d3:2e:1d:df:9d:6a:7d:9c:93:49:77:fd:62:39 Fingerprint (SHA-256): FA:75:90:77:7E:25:19:8C:51:09:5F:14:EC:5A:73:27:7A:95:09:F5:30:26:1D:AC:30:12:44:2B:2B:9B:18:E3 Fingerprint (SHA1): 68:DC:FC:66:B6:A0:9A:52:B2:21:0B:5F:EE:B7:90:B0:9A:8E:2E:00 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #1679: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1680: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1681: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1682: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1683: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1684: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1685: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1686: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1687: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1688: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1689: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1690: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1691: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1692: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1693: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1694: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #1695: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1696: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1697: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1698: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1699: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1700: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1701: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1702: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1703: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1704: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1705: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1706: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20220927205144Z nextupdate=20230927205144Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Tue Sep 27 20:51:44 2022 Next Update: Wed Sep 27 20:51:44 2023 CRL Extensions: chains.sh: #1707: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220927205145Z nextupdate=20230927205145Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Sep 27 20:51:45 2022 Next Update: Wed Sep 27 20:51:45 2023 CRL Extensions: chains.sh: #1708: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20220927205145Z nextupdate=20230927205145Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Tue Sep 27 20:51:45 2022 Next Update: Wed Sep 27 20:51:45 2023 CRL Extensions: chains.sh: #1709: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20220927205145Z nextupdate=20230927205145Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Tue Sep 27 20:51:45 2022 Next Update: Wed Sep 27 20:51:45 2023 CRL Extensions: chains.sh: #1710: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20220927205146Z addcert 14 20220927205146Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Tue Sep 27 20:51:46 2022 Next Update: Wed Sep 27 20:51:45 2023 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Tue Sep 27 20:51:46 2022 CRL Extensions: chains.sh: #1711: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220927205147Z addcert 15 20220927205147Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Sep 27 20:51:47 2022 Next Update: Wed Sep 27 20:51:45 2023 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Tue Sep 27 20:51:47 2022 CRL Extensions: chains.sh: #1712: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1713: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1714: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1715: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #1716: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #1717: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #1718: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #1719: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #1720: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #1721: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:51:33 2022 Not After : Tue Sep 27 20:51:33 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:ef:91:41:bf:9b:7a:49:78:f0:03:5b:29:23:6d:bb: 83:76:31:20:03:03:be:77:54:ca:ed:fc:94:7c:43:45: 7a:6e:05:30:ba:ea:a1:8b:94:70:90:a3:85:59:8d:1e: 66:4b:19:dd:aa:be:60:79:0a:61:38:4d:21:fc:cf:b4: f5:c4:96:d8:a4:24:85:15:b0:f9:d9:77:b8:18:5c:9a: fe:94:76:1c:f9:d2:5a:26:76:e0:4a:37:65:d9:26:93: 7e:b7:1f:ce:bd:54:03:fd:77:9c:33:6e:43:e2:16:18: bd:3f:f2:0c:40:fd:f0:cf:7c:af:5d:e0:9a:9d:bb:e1: 47:f8:73:53:8d:7d:42:a4:e1:4e:28:35:74:58:45:3f: 73:88:aa:fa:7e:22:69:70:f6:22:fe:20:fa:46:35:fd: c9:a9:9e:74:13:ad:21:76:cd:86:5f:f9:ac:4b:71:ea: 82:76:3f:81:e7:9d:2b:76:2b:4d:9c:c8:6e:48:c5:97: c1:91:45:c7:d8:b0:71:22:b1:1a:ab:f6:10:6c:c3:82: 4f:91:5f:a4:30:3f:a2:60:14:c3:a9:26:60:1f:c2:38: a3:3e:a8:fd:7f:d9:56:e0:c5:31:b3:47:28:23:31:a0: c4:93:c9:a3:57:b7:90:1d:38:6c:b2:a3:39:61:96:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:16:42:bb:44:19:7a:4f:9f:ff:80:2d:9e:4c:5b:71: 6f:a2:c3:62:8b:7b:78:d3:d9:da:ee:0f:54:df:d3:02: 8c:cd:38:6b:02:4f:3d:8d:13:1b:f4:ed:18:e8:ac:02: 9a:a3:7f:d1:44:e6:f6:a8:55:fd:50:44:cf:35:13:40: a1:96:3b:f4:0b:df:07:a3:e7:65:55:3a:d4:a9:fe:82: 6f:97:7f:4e:63:a1:2c:67:9e:d3:48:33:5d:87:2e:58: 1d:3e:e2:ef:f4:09:9a:e9:1c:a2:a8:d4:4a:71:76:0a: 40:72:0f:ad:93:f4:09:11:48:84:38:33:8a:55:d7:75: 67:da:b4:01:c7:af:77:63:0b:da:25:c1:3b:76:9f:1f: 31:53:71:43:d9:69:1f:80:80:d9:65:c1:95:94:05:f6: cb:21:0c:95:5d:a8:55:18:5e:d5:d0:15:e8:8d:1d:19: 2c:50:25:84:38:5a:d9:90:50:e4:95:7e:f8:cf:39:4b: a1:3b:70:3a:3d:8e:2d:5c:8d:7b:57:28:a7:45:3f:05: 6f:45:a1:9e:7e:5f:10:9c:9e:f9:0f:75:91:64:94:f8: 47:2b:dc:4f:6a:f6:ee:8a:b0:44:d4:67:5a:e0:f2:16: 07:b0:7b:c4:b1:6f:5d:05:77:bc:48:a3:b3:31:c3:86 Fingerprint (SHA-256): 35:E9:63:D1:39:FA:00:0D:AE:04:32:43:23:7A:35:C6:53:6C:3C:91:AA:09:41:AA:8C:BA:7F:2A:99:1B:6D:D3 Fingerprint (SHA1): 6B:FD:E9:DA:05:F6:AC:CF:38:66:F6:78:D0:9F:D9:BD:55:85:41:14 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1722: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1723: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:51:33 2022 Not After : Tue Sep 27 20:51:33 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:ef:91:41:bf:9b:7a:49:78:f0:03:5b:29:23:6d:bb: 83:76:31:20:03:03:be:77:54:ca:ed:fc:94:7c:43:45: 7a:6e:05:30:ba:ea:a1:8b:94:70:90:a3:85:59:8d:1e: 66:4b:19:dd:aa:be:60:79:0a:61:38:4d:21:fc:cf:b4: f5:c4:96:d8:a4:24:85:15:b0:f9:d9:77:b8:18:5c:9a: fe:94:76:1c:f9:d2:5a:26:76:e0:4a:37:65:d9:26:93: 7e:b7:1f:ce:bd:54:03:fd:77:9c:33:6e:43:e2:16:18: bd:3f:f2:0c:40:fd:f0:cf:7c:af:5d:e0:9a:9d:bb:e1: 47:f8:73:53:8d:7d:42:a4:e1:4e:28:35:74:58:45:3f: 73:88:aa:fa:7e:22:69:70:f6:22:fe:20:fa:46:35:fd: c9:a9:9e:74:13:ad:21:76:cd:86:5f:f9:ac:4b:71:ea: 82:76:3f:81:e7:9d:2b:76:2b:4d:9c:c8:6e:48:c5:97: c1:91:45:c7:d8:b0:71:22:b1:1a:ab:f6:10:6c:c3:82: 4f:91:5f:a4:30:3f:a2:60:14:c3:a9:26:60:1f:c2:38: a3:3e:a8:fd:7f:d9:56:e0:c5:31:b3:47:28:23:31:a0: c4:93:c9:a3:57:b7:90:1d:38:6c:b2:a3:39:61:96:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:16:42:bb:44:19:7a:4f:9f:ff:80:2d:9e:4c:5b:71: 6f:a2:c3:62:8b:7b:78:d3:d9:da:ee:0f:54:df:d3:02: 8c:cd:38:6b:02:4f:3d:8d:13:1b:f4:ed:18:e8:ac:02: 9a:a3:7f:d1:44:e6:f6:a8:55:fd:50:44:cf:35:13:40: a1:96:3b:f4:0b:df:07:a3:e7:65:55:3a:d4:a9:fe:82: 6f:97:7f:4e:63:a1:2c:67:9e:d3:48:33:5d:87:2e:58: 1d:3e:e2:ef:f4:09:9a:e9:1c:a2:a8:d4:4a:71:76:0a: 40:72:0f:ad:93:f4:09:11:48:84:38:33:8a:55:d7:75: 67:da:b4:01:c7:af:77:63:0b:da:25:c1:3b:76:9f:1f: 31:53:71:43:d9:69:1f:80:80:d9:65:c1:95:94:05:f6: cb:21:0c:95:5d:a8:55:18:5e:d5:d0:15:e8:8d:1d:19: 2c:50:25:84:38:5a:d9:90:50:e4:95:7e:f8:cf:39:4b: a1:3b:70:3a:3d:8e:2d:5c:8d:7b:57:28:a7:45:3f:05: 6f:45:a1:9e:7e:5f:10:9c:9e:f9:0f:75:91:64:94:f8: 47:2b:dc:4f:6a:f6:ee:8a:b0:44:d4:67:5a:e0:f2:16: 07:b0:7b:c4:b1:6f:5d:05:77:bc:48:a3:b3:31:c3:86 Fingerprint (SHA-256): 35:E9:63:D1:39:FA:00:0D:AE:04:32:43:23:7A:35:C6:53:6C:3C:91:AA:09:41:AA:8C:BA:7F:2A:99:1B:6D:D3 Fingerprint (SHA1): 6B:FD:E9:DA:05:F6:AC:CF:38:66:F6:78:D0:9F:D9:BD:55:85:41:14 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1724: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1725: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1726: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204293 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1727: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1728: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1729: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1730: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 927204294 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1731: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1732: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1733: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-927204050.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1734: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-927204023.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1735: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1736: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1737: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-927204050.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1738: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 927204295 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1739: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1740: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1741: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-927204050.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1742: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-927204024.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1743: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1744: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1745: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1746: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 927204296 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1747: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1748: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1749: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-927204050.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1750: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-927204025.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1751: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1752: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1753: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-927204050.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1754: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-927204026.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1755: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1756: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20220927205205Z nextupdate=20230927205205Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Tue Sep 27 20:52:05 2022 Next Update: Wed Sep 27 20:52:05 2023 CRL Extensions: chains.sh: #1757: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220927205206Z nextupdate=20230927205206Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Sep 27 20:52:06 2022 Next Update: Wed Sep 27 20:52:06 2023 CRL Extensions: chains.sh: #1758: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20220927205206Z nextupdate=20230927205206Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Tue Sep 27 20:52:06 2022 Next Update: Wed Sep 27 20:52:06 2023 CRL Extensions: chains.sh: #1759: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20220927205206Z nextupdate=20230927205206Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Tue Sep 27 20:52:06 2022 Next Update: Wed Sep 27 20:52:06 2023 CRL Extensions: chains.sh: #1760: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220927205207Z addcert 20 20220927205207Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Sep 27 20:52:07 2022 Next Update: Wed Sep 27 20:52:06 2023 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Tue Sep 27 20:52:07 2022 CRL Extensions: chains.sh: #1761: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220927205208Z addcert 40 20220927205208Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Sep 27 20:52:08 2022 Next Update: Wed Sep 27 20:52:06 2023 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Tue Sep 27 20:52:07 2022 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Tue Sep 27 20:52:08 2022 CRL Extensions: chains.sh: #1762: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1763: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1764: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1765: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204293 (0x374403c5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:51:52 2022 Not After : Tue Sep 27 20:51:52 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:b3:3a:c3:6d:82:ee:4a:7e:f7:17:f7:e8:e6:81:8b: ff:80:d0:2f:87:cc:fe:de:3b:32:b7:9e:ae:2d:56:70: 09:57:bf:94:8f:4a:70:eb:4b:c9:dd:bb:16:b7:47:0e: aa:a9:d2:60:1b:aa:5f:ca:cf:57:92:2f:cf:6b:cb:c4: f2:97:a7:55:dd:92:8c:6e:a4:51:2d:52:7d:36:9f:32: c0:52:0e:7e:07:56:e8:26:ef:5f:d8:fe:c7:4f:b3:53: e2:ee:88:36:e9:28:6e:97:b2:41:23:df:0f:c7:49:d4: 58:15:12:d4:a0:47:04:41:3a:ba:90:8d:fb:b3:b8:45: fe:76:fd:38:f8:70:44:de:fd:44:98:f3:00:b8:43:f6: cb:b3:e6:39:bf:ff:f2:3b:a9:dd:37:a0:87:ef:1d:75: 89:ce:c0:3a:c4:cc:b9:31:8e:67:ec:78:7f:9a:b6:83: 9d:46:97:54:a3:03:cd:68:17:4f:fc:b1:1b:5d:70:fb: 26:0d:01:9f:c2:54:08:b5:6a:a1:af:c2:bc:0b:96:f0: 37:50:8e:96:0a:41:f1:38:2e:5d:5a:de:c4:aa:b3:c0: 5e:5d:00:80:e6:7b:d3:bb:e7:78:85:0c:d5:09:eb:43: d5:9e:e1:02:42:88:06:98:5c:de:3c:f4:cd:91:d2:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:33:f3:07:4d:54:92:fa:2c:7d:a6:33:a9:2a:0a:4e: fd:e8:a0:15:94:54:e0:d2:c0:17:fc:55:41:25:e9:15: 0d:ed:0d:41:75:f8:71:03:b7:41:45:ce:95:83:40:47: 24:81:90:09:95:97:55:20:64:e1:d0:a6:fc:03:81:71: a1:08:d8:a6:8b:25:a0:83:e6:fa:12:d6:87:9d:fd:9c: be:5a:0c:0e:a8:7e:df:dd:d3:5d:b2:dd:13:7d:c6:7b: 86:22:1b:05:e5:88:cb:14:12:90:67:1a:52:d1:89:d0: be:a6:5c:e1:dc:89:56:45:0f:dc:77:45:d3:74:9a:cb: b3:72:34:29:81:5a:34:3a:fe:44:19:4b:02:0d:2b:da: 4d:8d:b7:33:df:9c:34:fa:d4:6b:9b:18:23:86:b2:59: c5:a1:5c:f0:bd:3c:4c:52:a1:11:95:77:a1:7e:88:15: b5:5f:84:d5:50:b9:17:86:a4:25:45:7d:de:04:b5:40: e4:0a:c6:41:51:8c:be:93:5a:c4:98:56:68:59:3e:fd: 0a:60:aa:f1:14:83:0a:10:a3:ec:a9:ab:e7:c9:cf:38: 24:03:9d:3c:8c:49:ff:51:45:73:44:57:3c:17:f4:b1: 3c:97:aa:f5:6c:fd:cb:bd:a0:2c:20:ec:70:54:bc:b1 Fingerprint (SHA-256): FA:CF:34:DC:96:76:CB:7E:12:67:E9:D3:1D:42:F0:19:F1:E2:89:57:4C:73:B1:1A:11:68:12:56:20:53:D9:4A Fingerprint (SHA1): A4:71:3E:FA:6E:A0:63:BD:96:E4:F8:9B:6E:B9:65:F3:61:08:41:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1766: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1767: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204293 (0x374403c5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 20:51:52 2022 Not After : Tue Sep 27 20:51:52 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:b3:3a:c3:6d:82:ee:4a:7e:f7:17:f7:e8:e6:81:8b: ff:80:d0:2f:87:cc:fe:de:3b:32:b7:9e:ae:2d:56:70: 09:57:bf:94:8f:4a:70:eb:4b:c9:dd:bb:16:b7:47:0e: aa:a9:d2:60:1b:aa:5f:ca:cf:57:92:2f:cf:6b:cb:c4: f2:97:a7:55:dd:92:8c:6e:a4:51:2d:52:7d:36:9f:32: c0:52:0e:7e:07:56:e8:26:ef:5f:d8:fe:c7:4f:b3:53: e2:ee:88:36:e9:28:6e:97:b2:41:23:df:0f:c7:49:d4: 58:15:12:d4:a0:47:04:41:3a:ba:90:8d:fb:b3:b8:45: fe:76:fd:38:f8:70:44:de:fd:44:98:f3:00:b8:43:f6: cb:b3:e6:39:bf:ff:f2:3b:a9:dd:37:a0:87:ef:1d:75: 89:ce:c0:3a:c4:cc:b9:31:8e:67:ec:78:7f:9a:b6:83: 9d:46:97:54:a3:03:cd:68:17:4f:fc:b1:1b:5d:70:fb: 26:0d:01:9f:c2:54:08:b5:6a:a1:af:c2:bc:0b:96:f0: 37:50:8e:96:0a:41:f1:38:2e:5d:5a:de:c4:aa:b3:c0: 5e:5d:00:80:e6:7b:d3:bb:e7:78:85:0c:d5:09:eb:43: d5:9e:e1:02:42:88:06:98:5c:de:3c:f4:cd:91:d2:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:33:f3:07:4d:54:92:fa:2c:7d:a6:33:a9:2a:0a:4e: fd:e8:a0:15:94:54:e0:d2:c0:17:fc:55:41:25:e9:15: 0d:ed:0d:41:75:f8:71:03:b7:41:45:ce:95:83:40:47: 24:81:90:09:95:97:55:20:64:e1:d0:a6:fc:03:81:71: a1:08:d8:a6:8b:25:a0:83:e6:fa:12:d6:87:9d:fd:9c: be:5a:0c:0e:a8:7e:df:dd:d3:5d:b2:dd:13:7d:c6:7b: 86:22:1b:05:e5:88:cb:14:12:90:67:1a:52:d1:89:d0: be:a6:5c:e1:dc:89:56:45:0f:dc:77:45:d3:74:9a:cb: b3:72:34:29:81:5a:34:3a:fe:44:19:4b:02:0d:2b:da: 4d:8d:b7:33:df:9c:34:fa:d4:6b:9b:18:23:86:b2:59: c5:a1:5c:f0:bd:3c:4c:52:a1:11:95:77:a1:7e:88:15: b5:5f:84:d5:50:b9:17:86:a4:25:45:7d:de:04:b5:40: e4:0a:c6:41:51:8c:be:93:5a:c4:98:56:68:59:3e:fd: 0a:60:aa:f1:14:83:0a:10:a3:ec:a9:ab:e7:c9:cf:38: 24:03:9d:3c:8c:49:ff:51:45:73:44:57:3c:17:f4:b1: 3c:97:aa:f5:6c:fd:cb:bd:a0:2c:20:ec:70:54:bc:b1 Fingerprint (SHA-256): FA:CF:34:DC:96:76:CB:7E:12:67:E9:D3:1D:42:F0:19:F1:E2:89:57:4C:73:B1:1A:11:68:12:56:20:53:D9:4A Fingerprint (SHA1): A4:71:3E:FA:6E:A0:63:BD:96:E4:F8:9B:6E:B9:65:F3:61:08:41:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1768: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1769: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1770: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204297 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1771: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1772: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1773: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1774: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 927204298 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1775: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1776: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1777: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1778: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927204299 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1779: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1780: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1781: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1782: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 927204300 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1783: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1784: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #1785: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -m 927204301 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1786: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #1787: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #1788: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1789: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 927204302 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1790: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1791: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1792: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1793: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 927204303 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1794: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1795: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #1796: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #1797: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #1798: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204297 (0x374403c9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:52:11 2022 Not After : Tue Sep 27 20:52:11 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:d7:70:fa:c4:38:8a:34:f1:5d:f2:ae:2e:4e:fc:17: 21:b8:1d:df:39:ca:6e:87:45:f7:16:4f:70:52:42:0f: b0:5e:b4:9a:f9:73:f6:17:d8:f8:d9:19:64:db:1e:49: 55:f2:b0:55:b7:3e:19:70:89:43:47:12:c9:f5:0a:c0: 1e:88:a4:ba:1f:68:91:62:c5:c8:01:15:ab:1a:fe:f3: d5:d6:5d:2f:dc:8f:e3:71:90:ff:12:c0:37:2e:32:0d: ee:9f:b2:1b:96:16:a0:82:92:61:de:c9:d6:a6:e5:e7: b8:70:07:66:59:e0:93:3c:4d:8c:78:a3:cc:75:e2:ee: e0:4c:94:eb:5e:ee:27:d8:49:45:76:60:35:44:ed:8e: dc:31:4c:32:b5:33:a1:6e:15:7c:8b:19:14:64:43:12: 25:58:9c:5c:56:0f:fd:86:54:b3:98:04:52:81:4e:7c: 2b:c9:81:9f:8b:ac:c6:35:e1:4e:3e:40:08:b6:23:ec: 6b:3a:77:97:f8:39:d5:dc:65:4b:dc:26:8c:d5:35:0b: e3:f4:d0:3e:0f:c2:af:76:23:be:b0:50:73:98:fb:04: c7:5d:14:62:1b:a1:10:41:c6:b2:c1:2f:fe:10:52:ba: 21:69:a4:39:7f:d2:a0:00:53:14:27:b8:c3:13:2b:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: af:24:ba:a6:ab:30:66:3b:c7:6a:9b:a4:31:b9:f2:55: 61:89:c2:ec:2f:4f:19:24:3b:93:6e:28:cf:76:1a:bd: 9d:f2:e0:69:53:cf:5e:0c:5d:8a:c6:ef:c4:37:70:24: e7:2f:49:89:66:18:c8:cd:c4:15:49:47:34:b7:4c:92: 76:a8:b1:24:08:4c:1a:e4:bc:46:2d:5f:82:58:3e:db: e5:1d:56:b8:3d:ac:ed:c1:f3:73:41:e1:f6:35:4f:17: cd:54:2a:de:8e:5c:dc:81:c4:98:b2:c7:85:0f:9f:db: ca:44:d9:de:eb:34:77:40:34:8a:84:3e:8a:5b:18:44: c2:ad:88:33:14:81:7a:4e:2c:43:21:a4:25:36:be:ce: 3b:fc:a5:5e:d9:d6:43:f3:1e:dd:ae:3c:dc:07:35:0c: 7b:7c:9a:f4:d6:b3:55:46:26:fa:dc:74:28:6e:31:3e: ff:fc:56:47:43:19:c6:90:dc:8a:ed:80:09:34:3c:74: 24:55:9a:ae:ef:b4:85:5f:b8:6e:d5:f6:df:40:a2:c6: 22:7d:89:42:d1:0d:0a:eb:94:91:86:83:e7:ef:2b:fa: f9:9b:f2:b0:c1:e7:d9:48:f6:da:7c:e3:84:10:f2:55: 54:ae:a2:6f:d5:89:13:87:3c:96:b6:4f:71:d9:f6:b4 Fingerprint (SHA-256): 11:B1:AE:6A:CC:74:A4:02:FB:1A:BF:6A:80:0E:15:8C:96:70:F0:B1:90:7F:02:23:C1:86:98:41:0B:DE:EE:DC Fingerprint (SHA1): BF:18:23:82:05:5A:DE:B9:76:D7:94:C6:31:7F:68:A2:CC:1C:69:9C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1799: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204299 (0x374403cb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 20:52:14 2022 Not After : Mon Sep 27 20:52:14 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:93:00:95:3f:42:27:c2:c4:bb:cb:9c:c6:22:0f:c1: 0d:6b:b7:42:93:86:e9:e8:ab:6e:fc:41:df:c3:60:ce: 53:36:3d:42:df:7c:a6:6e:6f:8f:52:e6:30:c4:be:8c: 92:c0:f5:0c:cd:0a:84:40:a1:73:bd:83:96:57:66:bf: 1b:c8:e3:75:40:26:6d:bd:19:90:09:b3:8d:ea:4a:d8: 6f:53:01:5c:7c:e1:e9:55:64:d2:75:c5:21:cf:fa:c3: e0:62:ed:44:af:96:31:bf:47:35:94:fb:9e:7c:00:71: f5:ee:1d:c6:bd:17:ae:21:d4:09:8e:72:5f:3e:52:3f: 84:9d:b5:99:eb:ff:20:7a:4b:95:f3:f7:7a:77:64:49: bf:bc:18:1a:94:87:c3:30:4e:a6:1b:44:c3:5d:5b:e5: fd:ba:90:39:67:19:2f:ed:fb:73:1a:e1:fd:29:fb:f3: b5:e5:a0:f8:1a:70:fd:43:02:8b:51:a4:0c:c3:4c:31: b8:ab:18:53:ff:fb:b3:88:2e:02:ff:31:f5:34:37:87: f8:e1:51:de:44:ba:16:68:ad:61:31:ca:95:58:63:42: a8:65:da:50:00:95:d6:bd:af:3f:6f:cd:6f:d3:4c:62: 8b:6c:fd:d9:af:79:23:c2:da:20:87:1c:45:a2:44:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 74:58:74:b9:3e:9b:4a:41:3a:3c:7f:6d:cb:d3:84:f8: 0a:93:c5:a9:08:5f:ef:7f:4b:92:7d:42:1c:46:7a:ff: 39:65:3f:57:39:ee:ed:14:09:ae:eb:ab:99:bf:95:e8: d2:eb:6a:16:97:da:83:0d:b6:5c:ea:49:cf:c0:b1:ec: 94:64:a8:d4:34:38:55:65:62:5b:d6:4b:40:b4:fb:2d: 3c:95:39:9d:d6:7a:47:1f:7d:6a:db:22:88:d6:92:d9: 11:87:09:fb:cc:03:d2:c2:64:58:2f:16:9a:4e:9a:de: 97:ed:3e:54:d5:bc:cb:c2:35:b4:25:46:96:2f:c8:d9: 2d:fc:1c:ab:48:c4:f4:40:09:9c:b3:33:4d:4a:c4:95: 79:de:ee:fc:e3:5a:74:83:c4:bb:88:f9:6f:97:4d:8c: 7f:2f:ab:3a:40:e2:d9:b4:6e:32:f5:26:9d:12:e4:e3: 1c:53:6d:bc:a7:05:a7:4c:c4:9c:52:2e:a1:82:15:98: c6:1e:c5:af:97:45:c9:c2:a3:f6:0e:32:a1:ee:08:ef: e4:75:0b:b8:5a:4f:48:cf:21:73:b1:e9:dd:31:ac:30: 04:8a:17:66:70:a0:eb:7a:46:5d:2f:82:1d:90:a6:e9: 59:91:ae:b1:77:a5:96:a4:9a:66:b9:1f:86:da:76:fb Fingerprint (SHA-256): F9:F0:CD:3E:2D:4F:8F:FB:D7:3A:5C:F9:1E:A4:F4:E2:AC:D3:60:29:40:B8:67:20:CC:AC:47:1C:57:62:8A:C9 Fingerprint (SHA1): 2F:79:B8:A3:BF:1E:C8:BF:A9:F0:FA:80:A7:ED:0B:F2:8F:DC:FF:39 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1800: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204297 (0x374403c9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:52:11 2022 Not After : Tue Sep 27 20:52:11 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:d7:70:fa:c4:38:8a:34:f1:5d:f2:ae:2e:4e:fc:17: 21:b8:1d:df:39:ca:6e:87:45:f7:16:4f:70:52:42:0f: b0:5e:b4:9a:f9:73:f6:17:d8:f8:d9:19:64:db:1e:49: 55:f2:b0:55:b7:3e:19:70:89:43:47:12:c9:f5:0a:c0: 1e:88:a4:ba:1f:68:91:62:c5:c8:01:15:ab:1a:fe:f3: d5:d6:5d:2f:dc:8f:e3:71:90:ff:12:c0:37:2e:32:0d: ee:9f:b2:1b:96:16:a0:82:92:61:de:c9:d6:a6:e5:e7: b8:70:07:66:59:e0:93:3c:4d:8c:78:a3:cc:75:e2:ee: e0:4c:94:eb:5e:ee:27:d8:49:45:76:60:35:44:ed:8e: dc:31:4c:32:b5:33:a1:6e:15:7c:8b:19:14:64:43:12: 25:58:9c:5c:56:0f:fd:86:54:b3:98:04:52:81:4e:7c: 2b:c9:81:9f:8b:ac:c6:35:e1:4e:3e:40:08:b6:23:ec: 6b:3a:77:97:f8:39:d5:dc:65:4b:dc:26:8c:d5:35:0b: e3:f4:d0:3e:0f:c2:af:76:23:be:b0:50:73:98:fb:04: c7:5d:14:62:1b:a1:10:41:c6:b2:c1:2f:fe:10:52:ba: 21:69:a4:39:7f:d2:a0:00:53:14:27:b8:c3:13:2b:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: af:24:ba:a6:ab:30:66:3b:c7:6a:9b:a4:31:b9:f2:55: 61:89:c2:ec:2f:4f:19:24:3b:93:6e:28:cf:76:1a:bd: 9d:f2:e0:69:53:cf:5e:0c:5d:8a:c6:ef:c4:37:70:24: e7:2f:49:89:66:18:c8:cd:c4:15:49:47:34:b7:4c:92: 76:a8:b1:24:08:4c:1a:e4:bc:46:2d:5f:82:58:3e:db: e5:1d:56:b8:3d:ac:ed:c1:f3:73:41:e1:f6:35:4f:17: cd:54:2a:de:8e:5c:dc:81:c4:98:b2:c7:85:0f:9f:db: ca:44:d9:de:eb:34:77:40:34:8a:84:3e:8a:5b:18:44: c2:ad:88:33:14:81:7a:4e:2c:43:21:a4:25:36:be:ce: 3b:fc:a5:5e:d9:d6:43:f3:1e:dd:ae:3c:dc:07:35:0c: 7b:7c:9a:f4:d6:b3:55:46:26:fa:dc:74:28:6e:31:3e: ff:fc:56:47:43:19:c6:90:dc:8a:ed:80:09:34:3c:74: 24:55:9a:ae:ef:b4:85:5f:b8:6e:d5:f6:df:40:a2:c6: 22:7d:89:42:d1:0d:0a:eb:94:91:86:83:e7:ef:2b:fa: f9:9b:f2:b0:c1:e7:d9:48:f6:da:7c:e3:84:10:f2:55: 54:ae:a2:6f:d5:89:13:87:3c:96:b6:4f:71:d9:f6:b4 Fingerprint (SHA-256): 11:B1:AE:6A:CC:74:A4:02:FB:1A:BF:6A:80:0E:15:8C:96:70:F0:B1:90:7F:02:23:C1:86:98:41:0B:DE:EE:DC Fingerprint (SHA1): BF:18:23:82:05:5A:DE:B9:76:D7:94:C6:31:7F:68:A2:CC:1C:69:9C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1801: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #1802: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204297 (0x374403c9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:52:11 2022 Not After : Tue Sep 27 20:52:11 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:d7:70:fa:c4:38:8a:34:f1:5d:f2:ae:2e:4e:fc:17: 21:b8:1d:df:39:ca:6e:87:45:f7:16:4f:70:52:42:0f: b0:5e:b4:9a:f9:73:f6:17:d8:f8:d9:19:64:db:1e:49: 55:f2:b0:55:b7:3e:19:70:89:43:47:12:c9:f5:0a:c0: 1e:88:a4:ba:1f:68:91:62:c5:c8:01:15:ab:1a:fe:f3: d5:d6:5d:2f:dc:8f:e3:71:90:ff:12:c0:37:2e:32:0d: ee:9f:b2:1b:96:16:a0:82:92:61:de:c9:d6:a6:e5:e7: b8:70:07:66:59:e0:93:3c:4d:8c:78:a3:cc:75:e2:ee: e0:4c:94:eb:5e:ee:27:d8:49:45:76:60:35:44:ed:8e: dc:31:4c:32:b5:33:a1:6e:15:7c:8b:19:14:64:43:12: 25:58:9c:5c:56:0f:fd:86:54:b3:98:04:52:81:4e:7c: 2b:c9:81:9f:8b:ac:c6:35:e1:4e:3e:40:08:b6:23:ec: 6b:3a:77:97:f8:39:d5:dc:65:4b:dc:26:8c:d5:35:0b: e3:f4:d0:3e:0f:c2:af:76:23:be:b0:50:73:98:fb:04: c7:5d:14:62:1b:a1:10:41:c6:b2:c1:2f:fe:10:52:ba: 21:69:a4:39:7f:d2:a0:00:53:14:27:b8:c3:13:2b:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: af:24:ba:a6:ab:30:66:3b:c7:6a:9b:a4:31:b9:f2:55: 61:89:c2:ec:2f:4f:19:24:3b:93:6e:28:cf:76:1a:bd: 9d:f2:e0:69:53:cf:5e:0c:5d:8a:c6:ef:c4:37:70:24: e7:2f:49:89:66:18:c8:cd:c4:15:49:47:34:b7:4c:92: 76:a8:b1:24:08:4c:1a:e4:bc:46:2d:5f:82:58:3e:db: e5:1d:56:b8:3d:ac:ed:c1:f3:73:41:e1:f6:35:4f:17: cd:54:2a:de:8e:5c:dc:81:c4:98:b2:c7:85:0f:9f:db: ca:44:d9:de:eb:34:77:40:34:8a:84:3e:8a:5b:18:44: c2:ad:88:33:14:81:7a:4e:2c:43:21:a4:25:36:be:ce: 3b:fc:a5:5e:d9:d6:43:f3:1e:dd:ae:3c:dc:07:35:0c: 7b:7c:9a:f4:d6:b3:55:46:26:fa:dc:74:28:6e:31:3e: ff:fc:56:47:43:19:c6:90:dc:8a:ed:80:09:34:3c:74: 24:55:9a:ae:ef:b4:85:5f:b8:6e:d5:f6:df:40:a2:c6: 22:7d:89:42:d1:0d:0a:eb:94:91:86:83:e7:ef:2b:fa: f9:9b:f2:b0:c1:e7:d9:48:f6:da:7c:e3:84:10:f2:55: 54:ae:a2:6f:d5:89:13:87:3c:96:b6:4f:71:d9:f6:b4 Fingerprint (SHA-256): 11:B1:AE:6A:CC:74:A4:02:FB:1A:BF:6A:80:0E:15:8C:96:70:F0:B1:90:7F:02:23:C1:86:98:41:0B:DE:EE:DC Fingerprint (SHA1): BF:18:23:82:05:5A:DE:B9:76:D7:94:C6:31:7F:68:A2:CC:1C:69:9C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1803: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204299 (0x374403cb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 20:52:14 2022 Not After : Mon Sep 27 20:52:14 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:93:00:95:3f:42:27:c2:c4:bb:cb:9c:c6:22:0f:c1: 0d:6b:b7:42:93:86:e9:e8:ab:6e:fc:41:df:c3:60:ce: 53:36:3d:42:df:7c:a6:6e:6f:8f:52:e6:30:c4:be:8c: 92:c0:f5:0c:cd:0a:84:40:a1:73:bd:83:96:57:66:bf: 1b:c8:e3:75:40:26:6d:bd:19:90:09:b3:8d:ea:4a:d8: 6f:53:01:5c:7c:e1:e9:55:64:d2:75:c5:21:cf:fa:c3: e0:62:ed:44:af:96:31:bf:47:35:94:fb:9e:7c:00:71: f5:ee:1d:c6:bd:17:ae:21:d4:09:8e:72:5f:3e:52:3f: 84:9d:b5:99:eb:ff:20:7a:4b:95:f3:f7:7a:77:64:49: bf:bc:18:1a:94:87:c3:30:4e:a6:1b:44:c3:5d:5b:e5: fd:ba:90:39:67:19:2f:ed:fb:73:1a:e1:fd:29:fb:f3: b5:e5:a0:f8:1a:70:fd:43:02:8b:51:a4:0c:c3:4c:31: b8:ab:18:53:ff:fb:b3:88:2e:02:ff:31:f5:34:37:87: f8:e1:51:de:44:ba:16:68:ad:61:31:ca:95:58:63:42: a8:65:da:50:00:95:d6:bd:af:3f:6f:cd:6f:d3:4c:62: 8b:6c:fd:d9:af:79:23:c2:da:20:87:1c:45:a2:44:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 74:58:74:b9:3e:9b:4a:41:3a:3c:7f:6d:cb:d3:84:f8: 0a:93:c5:a9:08:5f:ef:7f:4b:92:7d:42:1c:46:7a:ff: 39:65:3f:57:39:ee:ed:14:09:ae:eb:ab:99:bf:95:e8: d2:eb:6a:16:97:da:83:0d:b6:5c:ea:49:cf:c0:b1:ec: 94:64:a8:d4:34:38:55:65:62:5b:d6:4b:40:b4:fb:2d: 3c:95:39:9d:d6:7a:47:1f:7d:6a:db:22:88:d6:92:d9: 11:87:09:fb:cc:03:d2:c2:64:58:2f:16:9a:4e:9a:de: 97:ed:3e:54:d5:bc:cb:c2:35:b4:25:46:96:2f:c8:d9: 2d:fc:1c:ab:48:c4:f4:40:09:9c:b3:33:4d:4a:c4:95: 79:de:ee:fc:e3:5a:74:83:c4:bb:88:f9:6f:97:4d:8c: 7f:2f:ab:3a:40:e2:d9:b4:6e:32:f5:26:9d:12:e4:e3: 1c:53:6d:bc:a7:05:a7:4c:c4:9c:52:2e:a1:82:15:98: c6:1e:c5:af:97:45:c9:c2:a3:f6:0e:32:a1:ee:08:ef: e4:75:0b:b8:5a:4f:48:cf:21:73:b1:e9:dd:31:ac:30: 04:8a:17:66:70:a0:eb:7a:46:5d:2f:82:1d:90:a6:e9: 59:91:ae:b1:77:a5:96:a4:9a:66:b9:1f:86:da:76:fb Fingerprint (SHA-256): F9:F0:CD:3E:2D:4F:8F:FB:D7:3A:5C:F9:1E:A4:F4:E2:AC:D3:60:29:40:B8:67:20:CC:AC:47:1C:57:62:8A:C9 Fingerprint (SHA1): 2F:79:B8:A3:BF:1E:C8:BF:A9:F0:FA:80:A7:ED:0B:F2:8F:DC:FF:39 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1804: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #1805: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #1806: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #1807: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204297 (0x374403c9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:52:11 2022 Not After : Tue Sep 27 20:52:11 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:d7:70:fa:c4:38:8a:34:f1:5d:f2:ae:2e:4e:fc:17: 21:b8:1d:df:39:ca:6e:87:45:f7:16:4f:70:52:42:0f: b0:5e:b4:9a:f9:73:f6:17:d8:f8:d9:19:64:db:1e:49: 55:f2:b0:55:b7:3e:19:70:89:43:47:12:c9:f5:0a:c0: 1e:88:a4:ba:1f:68:91:62:c5:c8:01:15:ab:1a:fe:f3: d5:d6:5d:2f:dc:8f:e3:71:90:ff:12:c0:37:2e:32:0d: ee:9f:b2:1b:96:16:a0:82:92:61:de:c9:d6:a6:e5:e7: b8:70:07:66:59:e0:93:3c:4d:8c:78:a3:cc:75:e2:ee: e0:4c:94:eb:5e:ee:27:d8:49:45:76:60:35:44:ed:8e: dc:31:4c:32:b5:33:a1:6e:15:7c:8b:19:14:64:43:12: 25:58:9c:5c:56:0f:fd:86:54:b3:98:04:52:81:4e:7c: 2b:c9:81:9f:8b:ac:c6:35:e1:4e:3e:40:08:b6:23:ec: 6b:3a:77:97:f8:39:d5:dc:65:4b:dc:26:8c:d5:35:0b: e3:f4:d0:3e:0f:c2:af:76:23:be:b0:50:73:98:fb:04: c7:5d:14:62:1b:a1:10:41:c6:b2:c1:2f:fe:10:52:ba: 21:69:a4:39:7f:d2:a0:00:53:14:27:b8:c3:13:2b:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: af:24:ba:a6:ab:30:66:3b:c7:6a:9b:a4:31:b9:f2:55: 61:89:c2:ec:2f:4f:19:24:3b:93:6e:28:cf:76:1a:bd: 9d:f2:e0:69:53:cf:5e:0c:5d:8a:c6:ef:c4:37:70:24: e7:2f:49:89:66:18:c8:cd:c4:15:49:47:34:b7:4c:92: 76:a8:b1:24:08:4c:1a:e4:bc:46:2d:5f:82:58:3e:db: e5:1d:56:b8:3d:ac:ed:c1:f3:73:41:e1:f6:35:4f:17: cd:54:2a:de:8e:5c:dc:81:c4:98:b2:c7:85:0f:9f:db: ca:44:d9:de:eb:34:77:40:34:8a:84:3e:8a:5b:18:44: c2:ad:88:33:14:81:7a:4e:2c:43:21:a4:25:36:be:ce: 3b:fc:a5:5e:d9:d6:43:f3:1e:dd:ae:3c:dc:07:35:0c: 7b:7c:9a:f4:d6:b3:55:46:26:fa:dc:74:28:6e:31:3e: ff:fc:56:47:43:19:c6:90:dc:8a:ed:80:09:34:3c:74: 24:55:9a:ae:ef:b4:85:5f:b8:6e:d5:f6:df:40:a2:c6: 22:7d:89:42:d1:0d:0a:eb:94:91:86:83:e7:ef:2b:fa: f9:9b:f2:b0:c1:e7:d9:48:f6:da:7c:e3:84:10:f2:55: 54:ae:a2:6f:d5:89:13:87:3c:96:b6:4f:71:d9:f6:b4 Fingerprint (SHA-256): 11:B1:AE:6A:CC:74:A4:02:FB:1A:BF:6A:80:0E:15:8C:96:70:F0:B1:90:7F:02:23:C1:86:98:41:0B:DE:EE:DC Fingerprint (SHA1): BF:18:23:82:05:5A:DE:B9:76:D7:94:C6:31:7F:68:A2:CC:1C:69:9C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1808: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204301 (0x374403cd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Tue Sep 27 20:52:17 2022 Not After : Tue Sep 27 20:52:17 2072 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:1a:f7:4a:84:ce:6c:74:f0:c6:40:16:22:e3:c1:7d: a1:6f:92:4e:aa:19:af:63:b8:37:d4:e2:50:91:f8:ac: 88:1f:8f:d2:ba:34:4b:db:9b:e9:db:c0:41:e5:46:00: 22:cf:5f:a2:81:a6:58:e0:58:81:c8:43:dc:87:1b:7b: de:67:c4:b3:85:04:66:c9:15:3f:3c:59:6e:f4:57:7c: e3:14:d2:f9:aa:77:ae:d6:8b:d0:e8:b5:e0:b4:b7:7d: 88:64:db:33:2b:21:de:e9:68:7c:bf:78:eb:ed:43:a1: d7:66:ef:8b:52:41:eb:e0:9f:5a:ef:7c:18:74:27:74: 18:6d:7f:8d:d1:7e:1c:3f:eb:2f:3b:55:e7:a8:72:68: 5c:29:1d:5f:c8:35:90:a3:90:6c:8b:5a:08:73:21:ed: 64:44:d6:3d:c3:e7:7e:74:e4:ad:8e:6e:2e:5f:0e:bc: b1:83:2c:cf:85:e2:93:b4:02:ed:a0:ff:f2:42:8d:5d: 4c:e7:81:30:72:97:59:a9:57:3a:cb:a6:13:ad:2d:f9: 6e:c3:d9:6c:4e:76:34:12:59:db:b7:f1:ae:69:2b:61: a9:57:d7:cb:de:bb:99:ae:50:7a:73:ec:b0:4e:5a:8a: 36:55:1d:77:0c:5b:e9:4f:57:f4:29:d3:4d:6d:14:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:72:87:ab:72:03:f9:f8:90:6f:b1:4e:f4:5c:fd:82: 8f:3f:06:91:ba:a8:3e:ae:3b:8a:37:3b:84:2f:de:e2: 96:2e:e1:0a:ae:26:4e:1b:c1:3b:7c:d7:42:14:37:db: de:70:b6:bb:d6:83:85:c2:88:4f:ed:e6:e5:7b:fe:f5: 24:d5:ff:05:7c:f2:d3:86:bf:96:12:df:4c:58:d8:a5: a0:22:c4:4c:4a:20:b8:c9:69:96:e0:3c:59:19:48:8e: 14:c6:d4:07:d2:4e:56:b6:32:01:25:88:23:9f:93:9b: 07:7f:b6:48:f7:d6:7d:8b:bc:b9:fe:ea:2e:01:3c:ac: b1:73:d7:95:5b:50:3f:ac:18:e3:6e:2a:d0:44:dc:d8: 2c:06:19:ab:bb:cf:04:2a:fe:c3:60:50:43:aa:c0:a3: e2:ea:88:69:6f:77:df:31:4f:ca:f4:7e:0b:1a:52:fc: 88:db:91:8a:f2:d5:f0:4b:88:a2:3c:ee:ed:46:23:a2: 59:a8:54:6e:7a:8b:4a:7d:97:44:9b:db:05:da:e3:5f: d9:07:b4:e5:73:64:78:46:db:ac:6e:2a:46:c7:77:ff: db:09:02:bc:ab:12:9e:eb:ef:10:6e:73:05:c2:dd:bd: b5:2b:88:13:ae:3b:a3:95:3c:ff:00:14:8c:c2:32:5d Fingerprint (SHA-256): B9:04:E3:C9:8B:0D:98:01:74:DB:C9:88:C6:78:25:E4:04:F7:62:53:58:26:DC:27:6F:77:CD:A3:07:9C:0A:CE Fingerprint (SHA1): 22:3C:62:1E:33:45:37:13:DF:BD:F2:2D:9A:A8:AD:86:55:63:C1:4C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #1809: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204297 (0x374403c9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 20:52:11 2022 Not After : Tue Sep 27 20:52:11 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:d7:70:fa:c4:38:8a:34:f1:5d:f2:ae:2e:4e:fc:17: 21:b8:1d:df:39:ca:6e:87:45:f7:16:4f:70:52:42:0f: b0:5e:b4:9a:f9:73:f6:17:d8:f8:d9:19:64:db:1e:49: 55:f2:b0:55:b7:3e:19:70:89:43:47:12:c9:f5:0a:c0: 1e:88:a4:ba:1f:68:91:62:c5:c8:01:15:ab:1a:fe:f3: d5:d6:5d:2f:dc:8f:e3:71:90:ff:12:c0:37:2e:32:0d: ee:9f:b2:1b:96:16:a0:82:92:61:de:c9:d6:a6:e5:e7: b8:70:07:66:59:e0:93:3c:4d:8c:78:a3:cc:75:e2:ee: e0:4c:94:eb:5e:ee:27:d8:49:45:76:60:35:44:ed:8e: dc:31:4c:32:b5:33:a1:6e:15:7c:8b:19:14:64:43:12: 25:58:9c:5c:56:0f:fd:86:54:b3:98:04:52:81:4e:7c: 2b:c9:81:9f:8b:ac:c6:35:e1:4e:3e:40:08:b6:23:ec: 6b:3a:77:97:f8:39:d5:dc:65:4b:dc:26:8c:d5:35:0b: e3:f4:d0:3e:0f:c2:af:76:23:be:b0:50:73:98:fb:04: c7:5d:14:62:1b:a1:10:41:c6:b2:c1:2f:fe:10:52:ba: 21:69:a4:39:7f:d2:a0:00:53:14:27:b8:c3:13:2b:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: af:24:ba:a6:ab:30:66:3b:c7:6a:9b:a4:31:b9:f2:55: 61:89:c2:ec:2f:4f:19:24:3b:93:6e:28:cf:76:1a:bd: 9d:f2:e0:69:53:cf:5e:0c:5d:8a:c6:ef:c4:37:70:24: e7:2f:49:89:66:18:c8:cd:c4:15:49:47:34:b7:4c:92: 76:a8:b1:24:08:4c:1a:e4:bc:46:2d:5f:82:58:3e:db: e5:1d:56:b8:3d:ac:ed:c1:f3:73:41:e1:f6:35:4f:17: cd:54:2a:de:8e:5c:dc:81:c4:98:b2:c7:85:0f:9f:db: ca:44:d9:de:eb:34:77:40:34:8a:84:3e:8a:5b:18:44: c2:ad:88:33:14:81:7a:4e:2c:43:21:a4:25:36:be:ce: 3b:fc:a5:5e:d9:d6:43:f3:1e:dd:ae:3c:dc:07:35:0c: 7b:7c:9a:f4:d6:b3:55:46:26:fa:dc:74:28:6e:31:3e: ff:fc:56:47:43:19:c6:90:dc:8a:ed:80:09:34:3c:74: 24:55:9a:ae:ef:b4:85:5f:b8:6e:d5:f6:df:40:a2:c6: 22:7d:89:42:d1:0d:0a:eb:94:91:86:83:e7:ef:2b:fa: f9:9b:f2:b0:c1:e7:d9:48:f6:da:7c:e3:84:10:f2:55: 54:ae:a2:6f:d5:89:13:87:3c:96:b6:4f:71:d9:f6:b4 Fingerprint (SHA-256): 11:B1:AE:6A:CC:74:A4:02:FB:1A:BF:6A:80:0E:15:8C:96:70:F0:B1:90:7F:02:23:C1:86:98:41:0B:DE:EE:DC Fingerprint (SHA1): BF:18:23:82:05:5A:DE:B9:76:D7:94:C6:31:7F:68:A2:CC:1C:69:9C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1810: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #1811: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1812: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1813: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1814: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1815: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927204302 (0x374403ce) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Tue Sep 27 20:52:18 2022 Not After : Mon Sep 27 20:52:18 2027 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:52:9b:c1:5e:43:65:c0:b4:4a:a6:d8:27:2c:2b:5a: 4a:c2:95:7d:fe:5a:5d:20:b1:10:64:82:bc:32:2f:ca: 08:1f:cc:25:b3:08:f3:33:bb:0f:40:1b:e5:0c:82:ff: 25:dd:3d:7f:e2:a5:59:4e:ea:51:ab:2f:76:6e:90:a6: be:ca:0a:cd:74:72:66:20:57:69:f2:1a:35:98:f4:06: 02:2e:f0:c3:9d:86:d8:64:0f:7c:fa:d7:0c:7e:24:20: 64:2b:a1:76:5e:83:2a:f5:2c:a5:5f:d6:28:cf:18:3a: f7:ab:f4:d7:ad:ab:c4:1f:56:64:f5:3e:09:94:9f:e8: c7:20:6a:ee:d8:02:aa:12:b8:c3:52:ac:eb:d7:ff:b3: 2e:01:d7:b5:8f:14:83:81:ec:85:5b:56:10:70:86:a7: 20:9d:56:43:08:65:f8:f6:e2:e9:8c:2c:cd:a7:fd:d1: f1:cb:f7:2e:ca:47:f2:02:47:11:69:fc:6f:8d:77:0d: dd:15:cc:ae:4f:d1:0a:4f:fb:96:f0:26:2f:ad:e7:91: d5:57:98:e4:10:12:4f:4f:c2:ac:4c:76:8b:58:a1:a1: 72:b4:38:d5:cb:fb:0b:4e:aa:a0:52:fc:83:de:b7:3a: df:ea:a9:f7:65:4d:1f:37:e2:c9:1e:3b:ea:ed:34:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:f4:16:61:d6:29:c3:af:b5:10:ec:7f:30:2b:11:56: eb:74:6c:9a:c6:22:45:66:e8:93:62:5b:b3:c3:4f:f3: 91:3c:48:c8:37:b3:f4:8b:57:44:0c:a0:94:68:95:74: f2:df:2d:bb:de:a0:10:7c:c1:cf:f0:2a:52:17:1c:ba: 94:98:da:f6:c2:bb:19:72:6e:59:10:02:bc:53:61:50: f0:54:4a:6e:c7:5d:93:d9:30:17:5a:09:0f:a9:6a:46: fb:ae:ec:60:e5:a2:6e:2f:47:41:f7:4b:26:e7:a3:3c: 51:4a:8f:cc:04:ba:d4:60:1d:30:ba:98:ee:68:96:14: 5b:34:51:95:76:df:12:e8:b7:8d:6a:13:5c:e2:e5:cb: fc:e0:6b:73:1f:b4:da:9c:2e:9d:8c:97:fb:3d:f2:8a: 86:b9:87:11:99:a0:94:54:1a:1b:a9:65:6a:1c:8c:7c: c2:e1:b2:81:7e:ce:76:99:d0:95:3b:28:b7:d5:7f:6c: f3:97:b1:03:23:13:b7:c7:7d:57:8a:a3:0e:89:9d:75: b6:06:ff:79:45:c6:96:07:c5:3c:64:df:16:dc:de:25: 0a:0f:3c:00:ba:67:4c:33:c5:8e:33:9f:5c:a4:9e:65: 9d:41:f7:e6:07:6e:f2:90:d3:6b:d6:37:e0:5a:6d:c4 Fingerprint (SHA-256): 99:B0:A1:C4:C8:EB:89:44:62:48:52:48:EB:9E:27:FA:0E:85:54:59:DF:67:2E:2D:23:C7:F8:FA:1E:44:A9:18 Fingerprint (SHA1): 1B:5C:FE:8F:EC:C1:4B:26:D7:63:70:01:59:F5:E2:F9:79:B4:5F:E5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1816: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1817: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1818: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1819: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1820: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1821: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1822: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1823: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1824: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1825: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1826: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1827: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1828: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1829: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1830: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1831: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1832: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1833: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1834: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1835: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1836: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1837: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1838: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1839: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1840: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1841: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 44735 at Tue Sep 27 20:52:32 UTC 2022 kill -USR1 44735 httpserv: normal termination httpserv -b -p 9233 2>/dev/null; httpserv with PID 44735 killed at Tue Sep 27 20:52:33 UTC 2022 TIMESTAMP chains END: Tue Sep 27 20:52:33 UTC 2022 Running tests for ec TIMESTAMP ec BEGIN: Tue Sep 27 20:52:33 UTC 2022 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Tue Sep 27 20:52:33 UTC 2022 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #1: ec(perf) test - PASSED TIMESTAMP ecperf END: Tue Sep 27 20:52:33 UTC 2022 Running ec tests for ectest TIMESTAMP ectest BEGIN: Tue Sep 27 20:52:33 UTC 2022 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test curve25519 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #1: ec test certutil keygen - curve25519 - PASSED Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #2: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #3: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #5: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #6: pk11 ec tests - PASSED TIMESTAMP ectest END: Tue Sep 27 20:52:35 UTC 2022 TIMESTAMP ec END: Tue Sep 27 20:52:35 UTC 2022 ec.sh: Testing with PKIX =============================== Running tests for libpkix TIMESTAMP libpkix BEGIN: Tue Sep 27 20:52:35 UTC 2022 TIMESTAMP libpkix END: Tue Sep 27 20:52:35 UTC 2022 Running tests for cert TIMESTAMP cert BEGIN: Tue Sep 27 20:52:35 UTC 2022 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #79: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/serverCA-dsa.ca.cert cert.sh: #80: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #81: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #82: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/serverCA-ec.ca.cert cert.sh: #83: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #84: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #85: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #86: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #87: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw cert.sh: #88: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #89: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #90: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #91: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #92: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #93: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #94: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #95: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #96: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/serverCA-dsa.ca.cert cert.sh: #97: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #98: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #99: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #101: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #102: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA/serverCA-ec.ca.cert cert.sh: #104: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #105: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #106: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #107: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #108: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #109: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/clientCA-dsa.ca.cert cert.sh: #110: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #111: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #112: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #113: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #114: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/clientCA/clientCA-ec.ca.cert cert.sh: #116: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw cert.sh: #117: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #118: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA.ca.cert cert.sh: #119: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #120: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA-ec.ca.cert cert.sh: #121: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #123: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #126: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #128: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #129: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #130: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #131: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #132: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #133: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #134: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #135: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #136: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #137: Generate RSA-PSS Cert Request for TestUser - PASSED cert.sh: Sign TestUser's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30070 -v 60 -d ../CA -i req -o TestUser-rsa-pss.cert -f ../tests.pw cert.sh: #138: Sign TestUser's RSA-PSS Request - PASSED cert.sh: Import TestUser's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #139: Import TestUser's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #140: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #141: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA.ca.cert cert.sh: #142: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #143: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA-ec.ca.cert cert.sh: #144: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #149: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #152: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #155: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #158: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #160: Generate RSA-PSS Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30100 -v 60 -d ../CA -i req -o localhost.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #161: Sign localhost.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost.localdomain's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #163: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #164: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #165: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #166: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #167: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #168: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #169: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #170: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #171: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #172: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #173: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #174: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #176: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #177: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost-sni.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #178: Generate RSA-PSS Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #179: Sign localhost-sni.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost-sni.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #180: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost-sni.localdomain's RSA-PSS Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #181: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #182: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #183: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating database for strsclnt no login tests =============== cp -r /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/nologin cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -W -d ../nologin -f ../tests.pw -@ ../tests_empty Password changed successfully. cert.sh: #184: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -k ec -q nistp256 -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server Generating key. This may take a few moments... cert.sh: #185: Create orphan key in serverdir - PASSED cert.sh: Delete orphan key -------------------------- certutil -F -f ../tests.pw -k 686325259fdd752971b5a78e0edb1b3d9ea4aa6a -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server cert.sh: #186: Delete orphan key - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server Generating key. This may take a few moments... cert.sh: #187: Create orphan key in serverdir - PASSED cert.sh: Create cert request for orphan key -------------------------- certutil -R -f ../tests.pw -k e9847ad8f486ae70af1b326bff4140af07ad6aeb -s CN=orphan -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/orphan.req cert.sh: #188: Create cert request for orphan key - PASSED Certificate Request: Data: Version: 0 (0x0) Subject: "CN=orphan" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:f3:8e:97:eb:2f:35:9a:5c:a5:09:55:3d:9a:30:6d: 66:6c:4f:7c:e6:b7:39:93:c4:e6:ca:c4:c9:5a:19:10: f5:f6:7e:7f:f7:f1:fa:51:bb:e3:af:f9:de:51:7e:3c: e5:50:24:21:d0:1b:c1:31:f1:e2:88:75:38:62:9a:36: fe:2e:e6:a3:15:82:fc:49:ae:00:3a:23:c5:37:93:38: e3:aa:68:26:0e:43:75:c8:8f:26:0a:24:5b:d0:cb:8a: 14:01:11:be:37:c7:24:f4:0f:15:2c:45:88:c7:86:4e: 1e:c3:64:7f:04:e5:63:62:a8:d3:64:59:db:d2:d8:58: e3:1d:9e:e3:c4:d7:39:70:f1:fd:63:68:bf:96:ef:96: 7d:44:1b:a0:2f:dc:2d:fc:25:57:5b:0e:e7:7e:9e:19: 21:4b:cf:45:89:3a:f8:1e:1a:c6:d0:72:e8:a7:54:00: bd:fb:be:b6:b7:26:1c:3a:6e:4b:cd:7c:4e:fd:23:fb: 79:06:83:84:00:7f:13:dc:ad:12:82:a6:ac:30:3a:19: 5d:52:fb:29:8b:19:50:86:c0:ea:e3:94:a2:c1:5b:3f: fc:b9:19:46:56:a6:a7:c9:73:83:eb:c4:5b:09:a4:18: 10:cf:7b:f4:04:41:36:22:1b:a6:11:62:48:30:f7:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9b:00:a4:8f:25:5c:35:5f:b3:d2:36:37:7c:e5:04:66: 86:b8:94:dd:3c:8f:48:d7:5e:7e:ba:bd:8b:de:6b:95: b7:6f:02:af:57:ea:3d:39:eb:89:43:ea:d4:96:15:78: ad:99:76:43:e8:68:9c:0c:38:c7:29:25:6b:a3:21:cf: 1d:24:f5:b0:49:a4:b1:d0:91:9c:5a:89:eb:17:dd:18: c6:9d:1e:76:76:e2:48:e4:bb:26:c5:0f:9c:fc:45:8f: 95:06:3e:a7:64:96:6f:ed:38:e6:26:1d:03:86:ec:e6: f8:34:33:f1:9a:de:26:06:0a:db:71:0b:6b:34:68:20: c9:fc:3d:c2:68:68:5b:af:37:ab:07:5b:57:04:7b:c4: 95:82:3c:96:ec:b1:f0:7b:7e:a8:e4:19:cb:97:1c:b8: 07:b3:46:31:3f:04:f0:45:bd:6d:c6:9f:33:91:58:a7: b0:c9:c1:3f:74:61:b0:9f:5b:40:8e:91:dd:d7:c1:2d: 08:65:c3:06:93:87:51:a1:03:0b:20:42:cd:50:8c:c1: 96:58:4d:ea:6c:74:60:33:75:ae:7f:37:31:77:84:4f: 96:58:14:ab:c4:47:23:47:9e:56:92:88:22:e8:ea:43: 99:eb:5b:4b:13:7e:28:dc:87:2b:61:6f:4a:8b:ae:f3 Fingerprint (SHA-256): A5:5E:01:52:B4:42:F0:22:6A:1B:4B:1B:22:BB:8B:7F:35:C4:8D:17:A9:AB:0E:5D:3B:76:AC:11:57:95:8F:FC Fingerprint (SHA1): 32:43:1A:6C:37:BE:81:E8:CC:E9:4C:7D:EF:A9:E8:C3:41:B0:4D:FC cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw cert.sh: #189: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #195: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #198: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #204: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created Importing RSA-PSS server certificate Import Alice's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #209: Generate RSA-PSS Cert Request for Alice - PASSED cert.sh: Sign Alice's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30030 -v 60 -d ../CA -i req -o Alice-rsa-pss.cert -f ../tests.pw cert.sh: #210: Sign Alice's RSA-PSS Request - PASSED cert.sh: Import Alice's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Alice-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #211: Import Alice's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Alice's RSA-PSS Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw cert.sh: #212: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #213: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA.ca.cert cert.sh: #214: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #215: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #216: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #218: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #221: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #224: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #227: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #229: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #230: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #231: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created Importing RSA-PSS server certificate Import Bob's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #232: Generate RSA-PSS Cert Request for Bob - PASSED cert.sh: Sign Bob's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o Bob-rsa-pss.cert -f ../tests.pw cert.sh: #233: Sign Bob's RSA-PSS Request - PASSED cert.sh: Import Bob's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Bob-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #234: Import Bob's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Bob's RSA-PSS Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw cert.sh: #235: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #236: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA.ca.cert cert.sh: #237: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #238: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #239: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #241: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #244: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #247: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #249: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #250: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #251: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #252: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #253: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #254: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created Importing RSA-PSS server certificate Import Dave's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #255: Generate RSA-PSS Cert Request for Dave - PASSED cert.sh: Sign Dave's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o Dave-rsa-pss.cert -f ../tests.pw cert.sh: #256: Sign Dave's RSA-PSS Request - PASSED cert.sh: Import Dave's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Dave-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Import Dave's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Dave's RSA-PSS Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw cert.sh: #258: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA.ca.cert cert.sh: #260: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #261: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #262: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #263: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #264: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #265: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #266: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #267: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #268: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #269: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #270: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #271: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #272: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #273: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #274: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #276: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created Importing RSA-PSS server certificate Import Eve's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #278: Generate RSA-PSS Cert Request for Eve - PASSED cert.sh: Sign Eve's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30060 -v 60 -d ../CA -i req -o Eve-rsa-pss.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #279: Sign Eve's RSA-PSS Request - PASSED cert.sh: Import Eve's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Eve-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import Eve's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Eve's RSA-PSS Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #281: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #282: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #283: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #284: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #285: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #286: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #287: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #288: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw cert.sh: #289: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #290: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #291: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Setting invalid database password in FIPS mode -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw -@ ../tests.fipsbadpw Failed to change password. certutil: Could not set password for the slot: SEC_ERROR_INVALID_PASSWORD: Password entered is invalid. Please pick a different one. cert.sh: #292: Setting invalid database password in FIPS mode - PASSED cert.sh: Attempt to generate a key with exponent of 3 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 3 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #293: Attempt to generate a key with exponent of 3 (too small) - PASSED cert.sh: Attempt to generate a key with exponent of 17 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 17 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #294: Attempt to generate a key with exponent of 17 (too small) - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@example.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #295: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw cert.sh: #296: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #297: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #298: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #299: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #300: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #301: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #302: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #303: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #304: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #305: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #306: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #307: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw cert.sh: #308: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #309: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #310: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #311: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #312: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #313: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #314: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #315: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #316: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #317: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #318: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #319: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #320: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #321: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #322: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #323: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #324: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #325: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #326: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #327: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created Importing RSA-PSS server certificate Import TestExt's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #328: Generate RSA-PSS Cert Request for TestExt - PASSED cert.sh: Sign TestExt's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30090 -v 60 -d ../CA -i req -o TestExt-rsa-pss.cert -f ../tests.pw cert.sh: #329: Sign TestExt's RSA-PSS Request - PASSED cert.sh: Import TestExt's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestExt-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #330: Import TestExt's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestExt's RSA-PSS Cert Created certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:db:33 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Sep 27 20:54:30 2022 Not After : Tue Dec 27 20:54:30 2022 Subject: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:72:8e:5e:a4:09:0d:54:1b:21:77:d3:b4:d9:b4:02: f4:83:53:2e:30:41:43:9a:c4:ab:66:67:39:da:03:47: 38:85:6c:ee:cc:f9:0c:65:4c:3a:dd:78:1c:0c:b0:87: f9:5e:de:1c:52:ab:52:e3:f0:43:c7:ba:fc:f4:1d:3a: 6e:98:4f:7c:cb:36:b6:ac:71:a6:71:35:5e:d3:29:d4: 2b:e6:e9:bc:a7:92:2e:7c:f0:ff:f8:b6:4a:77:7b:b3: 0a:d5:c4:3c:6b:89:52:2a:72:9b:e5:63:08:b7:d7:8a: af:49:22:be:d5:23:fd:13:40:50:0d:87:4b:06:46:03: 9f:5a:52:57:e2:43:3b:f4:a4:90:a6:44:71:73:34:ab: bb:fc:98:2e:ef:8b:f3:4f:46:ea:83:88:f7:c9:a3:cb: b6:d8:52:94:75:cd:92:fb:e5:b7:bc:f9:16:5e:13:a8: be:00:ce:7e:ce:c5:f9:09:99:f3:a8:b5:22:20:de:a1: 6e:6f:f1:4d:cd:2b:6f:94:ff:87:37:21:8b:bf:e4:eb: ed:2d:0c:30:a3:aa:78:61:e3:a8:9c:1a:99:45:95:4f: 4d:92:aa:ff:0e:91:51:48:1c:be:0b:0a:08:4c:6d:a2: 7b:77:0e:fe:5c:a0:11:9d:c5:01:41:a6:8b:f2:61:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:d8:59:53:04:71:b8:90:e5:ea:18:0a:c8:83:19:ae: 50:61:d6:15:6b:c5:96:4f:d3:93:b5:56:fc:bb:f0:65: 70:6b:8e:a0:9c:c2:7d:42:6c:db:bf:b4:1a:8f:3a:e1: 11:1b:0c:c9:e9:13:1a:cd:c4:29:38:cc:18:ac:5f:e9: ad:ef:f2:d4:11:1d:b8:07:4d:1b:ac:ab:5a:5e:6c:5b: 55:73:69:b6:e9:b4:69:3d:2d:37:29:b4:7b:52:10:41: 6f:3c:50:55:81:1c:86:7d:21:80:f2:0e:92:58:04:c8: 6b:fb:a9:82:45:89:38:47:8a:73:a5:d4:76:88:91:69: 95:f0:78:e5:90:52:24:16:31:4a:7e:f4:5a:ff:c7:a9: 4a:c0:ac:be:8e:e7:4a:ce:5e:ec:50:58:e2:c0:89:69: 22:fa:ac:64:32:48:5c:28:19:80:8d:33:28:76:1c:67: ea:89:e5:ed:40:ad:d0:e5:aa:a5:9d:d1:3a:55:37:c0: 0b:d2:e4:36:5e:0c:0c:b7:a9:29:40:8a:9f:e2:84:25: 7b:72:20:41:b6:37:9a:68:22:55:a3:fe:66:5a:42:4f: d4:03:93:ac:21:8b:45:b1:2d:f4:60:31:50:ce:70:2e: d7:02:e2:89:f3:03:21:01:39:d7:ce:c5:29:b5:7a:82 Fingerprint (SHA-256): 18:90:17:2B:1B:9D:27:16:77:C0:58:A8:7E:53:33:12:50:C9:21:CA:8F:A5:FC:83:B3:E3:CA:6D:40:E4:C6:5E Fingerprint (SHA1): 41:28:8A:01:2C:46:90:18:F1:82:99:27:00:62:4C:E4:31:18:4F:B6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #331: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:db:38 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Sep 27 20:54:32 2022 Not After : Tue Dec 27 20:54:32 2022 Subject: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:77:54:dd:d0:14:41:cf:34:73:be:99:33:9b:e2:a4: 4f:3f:e2:65:51:fe:40:4e:5c:1a:55:07:92:d8:6e:ca: 28:0c:89:b8:28:bf:d8:b0:4f:78:a7:f5:e2:ac:9d:24: 88:52:54:4b:02:af:5f:93:f4:e4:75:fb:17:fa:e5:61: b8:73:83:fe:fe:62:88:c3:54:a0:42:7b:9c:84:ae:60: 3b:6a:35:70:b2:06:e8:ba:fc:13:bb:cb:68:41:71:f8: 3e:a1:50:8a:36:c9:7c:1d:72:ea:67:86:ca:75:91:b9: d5:fb:4f:ad:b4:84:e7:32:24:a6:b6:c1:42:71:fb:87: 4c:3a:df:49:98:6c:1e:f8:14:a9:e4:1a:64:c4:da:a5: ec:1a:3c:f2:7d:03:a3:86:ed:4d:03:88:13:cf:25:90: 3f:9d:2c:6d:17:a3:7a:c5:be:f3:88:d4:7a:a0:89:90: 9b:9f:16:67:4c:fc:ef:7a:10:2b:ed:5f:15:eb:b2:d2: 8e:26:ea:ee:71:72:93:46:46:6a:49:54:03:f2:d5:a6: a1:af:15:21:48:56:ae:c4:19:5a:92:5f:44:7e:34:f3: ec:78:4b:a6:ad:de:93:2e:bf:17:00:bd:e4:54:20:31: 32:1b:7c:98:eb:c6:3f:22:59:bd:58:c5:25:a9:ec:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:d8:9a:de:d0:1e:ce:ab:a8:a5:2b:3e:72:88:55:77: c0:d5:cc:0b:da:f0:d9:57:6a:e4:c1:41:5d:15:4f:69: a2:3a:53:e9:18:2a:71:86:e8:dd:3e:22:17:28:45:bd: 30:55:f8:22:25:32:14:f0:20:94:e4:eb:58:8f:a3:19: bb:aa:e4:f4:57:8d:20:e8:ad:d9:de:23:1e:c8:e5:5d: 65:ec:7e:cc:72:dc:53:a6:ee:93:81:17:4a:7e:e1:85: 4d:1d:8e:3d:c4:7b:69:ed:45:49:74:57:42:82:02:ca: c9:13:a1:16:a6:1f:be:0f:c4:18:23:a6:92:49:64:60: 86:a6:a6:d5:83:74:72:d3:37:83:cc:63:fe:2c:c3:30: b1:08:95:a4:be:ae:be:13:0b:cb:c9:44:3d:f3:82:e3: 7a:0e:20:b1:b3:d7:2c:43:b6:c5:45:84:44:6f:26:51: 96:cc:c2:f0:1c:ea:c3:76:8d:4e:92:7e:48:cd:c8:b2: be:42:96:56:d3:b0:fb:b0:18:c3:e4:68:be:28:f4:63: c3:a8:32:57:0c:64:cd:71:b3:1d:48:a1:c0:a9:1a:be: a5:b8:8e:00:a5:d3:ae:a9:5c:91:f6:65:63:7d:2b:eb: a1:94:a1:95:ba:50:c8:be:22:66:6c:34:20:34:5b:25 Fingerprint (SHA-256): CA:2C:29:46:29:B9:BC:8C:7C:CD:C2:ED:86:B6:FE:F5:E2:8E:4D:0E:D1:B9:5B:7E:4B:F7:66:58:BC:B8:05:B9 Fingerprint (SHA1): A3:86:78:68:86:61:34:EC:9F:97:07:0E:43:84:A1:4C:B2:2E:B6:B8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #332: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:db:3c Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Sep 27 20:54:33 2022 Not After : Tue Dec 27 20:54:33 2022 Subject: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ff:21:6c:8d:02:2c:6b:bc:dc:82:68:de:e4:ca:68:37: 5e:09:56:1e:d1:c3:a3:ef:69:16:93:73:53:87:e3:b5: ec:61:03:1e:cb:45:2b:ad:eb:8f:0a:c1:3d:39:3b:9f: f9:82:4c:14:a8:9f:b7:87:a4:b5:34:cb:04:12:bc:cd: 94:10:64:57:7d:6c:77:03:3f:33:ee:d1:c6:c2:f7:80: c8:45:0d:b7:40:86:7b:a6:d5:6a:cb:48:95:38:2a:a3: 5b:4f:81:f8:be:84:43:39:cc:d5:b7:6d:3d:f2:56:84: 6a:43:72:b3:62:b7:39:63:c3:f2:b3:50:e2:14:ea:56: 4a:fd:b2:65:28:09:42:32:93:6d:46:17:f6:23:de:48: 8e:69:fe:42:d9:08:ac:95:5f:eb:53:63:46:35:76:a2: 45:3f:ea:1f:d8:8d:03:88:27:f2:cd:37:30:01:0b:cb: 94:e6:38:d6:e1:e8:16:2a:53:85:25:d6:c2:79:66:c5: 00:ca:67:73:2c:63:d8:57:1c:25:d9:ad:1b:50:e2:9c: 6c:14:db:f3:1d:1e:85:f9:05:97:ba:21:ea:ef:38:d1: 99:50:18:9f:21:4d:85:4f:48:d4:a7:eb:2d:fe:d5:10: e7:75:71:0d:f9:de:d7:20:34:cd:31:bf:6b:23:a2:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:65:99:23:34:96:c9:cd:59:ce:c2:9d:56:47:e2:4c: 1b:c6:b6:ac:4d:92:ff:12:2b:35:29:ee:b0:26:c4:25: ff:63:86:cb:14:72:0f:b2:7f:98:62:a3:b6:6f:72:87: 7b:2b:16:74:a8:a7:bb:dd:d8:7c:d4:02:7a:68:1c:d8: 0b:ea:04:71:c5:9e:26:8f:5e:63:cb:49:2e:09:39:06: be:cd:2e:f8:34:9b:4a:47:c2:a9:e5:dd:2d:59:49:e0: 90:be:92:c8:51:8c:54:96:52:37:68:e5:d8:05:10:ea: f3:fa:43:39:01:99:b1:83:4b:c7:a1:16:03:af:17:c0: 78:44:db:ab:93:d6:69:7d:58:7c:be:07:fe:81:d0:e4: c6:4d:c1:ac:36:9b:08:9e:69:d9:a7:88:a8:60:9f:aa: d3:9f:3b:79:28:b6:bf:74:28:08:b8:d9:32:19:85:ac: a6:09:db:ea:f5:4b:09:2e:9a:ae:34:d6:bd:cc:be:ae: f0:ef:1e:91:c4:18:9d:a3:af:26:11:5e:0c:48:e3:57: b1:4f:48:1a:67:64:df:8e:50:19:d6:79:80:2b:d6:fc: 7f:b5:fa:5c:3b:cd:fc:f8:d9:de:23:87:fc:c5:95:56: fc:1e:02:12:7b:83:74:31:0e:cb:f5:cf:5f:5a:6f:9e Fingerprint (SHA-256): F0:92:35:A6:F2:E9:B2:C9:76:E0:CC:5D:46:02:81:01:B5:C8:F3:4A:7D:92:1B:94:D1:CC:52:CA:27:04:58:BF Fingerprint (SHA1): F5:94:3E:13:08:25:11:11:AA:76:9E:C0:C2:7D:1C:1C:BC:08:CC:A7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #333: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:db:3e Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Sep 27 20:54:34 2022 Not After : Tue Dec 27 20:54:34 2022 Subject: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:62:a4:f7:0c:df:21:ee:b5:81:cd:c2:8d:a6:bf:b9: 4e:85:9b:4e:a8:df:7a:b7:36:4a:41:47:70:0a:20:32: 66:17:dd:78:02:69:f9:2a:e7:c6:0d:29:6b:9e:12:e3: e6:cf:00:e0:6f:59:14:9d:3d:93:59:15:bf:47:af:a4: 8e:82:76:08:74:00:18:ff:cd:fe:15:9f:1d:53:81:3a: 83:1e:ab:6e:71:84:05:d9:60:2a:54:10:9b:5a:c1:8d: 6b:89:16:1c:cc:03:d4:84:d2:e1:9c:99:86:95:fd:7a: a6:d7:af:93:25:58:a8:5b:82:a0:a1:b8:62:80:ae:4c: 19:36:b0:95:81:63:a2:46:0e:75:10:14:74:61:a5:68: 33:da:8a:8f:02:c2:69:c5:26:7a:67:32:ff:6a:f5:56: e7:61:cf:ce:4a:42:42:f0:0d:3a:5e:15:c5:42:4d:5e: 5f:3d:63:77:26:1c:f9:da:87:29:ea:e6:1d:be:31:8c: d8:e1:7f:d8:07:73:f7:f9:cf:9a:3c:50:41:d3:d9:8c: 38:58:7a:5a:9e:c6:d2:4c:90:c8:52:3f:93:d9:83:91: dc:fb:fc:cf:60:3b:c6:1b:74:ac:03:9e:0e:5d:84:3b: b1:0a:8f:2e:1f:3a:76:91:40:a5:c6:7d:a6:d0:bd:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:dd:1a:e4:6d:94:da:1e:64:18:34:b4:78:22:47:63: c1:ad:b2:1c:7f:d6:65:a7:70:78:84:0b:f1:96:ce:fb: 07:65:f4:79:48:be:00:ee:8d:fa:e2:e0:c5:14:c6:ab: 03:a3:a4:93:6c:51:a5:25:0a:10:97:f4:62:ec:3a:2b: ec:45:ff:89:31:2c:53:83:2e:2f:8a:5d:de:58:e3:ed: 1b:29:d8:6a:bb:7f:7d:37:8d:35:0f:64:35:0d:5f:67: 9d:c0:8b:f4:07:e2:3b:be:36:ca:b5:1a:d4:45:a5:93: 44:32:1b:2c:2d:5e:7f:d4:9b:84:fd:2e:ba:18:dd:4f: b2:30:5c:d4:4e:3e:b0:93:e6:3f:69:88:bf:a8:44:59: 71:16:80:6b:c4:7d:c6:fd:a2:b6:8e:20:c9:4b:cf:78: 41:69:bc:eb:6b:65:67:19:d3:0f:22:6f:9a:67:55:58: cf:fe:e1:92:d9:87:30:05:65:e0:85:fc:7b:a7:23:81: 3d:a6:5a:31:56:26:aa:83:0f:c8:20:2f:58:dc:8e:66: ef:07:a3:e4:6e:7b:9d:30:1f:73:b0:66:57:b7:3c:9f: 79:78:f9:27:94:18:0c:80:80:e4:95:ff:db:f3:86:00: c7:28:0a:33:cf:c3:1c:7a:a3:5e:70:41:9b:e4:db:ce Fingerprint (SHA-256): FB:FE:1B:86:55:21:D2:21:58:03:F8:48:FE:31:A1:8A:8D:4F:0C:B5:1E:06:F9:E9:EE:C9:38:E2:84:35:21:74 Fingerprint (SHA1): D7:A8:14:76:20:69:A6:4F:30:AF:F6:6E:EA:C6:91:9C:FC:D0:13:A2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #334: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:db:40 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Sep 27 20:54:35 2022 Not After : Tue Dec 27 20:54:35 2022 Subject: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:ca:17:25:97:dc:8d:66:27:82:7a:da:52:7f:95:8d: 84:a3:e9:2c:0d:91:69:7d:9e:2e:72:d9:84:09:de:8e: 45:ed:6c:06:e0:26:4a:ab:ef:97:d9:9f:33:59:b4:d9: f8:78:bb:35:0d:b9:4b:46:23:c1:f6:09:d3:b3:d1:26: 7c:c1:f5:35:94:f6:db:ce:63:e7:4e:d9:e4:58:70:07: ab:65:a4:6a:86:1f:76:96:c4:23:1f:52:78:6c:66:8d: 95:e0:3e:73:6a:ef:62:90:2f:e5:ff:59:5c:f1:1d:25: 17:1f:8e:d0:3b:0b:da:e8:39:48:cd:9c:14:e9:5a:99: e6:8f:dd:85:a9:74:e3:2c:2a:de:b6:fd:e3:e9:2a:1b: 79:ae:b5:5a:e6:42:72:f2:c1:84:a9:74:2f:75:c6:41: f3:01:13:c8:da:2e:4f:38:38:ac:6e:3a:22:1c:80:e1: fb:e6:0d:16:aa:7b:2a:b4:f4:9b:94:ea:2b:67:a2:fa: 80:49:4b:db:b7:12:9e:34:79:df:7f:da:ef:fd:70:c5: 6b:86:06:38:bf:f2:64:cd:53:c4:f0:cf:81:da:7b:25: 39:84:94:a4:c6:ba:99:28:6f:b3:43:24:aa:f8:4f:9e: b2:56:ba:89:90:17:3e:e6:b1:2a:82:c5:83:0e:e4:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7c:f6:1c:58:a9:d7:49:6d:28:fb:a0:11:41:f0:69:28: e3:82:f5:7b:b1:1d:b7:3b:24:77:a5:28:7e:de:ff:0a: bd:dc:90:11:eb:c5:ee:09:3c:f0:d7:8b:2a:66:9c:23: 22:ca:61:c3:88:98:4a:74:33:8c:2b:b0:80:77:52:cf: a1:17:f1:6a:58:f1:0d:d6:82:fc:a1:03:ac:36:b8:e4: d2:0f:fc:d8:be:6e:79:56:9e:42:85:64:84:46:cd:d3: 68:5e:50:97:c6:f9:89:7e:3b:9e:63:fd:a9:d7:39:78: 5e:a2:58:bf:b0:bb:19:b5:f2:07:61:a1:99:57:da:7f: fb:4e:73:2a:fe:d1:15:1f:66:82:0e:7c:e5:ed:65:a5: a4:a7:12:fc:a5:81:e2:ea:6d:f3:3c:6c:33:e7:6c:a9: 53:93:77:45:df:81:31:f4:9d:ca:39:33:3a:a3:7f:c7: 01:c4:b4:32:e5:11:29:1a:98:6a:49:0a:00:8c:5f:02: 99:65:55:a7:50:76:76:34:74:48:af:36:c3:dc:f3:7e: 37:1e:1d:27:c6:99:2d:fd:b5:6d:d8:40:cf:d4:5b:0e: fb:5f:f2:9e:d3:14:05:b2:ec:ff:fd:17:75:e2:e8:9e: ae:3f:95:5b:f8:b5:40:aa:34:93:f6:17:d1:86:0c:6e Fingerprint (SHA-256): 45:3E:3F:EE:77:22:81:2B:5E:CB:09:F0:08:DA:F8:AC:88:3B:18:A9:43:76:32:6E:9B:E6:41:43:C3:58:C1:56 Fingerprint (SHA1): 7A:6A:05:86:34:3E:59:81:5C:27:35:F2:B2:4B:EC:78:A2:F3:56:3E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #335: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:db:43 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Sep 27 20:54:37 2022 Not After : Tue Dec 27 20:54:37 2022 Subject: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:01:aa:6c:9f:5b:1a:84:be:0f:c7:7c:39:d8:36:ce: 33:0b:35:00:cd:e1:86:a3:19:91:e9:ad:67:67:71:a6: 7d:fa:6f:20:51:8c:bf:2d:d6:fd:6b:e1:c6:b4:1d:5d: 3a:6b:16:07:80:7f:cb:20:a5:3a:73:f1:cb:4c:f8:df: 3d:b9:dd:aa:66:d5:a9:cb:51:fe:a1:7a:96:65:db:06: 84:92:f3:d4:0c:f6:35:06:ed:96:23:66:46:3f:68:5e: 38:c5:1a:ee:fe:1d:65:70:3b:41:bf:c1:00:74:9c:39: 16:6b:39:17:bd:85:c4:0a:9f:f8:68:26:c2:62:35:18: 27:8f:e0:32:95:20:12:fc:fb:23:11:18:7f:6c:eb:0f: a2:d8:fd:b8:c1:82:e0:61:a0:8f:f8:8a:89:a6:c5:69: 86:88:78:fb:ed:74:72:91:a0:a2:50:41:6a:86:d3:3a: 9d:79:be:88:8f:54:7b:09:5f:c0:c2:e0:ca:1a:cc:fa: af:49:9d:ce:c1:5d:42:54:87:72:5b:ea:60:6a:ec:4b: 0f:1a:d9:10:52:e6:d0:3a:52:9e:11:d5:cf:4e:2d:a7: 71:11:9f:9d:20:87:50:31:39:0f:fe:62:ee:66:f6:99: 39:e0:4a:e9:a9:6d:37:71:7c:92:29:d4:3d:4e:b3:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:d5:b3:86:01:25:17:0a:09:2a:d2:66:98:c4:57:b8: f1:d8:07:20:bd:c8:48:f0:fb:be:b8:f8:70:b5:c8:93: 46:df:ec:f0:b9:a2:14:ae:fd:7b:b1:20:f0:1f:12:82: 76:6e:27:fc:d6:0a:64:e8:e8:f0:98:2b:0c:d4:e5:31: 20:b9:c9:0c:aa:d0:8a:72:ef:4c:df:e8:bd:f9:1b:7f: a1:66:40:a0:6d:4f:6e:1b:07:27:10:78:66:c4:75:d0: f5:f4:21:aa:54:97:29:1a:fa:91:69:d0:dc:1d:d7:8a: 0e:2e:cd:bf:3d:21:eb:18:3e:56:d6:61:96:7b:24:2a: cb:75:02:58:7e:4f:a9:26:ff:64:f1:9d:69:7c:4a:fa: bb:87:e3:3c:53:84:a4:e7:f0:cd:0d:a2:16:93:d7:14: 51:b4:f0:37:ba:0d:14:6c:c1:0a:43:e7:b8:9a:f9:49: b3:40:5c:6f:4e:ab:a6:86:38:14:2a:e4:f0:a8:4a:35: 64:77:74:a7:37:f0:ea:0e:5f:a4:b5:dd:6c:84:7d:69: 07:92:11:e8:f2:48:b8:48:9c:a8:45:43:60:5c:e3:8a: f1:b5:85:3f:05:97:aa:89:4e:83:03:4f:17:f0:c5:4e: 72:3d:2a:46:59:d7:e6:f1:23:a6:da:0d:7e:be:c9:6f Fingerprint (SHA-256): EC:91:CE:65:00:11:BA:3C:A2:29:F3:72:D5:3A:AB:D6:60:80:52:30:9A:F7:68:39:29:1B:00:F1:A4:E2:68:06 Fingerprint (SHA1): D7:CC:96:F0:A3:DC:A8:33:85:29:AF:88:9C:20:97:1B:2C:9B:73:B6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #336: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:db:47 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Sep 27 20:54:39 2022 Not After : Tue Dec 27 20:54:39 2022 Subject: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:94:99:c6:36:b0:78:19:8a:f4:e7:ed:bf:7b:22:72: c6:fc:ef:d8:4d:ea:b6:eb:46:11:f9:f1:18:47:18:3e: 59:d3:9c:2c:bb:fd:5e:14:c2:fb:e6:87:96:85:c1:de: 8c:bf:be:02:41:74:66:b5:d1:a6:30:7d:9f:cf:06:b9: fe:6d:2c:df:f5:98:40:70:8b:1d:7b:a5:a8:40:51:69: 2e:51:2d:08:f4:87:37:60:2a:70:f1:8d:3b:c3:03:8c: fb:31:f7:16:c8:ff:c6:8b:f8:ff:30:08:80:d8:39:db: b5:85:1f:1c:99:a4:c6:49:e5:8d:c6:bf:04:ad:31:a3: a0:d1:ed:75:5e:2c:83:f7:71:0a:5b:24:a0:37:1b:ec: d1:ce:6f:c8:ae:e7:ab:d5:54:30:a6:c7:b5:3a:ea:d6: 34:3c:a5:7a:b9:89:8e:82:c2:bf:f2:bd:c6:4b:7c:1d: bf:5d:0e:3c:7a:4b:bd:16:de:be:7b:6b:bf:c3:ca:6e: 88:31:fc:76:c4:7b:16:e0:bd:fe:ce:2b:2a:33:25:fa: ec:41:08:70:72:f1:f6:ef:11:2d:f9:dd:11:34:8e:d9: a6:43:aa:7b:bf:73:26:3c:70:4e:60:d5:5a:2f:b3:f1: 57:96:ab:11:a2:7d:fb:f3:a3:69:a6:91:fb:d0:3c:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:ea:7c:23:07:22:aa:f4:82:e6:4e:b5:03:7b:2d:04: 89:6d:02:d7:39:b0:06:69:93:24:91:92:8e:e6:02:52: 2c:4e:86:16:ad:bc:96:5d:4c:42:8c:24:99:a0:a6:77: 81:16:8c:0f:51:c7:b5:04:85:db:36:b7:7c:75:b9:35: 75:83:10:df:a2:24:b8:94:b3:7a:f4:54:31:da:3e:f1: d7:40:11:34:00:2f:29:1a:bd:ff:de:57:6f:ea:84:ce: eb:80:ba:dc:2c:2b:14:c6:be:fc:f4:2c:6d:6b:db:35: e7:98:ec:2d:ac:5f:57:b3:24:32:fe:e7:60:1f:9c:1d: 15:8e:89:24:e8:9c:c1:dc:c1:b5:ca:ab:57:74:78:f3: 40:61:7d:a8:29:10:8c:8c:6f:13:72:60:f8:64:db:9b: bd:4c:8c:0c:b2:b2:75:73:5f:de:49:b3:94:68:63:ab: a4:7b:eb:c2:11:fe:94:0b:2b:67:20:2b:1f:0d:3b:de: 9a:b3:c9:ca:3b:81:c1:18:c2:4e:8c:0e:24:80:f8:53: 70:cf:9a:67:ed:88:df:26:ec:30:ff:05:d3:75:da:da: b3:6d:9a:6e:45:d5:b9:13:bb:b9:20:5c:20:e8:da:e2: 2e:de:49:7f:cb:6d:e6:4a:3d:00:95:45:d8:ee:fb:65 Fingerprint (SHA-256): 7D:3F:60:36:AD:D9:0A:42:DD:1B:91:29:4F:B8:E2:45:AA:17:38:74:E8:69:8F:A3:B7:46:2E:23:8F:18:4C:24 Fingerprint (SHA1): 7C:17:48:A7:77:94:EE:0F:5C:E0:F3:8F:33:4B:4E:74:0B:C8:9B:40 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #337: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:db:4a Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Sep 27 20:54:40 2022 Not After : Tue Dec 27 20:54:40 2022 Subject: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:bd:bc:51:7d:f7:c1:d4:c4:12:b2:fb:1a:2d:d1:65: 3b:fd:7f:c0:7b:19:7f:c8:f8:62:d9:7f:ed:3d:25:b5: f6:5d:18:63:28:ed:e4:79:ab:5d:ed:5e:70:bc:37:7d: 69:2a:51:0c:96:89:50:1f:9c:44:a8:8f:2d:1a:a4:1e: 63:d1:12:49:a1:42:38:89:91:28:0c:c8:e4:39:44:03: 88:ac:79:fa:c4:1a:21:b5:3d:67:7d:9a:8f:f6:4a:b0: 74:02:2a:83:74:f3:aa:1b:75:dd:4e:b5:b6:ec:3b:1e: a1:47:41:bb:e4:d9:51:ea:b9:f0:25:7a:68:84:b4:96: 66:df:27:67:38:84:45:56:7c:e1:4e:16:c7:f4:84:c5: 3c:e2:eb:c8:b5:35:64:95:47:14:82:c3:97:4d:16:7d: d0:68:7a:53:8c:4f:e4:5f:b6:49:d4:50:dd:9b:52:e4: f9:aa:af:57:8b:22:1d:8a:4d:bc:6c:eb:5d:62:34:e0: cc:cd:20:a8:c1:8f:da:2f:c3:1c:8e:e7:a7:b2:19:d8: bd:09:14:e1:a4:b1:a7:0d:68:70:e1:f0:47:dc:96:ac: bf:8d:60:85:19:68:ec:cf:ae:c0:11:3e:9b:9b:57:b6: 02:92:3f:d2:ca:c8:e7:a0:75:5a:d2:7d:90:dc:e3:65 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:b5:1b:12:cf:bc:06:8b:22:f8:9a:dd:5d:d0:11:c9: 5a:ca:bb:b7:f6:67:72:4e:f3:69:2a:37:7d:06:e3:ac: b4:48:b3:5e:74:83:c4:67:92:5e:f6:8b:4e:76:bb:51: 5e:81:df:c4:a5:22:e4:dc:0a:53:1e:32:ee:85:ff:da: cf:de:f9:f5:a3:82:a5:16:e8:5a:0b:ba:7e:95:30:ec: c0:d0:ab:d3:62:fc:7d:5a:5e:e3:50:71:68:e5:50:17: 1c:0c:eb:86:13:b1:84:68:56:68:cf:64:a7:be:11:e7: 11:90:f2:95:d8:7a:fe:e5:5f:95:e0:0b:4e:81:8c:07: e6:a8:59:83:1b:4a:4f:2d:d6:47:8c:00:7f:e2:b3:89: 13:3d:39:79:f6:b0:c9:a4:e8:cd:e6:84:ce:5f:5b:fc: 55:9c:5c:51:ff:25:a6:da:9a:74:bb:c9:21:d4:1b:4a: 7e:61:38:64:04:5b:19:b5:29:81:9e:0c:58:ef:78:5b: b4:39:7c:71:2f:03:94:b3:28:79:a2:fa:b5:d3:6d:76: 68:bc:08:c7:a7:c9:40:49:3e:dd:81:8d:33:a2:22:9d: d6:fa:7d:a8:ee:85:b5:a2:39:7f:9a:66:f9:2f:32:d1: 5a:3d:91:b3:4f:9b:8c:0b:93:6f:eb:a4:99:ab:44:a1 Fingerprint (SHA-256): D3:F5:2B:A0:5C:FF:28:B0:60:DF:21:23:74:1A:71:A7:AC:78:C4:95:AF:F0:B4:C9:76:54:46:B1:5F:9B:9F:A8 Fingerprint (SHA1): 55:08:4D:0D:B6:38:73:0B:BF:55:28:9E:6C:AC:A8:3A:8E:71:90:F2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #338: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:db:4c Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Sep 27 20:54:41 2022 Not After : Tue Dec 27 20:54:41 2022 Subject: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:6f:3f:5f:d6:5c:c5:a5:af:b2:86:f9:e3:14:dd:e0: a9:ce:c9:cf:37:bd:2c:48:7d:e4:c1:7b:b6:68:10:b8: ff:38:f0:e4:ef:a5:54:53:5e:56:58:93:af:d1:c3:c6: 38:61:a1:d6:84:f4:ab:53:b9:26:23:58:f9:aa:1f:04: 8c:44:87:8c:d4:f0:68:89:41:00:ca:7d:00:7e:a4:35: 72:7c:f5:01:28:e6:b7:22:30:ad:17:ea:e9:e2:c9:e6: da:c1:e5:9d:0b:78:92:97:3e:c0:20:4d:de:25:db:df: 0e:c9:97:fb:7f:3b:c2:e5:b1:e7:ab:80:5a:4c:37:66: 31:d3:a5:49:73:b2:50:1f:9c:ec:d5:ef:20:95:07:c7: 28:75:d4:c4:c8:95:7c:b6:f3:1c:f6:14:14:93:aa:3f: 0b:02:55:04:a6:fa:d4:de:7c:27:ad:68:6e:60:eb:74: 05:48:c7:42:b6:85:25:d6:f3:30:d0:70:f9:39:0b:c4: 4e:54:36:7e:d0:b8:5a:8f:2e:98:94:cf:e5:92:24:a7: 4a:4e:63:32:77:15:10:f3:db:ed:89:60:9c:ac:4e:f0: 1d:ce:ad:d2:8d:7e:f1:9d:2d:8b:8c:c2:3f:21:8f:95: 70:68:82:10:08:8e:a2:e3:2e:3e:ec:36:09:fc:14:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6c:9e:8f:e1:b3:f3:ec:41:2e:5b:85:35:39:d2:64:a1: 81:91:ef:99:b2:fa:ce:72:de:eb:ed:12:21:e9:d3:3b: 55:35:3d:12:19:01:52:4f:53:0e:f0:e4:73:0d:b3:59: df:16:e5:c1:4b:9e:ed:8d:41:d1:d3:6c:c1:d6:c8:64: fd:99:76:ab:8a:99:55:09:fc:f2:5c:40:11:f0:a8:1e: 08:a9:af:03:21:1d:63:1b:70:ca:3a:dc:7c:de:64:3f: 4f:b7:f8:9a:83:6f:2c:aa:17:67:60:01:2d:e8:62:a5: 53:74:cd:a5:da:15:9f:8e:a9:20:3d:52:07:75:ba:45: 09:6f:5a:f6:04:01:13:93:1e:57:07:bf:8d:e5:a6:4a: 3e:90:7c:07:b4:7d:00:5c:37:10:4f:16:c7:20:bb:d1: 9f:38:a2:29:c6:ab:2d:0c:0b:38:36:56:c2:d8:02:e9: d9:0c:e3:9a:8c:a3:58:2e:fd:0b:bb:23:c4:5a:1b:6e: a6:a8:88:8c:c7:ee:a6:2d:f0:eb:36:69:04:f5:46:24: 0f:97:b8:97:ee:ff:8f:a1:73:e8:02:8c:c8:f2:89:a9: a3:10:3c:29:d8:73:e1:b0:c3:9a:b5:f7:19:5e:fe:28: b6:08:0c:b2:f9:cb:b9:d0:9b:55:ca:56:c8:7a:27:3a Fingerprint (SHA-256): 38:01:DF:04:FB:46:97:C1:C3:0A:93:EE:6F:12:91:17:A6:FC:F0:1B:3E:18:4D:DB:2B:4A:A2:24:05:B9:4D:6C Fingerprint (SHA1): FD:66:26:9E:4C:94:54:80:A4:B7:DF:25:BF:83:C8:1F:A8:9C:33:28 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #339: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:db:4e Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Tue Sep 27 20:54:42 2022 Not After : Tue Dec 27 20:54:42 2022 Subject: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:8d:ff:3e:22:c1:52:64:65:7a:27:23:29:ce:4c:2b: 54:9b:47:66:ad:6d:8a:e9:e8:f8:29:c1:1e:3f:0d:37: f8:8e:88:c9:e3:51:7b:3e:3d:ac:b4:c0:cd:eb:b0:14: cb:6d:e8:dc:61:fd:49:1d:b7:d8:05:9c:37:81:24:f3: fb:80:8e:e3:9e:dc:38:1f:53:cb:b4:6c:f9:dd:57:89: b1:fd:ee:b3:a4:03:c6:e3:25:0e:31:be:dd:41:ad:94: ae:35:1c:d7:de:11:fa:41:c9:e6:cb:09:95:70:1d:b9: 5c:1e:60:36:ce:9f:9d:30:bb:c1:fa:34:69:60:9d:ed: f3:7d:51:96:67:0f:3a:13:b9:52:ee:18:4f:90:26:f1: 0a:57:cf:91:4a:23:f3:91:be:c1:a2:4e:78:5d:15:2d: ae:ae:59:7c:9f:f2:75:22:19:ec:ff:82:2f:c4:94:ba: 0d:ac:53:67:79:26:17:64:d4:2a:3e:8b:2a:bf:fe:8b: 15:c5:92:1b:63:04:3d:5e:07:5d:8f:93:db:12:40:c6: ab:bf:1c:e8:2e:83:f9:8c:53:cd:c7:8d:85:43:4d:f4: 0d:c3:40:a2:5e:36:f2:86:cb:5f:ae:5a:f1:69:b3:a0: 25:d5:c4:d3:7d:4c:23:9f:d1:81:dd:a9:97:78:8c:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c4:f2:ce:7c:26:ec:ea:a9:b6:ef:09:a2:ff:6b:33:41: 43:61:17:47:91:ba:2f:ed:f3:76:71:94:98:a6:d7:8b: 0b:1e:06:1c:08:69:c7:66:64:f8:2f:a1:80:51:89:bf: 64:8a:9c:4b:4e:7c:cd:96:c0:ff:fc:17:b8:61:31:ee: b2:5d:a2:f7:59:e8:4a:22:bb:83:09:ed:db:6c:77:98: b3:b3:62:ab:57:9c:c3:bd:f9:cd:3b:e0:63:b3:6f:23: dd:47:6f:c7:e4:99:b5:da:a0:95:04:1a:4d:2b:c9:dd: 66:05:3b:93:39:9e:7d:40:7b:ec:3b:d9:46:a5:df:98: 01:b2:f5:93:01:fb:16:fe:f6:a1:a3:b0:f3:b0:3e:ea: 97:1a:7a:0f:70:22:75:d1:88:61:38:77:7e:d5:c2:ea: 21:cc:a5:dd:16:ee:37:91:48:2b:35:b8:99:e0:4d:98: 5f:12:dd:17:5a:c1:3b:12:65:87:3e:f0:cf:5a:46:e7: 7a:86:ed:6d:ed:d7:dc:5c:cc:74:bb:d6:5c:9d:75:09: 50:61:bd:86:69:3d:00:4c:21:e2:ac:c6:02:e4:22:66: 40:71:3f:1d:26:05:87:de:7f:fc:31:bf:a8:ff:36:0e: 00:c0:01:d1:39:80:8d:42:34:1f:1f:d4:c8:7b:3d:d3 Fingerprint (SHA-256): 92:A2:79:47:96:57:EC:A9:6E:10:91:47:B3:DA:41:50:6E:81:A4:F8:E2:CD:8B:EF:8D:F9:66:5F:4D:04:46:7E Fingerprint (SHA1): D9:87:E9:4A:65:65:22:D6:D6:6E:4B:A6:D5:5A:B0:E1:48:82:D6:AA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #340: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:db:51 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Tue Sep 27 20:54:44 2022 Not After : Tue Dec 27 20:54:44 2022 Subject: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:d4:2a:44:46:87:d6:37:db:4f:6f:93:25:9d:17:6c: 70:06:0d:2c:2c:be:2d:b6:c0:34:41:8b:62:25:29:df: f6:fe:19:ab:22:90:f0:4e:95:fc:5e:b1:41:0c:9c:94: 5f:b4:8b:28:77:fc:63:16:0f:7c:76:e1:ef:8b:f1:36: 56:14:38:05:97:ed:50:2c:d1:5e:91:83:ef:d1:43:6e: b9:e9:c8:0b:7a:6b:9d:10:59:22:3e:a1:c0:0c:a2:2b: 9d:aa:a3:5e:27:ec:bc:04:51:2d:ab:25:67:08:6f:49: ce:04:3d:ab:70:b3:50:61:53:8a:91:97:c1:a3:00:ee: d0:58:dd:11:35:d9:7e:24:b3:33:5a:e1:77:e2:01:72: 52:ca:ad:81:49:f2:65:8f:58:54:1f:fc:49:7e:70:6e: 9d:68:d9:f2:0e:13:d5:26:4d:74:f1:f0:86:75:04:fc: d4:b2:c9:14:95:69:ed:94:63:c1:3c:85:e0:4c:9e:66: 5a:80:cf:a2:f1:7a:50:97:18:16:34:4b:04:88:4d:44: 07:55:21:01:c0:2e:f2:55:1a:d0:84:5c:2e:37:39:98: 35:d5:c3:9a:20:44:52:0a:15:62:9a:88:c4:1e:bb:e6: 2a:b0:87:12:54:be:f3:69:0d:ad:61:ce:db:cd:ab:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:b7:54:07:9e:21:f0:95:f0:87:14:e0:6a:f6:8c:15: 60:2f:91:a1:6e:82:04:30:d5:98:00:c9:dd:38:55:09: fa:a4:0f:f0:81:73:e5:7a:3c:27:01:73:e0:d5:fd:b3: 30:1a:bf:95:de:9b:32:29:e4:46:73:05:95:ca:a1:41: f0:c5:90:9c:80:07:65:36:0f:4d:2d:c4:b8:5d:c4:c8: 24:6e:8e:8b:3b:46:ca:c2:ac:5a:26:8c:26:c1:cd:07: cd:f4:3f:b6:e2:60:38:c3:e6:52:c9:15:bd:a8:92:03: e2:16:38:5d:41:e1:6a:38:40:e3:8e:3c:15:9d:06:de: 45:16:07:7f:a2:8d:fd:d7:ef:36:88:9f:ba:cd:85:b0: 52:23:93:50:53:20:77:d4:4b:1a:e7:f2:67:13:88:33: 13:70:77:16:39:7b:3a:21:4e:6c:57:ab:9a:26:43:71: 83:82:b4:04:d5:00:67:63:c3:de:85:06:72:0b:df:39: 0d:bb:2d:fe:1b:45:48:a9:4b:ae:5d:02:b8:a7:da:73: 76:00:a2:41:3d:68:19:6a:04:0c:84:50:d3:67:c9:b9: bc:f2:8f:a5:86:57:1d:b8:7f:a9:0c:17:66:eb:b6:4c: 1c:0a:d9:54:29:fb:5c:db:d8:36:ee:8d:d7:f2:6d:11 Fingerprint (SHA-256): 0C:79:ED:27:92:BF:5D:35:16:BC:5F:2A:40:93:69:F7:A7:EA:C7:C7:9F:EB:C1:90:61:9F:08:EA:33:BE:94:55 Fingerprint (SHA1): 6C:87:98:48:DB:02:B6:45:CF:72:B9:66:0D:76:AD:9A:BB:4E:61:DB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #341: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #342: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #343: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #344: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:db:57 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Tue Sep 27 20:54:48 2022 Not After : Tue Dec 27 20:54:48 2022 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:19:d7:0e:71:68:6a:6f:3e:98:0a:c3:db:9e:e7:61: 7d:00:28:87:71:8c:b8:30:0f:75:1d:b8:12:8d:15:b2: dc:5b:ea:e8:dc:33:82:63:6e:72:56:40:80:8b:90:54: a6:dc:9f:74:91:e7:0b:1b:ff:62:57:fc:40:94:6d:ce: 31:71:b6:9a:02:80:a7:7c:cb:3c:6d:d0:b8:a7:5a:cb: 95:31:e4:dd:6a:2e:63:ed:87:98:3b:24:19:00:8d:ad: ad:84:1c:43:cc:7b:34:6e:a6:28:b0:d9:e2:7e:36:e5: de:7f:0c:98:6e:71:61:8a:3c:77:09:5d:56:fd:75:33: aa:89:cb:b5:f2:e2:63:d8:b7:de:d7:4d:c1:5b:16:ab: 67:88:27:b8:a3:8c:3e:3e:e4:c0:77:ca:cd:0c:de:d8: 31:e8:04:45:94:4e:e8:52:f9:f7:b6:8e:82:e8:24:a2: 18:c4:ef:42:f3:b1:79:4f:64:7f:24:19:fc:99:75:37: 54:ae:4c:d6:59:fb:f8:84:cd:3c:db:06:04:07:f1:90: ea:50:36:51:c4:16:c4:7c:5e:19:f2:52:2d:05:ff:0c: 86:94:93:17:16:2e:f2:6e:9d:8a:d5:59:21:0e:8b:f3: 75:80:01:d8:85:ea:78:6b:87:9a:6e:ef:bb:f9:d5:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:7b:b5:cd:65:df:67:b8:30:82:03:f4:7a:99:af:d4: c1:25:b1:11:94:49:1f:a6:10:eb:75:ff:0b:ad:a5:27: 38:a0:ab:c3:91:8d:a5:6c:8b:4d:3a:f6:a4:2c:93:30: 73:06:a2:b3:d2:bc:1d:94:23:12:53:1b:67:27:2c:b3: 2b:93:8b:70:3e:af:39:6c:b2:b7:da:24:eb:5a:92:df: f7:ee:ba:48:7b:15:03:40:32:ff:59:24:d9:36:a5:5f: 53:88:60:8f:30:b4:51:99:bb:3e:d0:3b:37:29:2c:85: c1:94:67:89:41:30:cd:1e:8a:c9:a2:b0:10:48:62:3b: 2f:0a:3f:8b:2b:e7:25:e9:bb:68:63:21:ef:93:88:65: 81:d4:ba:9d:71:1f:7f:de:e4:1f:07:b4:5b:0a:c8:70: aa:b1:c4:b6:fd:29:61:49:be:06:43:49:4e:f2:0a:e1: e3:90:a4:fa:bb:22:7d:14:18:7e:f8:ab:0b:87:ba:41: 6a:b9:29:f8:9d:af:38:60:8e:27:a5:21:3c:70:9c:df: 74:d0:08:44:85:30:3c:b3:51:0b:d9:74:62:e8:4c:97: 20:91:3e:18:75:e0:18:e8:1c:3c:3d:8c:e1:5c:d9:64: e7:36:86:08:94:af:c0:27:a4:e8:85:95:dc:02:df:a0 Fingerprint (SHA-256): 44:E9:BE:F7:C9:27:D1:B6:5B:6A:88:AB:03:BD:07:BA:11:B0:B0:B8:48:11:87:31:1C:8F:30:1F:E4:9D:79:1E Fingerprint (SHA1): A5:66:E0:40:ED:59:BD:C6:38:79:58:35:CA:5C:A2:B0:8B:46:C5:C4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #345: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der cert.sh: #346: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #347: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #348: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #349: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #350: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #351: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #352: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:35:db:64 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Tue Sep 27 20:54:54 2022 Not After : Tue Dec 27 20:54:54 2022 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:ab:4e:24:63:2c:1b:94:19:5d:a1:27:7b:37:74:95: 35:46:d7:44:1a:3a:aa:15:34:34:ef:01:29:53:83:19: 51:f7:60:ce:f5:c2:72:dc:38:d8:82:5d:d9:2d:7e:34: fc:4b:c3:64:2d:22:cb:0e:e9:c0:1f:95:02:91:8e:67: 74:0d:66:6d:81:0d:63:82:08:b0:40:13:83:8f:c1:10: ed:f5:20:31:d5:97:71:5b:57:e3:8d:29:c4:a5:96:d3: 2e:16:4e:b2:ed:61:da:a6:28:cf:44:94:6e:ba:d0:06: c4:78:28:ec:d4:30:7f:8e:03:a6:a8:c8:c7:8b:f7:9d: 84:03:15:80:41:17:77:7a:b3:52:4b:01:f8:ab:e9:4a: 29:2f:f8:53:50:2c:ce:d5:6f:47:94:05:73:67:15:3f: e5:d4:34:85:95:af:2c:2d:4b:dd:f8:eb:3e:7e:0a:2a: bf:46:13:2e:96:a9:40:51:72:15:ce:32:58:65:7e:f9: 53:14:8a:32:46:fc:5f:d6:ae:28:e6:ab:1f:ff:8a:3c: dc:e3:9f:de:a2:56:65:af:18:a0:c0:21:22:1c:d3:f7: 4a:d8:d8:cc:ee:42:a0:b4:13:ca:2f:e2:5d:c2:50:a6: 72:5f:bc:af:26:8c:7f:e6:25:b2:ef:be:a5:ab:d8:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:c4:71:6f:5c:9d:04:3f:26:33:15:a9:ee:b9:62:49: 8c:35:c0:b0:05:0e:11:c3:1a:9c:61:8f:ee:19:5a:92: 9c:52:ea:19:1e:07:7a:60:6d:e3:f8:a2:54:95:dc:e6: ef:12:97:97:28:32:b0:48:63:20:fb:0b:bb:3a:cb:ac: 90:1c:d0:76:28:0c:b0:63:78:7d:ab:85:53:df:9b:0b: ac:37:cb:53:a9:72:b1:96:88:4a:79:36:b8:ad:d1:51: f9:de:73:34:ec:8d:40:7c:40:93:ed:4c:f2:bd:74:4d: 8c:fc:4c:f9:ed:ce:01:96:20:9d:35:f0:63:56:82:f8: 77:02:58:0e:fa:22:79:61:e9:25:7c:16:6a:5f:83:4f: 70:16:e1:f2:06:e9:08:55:a6:05:27:6a:af:51:5d:9a: 9b:80:93:92:e0:41:c1:7b:33:17:5f:61:b3:d4:b1:fe: 95:4d:ea:0b:29:e7:11:0f:4a:95:90:32:2d:08:e5:16: 6f:b9:ae:e5:5b:29:17:e1:ca:e8:c3:c5:6d:5e:5c:b8: 70:25:98:1f:47:d9:57:cc:fa:da:47:40:ed:54:d1:91: 11:47:da:a6:a6:4b:9f:b8:55:1e:02:ef:c4:33:9e:25: dc:58:74:d8:6d:c3:c4:01:44:74:07:c3:da:11:0d:8a Fingerprint (SHA-256): ED:18:5E:08:E5:30:F1:D9:A6:53:98:32:37:53:74:76:19:E0:62:B7:E8:A0:B4:89:79:17:2A:05:02:7D:76:AC Fingerprint (SHA1): 31:E2:DD:00:64:75:28:EF:06:67:18:D3:70:83:D6:1E:20:D8:2F:0E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #353: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #354: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #355: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw cert.sh: #356: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #357: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #358: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dbpass -o root.cert cert.sh: #359: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #360: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #361: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #362: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #363: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #364: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA.ca.cert cert.sh: #365: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #366: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #367: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #369: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #372: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #375: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #378: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #381: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created Importing RSA-PSS server certificate Import Distrusted's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #383: Generate RSA-PSS Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 32000 -v 60 -d ../CA -i req -o Distrusted-rsa-pss.cert -f ../tests.pw cert.sh: #384: Sign Distrusted's RSA-PSS Request - PASSED cert.sh: Import Distrusted's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Distrusted-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import Distrusted's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Distrusted's RSA-PSS Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #386: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #387: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #388: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #389: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #390: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #391: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #392: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #393: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #394: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #395: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #396: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #397: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #398: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #399: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #400: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #401: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #402: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #403: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #404: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #405: perform selftest - PASSED cert.sh: Initialize Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw cert.sh: #406: Initialize Cert DB - PASSED cert.sh: Import RSA CA Cert -------------------------- certutil -A -n TestCA -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i ../CA/TestCA.ca.cert cert.sh: #407: Import RSA CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert -------------------------- certutil -A -n TestCA-rsa-pss -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss.ca.cert cert.sh: #408: Import RSA-PSS CA Cert - PASSED cert.sh: Verify RSA-PSS CA Cert -------------------------- certutil -V -u L -e -n TestCA-rsa-pss -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #409: Verify RSA-PSS CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert (SHA1) -------------------------- certutil -A -n TestCA-rsa-pss-sha1 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss-sha1.ca.cert cert.sh: #410: Import RSA-PSS CA Cert (SHA1) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -A -n TestCA-bogus-rsa-pss1 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestCA-bogus-rsa-pss1.crt cert.sh: #411: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss1 -u L -e -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #412: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -A -n TestCA-bogus-rsa-pss2 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestCA-bogus-rsa-pss2.crt cert.sh: #413: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss2 -u L -e -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #414: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss1 -------------------------- certutil -s "CN=TestUser-rsa-pss1, E=TestUser-rsa-pss1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #415: Generate Cert Request for TestUser-rsa-pss1 - PASSED cert.sh: Sign TestUser-rsa-pss1's Request -------------------------- certutil -C -c TestCA --pss-sign -m 200 -v 60 -d ../CA -i req -o TestUser-rsa-pss1.cert -f ../tests.pw cert.sh: #416: Sign TestUser-rsa-pss1's Request - PASSED cert.sh: Import TestUser-rsa-pss1's Cert -------------------------- certutil -A -n TestUser-rsa-pss1 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss1.cert cert.sh: #417: Import TestUser-rsa-pss1's Cert - PASSED cert.sh: Verify TestUser-rsa-pss1's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #418: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: #419: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss2 -------------------------- certutil -s "CN=TestUser-rsa-pss2, E=TestUser-rsa-pss2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #420: Generate Cert Request for TestUser-rsa-pss2 - PASSED cert.sh: Sign TestUser-rsa-pss2's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA512 -m 201 -v 60 -d ../CA -i req -o TestUser-rsa-pss2.cert -f ../tests.pw cert.sh: #421: Sign TestUser-rsa-pss2's Request - PASSED cert.sh: Import TestUser-rsa-pss2's Cert -------------------------- certutil -A -n TestUser-rsa-pss2 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss2.cert cert.sh: #422: Import TestUser-rsa-pss2's Cert - PASSED cert.sh: Verify TestUser-rsa-pss2's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss2 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #423: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: #424: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss3 -------------------------- certutil -s "CN=TestUser-rsa-pss3, E=TestUser-rsa-pss3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser-rsa-pss3 - PASSED cert.sh: Sign TestUser-rsa-pss3's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 202 -v 60 -d ../CA -i req -o TestUser-rsa-pss3.cert -f ../tests.pw cert.sh: #426: Sign TestUser-rsa-pss3's Request - PASSED cert.sh: Import TestUser-rsa-pss3's Cert -------------------------- certutil -A -n TestUser-rsa-pss3 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss3.cert cert.sh: #427: Import TestUser-rsa-pss3's Cert - PASSED cert.sh: Verify TestUser-rsa-pss3's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss3 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #428: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: #429: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss4 -------------------------- certutil -s "CN=TestUser-rsa-pss4, E=TestUser-rsa-pss4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #430: Generate Cert Request for TestUser-rsa-pss4 - PASSED cert.sh: Sign TestUser-rsa-pss4's Request -------------------------- certutil -C -c TestCA --pss-sign -m 203 -v 60 -d ../CA -i req -o TestUser-rsa-pss4.cert -f ../tests.pw cert.sh: #431: Sign TestUser-rsa-pss4's Request - PASSED cert.sh: Import TestUser-rsa-pss4's Cert -------------------------- certutil -A -n TestUser-rsa-pss4 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss4.cert cert.sh: #432: Import TestUser-rsa-pss4's Cert - PASSED cert.sh: Verify TestUser-rsa-pss4's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss4 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #433: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: #434: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss5 -------------------------- certutil -s "CN=TestUser-rsa-pss5, E=TestUser-rsa-pss5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #435: Generate Cert Request for TestUser-rsa-pss5 - PASSED cert.sh: Sign TestUser-rsa-pss5's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -m 204 -v 60 -d ../CA -i req -o TestUser-rsa-pss5.cert -f ../tests.pw cert.sh: #436: Sign TestUser-rsa-pss5's Request - PASSED cert.sh: Import TestUser-rsa-pss5's Cert -------------------------- certutil -A -n TestUser-rsa-pss5 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss5.cert cert.sh: #437: Import TestUser-rsa-pss5's Cert - PASSED cert.sh: Verify TestUser-rsa-pss5's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss5 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #438: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: #439: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss6 -------------------------- certutil -s "CN=TestUser-rsa-pss6, E=TestUser-rsa-pss6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser-rsa-pss6 - PASSED cert.sh: Sign TestUser-rsa-pss6's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 205 -v 60 -d ../CA -i req -o TestUser-rsa-pss6.cert -f ../tests.pw cert.sh: #441: Sign TestUser-rsa-pss6's Request - PASSED cert.sh: Import TestUser-rsa-pss6's Cert -------------------------- certutil -A -n TestUser-rsa-pss6 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss6.cert cert.sh: #442: Import TestUser-rsa-pss6's Cert - PASSED cert.sh: Verify TestUser-rsa-pss6's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss6 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #443: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: #444: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss7 -------------------------- certutil -s "CN=TestUser-rsa-pss7, E=TestUser-rsa-pss7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #445: Generate Cert Request for TestUser-rsa-pss7 - PASSED cert.sh: Sign TestUser-rsa-pss7's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA512 -m 206 -v 60 -d ../CA -i req -o TestUser-rsa-pss7.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #446: Sign TestUser-rsa-pss7's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss8 -------------------------- certutil -s "CN=TestUser-rsa-pss8, E=TestUser-rsa-pss8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #447: Generate Cert Request for TestUser-rsa-pss8 - PASSED cert.sh: Sign TestUser-rsa-pss8's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA256 -m 207 -v 60 -d ../CA -i req -o TestUser-rsa-pss8.cert -f ../tests.pw cert.sh: #448: Sign TestUser-rsa-pss8's Request - PASSED cert.sh: Import TestUser-rsa-pss8's Cert -------------------------- certutil -A -n TestUser-rsa-pss8 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss8.cert cert.sh: #449: Import TestUser-rsa-pss8's Cert - PASSED cert.sh: Verify TestUser-rsa-pss8's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss8 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #450: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: #451: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss9 -------------------------- certutil -s "CN=TestUser-rsa-pss9, E=TestUser-rsa-pss9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser-rsa-pss9 - PASSED cert.sh: Sign TestUser-rsa-pss9's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 208 -v 60 -d ../CA -i req -o TestUser-rsa-pss9.cert -f ../tests.pw cert.sh: #453: Sign TestUser-rsa-pss9's Request - PASSED cert.sh: Import TestUser-rsa-pss9's Cert -------------------------- certutil -A -n TestUser-rsa-pss9 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss9.cert cert.sh: #454: Import TestUser-rsa-pss9's Cert - PASSED cert.sh: Verify TestUser-rsa-pss9's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss9 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #455: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: #456: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss10 -------------------------- certutil -s "CN=TestUser-rsa-pss10, E=TestUser-rsa-pss10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #457: Generate Cert Request for TestUser-rsa-pss10 - PASSED cert.sh: Sign TestUser-rsa-pss10's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 -m 209 -v 60 -d ../CA -i req -o TestUser-rsa-pss10.cert -f ../tests.pw cert.sh: #458: Sign TestUser-rsa-pss10's Request - PASSED cert.sh: Import TestUser-rsa-pss10's Cert -------------------------- certutil -A -n TestUser-rsa-pss10 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss10.cert cert.sh: #459: Import TestUser-rsa-pss10's Cert - PASSED cert.sh: Verify TestUser-rsa-pss10's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss10 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #460: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: #461: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss11 -------------------------- certutil -s "CN=TestUser-rsa-pss11, E=TestUser-rsa-pss11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #462: Generate Cert Request for TestUser-rsa-pss11 - PASSED cert.sh: Sign TestUser-rsa-pss11's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 --pss-sign -Z SHA256 -m 210 -v 60 -d ../CA -i req -o TestUser-rsa-pss11.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #463: Sign TestUser-rsa-pss11's Request - PASSED cert.sh: specify token with PKCS#11 URI cert.sh: List keys in NSS Certificate DB -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> ec 6effb9ad876818ebbcdaee7507c99c1f67eabcad NSS Certificate DB:localhost-sni.localdomain-ec < 1> ec 7ea0856a5cb9ea4c8d0751e581ae8562962a56d7 NSS Certificate DB:localhost.localdomain-ec < 2> ec 52f0c4b91f1b1085974971dfb8d77128adc43ba4 NSS Certificate DB:localhost.localdomain-ecmixed < 3> dsa 4e8ab1f56c9495fa74df2d4d00837c13f8fbb54e NSS Certificate DB:localhost-sni.localdomain-dsa < 4> ec 8534e7e23ba276d9375da908ab266d121b2ef213 NSS Certificate DB:localhost-sni.localdomain-ecmixed < 5> rsa ca75df9632637f07486b5f1b31e55d03e1d449cf TestUser-rsa-pss-interop < 6> dsa 826d1507722a3b288263823e4f3f1806fa6547cb NSS Certificate DB:localhost.localdomain-dsa < 7> rsa 96e53204088710bcea00c5844a82e7514e4493a9 NSS Certificate DB:localhost-sni.localdomain < 8> rsa 82a5bd4abceedce7c3f16cbdf5c5bcdba21a778b NSS Certificate DB:localhost.localdomain < 9> dsa 7dda08cdfbe157ad52bf02bbe4faa6ce7b5f84c4 NSS Certificate DB:localhost.localdomain-dsamixed <10> dsa 4659826588aa5a84574ad2bcd210c830b37ee269 NSS Certificate DB:localhost-sni.localdomain-dsamixed <11> rsa e9847ad8f486ae70af1b326bff4140af07ad6aeb (orphan) cert.sh: #464: List keys in NSS Certificate DB - PASSED cert.sh: List keys in NSS Builtin Objects -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects" certutil: no keys found cert.sh: #465: List keys in NSS Builtin Objects - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #466: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #467: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #468: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #469: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #470: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #471: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #472: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #473: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #474: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #475: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #476: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #477: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #478: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #479: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #480: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser40's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #481: Generate RSA-PSS Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o TestUser40-rsa-pss.cert -f ../tests.pw cert.sh: #482: Sign TestUser40's RSA-PSS Request - PASSED cert.sh: Import TestUser40's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser40-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #483: Import TestUser40's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser40's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #484: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #485: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #486: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #487: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #488: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #489: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #490: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #491: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #492: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #493: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #494: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #495: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #496: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #497: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #498: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser41's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #499: Generate RSA-PSS Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30041 -v 60 -d ../CA -i req -o TestUser41-rsa-pss.cert -f ../tests.pw cert.sh: #500: Sign TestUser41's RSA-PSS Request - PASSED cert.sh: Import TestUser41's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser41-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #501: Import TestUser41's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser41's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #502: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #503: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #504: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #505: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #506: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #507: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #508: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #509: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #510: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #511: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #512: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #513: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #514: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #515: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #516: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser42's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #517: Generate RSA-PSS Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30042 -v 60 -d ../CA -i req -o TestUser42-rsa-pss.cert -f ../tests.pw cert.sh: #518: Sign TestUser42's RSA-PSS Request - PASSED cert.sh: Import TestUser42's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser42-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #519: Import TestUser42's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser42's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #520: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #521: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #522: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #523: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #524: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #525: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #526: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #527: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #528: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #529: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #530: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #531: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #532: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #533: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #534: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser43's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #535: Generate RSA-PSS Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30043 -v 60 -d ../CA -i req -o TestUser43-rsa-pss.cert -f ../tests.pw cert.sh: #536: Sign TestUser43's RSA-PSS Request - PASSED cert.sh: Import TestUser43's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser43-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #537: Import TestUser43's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser43's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #538: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #539: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #540: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #541: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #542: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #543: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #544: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #545: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #546: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #547: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #548: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #549: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #550: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #551: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #552: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser44's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #553: Generate RSA-PSS Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30044 -v 60 -d ../CA -i req -o TestUser44-rsa-pss.cert -f ../tests.pw cert.sh: #554: Sign TestUser44's RSA-PSS Request - PASSED cert.sh: Import TestUser44's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser44-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #555: Import TestUser44's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser44's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #556: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #557: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #558: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #559: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #560: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #561: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #562: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #563: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #564: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #565: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #566: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #567: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #568: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #569: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #570: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser45's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #571: Generate RSA-PSS Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30045 -v 60 -d ../CA -i req -o TestUser45-rsa-pss.cert -f ../tests.pw cert.sh: #572: Sign TestUser45's RSA-PSS Request - PASSED cert.sh: Import TestUser45's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser45-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #573: Import TestUser45's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser45's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #574: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #575: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #576: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #577: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #578: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #579: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #580: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #581: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #582: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #583: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #584: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #585: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #586: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #587: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #588: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser46's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #589: Generate RSA-PSS Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30046 -v 60 -d ../CA -i req -o TestUser46-rsa-pss.cert -f ../tests.pw cert.sh: #590: Sign TestUser46's RSA-PSS Request - PASSED cert.sh: Import TestUser46's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser46-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #591: Import TestUser46's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser46's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #592: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #593: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #594: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #595: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #596: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #597: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #598: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #599: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #600: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #601: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #602: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #603: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #604: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #605: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #606: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser47's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #607: Generate RSA-PSS Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30047 -v 60 -d ../CA -i req -o TestUser47-rsa-pss.cert -f ../tests.pw cert.sh: #608: Sign TestUser47's RSA-PSS Request - PASSED cert.sh: Import TestUser47's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser47-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #609: Import TestUser47's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser47's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #610: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #611: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #612: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #613: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #614: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #615: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #616: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #617: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #618: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #619: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #620: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #621: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #622: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #623: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #624: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser48's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #625: Generate RSA-PSS Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30048 -v 60 -d ../CA -i req -o TestUser48-rsa-pss.cert -f ../tests.pw cert.sh: #626: Sign TestUser48's RSA-PSS Request - PASSED cert.sh: Import TestUser48's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser48-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #627: Import TestUser48's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser48's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #628: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #629: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #630: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #631: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #632: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #633: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #634: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #635: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #636: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #637: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #638: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #639: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #640: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #641: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #642: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser49's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #643: Generate RSA-PSS Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30049 -v 60 -d ../CA -i req -o TestUser49-rsa-pss.cert -f ../tests.pw cert.sh: #644: Sign TestUser49's RSA-PSS Request - PASSED cert.sh: Import TestUser49's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser49-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #645: Import TestUser49's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser49's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #646: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #647: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #648: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #649: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #650: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #651: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #652: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #653: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #654: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #655: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #656: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #657: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #658: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #659: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #660: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser50's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #661: Generate RSA-PSS Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o TestUser50-rsa-pss.cert -f ../tests.pw cert.sh: #662: Sign TestUser50's RSA-PSS Request - PASSED cert.sh: Import TestUser50's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser50-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #663: Import TestUser50's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser50's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #664: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #665: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #666: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #667: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #668: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #669: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #670: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #671: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #672: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #673: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #674: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #675: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #676: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #677: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #678: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser51's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #679: Generate RSA-PSS Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30051 -v 60 -d ../CA -i req -o TestUser51-rsa-pss.cert -f ../tests.pw cert.sh: #680: Sign TestUser51's RSA-PSS Request - PASSED cert.sh: Import TestUser51's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser51-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #681: Import TestUser51's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser51's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #682: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #683: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #684: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #685: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #686: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #687: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #688: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #689: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #690: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #691: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #692: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #693: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #694: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #695: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #696: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser52's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #697: Generate RSA-PSS Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30052 -v 60 -d ../CA -i req -o TestUser52-rsa-pss.cert -f ../tests.pw cert.sh: #698: Sign TestUser52's RSA-PSS Request - PASSED cert.sh: Import TestUser52's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser52-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #699: Import TestUser52's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser52's RSA-PSS Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #700: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #701: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #702: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #703: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #704: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #705: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #706: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #707: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #708: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #709: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #710: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #711: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #712: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #713: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #714: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #715: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #716: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Tue Sep 27 20:57:06 UTC 2022 Running tests for tools TIMESTAMP tools BEGIN: Tue Sep 27 20:57:06 UTC 2022 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #1: Exporting with [default:default:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #2: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5d:95:24:8c:2e:7f:22:2f:3d:31:d5:6e:6f:d7:b0:08 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #3: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5: Exporting Alice's email EC cert & key (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #6: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 89:0d:79:da:7f:dc:4b:35:5b:7f:7b:44:96:28:5f:df Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Tue Sep 27 20:52:50 2022 Not After : Tue Sep 27 20:52:50 2072 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:42:18:21:cb:81:22:3a:0f:8f:5a:0f:37:b9:b1: 44:83:ef:98:57:36:70:8a:ef:05:55:ae:19:55:38:a7: 27:34:91:9f:04:f9:9c:cd:ad:63:3e:ff:af:e9:dd:6f: ce:f4:2b:ca:66:5a:00:a2:08:6c:0c:18:a0:db:79:cb: f7:9c:af:01:62:48:85:f2:dd:2b:86:cf:49:4f:a2:26: 1a:30:c3:80:ea:11:ac:64:28:e7:fa:1f:3f:69:e8:ca: 31:5c:3d:94:5a:e9:cd:d2:dc:b6:a2:8e:2d:1c:e7:fa: 7d:be:9e:e1:d8:a7:97:e7:04:8b:22:53:3f:db:e9:9f: ea:02:5e:ad:1d Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:c4:f1:cf:93:f5:3c:79:be:15:8a: 63:e2:3e:68:c2:72:a1:35:13:81:c9:01:e1:aa:90:59: 4b:68:05:57:73:7a:37:41:70:81:98:79:0e:6b:b6:d7: 7f:cf:51:85:f5:6a:14:58:d3:2b:27:ef:84:36:50:88: 2c:c3:df:79:0c:40:2a:02:42:01:6c:83:92:c9:f8:30: 2f:3e:e3:96:ef:88:1c:85:fe:fa:6c:fd:49:a4:2d:08: cd:d7:52:11:7d:ac:62:e5:db:37:9e:4f:be:7c:f6:26: 2b:46:e1:0e:5b:c8:11:03:79:bc:73:03:ab:74:41:37: 41:67:17:e9:80:8c:a0:70:7d:c2:f1 Fingerprint (SHA-256): 64:BC:94:C1:BC:C6:4F:10:00:6B:75:AF:E1:FF:9A:35:B5:89:D5:6B:D5:8F:09:E1:E4:98:71:0A:E1:0E:CE:40 Fingerprint (SHA1): 9E:0C:0B:37:CE:3F:43:4B:39:B2:A3:31:5E:8F:04:F1:96:96:D6:21 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Tue Sep 27 20:53:51 2022 Not After : Mon Sep 27 20:53:51 2027 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:f5:cd:d5:c4:70:cf:61:c8:a2:4d:da:b1:c4:0b:16: ed:34:82:da:f7:13:a2:35:5d:7b:d8:52:69:32:37:86: b4:eb:4e:63:0e:16:e1:e8:12:0f:ff:8e:79:39:77:22: f0:ff:bb:85:e7:66:6c:38:11:81:61:af:46:2c:4b:88: 39:cd:cc:e0:9a:7f:85:67:ac:40:c9:d0:f0:f9:24:c7: 45:16:a1:57:b8:c4:d5:68:c8:4d:9d:8c:b8:18:3b:30: 4e Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:e7:40:6e:c7:76:0a:05:66:eb:38: 0f:29:6c:1a:5a:dd:de:f7:24:68:2b:db:3e:76:f3:4d: 74:54:b0:46:10:5c:1e:b2:35:4a:af:84:94:f1:27:59: f0:89:dc:dc:1a:c1:d9:12:e1:d2:3a:ea:93:b3:e5:d4: 86:c1:28:23:33:09:b5:02:42:01:4f:82:97:dc:90:ca: 13:63:18:7e:d9:be:f8:9b:c4:85:a2:25:6c:fd:a3:1c: 8f:c2:3f:6e:41:54:6c:af:89:e7:07:da:31:7a:4b:c8: d2:88:80:f2:55:eb:2e:41:53:b7:7e:91:39:ac:63:e1: 9e:41:e0:b1:5e:24:fb:9c:d2:2c:4c Fingerprint (SHA-256): 28:84:4E:3E:64:61:BC:85:80:16:BC:F7:EF:EA:89:3E:E6:49:5C:29:F6:A2:CB:66:7B:57:5E:B3:0B:A1:19:93 Fingerprint (SHA1): 0C:6D:E0:4E:02:FC:05:57:63:4B:3B:9B:F6:45:32:FC:16:81:DF:34 Friendly Name: Alice-ec tools.sh: #8: Listing Alice's pk12 EC file (pk12util -l) - PASSED tools.sh: Exporting Alice's email EC cert & key with long pw------ pk12util -o Alice-ec-long.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.longpw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9: Exporting Alice's email EC cert & key with long pw (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #10: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key with long pw----- pk12util -i Alice-ec-long.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.longpw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #11: Importing Alice's email EC cert & key with long pw (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file with long pw ------------ pk12util -l Alice-ec-long.p12 -w ../tests.longpw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: dc:e2:e5:30:29:77:2b:c5:a3:a5:c7:94:bf:b7:ea:69 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Tue Sep 27 20:52:50 2022 Not After : Tue Sep 27 20:52:50 2072 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:42:18:21:cb:81:22:3a:0f:8f:5a:0f:37:b9:b1: 44:83:ef:98:57:36:70:8a:ef:05:55:ae:19:55:38:a7: 27:34:91:9f:04:f9:9c:cd:ad:63:3e:ff:af:e9:dd:6f: ce:f4:2b:ca:66:5a:00:a2:08:6c:0c:18:a0:db:79:cb: f7:9c:af:01:62:48:85:f2:dd:2b:86:cf:49:4f:a2:26: 1a:30:c3:80:ea:11:ac:64:28:e7:fa:1f:3f:69:e8:ca: 31:5c:3d:94:5a:e9:cd:d2:dc:b6:a2:8e:2d:1c:e7:fa: 7d:be:9e:e1:d8:a7:97:e7:04:8b:22:53:3f:db:e9:9f: ea:02:5e:ad:1d Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:c4:f1:cf:93:f5:3c:79:be:15:8a: 63:e2:3e:68:c2:72:a1:35:13:81:c9:01:e1:aa:90:59: 4b:68:05:57:73:7a:37:41:70:81:98:79:0e:6b:b6:d7: 7f:cf:51:85:f5:6a:14:58:d3:2b:27:ef:84:36:50:88: 2c:c3:df:79:0c:40:2a:02:42:01:6c:83:92:c9:f8:30: 2f:3e:e3:96:ef:88:1c:85:fe:fa:6c:fd:49:a4:2d:08: cd:d7:52:11:7d:ac:62:e5:db:37:9e:4f:be:7c:f6:26: 2b:46:e1:0e:5b:c8:11:03:79:bc:73:03:ab:74:41:37: 41:67:17:e9:80:8c:a0:70:7d:c2:f1 Fingerprint (SHA-256): 64:BC:94:C1:BC:C6:4F:10:00:6B:75:AF:E1:FF:9A:35:B5:89:D5:6B:D5:8F:09:E1:E4:98:71:0A:E1:0E:CE:40 Fingerprint (SHA1): 9E:0C:0B:37:CE:3F:43:4B:39:B2:A3:31:5E:8F:04:F1:96:96:D6:21 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Tue Sep 27 20:53:51 2022 Not After : Mon Sep 27 20:53:51 2027 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:f5:cd:d5:c4:70:cf:61:c8:a2:4d:da:b1:c4:0b:16: ed:34:82:da:f7:13:a2:35:5d:7b:d8:52:69:32:37:86: b4:eb:4e:63:0e:16:e1:e8:12:0f:ff:8e:79:39:77:22: f0:ff:bb:85:e7:66:6c:38:11:81:61:af:46:2c:4b:88: 39:cd:cc:e0:9a:7f:85:67:ac:40:c9:d0:f0:f9:24:c7: 45:16:a1:57:b8:c4:d5:68:c8:4d:9d:8c:b8:18:3b:30: 4e Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:e7:40:6e:c7:76:0a:05:66:eb:38: 0f:29:6c:1a:5a:dd:de:f7:24:68:2b:db:3e:76:f3:4d: 74:54:b0:46:10:5c:1e:b2:35:4a:af:84:94:f1:27:59: f0:89:dc:dc:1a:c1:d9:12:e1:d2:3a:ea:93:b3:e5:d4: 86:c1:28:23:33:09:b5:02:42:01:4f:82:97:dc:90:ca: 13:63:18:7e:d9:be:f8:9b:c4:85:a2:25:6c:fd:a3:1c: 8f:c2:3f:6e:41:54:6c:af:89:e7:07:da:31:7a:4b:c8: d2:88:80:f2:55:eb:2e:41:53:b7:7e:91:39:ac:63:e1: 9e:41:e0:b1:5e:24:fb:9c:d2:2c:4c Fingerprint (SHA-256): 28:84:4E:3E:64:61:BC:85:80:16:BC:F7:EF:EA:89:3E:E6:49:5C:29:F6:A2:CB:66:7B:57:5E:B3:0B:A1:19:93 Fingerprint (SHA1): 0C:6D:E0:4E:02:FC:05:57:63:4B:3B:9B:F6:45:32:FC:16:81:DF:34 Friendly Name: Alice-ec tools.sh: #12: Listing Alice's pk12 EC file with long pw (pk12util -l) - PASSED Iteration count=600000 pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #13: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #14: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 96:79:ed:61:0f:90:3b:71:69:13:3a:cf:11:21:6f:85 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #15: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #16: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #17: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #18: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 6b:16:de:e1:5d:65:0a:bb:8d:ac:08:f5:f7:f0:b3:dc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #19: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #20: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #21: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #22: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 32:40:ae:8a:92:28:d2:04:c1:5a:89:c6:20:67:da:33 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #23: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #24: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #25: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #26: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 33:92:dc:e9:08:9d:87:f7:1b:5a:49:d9:8b:cc:95:e3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #27: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #28: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #29: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #30: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 90:e2:a2:b9:03:b5:88:7c:48:f9:a7:4f:30:a9:8a:a1 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:d4:92:a9:6e:13:19:8c:1b:8b:78:a6:6e:eb:26: 94:08 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #31: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #32: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #33: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #34: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 54:1a:26:a3:e4:f1:47:09:27:0a:bf:78:57:3d:ec:bd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #35: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #36: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #37: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #38: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c3:4c:37:99:8e:fc:6c:f5:7e:3a:87:e3:02:1d:67:7a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #39: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #40: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #41: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #42: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 9f:02:97:c3:1f:fe:e5:6e:73:7c:86:a6:5c:d1:cf:6a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #43: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #44: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #45: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #46: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 08:4f:a7:88:5d:0a:d9:78:e3:63:a3:41:52:8f:2a:c5 Iteration Count: 600000 (0x927c0) tools.sh: #47: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #48: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #49: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #50: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 62:3d:6a:c9:6e:bd:ec:85:91:1f:78:75:58:e3:0e:7f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #51: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #52: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #53: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #54: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3c:cf:6b:21:af:3c:24:f2:f1:92:62:84:0a:bc:10:94 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #55: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #56: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #57: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #58: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: de:64:63:b1:d4:39:21:a6:eb:d2:41:fc:07:e7:99:73 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #59: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #60: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #61: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #62: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6a:00:6b:8c:db:ac:dc:cb:7b:87:96:22:af:f4:63:90 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #63: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #64: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #65: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #66: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: a2:31:05:5b:53:bd:d5:11:9b:4b:34:52:bf:b5:23:99 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #67: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #68: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #69: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #70: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 75:f9:b8:20:1f:9c:94:a3:79:c5:17:5b:f8:21:63:fe Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:45:7e:ce:e4:53:18:aa:c2:64:2d:d8:9d:4c:75: 23:8e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #71: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #72: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #73: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #74: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 31:93:65:81:46:59:30:ef:1f:4d:61:ad:de:3e:81:ce Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #75: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #76: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #77: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #78: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cf:6a:f1:dc:7d:73:a3:c1:7b:18:95:da:47:9a:3d:1f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #79: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #80: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #81: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #82: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 24:e8:33:4c:d2:b8:47:95:d1:2e:e9:b8:f7:e6:cb:bf Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #83: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #84: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #85: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #86: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: c6:43:b1:99:0f:22:39:7b:d4:de:65:ef:55:48:62:db Iteration Count: 600000 (0x927c0) tools.sh: #87: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #88: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #89: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #90: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 05:e6:44:1d:28:90:37:a0:a5:25:ac:ba:e9:e5:c9:8d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #91: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #92: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #93: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #94: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fa:b6:e0:40:71:7f:6a:09:18:ba:77:b7:3e:4a:87:97 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #95: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #96: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #97: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #98: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d2:eb:06:f6:05:e4:e5:72:bf:e0:23:19:13:fe:d4:e7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #99: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #100: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #101: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #102: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c7:43:4d:a4:9d:2e:56:ba:05:91:47:34:49:d1:0f:31 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:45:c0:7c:69:17:41:c6:fa:57:fc:62:ff:98:8c: 5c:5a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #103: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #104: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #105: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #106: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c2:60:f6:d9:c6:9b:a3:70:fe:6d:c6:5c:ae:b8:70:c0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #107: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #108: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #109: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #110: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 12:23:80:5f:b3:ca:05:8f:ab:d2:55:32:df:cb:4f:69 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #111: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #112: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #113: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #114: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 2e:be:6f:3f:b0:f7:7d:83:9b:37:bb:e1:d5:d3:00:c7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #115: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #116: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #117: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #118: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e0:18:21:3d:b8:e0:ba:ac:3b:1b:85:67:9b:7d:42:13 Iteration Count: 600000 (0x927c0) tools.sh: #119: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #120: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #121: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #122: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: fb:ac:6c:b6:5c:61:a6:00:f1:04:84:66:a0:fa:cd:d7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #123: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #124: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #125: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #126: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c7:1a:dd:11:11:6a:3a:2a:80:60:8e:6d:c8:e4:ab:99 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #127: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #128: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #129: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #130: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: ea:86:e3:ff:6d:06:43:0f:05:4c:97:0a:1b:43:fd:fb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #131: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #132: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #133: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #134: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 72:06:15:7d:11:95:ad:ba:17:f9:c5:6a:d0:95:8d:52 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #135: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #136: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #137: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #138: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 4e:fa:a0:1d:18:96:35:fa:26:2b:4f:58:31:9e:4e:4f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #139: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #140: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #141: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #142: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 24:8a:66:8c:82:84:85:a4:42:38:69:a5:53:05:8a:e6 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:3e:39:16:0c:18:7f:8f:17:2c:b2:0d:f1:92:93: 07:51 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #143: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #144: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #145: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #146: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: ae:c4:a4:e2:68:ee:6f:ae:30:29:f6:42:47:fc:da:04 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #147: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #148: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #149: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #150: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: de:e5:33:f3:d7:24:14:1f:d9:87:d9:34:d0:96:a9:bb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #151: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #152: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #153: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #154: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: e6:77:3c:cf:b9:61:d0:d6:15:1b:24:ea:66:74:f9:d7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #155: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #156: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #157: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #158: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 3a:12:1b:45:98:0c:f2:27:11:02:1e:da:e6:0c:12:ba Iteration Count: 600000 (0x927c0) tools.sh: #159: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #160: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #161: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #162: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 45:5d:d4:37:03:b4:45:b7:ea:44:3a:31:f0:ef:87:21 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #163: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #164: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #165: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #166: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 85:c0:79:23:2c:60:dc:a1:90:6a:fa:01:07:2c:c8:d2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #167: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #168: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #169: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #170: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: c8:e2:8d:52:b2:4f:55:22:0a:0f:c4:69:3b:1c:f2:4f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #171: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #172: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #173: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #174: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9e:55:b6:20:db:fc:0d:ef:ae:32:c3:08:bf:90:a5:7a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #175: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #176: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #177: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #178: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 6c:1a:cc:3c:f8:52:5a:16:17:c0:20:6f:26:65:c8:79 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #179: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #180: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #181: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #182: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 22:f7:fb:a8:86:e4:5c:84:95:3c:95:d7:b5:5f:95:b5 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:45:9f:21:b6:41:72:0e:4a:db:72:d6:b9:64:25: d5:0a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #183: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #184: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #185: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #186: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 39:37:7f:fd:e1:72:e9:db:1a:0f:c8:34:08:7c:f8:bb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #187: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #188: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #189: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #190: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fe:59:e2:2e:74:cf:87:64:25:c4:db:f0:ec:8f:40:ce Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #191: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #192: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #193: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #194: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 3a:be:7f:35:e4:35:89:2c:67:00:61:d2:0e:5a:62:a9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #195: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #196: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #197: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #198: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: f5:ac:69:9e:a7:12:94:a2:5a:e6:d8:88:f7:15:8e:bd Iteration Count: 600000 (0x927c0) tools.sh: #199: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #200: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #201: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #202: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: d8:0d:8d:dd:16:5b:82:21:5d:68:db:b9:4a:e9:36:9f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #203: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #204: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #205: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #206: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 47:f4:04:34:16:ae:d2:6a:03:cf:9d:b6:4a:7b:40:83 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #207: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #208: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #209: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #210: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cd:39:13:01:82:23:42:9f:d0:82:10:13:5b:7b:91:14 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #211: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #212: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #213: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #214: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 63:4c:ec:15:86:56:82:25:08:44:a1:47:9f:4e:cb:99 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:08:38:f0:64:f9:54:06:d7:53:c4:27:b0:fe:85: a3:b4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #215: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #216: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #217: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #218: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ae:21:c5:3b:71:f5:47:e3:f2:72:08:d2:34:94:49:53 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #219: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #220: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #221: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #222: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 34:3b:e8:8e:ae:e0:aa:55:a0:ae:af:34:ae:41:36:6a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #223: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #224: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #225: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #226: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 73:1d:46:c9:c1:ea:d6:54:60:32:94:4a:1c:8c:05:8d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #227: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #228: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #229: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #230: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d0:5b:e6:56:c0:f8:9b:c0:a3:36:3b:12:53:59:f0:a8 Iteration Count: 600000 (0x927c0) tools.sh: #231: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #232: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #233: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #234: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f3:cb:72:1f:8d:d6:81:e2:c0:6b:9f:4b:3d:65:48:f8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #235: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #236: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #237: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #238: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 15:5b:b6:e7:fc:8e:9e:e6:8f:af:b1:f6:a6:fb:95:80 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #239: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #240: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #241: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #242: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 16:e3:ed:f4:59:86:fc:ac:75:77:20:6c:ab:98:b8:a0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #244: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #245: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #246: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3c:7c:2a:19:ae:be:74:8d:44:55:32:65:d4:90:34:ea Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #247: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #248: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #249: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #250: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: a8:ef:bc:bb:ef:50:82:40:1e:6e:e6:a5:b5:9e:cf:d9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #251: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #252: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #253: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #254: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b9:90:b5:6d:90:29:2d:19:5e:6b:cf:5a:06:b7:aa:85 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:cd:65:57:12:f7:28:85:2f:d6:d0:2b:5d:c8:75: 81:3c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #256: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #257: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #258: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 68:ac:5d:96:85:e4:34:5f:d6:b3:01:1a:96:c6:7e:63 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #259: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #260: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #261: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #262: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 95:ed:81:83:6a:af:53:9d:d3:05:23:1d:01:73:94:e3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #263: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #264: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #265: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #266: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 4f:9b:43:7a:b9:07:e4:f2:58:eb:59:b5:e5:e1:e6:d6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #267: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #268: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #269: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #270: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 5c:c1:bd:ce:05:c5:ee:11:57:9f:7f:04:61:61:20:d1 Iteration Count: 600000 (0x927c0) tools.sh: #271: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #272: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #273: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #274: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 0d:7f:30:3e:42:93:2c:c1:7e:de:d1:06:bc:aa:8c:81 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #275: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #276: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #277: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #278: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 14:d1:0a:a5:f2:28:8f:0b:92:3d:53:ad:a5:da:ea:3d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #280: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #281: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #282: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 3e:72:c8:67:a5:ca:1c:24:b9:08:62:aa:1a:da:59:ab Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #283: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #284: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #285: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #286: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ac:c7:23:11:32:e1:0a:9b:7e:02:fe:81:16:c1:6b:ce Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #287: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #288: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #289: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #290: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: b2:08:66:7d:7f:cf:b4:c3:a9:91:c0:bf:63:27:dc:6b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #292: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #293: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #294: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 07:c8:e6:d6:66:b1:73:7a:c8:d6:87:f5:11:50:85:65 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e9:b7:de:d0:37:5a:47:38:c4:da:42:d0:05:65: 38:85 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #295: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #296: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #297: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #298: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 7e:62:dd:66:ca:c0:b6:e1:c3:88:2b:fc:43:33:18:4e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #299: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #300: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #301: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #302: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 43:30:d6:61:90:ea:11:c9:a2:4d:fb:45:2e:d1:5a:2c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #304: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #305: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #306: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: a1:94:85:23:03:9e:09:ba:a5:39:4d:3a:5c:c6:ab:a8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #307: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #308: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #309: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #310: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 2a:f3:c7:d7:ec:87:fc:5b:99:35:b8:54:ca:30:1c:a9 Iteration Count: 600000 (0x927c0) tools.sh: #311: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #312: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #313: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #314: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: a9:f2:74:99:f1:cf:ab:36:a2:c2:c0:7e:1b:27:3f:8b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #316: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #317: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #318: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 68:9b:11:38:15:71:c4:1e:2d:a0:0b:f3:e3:b2:b6:09 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #319: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #320: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #321: Exporting with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #322: Verifying p12 file generated with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 16:96:3f:fc:0b:46:98:5a:68:43:7d:c7:3b:a1:61:1c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #323: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #324: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #325: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #326: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5d:b4:52:ee:de:69:c9:34:c7:5f:03:c6:5f:55:98:95 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #328: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #329: Exporting with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #330: Verifying p12 file generated with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 87:e3:bb:56:d2:3e:b3:11:44:57:a6:01:c2:51:35:dd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #331: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #332: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #333: Exporting with [AES-256-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #334: Verifying p12 file generated with [AES-256-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c4:33:ea:45:1c:3e:4d:6f:4c:68:27:b7:fc:42:9c:a9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:3e:0d:f5:e6:b4:6d:90:78:b7:f5:a3:c8:4b:3c: 3a:84 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #335: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #336: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #337: Exporting with [RC2-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #338: Verifying p12 file generated with [RC2-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 00:51:a9:7e:7e:cc:9c:83:b8:c3:20:5b:08:7c:ac:63 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #339: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #340: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #341: Exporting with [default:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #342: Verifying p12 file generated with [default:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 64:12:a4:9f:86:7a:84:a8:1a:3a:e0:20:d0:9a:5e:a9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #343: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #344: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #345: Exporting with [RC2-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #346: Verifying p12 file generated with [RC2-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 6f:8f:fa:5b:d5:38:11:0d:ce:00:72:36:43:a9:ae:15 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #347: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #348: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #349: Exporting with [RC2-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #350: Verifying p12 file generated with [RC2-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 33:21:fa:ca:79:5b:8c:51:e3:c6:78:5e:da:5f:14:d4 Iteration Count: 600000 (0x927c0) tools.sh: #351: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #352: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "RC2-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #353: Exporting with [RC2-CBC:RC2-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #354: Verifying p12 file generated with [RC2-CBC:RC2-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 5d:a0:e4:b5:77:1a:b1:09:13:82:37:e7:28:35:95:5b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #355: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #356: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #357: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #358: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d5:e0:52:1f:73:4e:42:51:58:fd:62:4a:2d:41:07:b5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #359: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #360: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #361: Exporting with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #362: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 11:f2:ce:87:76:b8:5f:88:a5:1f:72:d7:ef:bd:2d:18 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #364: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #365: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #366: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ae:fe:28:89:7a:05:12:85:a3:40:2d:d2:67:57:b1:06 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #367: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #368: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #369: Exporting with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #370: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e3:47:56:3b:a9:d5:92:aa:a8:0c:14:12:32:75:c1:9f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #371: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #372: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #373: Exporting with [AES-256-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #374: Verifying p12 file generated with [AES-256-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c0:5f:7c:e7:21:46:01:2d:6f:33:7c:38:63:36:2b:9b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:22:2e:c4:36:d7:57:34:f4:29:8b:98:56:41:3e: 54:cb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #376: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #377: Exporting with [DES-EDE3-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #378: Verifying p12 file generated with [DES-EDE3-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 96:d3:1c:8e:79:60:26:61:23:d6:24:ff:ad:c5:0b:12 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #379: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #380: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #381: Exporting with [default:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #382: Verifying p12 file generated with [default:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 85:61:2a:54:f1:14:6a:3f:ea:0a:b8:a6:90:5d:a8:c2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #383: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #384: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #385: Exporting with [DES-EDE3-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #386: Verifying p12 file generated with [DES-EDE3-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3e:2d:8b:ce:08:da:8b:97:ce:03:fe:b0:b5:a4:00:ef Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #387: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #388: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #389: Exporting with [DES-EDE3-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #390: Verifying p12 file generated with [DES-EDE3-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3a:20:80:24:bb:60:69:88:92:2d:45:e8:65:1c:91:72 Iteration Count: 600000 (0x927c0) tools.sh: #391: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #392: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #393: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #394: Verifying p12 file generated with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f8:a4:14:8f:71:71:fd:93:e2:47:91:78:13:b4:d2:fb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #395: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #396: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #397: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #398: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d4:f9:67:e6:6b:56:3d:8c:c5:82:09:e1:f4:d1:03:07 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #399: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #400: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #401: Exporting with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #402: Verifying p12 file generated with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: df:a2:ec:fd:e5:06:5f:35:dd:24:de:c8:07:ee:ca:5a Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:04:c9:c2:1d:fc:5c:d0:49:c8:08:d3:82:b2:85: f4:81 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #403: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #404: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #405: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #406: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0d:3d:43:99:2b:75:1f:72:b2:7c:2b:9c:16:44:e6:e4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #407: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #408: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #409: Exporting with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #410: Verifying p12 file generated with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b5:b6:24:2f:9a:47:53:cd:14:06:78:de:75:f1:48:ba Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:a2:e5:f4:9d:7c:9e:c9:e3:23:e4:c1:47:8c:54: f5:e6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #411: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #412: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #413: Exporting with [AES-256-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #414: Verifying p12 file generated with [AES-256-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cc:8b:0a:4a:c6:50:80:51:d8:57:27:a4:05:da:39:75 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:26:01:58:0e:47:fa:e2:3b:59:6a:35:17:8a:17: 1b:c9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #415: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #416: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #417: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #418: Verifying p12 file generated with [AES-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cf:88:ac:52:72:0a:73:ea:e2:7b:59:7d:ef:cc:06:0d Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:01:52:25:4a:c7:66:e3:56:92:27:86:22:c4:77: ec:43 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #419: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #420: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #421: Exporting with [default:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #422: Verifying p12 file generated with [default:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1d:48:f8:b5:8a:ed:13:34:1d:5d:f2:37:54:24:fd:e2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #423: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #424: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #425: Exporting with [AES-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #426: Verifying p12 file generated with [AES-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7f:aa:f4:19:42:fd:ab:96:fa:0f:28:1d:48:e1:c1:84 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:d7:5c:67:76:85:af:88:5f:1e:6f:f4:15:6f:2b: 04:fb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #427: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #428: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #429: Exporting with [AES-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #430: Verifying p12 file generated with [AES-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 49:1c:49:0c:82:81:7d:84:bd:7c:7a:b6:37:32:d5:5d Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: AES-128-CBC Args: 04:10:6f:b6:ef:d3:71:ca:9f:e5:5a:c0:ee:78:02:2f: de:f6 tools.sh: #431: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #432: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #433: Exporting with [AES-128-CBC:AES-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #434: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c0:55:40:e9:10:be:d8:a7:ba:8a:48:44:18:b9:b9:fb Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: AES-128-CBC Args: 04:10:ea:24:e1:7f:50:87:53:0d:73:2c:b9:de:f6:09: c1:4d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #435: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #436: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #437: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #438: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 2b:4f:47:b4:79:3e:a5:28:8a:79:5c:35:e1:0f:17:37 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #439: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #440: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #441: Exporting with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #442: Verifying p12 file generated with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 75:d2:10:c4:fd:68:4e:83:bf:93:d7:24:96:18:38:56 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:43:ac:0c:92:0b:e2:e4:5b:f7:3a:b3:eb:19:87: 08:67 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #443: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #444: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #445: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #446: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 61:c5:d3:a6:57:98:08:b4:ac:f1:c0:e5:c8:6d:94:71 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #447: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #448: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #449: Exporting with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #450: Verifying p12 file generated with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 34:00:b2:cd:3a:32:3d:eb:40:41:f4:73:3d:37:3d:9f Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:90:77:cd:4d:d8:07:37:3a:b6:bb:58:53:60:41: 7a:e5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #451: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #452: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #453: Exporting with [AES-256-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #454: Verifying p12 file generated with [AES-256-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8c:a6:81:f8:98:5c:07:d2:8b:04:66:34:d8:50:4f:27 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e0:a4:67:d3:77:07:68:15:6e:bd:ab:d5:4c:44: 42:65 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #455: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #456: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #457: Exporting with [AES-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #458: Verifying p12 file generated with [AES-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 53:a4:6d:c1:e4:fb:c2:d4:de:24:17:c5:15:dd:af:79 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:d5:05:3e:00:92:cb:e2:be:d1:e6:71:15:0f:c5: dd:2f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #459: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #460: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #461: Exporting with [default:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #462: Verifying p12 file generated with [default:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3c:0d:5f:bb:f9:84:cd:3b:97:c1:63:3f:03:0e:bd:1c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #463: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #464: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #465: Exporting with [AES-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #466: Verifying p12 file generated with [AES-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 22:96:2f:53:c0:97:21:d0:f9:3a:a2:f7:02:d4:07:c0 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:62:4d:0e:45:b2:ed:eb:1d:40:e3:58:dd:cd:ec: d0:17 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #467: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #468: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #469: Exporting with [AES-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #470: Verifying p12 file generated with [AES-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7c:27:ee:54:2c:9a:6b:ea:bb:a1:5d:ee:1e:d6:38:b5 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: AES-192-CBC Args: 04:10:e9:91:f7:2c:0f:c1:d8:1d:6e:27:5f:46:a5:42: 48:70 tools.sh: #471: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #472: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #473: Exporting with [AES-192-CBC:AES-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #474: Verifying p12 file generated with [AES-192-CBC:AES-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 60:54:a2:b5:39:27:87:90:ae:c2:c1:a2:94:ba:ef:89 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: AES-192-CBC Args: 04:10:b3:9f:71:f1:8f:0e:19:92:84:59:56:92:f3:02: d1:9d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #475: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #476: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #477: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #478: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3c:41:39:ec:4b:70:2b:e7:96:1d:78:00:ad:7b:21:67 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #479: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #480: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #481: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #482: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 57:51:2d:4b:13:54:1d:e6:25:54:e7:71:8b:7a:35:9a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:38:02:27:09:44:b0:0a:c1:96:a8:e9:ad:c2:85: 98:09 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #483: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #484: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #485: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #486: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 25:52:55:c2:ca:6c:ae:b8:f2:93:7b:0d:93:2c:13:5e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #487: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #488: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #489: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #490: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5d:29:07:33:77:b2:df:44:c3:bf:5e:4f:14:eb:a3:16 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:86:09:2b:3d:ba:d2:80:65:3c:7d:37:5f:17:b6: 1e:5a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #491: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #492: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #493: Exporting with [default:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #494: Verifying p12 file generated with [default:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4b:0a:d7:e9:3d:07:1c:0f:2c:7c:41:a5:66:a5:3a:d1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #495: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #496: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #497: Exporting with [AES-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #498: Verifying p12 file generated with [AES-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3d:17:84:39:8d:3c:9e:77:1d:ce:f2:e1:2c:34:fc:ae Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:27:6e:a7:8d:ac:c4:8e:59:d5:03:06:4f:fc:7b: 29:51 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #499: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #500: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #501: Exporting with [AES-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #502: Verifying p12 file generated with [AES-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6f:b6:09:19:28:d4:58:66:00:79:d1:ba:f7:2a:84:ca Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:e1:00:3a:13:2d:f5:71:b8:e2:17:38:dc:67:69: d9:67 tools.sh: #503: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #504: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #505: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #506: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4c:f5:7a:be:90:23:c5:39:be:ff:6f:21:7e:6e:7a:b8 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:85:f7:8f:f9:c7:01:dd:36:87:11:26:c9:42:4b: 5c:ed Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #507: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #508: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #509: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #510: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 60:9c:81:6e:8e:69:1f:3f:5f:8e:57:7f:bf:77:6f:42 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #511: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #512: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #513: Exporting with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #514: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f0:a5:a4:d5:73:a7:00:c9:20:a1:2a:e7:5c:78:11:90 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:9e:3c:fa:66:ff:5b:a4:4d:54:d0:3f:8a:8f:ad: a1:6f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #515: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #516: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #517: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #518: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 69:3a:11:7e:ed:23:ea:16:ed:3b:2c:37:0e:e4:43:8f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #519: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #520: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #521: Exporting with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #522: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 92:0d:11:63:1c:a9:65:41:4d:c1:2e:02:59:0f:7b:31 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:52:27:3f:b3:94:fe:d4:b1:7a:59:7f:d4:13:1d: 42:15 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #523: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #524: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #525: Exporting with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #526: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c2:1d:9f:63:fd:d8:eb:97:ca:45:e1:86:a7:e4:6d:2b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:87:86:cc:95:4f:58:ab:34:9b:da:26:26:7c:67: d7:ee Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #527: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #528: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #529: Exporting with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #530: Verifying p12 file generated with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 74:37:f4:09:3e:3f:ed:77:17:3a:85:46:05:e2:7b:3f Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:a0:d4:7a:f5:d0:b2:07:55:b4:e2:50:13:2b:a9: c2:b7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #531: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #532: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #533: Exporting with [default:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #534: Verifying p12 file generated with [default:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 57:ab:0e:f2:3f:e0:a3:39:89:b3:70:4f:64:6b:23:7c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #535: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #536: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #537: Exporting with [CAMELLIA-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #538: Verifying p12 file generated with [CAMELLIA-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 16:74:c8:2c:4f:93:1b:3c:42:31:43:e8:af:69:2e:2e Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:25:d7:dd:ab:0f:a0:6a:78:4b:1b:16:f1:a1:e8: b0:ce Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #539: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #540: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #541: Exporting with [CAMELLIA-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #542: Verifying p12 file generated with [CAMELLIA-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d6:67:aa:dc:42:83:b4:4f:a6:ab:34:07:51:14:35:a2 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-128-CBC Args: 04:10:27:d7:0e:97:0f:9a:5b:10:00:32:93:41:7a:1c: 54:29 tools.sh: #543: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #544: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #545: Exporting with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #546: Verifying p12 file generated with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 41:29:ce:55:39:1d:24:30:cd:4d:7f:dd:9b:be:1c:ee Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-128-CBC Args: 04:10:8f:40:4c:51:92:27:67:a4:46:0d:72:68:e8:81: 1b:9c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #547: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #548: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #549: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #550: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 60:f3:3d:7e:e3:8b:f1:9e:d3:b5:c5:12:20:18:f2:d2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #551: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #552: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #553: Exporting with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #554: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cd:eb:9c:67:2d:bb:a8:45:36:9e:26:3e:a8:af:d4:7c Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:1e:86:50:34:32:52:30:58:5e:2f:84:35:84:58: ba:d0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #555: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #556: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #557: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #558: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 74:9d:dd:5e:fd:b3:e6:f8:fa:41:a4:5f:10:2e:e4:ba Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #559: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #560: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #561: Exporting with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #562: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b5:87:63:7a:9f:99:c2:c5:b2:22:9c:26:4a:46:5f:6d Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:a9:c3:a0:d7:92:ca:dd:e2:46:9b:c1:96:d6:30: 99:63 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #563: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #564: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #565: Exporting with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #566: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 63:b0:8a:34:0d:f5:cf:e1:db:d8:ee:4b:8c:67:91:42 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:bc:55:3d:74:76:7e:90:85:b5:13:c6:1f:72:b9: 3a:72 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #567: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #568: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #569: Exporting with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #570: Verifying p12 file generated with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3a:9d:1b:b3:f2:8d:35:18:ea:c5:0d:8b:f6:6f:0a:fb Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:9e:06:5c:a6:38:2d:f2:bd:e7:32:a7:f3:d9:7c: d3:89 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #571: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #572: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #573: Exporting with [default:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #574: Verifying p12 file generated with [default:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e8:bf:7f:6c:82:91:66:cb:2d:8c:1b:1e:02:a7:f3:89 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #575: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #576: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #577: Exporting with [CAMELLIA-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #578: Verifying p12 file generated with [CAMELLIA-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e6:a6:bc:4a:3d:47:78:61:d8:3a:3a:33:88:18:39:18 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:e1:11:55:21:54:02:7d:d8:03:05:c5:69:a4:e1: f3:9c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #579: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #580: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #581: Exporting with [CAMELLIA-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #582: Verifying p12 file generated with [CAMELLIA-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8f:88:81:43:6b:fb:03:b2:12:be:cb:90:dc:d4:c2:35 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-192-CBC Args: 04:10:eb:2e:cd:df:3e:58:f4:93:42:85:26:b8:e5:40: d8:65 tools.sh: #583: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #584: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #585: Exporting with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #586: Verifying p12 file generated with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: de:0f:ef:22:63:6e:6e:f7:0c:a3:4a:85:69:fc:1e:19 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-192-CBC Args: 04:10:b3:63:16:49:d8:ca:71:05:1d:74:6d:21:19:f8: f7:2f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #587: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #588: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #589: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #590: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 5f:af:3c:d8:20:d3:69:9f:af:49:59:67:6b:4d:f2:a2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #591: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #592: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #593: Exporting with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #594: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 51:b2:3e:05:6f:e9:d7:c5:62:b2:4a:39:d9:ac:62:bc Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:7c:ff:94:e7:ce:86:65:b4:a1:12:9b:88:32:8c: d8:e1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #595: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #596: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #597: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #598: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b2:29:d4:63:6b:ac:b2:ba:0a:bd:6f:6d:0d:c4:a3:d3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #602: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a0:aa:77:24:f1:aa:08:b3:d3:9c:97:7b:0d:48:87:18 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:f8:73:6a:ea:a2:0d:3d:ee:ac:f9:db:ab:0d:33: f6:4f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #603: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #604: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #605: Exporting with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #606: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5b:4f:15:fe:5b:00:bb:c9:d7:1f:8c:9a:1a:dc:07:3f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:76:5a:e4:38:3a:0e:57:cd:90:26:fe:5b:7b:72: a0:11 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #607: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #608: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #609: Exporting with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #610: Verifying p12 file generated with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5d:c1:56:89:1d:4b:7e:c2:2a:69:d0:01:80:3d:7a:af Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:db:04:23:9e:77:53:76:33:f0:48:f0:9a:43:f1: df:10 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #611: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [default:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #614: Verifying p12 file generated with [default:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 13:b2:b3:ad:a6:86:70:59:e9:15:db:14:31:95:54:69 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #615: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #616: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #617: Exporting with [CAMELLIA-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #618: Verifying p12 file generated with [CAMELLIA-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f2:ee:0b:83:1e:30:9c:00:7d:f5:87:ff:b5:b1:ac:37 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:0e:e6:68:d9:c6:90:23:d1:9e:be:44:ee:36:80: 8e:0c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #619: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #620: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #621: Exporting with [CAMELLIA-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #622: Verifying p12 file generated with [CAMELLIA-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 49:73:ef:4a:94:2f:a2:db:7a:af:9a:65:13:15:eb:60 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-256-CBC Args: 04:10:c2:e9:5c:ca:d2:90:fa:1e:73:c2:81:bc:3b:ae: 80:d4 tools.sh: #623: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #626: Verifying p12 file generated with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 96:65:85:f9:93:3a:3e:a7:21:13:f0:11:7f:a9:4a:31 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-256-CBC Args: 04:10:76:e5:0e:8f:35:6b:a8:ce:b9:8a:28:8b:04:da: 5f:28 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #627: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #628: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #629: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #630: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 83:83:63:ca:bb:6a:69:35:72:f8:f4:88:c4:c7:ae:0f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #631: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #632: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #633: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #634: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d0:61:f8:27:e3:f1:12:25:28:e0:8d:10:9b:88:68:14 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #638: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e9:ae:93:d2:6d:80:65:df:78:ce:67:a9:a7:3c:f7:64 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #639: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #640: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #641: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #642: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 82:ab:bf:f2:51:48:54:3e:15:f3:c4:f6:9b:62:8f:b0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #643: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #644: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #645: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #646: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 0a:e6:18:46:3a:3e:ad:03:be:7a:67:c6:1d:70:23:13 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #647: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #650: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 85:b3:36:6b:f3:f2:1a:db:1b:b0:dd:5d:1c:5c:f7:dd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #651: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #652: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #653: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #654: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cf:b7:08:52:15:c6:a8:6f:9c:f5:1a:03:ab:4b:69:28 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #655: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #656: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #657: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #658: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 59:1f:dd:70:a7:72:25:19:ab:b8:27:03:6f:3e:13:14 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #662: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ad:01:b8:ef:8c:a2:e7:36:5b:10:e7:73:91:0c:2b:19 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #663: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #664: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #665: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #666: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fe:ad:9a:cd:fb:71:16:72:74:02:02:ba:af:48:76:66 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #667: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #668: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #669: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #670: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 83:17:e0:4e:91:93:6f:24:fb:8d:b1:d6:45:39:f1:be Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #674: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b5:5e:1d:41:99:f2:a3:37:f0:66:5b:77:3f:b2:c2:8f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #675: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #676: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #677: Exporting with [AES-256-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #678: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 60:78:ad:c9:f3:32:20:9d:73:29:bf:d4:2d:9f:06:cd Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:1a:e6:ba:75:cf:cb:34:63:35:65:49:af:98:60: 80:ae Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #679: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #680: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #681: Exporting with [AES-256-CBC:AES-256-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #682: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8a:76:34:0d:58:a7:4c:f6:64:38:92:67:b5:63:58:dc Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:be:04:ff:ed:5e:db:12:d5:44:ec:c3:30:ac:fb: de:2d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #683: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [AES-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #686: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b4:0c:b3:7e:40:98:cd:b8:71:9f:f5:60:07:f0:82:8b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:27:e8:47:0b:a7:cd:30:f3:17:94:db:2d:dc:7f: 42:7b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #687: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #688: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #689: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #690: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4b:0e:7f:69:6a:3c:f5:fe:7e:a4:25:b1:63:cf:5b:14 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:7e:53:9d:6c:f3:1f:44:05:0c:bc:2a:fc:b3:42: 19:bc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #691: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #692: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #693: Exporting with [AES-256-CBC:AES-256-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #694: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 11:eb:0a:39:7d:65:7d:7f:9f:fd:3f:69:b9:cb:f6:75 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: AES-256-CBC Args: 04:10:a4:bf:1a:35:48:c4:67:6f:91:91:12:9a:84:bd: ec:72 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [AES-256-CBC:AES-256-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #698: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ea:2b:f8:50:af:96:d2:35:53:71:c1:85:72:75:d3:3e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:cb:1c:fe:a5:17:59:96:71:ad:21:07:df:5e:88: 0c:bb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #699: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #700: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #701: Exporting with [default:default:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #702: Verifying p12 file generated with [default:default:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f1:2c:42:b5:98:06:9c:55:1c:98:91:d7:f4:63:54:c1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #703: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #704: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #705: Exporting with [default:default:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #706: Verifying p12 file generated with [default:default:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9f:4d:8b:09:5d:e2:1d:16:83:5b:5d:bd:58:a0:49:69 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #709: Exporting with [default:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #710: Verifying p12 file generated with [default:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4a:18:e6:89:5c:c0:4c:ad:86:f1:10:64:8c:cc:9b:ca Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #711: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #712: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #713: Exporting with [default:default:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #714: Verifying p12 file generated with [default:default:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 97:1b:0d:3a:bf:77:02:f2:ef:d0:cc:57:bf:c7:69:f1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #715: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #716: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #717: Exporting with [default:default:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #718: Verifying p12 file generated with [default:default:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0e:d1:73:f7:b2:43:18:71:e3:97:5c:8c:18:16:13:a5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #719: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #721: Exporting with [default:default:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #722: Verifying p12 file generated with [default:default:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a2:32:d2:df:1e:81:ef:98:57:5f:75:9d:0b:7c:2c:20 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:52:37 2022 Not After : Tue Sep 27 20:52:37 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:31:0a:87:09:a6:46:0d:13:f6:02:f9:b0:0f:50:da: 27:7e:ab:ad:c0:35:b1:0a:be:80:21:be:40:5d:d0:8f: e5:02:42:de:cf:a2:1e:57:fa:fc:ea:a5:fb:e4:54:82: 28:fe:6d:49:0d:36:2c:f1:55:61:0e:27:42:a2:9e:72: e3:99:ba:a1:09:29:af:e4:2f:2b:82:f3:6a:3e:25:4a: 00:72:4c:3a:6d:69:4d:6e:cf:03:8f:b1:2e:a8:5d:a5: bb:ff:9d:11:f4:ea:a5:47:fc:16:50:c8:de:20:e0:3d: 3a:d2:dd:fb:bf:3e:78:cc:bd:e1:31:42:7a:fc:4f:34: 3d:3c:21:fb:a2:a9:d3:8a:57:d0:02:6e:89:b1:72:d0: 59:c6:fb:24:fc:3d:4b:92:2e:dd:7a:a7:73:76:d5:76: 60:09:e8:4a:26:5d:af:79:b0:83:aa:84:34:88:cc:e7: 97:65:74:d4:50:ef:9e:97:87:bd:70:eb:2b:d6:2a:13: 58:e7:d4:8c:63:cf:04:76:f6:4a:ef:ae:e9:7b:5d:80: a5:37:ce:b9:f7:98:ef:0d:69:7f:d9:61:80:ec:56:c5: 88:70:25:7f:27:c6:d0:d3:0b:c5:61:cc:92:44:f8:d9: 6e:5c:3a:cb:e0:97:9e:ea:c2:08:fd:7b:ab:e3:ba:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:b6:9b:26:15:0c:44:97:35:1a:48:47:39:0c:8d:dd: 6d:1e:e1:d9:08:c2:f4:1c:36:38:e0:b9:07:3c:7c:4a: 0e:c8:c4:71:3f:b0:d4:91:24:b4:20:33:53:4a:25:44: d3:5f:c1:7f:b7:86:2e:de:21:01:12:ba:54:11:5a:47: b8:c5:58:55:65:66:38:58:1d:10:8a:dc:97:49:54:6a: 85:8d:68:5c:0d:a6:49:cb:19:8e:0d:c0:b4:ad:d7:f5: 3a:40:e3:c9:e4:8d:ae:94:c2:43:03:13:6a:1e:da:42: 24:7d:e3:7c:02:46:12:3b:e7:ce:f8:2c:ce:09:96:ce: 1f:2a:f6:16:6e:ea:77:7c:3a:81:e4:f8:0e:ba:fb:48: f7:4d:c7:58:33:74:a4:8f:90:fa:5c:25:7b:c5:63:d2: 2c:82:8b:f0:fe:bb:03:5d:16:d6:c0:7d:12:d2:ae:e6: 8e:c4:be:6e:d0:a0:ec:75:fd:1b:e3:6f:cd:01:b2:f8: fb:85:fe:93:d1:05:aa:18:71:7e:92:a2:1b:4d:19:f2: 6c:13:ca:24:0d:14:fc:36:b2:9a:93:97:91:7c:7c:66: 0c:45:c3:cf:90:a9:d2:80:8d:3b:27:91:3b:15:0c:1b: d6:3b:a6:60:94:a0:20:d2:70:4c:bf:ee:98:81:54:05 Fingerprint (SHA-256): 83:0A:75:5A:64:49:F8:13:74:A7:0F:1E:56:05:08:7C:9E:2C:1B:4E:30:8C:97:8E:26:F8:51:B6:F8:BB:48:5F Fingerprint (SHA1): 70:A8:B1:33:57:39:6D:6F:20:CB:70:F2:03:67:38:29:22:A3:39:A3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 20:53:49 2022 Not After : Mon Sep 27 20:53:49 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:53:4a:b6:2c:ee:22:4a:13:7a:4b:d4:4f:f2:ee:eb: 5a:71:04:d3:37:e0:31:85:3e:15:9e:ac:9f:65:8a:0a: 4b:a5:8b:0d:84:a3:fb:6e:b2:9e:d7:fc:fa:09:65:3a: f9:88:71:ad:f9:17:40:63:97:9c:46:8d:a5:11:ea:a7: 17:b8:c8:28:ff:67:a6:09:d6:90:8c:f3:08:a7:2c:75: 2d:07:58:eb:5f:86:18:e5:24:f1:cb:02:ef:ef:2d:83: 63:76:24:64:2e:c9:01:88:ae:e0:ea:90:52:0f:78:d2: 63:3d:4b:41:5d:fa:cd:90:04:38:cc:0d:ec:6c:7b:10: 02:37:f3:dd:ab:6b:26:f4:b1:83:ee:4d:39:11:2a:c1: e2:f1:3b:8b:21:62:95:38:32:5b:60:5d:73:ed:54:a3: 2c:28:ae:4e:03:b6:0a:d3:98:6b:a3:26:04:c8:fd:e2: 55:d8:1f:34:52:61:e1:79:67:b1:29:bb:06:f7:f6:4d: 73:62:09:fb:d3:62:39:d3:ab:ea:37:e1:89:ba:87:87: d5:ee:3d:4f:18:4b:96:37:c4:cd:06:6c:7f:31:c2:c0: 9f:79:b3:36:92:3b:cb:1c:63:d2:41:59:61:b5:48:b4: 99:19:22:d1:b7:5a:0d:54:bb:8c:9c:f7:85:d0:ec:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1b:8c:1e:d2:6c:ad:67:87:77:34:2a:91:40:84:8a: 96:f9:11:3d:00:48:f0:8c:07:c3:b0:e2:37:42:83:f0: 62:77:3b:3a:12:c5:cc:b7:e1:97:21:37:dc:bc:b9:00: fc:4b:9a:af:e6:af:5e:8c:fc:30:f2:cc:8a:c7:18:e0: 20:1b:9d:d0:5b:4b:ff:c6:98:ae:55:ce:86:77:1f:f5: 2f:14:ce:df:81:5a:36:52:ba:51:a6:f4:cb:38:f6:d4: d2:13:89:ac:31:db:f9:ed:47:3c:67:43:a0:18:1e:51: 4e:11:73:3e:73:f7:f9:82:d8:aa:dd:f9:7c:81:7d:d2: 8e:72:ac:2a:88:b6:88:a5:30:ff:32:07:59:1f:42:a7: 8f:4e:5b:e6:d4:77:bc:fd:fa:d9:b9:5c:6e:fc:4e:88: 3f:15:b5:3e:fb:0f:47:64:93:0c:1c:89:9e:d1:c1:5d: 0e:5b:a4:12:af:83:52:92:3c:82:21:01:00:0f:70:17: 26:9e:04:fd:38:09:ef:e5:44:ea:b7:05:13:59:1c:bb: fe:b3:80:21:7d:00:a5:d7:e0:d0:e4:1d:82:10:75:39: d8:bf:14:ad:ce:ac:bf:ad:28:0d:4e:d2:64:7d:fb:84: 57:c0:a7:93:51:dd:f3:0a:26:45:03:eb:8a:52:66:6b Fingerprint (SHA-256): 0A:1E:F1:B4:8F:88:9C:27:C7:46:E2:13:E6:82:03:EE:59:B0:F9:41:57:ED:B1:E7:E9:53:12:C9:C4:60:0D:90 Fingerprint (SHA1): 6C:38:EE:F0:61:11:1F:7B:43:15:A5:84:64:51:4D:0D:2D:E0:85:BC Friendly Name: Alice tools.sh: #723: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #724: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c none pk12util: Algorithm: "none": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #725: Exporting with [none:default:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C none pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #726: Exporting with [default:none:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #727: Verifying p12 file generated with [default:none:default] - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #728: Exporting with [INVALID_CIPHER:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #729: Exporting with [default:INVALID_CIPHER] (pk12util -o) - PASSED tools.sh: Importing PKCS#12 files created with older NSS -------------- pk12util -i TestOldCA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #730: Importing PKCS#12 file created with NSS 3.21 (PBES2 with BMPString password) - PASSED pk12util -i TestOldAES128CA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #731: Importing PKCS#12 file created with NSS 3.29.5 (PBES2 with incorrect AES-128-CBC algorithm ID) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #732: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #733: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #734: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #735: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #736: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #737: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #738: Show who signed xpi (signtool -w) - PASSED tools.sh: Test if DB created by modutil -create is initialized WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Generating key. This may take a few moments... tools.sh: #739: Test if DB created by modutil -create is initialized - PASSED TIMESTAMP tools END: Tue Sep 27 21:45:29 UTC 2022 Running tests for fips TIMESTAMP fips BEGIN: Tue Sep 27 21:45:29 UTC 2022 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Internal%20Crypto%20Services;library-version=3.79 slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB uri: pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 2. RootCerts library name: /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Builtin%20Object%20Cryptoki%20Modu;library-version=2.54 slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token uri: pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 ----------------------------------------------------------- FIPS mode enabled. fips.sh: #1: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa d76db3849ccde6050a3d59e4a63f22224a137e9f NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #3: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #4: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #5: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #6: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #7: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #8: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #9: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #11: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #13: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa d76db3849ccde6050a3d59e4a63f22224a137e9f FIPS_PUB_140_Test_Certificate fips.sh: #14: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #15: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #16: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #17: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #18: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa d76db3849ccde6050a3d59e4a63f22224a137e9f FIPS_PUB_140_Test_Certificate fips.sh: #19: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 99. **** **** ALL TESTS PASSED **** fips.sh: #20: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 97. **** **** ALL TESTS PASSED **** fips.sh: #21: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi-testlib.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib64/libsoftokn3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle Changing byte 0x00053dc0 (343488): from 00 (0) to 20 (32) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/fips/mangle dbtest -r -d ../fips fips.sh: #22: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Tue Sep 27 21:46:09 UTC 2022 Running tests for ssl TIMESTAMP ssl BEGIN: Tue Sep 27 21:46:09 UTC 2022 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20539 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20539 found at Tue Sep 27 21:46:09 UTC 2022 selfserv_9223 with PID 20539 started at Tue Sep 27 21:46:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20539 at Tue Sep 27 21:46:10 UTC 2022 kill -USR1 20539 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20539 killed at Tue Sep 27 21:46:10 UTC 2022 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20591 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20591 found at Tue Sep 27 21:46:10 UTC 2022 selfserv_9223 with PID 20591 started at Tue Sep 27 21:46:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20591 at Tue Sep 27 21:46:11 UTC 2022 kill -USR1 20591 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20591 killed at Tue Sep 27 21:46:11 UTC 2022 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20643 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20643 found at Tue Sep 27 21:46:11 UTC 2022 selfserv_9223 with PID 20643 started at Tue Sep 27 21:46:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #3: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20643 at Tue Sep 27 21:46:12 UTC 2022 kill -USR1 20643 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20643 killed at Tue Sep 27 21:46:12 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:46:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20709 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20709 found at Tue Sep 27 21:46:13 UTC 2022 selfserv_9223 with PID 20709 started at Tue Sep 27 21:46:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #4: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20709 at Tue Sep 27 21:46:13 UTC 2022 kill -USR1 20709 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20709 killed at Tue Sep 27 21:46:13 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:46:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20761 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20761 found at Tue Sep 27 21:46:14 UTC 2022 selfserv_9223 with PID 20761 started at Tue Sep 27 21:46:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20761 at Tue Sep 27 21:46:14 UTC 2022 kill -USR1 20761 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20761 killed at Tue Sep 27 21:46:14 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:46:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20813 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20813 found at Tue Sep 27 21:46:15 UTC 2022 selfserv_9223 with PID 20813 started at Tue Sep 27 21:46:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #6: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20813 at Tue Sep 27 21:46:15 UTC 2022 kill -USR1 20813 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20813 killed at Tue Sep 27 21:46:15 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20879 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20879 found at Tue Sep 27 21:46:16 UTC 2022 selfserv_9223 with PID 20879 started at Tue Sep 27 21:46:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #7: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 20879 at Tue Sep 27 21:46:16 UTC 2022 kill -USR1 20879 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20879 killed at Tue Sep 27 21:46:16 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20931 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20931 found at Tue Sep 27 21:46:17 UTC 2022 selfserv_9223 with PID 20931 started at Tue Sep 27 21:46:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20931 at Tue Sep 27 21:46:17 UTC 2022 kill -USR1 20931 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20931 killed at Tue Sep 27 21:46:17 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20991 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20991 found at Tue Sep 27 21:46:18 UTC 2022 selfserv_9223 with PID 20991 started at Tue Sep 27 21:46:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 20991 at Tue Sep 27 21:46:18 UTC 2022 kill -USR1 20991 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20991 killed at Tue Sep 27 21:46:18 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21064 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21064 found at Tue Sep 27 21:46:19 UTC 2022 selfserv_9223 with PID 21064 started at Tue Sep 27 21:46:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 21064 at Tue Sep 27 21:46:19 UTC 2022 kill -USR1 21064 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21064 killed at Tue Sep 27 21:46:19 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21116 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21116 found at Tue Sep 27 21:46:20 UTC 2022 selfserv_9223 with PID 21116 started at Tue Sep 27 21:46:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #11: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 21116 at Tue Sep 27 21:46:20 UTC 2022 kill -USR1 21116 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21116 killed at Tue Sep 27 21:46:21 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21168 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21168 found at Tue Sep 27 21:46:21 UTC 2022 selfserv_9223 with PID 21168 started at Tue Sep 27 21:46:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #12: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 21168 at Tue Sep 27 21:46:22 UTC 2022 kill -USR1 21168 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21168 killed at Tue Sep 27 21:46:22 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:46:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21234 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21234 found at Tue Sep 27 21:46:22 UTC 2022 selfserv_9223 with PID 21234 started at Tue Sep 27 21:46:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #13: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 21234 at Tue Sep 27 21:46:23 UTC 2022 kill -USR1 21234 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21234 killed at Tue Sep 27 21:46:23 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:46:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21286 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21286 found at Tue Sep 27 21:46:23 UTC 2022 selfserv_9223 with PID 21286 started at Tue Sep 27 21:46:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #14: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 21286 at Tue Sep 27 21:46:24 UTC 2022 kill -USR1 21286 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21286 killed at Tue Sep 27 21:46:24 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:46:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21338 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21338 found at Tue Sep 27 21:46:24 UTC 2022 selfserv_9223 with PID 21338 started at Tue Sep 27 21:46:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #15: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 21338 at Tue Sep 27 21:46:24 UTC 2022 kill -USR1 21338 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21338 killed at Tue Sep 27 21:46:25 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21404 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21404 found at Tue Sep 27 21:46:25 UTC 2022 selfserv_9223 with PID 21404 started at Tue Sep 27 21:46:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #16: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 21404 at Tue Sep 27 21:46:25 UTC 2022 kill -USR1 21404 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21404 killed at Tue Sep 27 21:46:26 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21456 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21456 found at Tue Sep 27 21:46:26 UTC 2022 selfserv_9223 with PID 21456 started at Tue Sep 27 21:46:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #17: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21456 at Tue Sep 27 21:46:26 UTC 2022 kill -USR1 21456 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21456 killed at Tue Sep 27 21:46:27 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21509 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21509 found at Tue Sep 27 21:46:27 UTC 2022 selfserv_9223 with PID 21509 started at Tue Sep 27 21:46:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #18: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 21509 at Tue Sep 27 21:46:27 UTC 2022 kill -USR1 21509 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21509 killed at Tue Sep 27 21:46:28 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21575 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21575 found at Tue Sep 27 21:46:28 UTC 2022 selfserv_9223 with PID 21575 started at Tue Sep 27 21:46:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #19: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21575 at Tue Sep 27 21:46:29 UTC 2022 kill -USR1 21575 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21575 killed at Tue Sep 27 21:46:29 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21627 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21627 found at Tue Sep 27 21:46:29 UTC 2022 selfserv_9223 with PID 21627 started at Tue Sep 27 21:46:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #20: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21627 at Tue Sep 27 21:46:30 UTC 2022 kill -USR1 21627 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21627 killed at Tue Sep 27 21:46:30 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21679 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21679 found at Tue Sep 27 21:46:30 UTC 2022 selfserv_9223 with PID 21679 started at Tue Sep 27 21:46:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #21: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21679 at Tue Sep 27 21:46:31 UTC 2022 kill -USR1 21679 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21679 killed at Tue Sep 27 21:46:31 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:46:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21745 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21745 found at Tue Sep 27 21:46:31 UTC 2022 selfserv_9223 with PID 21745 started at Tue Sep 27 21:46:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #22: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21745 at Tue Sep 27 21:46:32 UTC 2022 kill -USR1 21745 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21745 killed at Tue Sep 27 21:46:32 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:46:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21797 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21797 found at Tue Sep 27 21:46:32 UTC 2022 selfserv_9223 with PID 21797 started at Tue Sep 27 21:46:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #23: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21797 at Tue Sep 27 21:46:33 UTC 2022 kill -USR1 21797 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21797 killed at Tue Sep 27 21:46:33 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:46:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21849 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21849 found at Tue Sep 27 21:46:33 UTC 2022 selfserv_9223 with PID 21849 started at Tue Sep 27 21:46:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #24: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21849 at Tue Sep 27 21:46:34 UTC 2022 kill -USR1 21849 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21849 killed at Tue Sep 27 21:46:34 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21915 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21915 found at Tue Sep 27 21:46:34 UTC 2022 selfserv_9223 with PID 21915 started at Tue Sep 27 21:46:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #25: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 21915 at Tue Sep 27 21:46:35 UTC 2022 kill -USR1 21915 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21915 killed at Tue Sep 27 21:46:35 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21967 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21967 found at Tue Sep 27 21:46:35 UTC 2022 selfserv_9223 with PID 21967 started at Tue Sep 27 21:46:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #26: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21967 at Tue Sep 27 21:46:36 UTC 2022 kill -USR1 21967 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21967 killed at Tue Sep 27 21:46:36 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22019 found at Tue Sep 27 21:46:36 UTC 2022 selfserv_9223 with PID 22019 started at Tue Sep 27 21:46:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #27: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22019 at Tue Sep 27 21:46:36 UTC 2022 kill -USR1 22019 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22019 killed at Tue Sep 27 21:46:37 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22086 found at Tue Sep 27 21:46:37 UTC 2022 selfserv_9223 with PID 22086 started at Tue Sep 27 21:46:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #28: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22086 at Tue Sep 27 21:46:38 UTC 2022 kill -USR1 22086 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22086 killed at Tue Sep 27 21:46:38 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22140 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22140 found at Tue Sep 27 21:46:38 UTC 2022 selfserv_9223 with PID 22140 started at Tue Sep 27 21:46:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #29: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22140 at Tue Sep 27 21:46:39 UTC 2022 kill -USR1 22140 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22140 killed at Tue Sep 27 21:46:39 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22192 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22192 found at Tue Sep 27 21:46:39 UTC 2022 selfserv_9223 with PID 22192 started at Tue Sep 27 21:46:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #30: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22192 at Tue Sep 27 21:46:40 UTC 2022 kill -USR1 22192 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22192 killed at Tue Sep 27 21:46:40 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:46:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22258 found at Tue Sep 27 21:46:40 UTC 2022 selfserv_9223 with PID 22258 started at Tue Sep 27 21:46:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #31: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22258 at Tue Sep 27 21:46:41 UTC 2022 kill -USR1 22258 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22258 killed at Tue Sep 27 21:46:41 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:46:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22310 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22310 found at Tue Sep 27 21:46:41 UTC 2022 selfserv_9223 with PID 22310 started at Tue Sep 27 21:46:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #32: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22310 at Tue Sep 27 21:46:42 UTC 2022 kill -USR1 22310 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22310 killed at Tue Sep 27 21:46:42 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:46:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22362 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22362 found at Tue Sep 27 21:46:42 UTC 2022 selfserv_9223 with PID 22362 started at Tue Sep 27 21:46:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #33: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22362 at Tue Sep 27 21:46:42 UTC 2022 kill -USR1 22362 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22362 killed at Tue Sep 27 21:46:43 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22428 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22428 found at Tue Sep 27 21:46:43 UTC 2022 selfserv_9223 with PID 22428 started at Tue Sep 27 21:46:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #34: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22428 at Tue Sep 27 21:46:43 UTC 2022 kill -USR1 22428 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22428 killed at Tue Sep 27 21:46:44 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22480 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22480 found at Tue Sep 27 21:46:44 UTC 2022 selfserv_9223 with PID 22480 started at Tue Sep 27 21:46:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #35: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22480 at Tue Sep 27 21:46:44 UTC 2022 kill -USR1 22480 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22480 killed at Tue Sep 27 21:46:45 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22532 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22532 found at Tue Sep 27 21:46:45 UTC 2022 selfserv_9223 with PID 22532 started at Tue Sep 27 21:46:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #36: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22532 at Tue Sep 27 21:46:45 UTC 2022 kill -USR1 22532 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22532 killed at Tue Sep 27 21:46:45 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22599 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22599 found at Tue Sep 27 21:46:46 UTC 2022 selfserv_9223 with PID 22599 started at Tue Sep 27 21:46:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #37: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22599 at Tue Sep 27 21:46:47 UTC 2022 kill -USR1 22599 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22599 killed at Tue Sep 27 21:46:47 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22655 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22655 found at Tue Sep 27 21:46:47 UTC 2022 selfserv_9223 with PID 22655 started at Tue Sep 27 21:46:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #38: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22655 at Tue Sep 27 21:46:48 UTC 2022 kill -USR1 22655 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22655 killed at Tue Sep 27 21:46:48 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22707 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22707 found at Tue Sep 27 21:46:48 UTC 2022 selfserv_9223 with PID 22707 started at Tue Sep 27 21:46:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #39: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22707 at Tue Sep 27 21:46:49 UTC 2022 kill -USR1 22707 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22707 killed at Tue Sep 27 21:46:49 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:46:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22773 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22773 found at Tue Sep 27 21:46:50 UTC 2022 selfserv_9223 with PID 22773 started at Tue Sep 27 21:46:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #40: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22773 at Tue Sep 27 21:46:50 UTC 2022 kill -USR1 22773 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22773 killed at Tue Sep 27 21:46:51 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:46:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22825 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22825 found at Tue Sep 27 21:46:51 UTC 2022 selfserv_9223 with PID 22825 started at Tue Sep 27 21:46:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #41: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22825 at Tue Sep 27 21:46:51 UTC 2022 kill -USR1 22825 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22825 killed at Tue Sep 27 21:46:52 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:46:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22877 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22877 found at Tue Sep 27 21:46:52 UTC 2022 selfserv_9223 with PID 22877 started at Tue Sep 27 21:46:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #42: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22877 at Tue Sep 27 21:46:52 UTC 2022 kill -USR1 22877 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22877 killed at Tue Sep 27 21:46:53 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22943 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22943 found at Tue Sep 27 21:46:53 UTC 2022 selfserv_9223 with PID 22943 started at Tue Sep 27 21:46:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #43: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22943 at Tue Sep 27 21:46:54 UTC 2022 kill -USR1 22943 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22943 killed at Tue Sep 27 21:46:54 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22995 found at Tue Sep 27 21:46:54 UTC 2022 selfserv_9223 with PID 22995 started at Tue Sep 27 21:46:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #44: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22995 at Tue Sep 27 21:46:55 UTC 2022 kill -USR1 22995 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22995 killed at Tue Sep 27 21:46:55 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23047 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23047 found at Tue Sep 27 21:46:55 UTC 2022 selfserv_9223 with PID 23047 started at Tue Sep 27 21:46:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #45: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23047 at Tue Sep 27 21:46:56 UTC 2022 kill -USR1 23047 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23047 killed at Tue Sep 27 21:46:56 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23113 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23113 found at Tue Sep 27 21:46:56 UTC 2022 selfserv_9223 with PID 23113 started at Tue Sep 27 21:46:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #46: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23113 at Tue Sep 27 21:46:57 UTC 2022 kill -USR1 23113 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23113 killed at Tue Sep 27 21:46:57 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23165 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23165 found at Tue Sep 27 21:46:58 UTC 2022 selfserv_9223 with PID 23165 started at Tue Sep 27 21:46:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #47: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23165 at Tue Sep 27 21:46:58 UTC 2022 kill -USR1 23165 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23165 killed at Tue Sep 27 21:46:59 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:46:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:46:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23217 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23217 found at Tue Sep 27 21:46:59 UTC 2022 selfserv_9223 with PID 23217 started at Tue Sep 27 21:46:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #48: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23217 at Tue Sep 27 21:47:00 UTC 2022 kill -USR1 23217 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23217 killed at Tue Sep 27 21:47:00 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:47:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23283 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23283 found at Tue Sep 27 21:47:00 UTC 2022 selfserv_9223 with PID 23283 started at Tue Sep 27 21:47:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #49: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23283 at Tue Sep 27 21:47:01 UTC 2022 kill -USR1 23283 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23283 killed at Tue Sep 27 21:47:01 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:47:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23335 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23335 found at Tue Sep 27 21:47:01 UTC 2022 selfserv_9223 with PID 23335 started at Tue Sep 27 21:47:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #50: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23335 at Tue Sep 27 21:47:02 UTC 2022 kill -USR1 23335 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23335 killed at Tue Sep 27 21:47:02 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:47:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23387 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23387 found at Tue Sep 27 21:47:02 UTC 2022 selfserv_9223 with PID 23387 started at Tue Sep 27 21:47:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #51: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23387 at Tue Sep 27 21:47:03 UTC 2022 kill -USR1 23387 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23387 killed at Tue Sep 27 21:47:03 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23453 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23453 found at Tue Sep 27 21:47:03 UTC 2022 selfserv_9223 with PID 23453 started at Tue Sep 27 21:47:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #52: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23453 at Tue Sep 27 21:47:04 UTC 2022 kill -USR1 23453 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23453 killed at Tue Sep 27 21:47:04 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23505 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23505 found at Tue Sep 27 21:47:05 UTC 2022 selfserv_9223 with PID 23505 started at Tue Sep 27 21:47:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #53: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23505 at Tue Sep 27 21:47:05 UTC 2022 kill -USR1 23505 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23505 killed at Tue Sep 27 21:47:05 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23557 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23557 found at Tue Sep 27 21:47:06 UTC 2022 selfserv_9223 with PID 23557 started at Tue Sep 27 21:47:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #54: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23557 at Tue Sep 27 21:47:06 UTC 2022 kill -USR1 23557 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23557 killed at Tue Sep 27 21:47:06 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23623 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23623 found at Tue Sep 27 21:47:07 UTC 2022 selfserv_9223 with PID 23623 started at Tue Sep 27 21:47:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #55: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23623 at Tue Sep 27 21:47:08 UTC 2022 kill -USR1 23623 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23623 killed at Tue Sep 27 21:47:08 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23675 found at Tue Sep 27 21:47:08 UTC 2022 selfserv_9223 with PID 23675 started at Tue Sep 27 21:47:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #56: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23675 at Tue Sep 27 21:47:09 UTC 2022 kill -USR1 23675 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23675 killed at Tue Sep 27 21:47:09 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23727 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23727 found at Tue Sep 27 21:47:09 UTC 2022 selfserv_9223 with PID 23727 started at Tue Sep 27 21:47:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #57: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23727 at Tue Sep 27 21:47:10 UTC 2022 kill -USR1 23727 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23727 killed at Tue Sep 27 21:47:10 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:47:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23795 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23795 found at Tue Sep 27 21:47:11 UTC 2022 selfserv_9223 with PID 23795 started at Tue Sep 27 21:47:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #58: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23795 at Tue Sep 27 21:47:11 UTC 2022 kill -USR1 23795 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23795 killed at Tue Sep 27 21:47:12 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:47:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23847 found at Tue Sep 27 21:47:12 UTC 2022 selfserv_9223 with PID 23847 started at Tue Sep 27 21:47:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #59: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23847 at Tue Sep 27 21:47:12 UTC 2022 kill -USR1 23847 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23847 killed at Tue Sep 27 21:47:13 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:47:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23899 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23899 found at Tue Sep 27 21:47:13 UTC 2022 selfserv_9223 with PID 23899 started at Tue Sep 27 21:47:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #60: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23899 at Tue Sep 27 21:47:14 UTC 2022 kill -USR1 23899 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23899 killed at Tue Sep 27 21:47:14 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23965 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23965 found at Tue Sep 27 21:47:14 UTC 2022 selfserv_9223 with PID 23965 started at Tue Sep 27 21:47:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #61: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23965 at Tue Sep 27 21:47:15 UTC 2022 kill -USR1 23965 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23965 killed at Tue Sep 27 21:47:15 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24017 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24017 found at Tue Sep 27 21:47:15 UTC 2022 selfserv_9223 with PID 24017 started at Tue Sep 27 21:47:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #62: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24017 at Tue Sep 27 21:47:16 UTC 2022 kill -USR1 24017 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24017 killed at Tue Sep 27 21:47:16 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24077 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24077 found at Tue Sep 27 21:47:16 UTC 2022 selfserv_9223 with PID 24077 started at Tue Sep 27 21:47:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #63: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24077 at Tue Sep 27 21:47:17 UTC 2022 kill -USR1 24077 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24077 killed at Tue Sep 27 21:47:17 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24150 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24150 found at Tue Sep 27 21:47:17 UTC 2022 selfserv_9223 with PID 24150 started at Tue Sep 27 21:47:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #64: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24150 at Tue Sep 27 21:47:18 UTC 2022 kill -USR1 24150 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24150 killed at Tue Sep 27 21:47:18 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24202 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24202 found at Tue Sep 27 21:47:19 UTC 2022 selfserv_9223 with PID 24202 started at Tue Sep 27 21:47:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #65: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24202 at Tue Sep 27 21:47:20 UTC 2022 kill -USR1 24202 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24202 killed at Tue Sep 27 21:47:20 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24254 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24254 found at Tue Sep 27 21:47:20 UTC 2022 selfserv_9223 with PID 24254 started at Tue Sep 27 21:47:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #66: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24254 at Tue Sep 27 21:47:21 UTC 2022 kill -USR1 24254 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24254 killed at Tue Sep 27 21:47:21 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:47:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24320 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24320 found at Tue Sep 27 21:47:21 UTC 2022 selfserv_9223 with PID 24320 started at Tue Sep 27 21:47:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #67: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24320 at Tue Sep 27 21:47:22 UTC 2022 kill -USR1 24320 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24320 killed at Tue Sep 27 21:47:22 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:47:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24372 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24372 found at Tue Sep 27 21:47:22 UTC 2022 selfserv_9223 with PID 24372 started at Tue Sep 27 21:47:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #68: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24372 at Tue Sep 27 21:47:23 UTC 2022 kill -USR1 24372 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24372 killed at Tue Sep 27 21:47:23 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:47:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24424 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24424 found at Tue Sep 27 21:47:24 UTC 2022 selfserv_9223 with PID 24424 started at Tue Sep 27 21:47:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #69: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24424 at Tue Sep 27 21:47:24 UTC 2022 kill -USR1 24424 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24424 killed at Tue Sep 27 21:47:24 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24491 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24491 found at Tue Sep 27 21:47:25 UTC 2022 selfserv_9223 with PID 24491 started at Tue Sep 27 21:47:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #70: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24491 at Tue Sep 27 21:47:25 UTC 2022 kill -USR1 24491 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24491 killed at Tue Sep 27 21:47:25 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24543 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24543 found at Tue Sep 27 21:47:26 UTC 2022 selfserv_9223 with PID 24543 started at Tue Sep 27 21:47:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #71: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24543 at Tue Sep 27 21:47:26 UTC 2022 kill -USR1 24543 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24543 killed at Tue Sep 27 21:47:26 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24595 found at Tue Sep 27 21:47:27 UTC 2022 selfserv_9223 with PID 24595 started at Tue Sep 27 21:47:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #72: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24595 at Tue Sep 27 21:47:27 UTC 2022 kill -USR1 24595 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24595 killed at Tue Sep 27 21:47:28 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24661 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24661 found at Tue Sep 27 21:47:28 UTC 2022 selfserv_9223 with PID 24661 started at Tue Sep 27 21:47:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #73: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24661 at Tue Sep 27 21:47:29 UTC 2022 kill -USR1 24661 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24661 killed at Tue Sep 27 21:47:29 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24713 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24713 found at Tue Sep 27 21:47:29 UTC 2022 selfserv_9223 with PID 24713 started at Tue Sep 27 21:47:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #74: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24713 at Tue Sep 27 21:47:30 UTC 2022 kill -USR1 24713 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24713 killed at Tue Sep 27 21:47:30 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24765 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24765 found at Tue Sep 27 21:47:30 UTC 2022 selfserv_9223 with PID 24765 started at Tue Sep 27 21:47:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #75: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24765 at Tue Sep 27 21:47:31 UTC 2022 kill -USR1 24765 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24765 killed at Tue Sep 27 21:47:31 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:47:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24831 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24831 found at Tue Sep 27 21:47:32 UTC 2022 selfserv_9223 with PID 24831 started at Tue Sep 27 21:47:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #76: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24831 at Tue Sep 27 21:47:32 UTC 2022 kill -USR1 24831 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24831 killed at Tue Sep 27 21:47:32 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:47:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24883 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24883 found at Tue Sep 27 21:47:33 UTC 2022 selfserv_9223 with PID 24883 started at Tue Sep 27 21:47:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #77: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24883 at Tue Sep 27 21:47:33 UTC 2022 kill -USR1 24883 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24883 killed at Tue Sep 27 21:47:33 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:47:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24935 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24935 found at Tue Sep 27 21:47:34 UTC 2022 selfserv_9223 with PID 24935 started at Tue Sep 27 21:47:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #78: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24935 at Tue Sep 27 21:47:34 UTC 2022 kill -USR1 24935 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24935 killed at Tue Sep 27 21:47:34 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25001 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25001 found at Tue Sep 27 21:47:35 UTC 2022 selfserv_9223 with PID 25001 started at Tue Sep 27 21:47:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #79: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25001 at Tue Sep 27 21:47:35 UTC 2022 kill -USR1 25001 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25001 killed at Tue Sep 27 21:47:35 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25053 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25053 found at Tue Sep 27 21:47:36 UTC 2022 selfserv_9223 with PID 25053 started at Tue Sep 27 21:47:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #80: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25053 at Tue Sep 27 21:47:36 UTC 2022 kill -USR1 25053 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25053 killed at Tue Sep 27 21:47:36 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25105 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25105 found at Tue Sep 27 21:47:37 UTC 2022 selfserv_9223 with PID 25105 started at Tue Sep 27 21:47:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #81: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25105 at Tue Sep 27 21:47:37 UTC 2022 kill -USR1 25105 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25105 killed at Tue Sep 27 21:47:37 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25172 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25172 found at Tue Sep 27 21:47:38 UTC 2022 selfserv_9223 with PID 25172 started at Tue Sep 27 21:47:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #82: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25172 at Tue Sep 27 21:47:38 UTC 2022 kill -USR1 25172 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25172 killed at Tue Sep 27 21:47:39 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25224 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25224 found at Tue Sep 27 21:47:39 UTC 2022 selfserv_9223 with PID 25224 started at Tue Sep 27 21:47:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #83: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25224 at Tue Sep 27 21:47:40 UTC 2022 kill -USR1 25224 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25224 killed at Tue Sep 27 21:47:40 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25276 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25276 found at Tue Sep 27 21:47:40 UTC 2022 selfserv_9223 with PID 25276 started at Tue Sep 27 21:47:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #84: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25276 at Tue Sep 27 21:47:41 UTC 2022 kill -USR1 25276 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25276 killed at Tue Sep 27 21:47:41 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:47:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25342 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25342 found at Tue Sep 27 21:47:41 UTC 2022 selfserv_9223 with PID 25342 started at Tue Sep 27 21:47:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #85: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25342 at Tue Sep 27 21:47:42 UTC 2022 kill -USR1 25342 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25342 killed at Tue Sep 27 21:47:42 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:47:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25394 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25394 found at Tue Sep 27 21:47:42 UTC 2022 selfserv_9223 with PID 25394 started at Tue Sep 27 21:47:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #86: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25394 at Tue Sep 27 21:47:43 UTC 2022 kill -USR1 25394 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25394 killed at Tue Sep 27 21:47:43 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:47:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25446 found at Tue Sep 27 21:47:43 UTC 2022 selfserv_9223 with PID 25446 started at Tue Sep 27 21:47:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #87: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25446 at Tue Sep 27 21:47:44 UTC 2022 kill -USR1 25446 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25446 killed at Tue Sep 27 21:47:44 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25512 found at Tue Sep 27 21:47:44 UTC 2022 selfserv_9223 with PID 25512 started at Tue Sep 27 21:47:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #88: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25512 at Tue Sep 27 21:47:45 UTC 2022 kill -USR1 25512 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25512 killed at Tue Sep 27 21:47:45 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25564 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25564 found at Tue Sep 27 21:47:45 UTC 2022 selfserv_9223 with PID 25564 started at Tue Sep 27 21:47:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #89: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25564 at Tue Sep 27 21:47:46 UTC 2022 kill -USR1 25564 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25564 killed at Tue Sep 27 21:47:46 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25616 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25616 found at Tue Sep 27 21:47:46 UTC 2022 selfserv_9223 with PID 25616 started at Tue Sep 27 21:47:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #90: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25616 at Tue Sep 27 21:47:47 UTC 2022 kill -USR1 25616 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25616 killed at Tue Sep 27 21:47:47 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25682 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25682 found at Tue Sep 27 21:47:47 UTC 2022 selfserv_9223 with PID 25682 started at Tue Sep 27 21:47:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #91: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25682 at Tue Sep 27 21:47:48 UTC 2022 kill -USR1 25682 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25682 killed at Tue Sep 27 21:47:48 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25734 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25734 found at Tue Sep 27 21:47:48 UTC 2022 selfserv_9223 with PID 25734 started at Tue Sep 27 21:47:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #92: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25734 at Tue Sep 27 21:47:49 UTC 2022 kill -USR1 25734 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25734 killed at Tue Sep 27 21:47:49 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25786 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25786 found at Tue Sep 27 21:47:49 UTC 2022 selfserv_9223 with PID 25786 started at Tue Sep 27 21:47:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #93: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25786 at Tue Sep 27 21:47:50 UTC 2022 kill -USR1 25786 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25786 killed at Tue Sep 27 21:47:50 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25852 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25852 found at Tue Sep 27 21:47:50 UTC 2022 selfserv_9223 with PID 25852 started at Tue Sep 27 21:47:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #94: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25852 at Tue Sep 27 21:47:50 UTC 2022 kill -USR1 25852 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25852 killed at Tue Sep 27 21:47:51 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25904 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25904 found at Tue Sep 27 21:47:51 UTC 2022 selfserv_9223 with PID 25904 started at Tue Sep 27 21:47:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #95: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25904 at Tue Sep 27 21:47:51 UTC 2022 kill -USR1 25904 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25904 killed at Tue Sep 27 21:47:52 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25956 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25956 found at Tue Sep 27 21:47:52 UTC 2022 selfserv_9223 with PID 25956 started at Tue Sep 27 21:47:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #96: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25956 at Tue Sep 27 21:47:52 UTC 2022 kill -USR1 25956 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25956 killed at Tue Sep 27 21:47:52 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26022 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26022 found at Tue Sep 27 21:47:53 UTC 2022 selfserv_9223 with PID 26022 started at Tue Sep 27 21:47:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #97: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26022 at Tue Sep 27 21:47:53 UTC 2022 kill -USR1 26022 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26022 killed at Tue Sep 27 21:47:54 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26074 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26074 found at Tue Sep 27 21:47:54 UTC 2022 selfserv_9223 with PID 26074 started at Tue Sep 27 21:47:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #98: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26074 at Tue Sep 27 21:47:54 UTC 2022 kill -USR1 26074 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26074 killed at Tue Sep 27 21:47:55 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26126 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26126 found at Tue Sep 27 21:47:55 UTC 2022 selfserv_9223 with PID 26126 started at Tue Sep 27 21:47:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #99: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26126 at Tue Sep 27 21:47:56 UTC 2022 kill -USR1 26126 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26126 killed at Tue Sep 27 21:47:56 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26192 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26192 found at Tue Sep 27 21:47:56 UTC 2022 selfserv_9223 with PID 26192 started at Tue Sep 27 21:47:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #100: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 26192 at Tue Sep 27 21:47:57 UTC 2022 kill -USR1 26192 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26192 killed at Tue Sep 27 21:47:57 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26244 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26244 found at Tue Sep 27 21:47:57 UTC 2022 selfserv_9223 with PID 26244 started at Tue Sep 27 21:47:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #101: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 26244 at Tue Sep 27 21:47:58 UTC 2022 kill -USR1 26244 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26244 killed at Tue Sep 27 21:47:58 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26296 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26296 found at Tue Sep 27 21:47:58 UTC 2022 selfserv_9223 with PID 26296 started at Tue Sep 27 21:47:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #102: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 26296 at Tue Sep 27 21:47:59 UTC 2022 kill -USR1 26296 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26296 killed at Tue Sep 27 21:47:59 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:47:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:47:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26362 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26362 found at Tue Sep 27 21:48:00 UTC 2022 selfserv_9223 with PID 26362 started at Tue Sep 27 21:48:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #103: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 26362 at Tue Sep 27 21:48:00 UTC 2022 kill -USR1 26362 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26362 killed at Tue Sep 27 21:48:00 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26418 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26418 found at Tue Sep 27 21:48:00 UTC 2022 selfserv_9223 with PID 26418 started at Tue Sep 27 21:48:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #104: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26418 at Tue Sep 27 21:48:01 UTC 2022 kill -USR1 26418 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26418 killed at Tue Sep 27 21:48:01 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26470 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26470 found at Tue Sep 27 21:48:01 UTC 2022 selfserv_9223 with PID 26470 started at Tue Sep 27 21:48:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #105: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 26470 at Tue Sep 27 21:48:02 UTC 2022 kill -USR1 26470 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26470 killed at Tue Sep 27 21:48:02 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26536 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26536 found at Tue Sep 27 21:48:02 UTC 2022 selfserv_9223 with PID 26536 started at Tue Sep 27 21:48:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #106: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26536 at Tue Sep 27 21:48:03 UTC 2022 kill -USR1 26536 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26536 killed at Tue Sep 27 21:48:03 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26588 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26588 found at Tue Sep 27 21:48:03 UTC 2022 selfserv_9223 with PID 26588 started at Tue Sep 27 21:48:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #107: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26588 at Tue Sep 27 21:48:04 UTC 2022 kill -USR1 26588 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26588 killed at Tue Sep 27 21:48:04 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26640 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26640 found at Tue Sep 27 21:48:05 UTC 2022 selfserv_9223 with PID 26640 started at Tue Sep 27 21:48:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #108: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26640 at Tue Sep 27 21:48:05 UTC 2022 kill -USR1 26640 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26640 killed at Tue Sep 27 21:48:05 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26706 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26706 found at Tue Sep 27 21:48:06 UTC 2022 selfserv_9223 with PID 26706 started at Tue Sep 27 21:48:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #109: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26706 at Tue Sep 27 21:48:06 UTC 2022 kill -USR1 26706 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26706 killed at Tue Sep 27 21:48:06 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26758 found at Tue Sep 27 21:48:07 UTC 2022 selfserv_9223 with PID 26758 started at Tue Sep 27 21:48:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #110: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26758 at Tue Sep 27 21:48:07 UTC 2022 kill -USR1 26758 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26758 killed at Tue Sep 27 21:48:07 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26810 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26810 found at Tue Sep 27 21:48:08 UTC 2022 selfserv_9223 with PID 26810 started at Tue Sep 27 21:48:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #111: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26810 at Tue Sep 27 21:48:08 UTC 2022 kill -USR1 26810 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26810 killed at Tue Sep 27 21:48:08 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26876 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26876 found at Tue Sep 27 21:48:09 UTC 2022 selfserv_9223 with PID 26876 started at Tue Sep 27 21:48:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #112: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 26876 at Tue Sep 27 21:48:09 UTC 2022 kill -USR1 26876 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26876 killed at Tue Sep 27 21:48:09 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26929 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26929 found at Tue Sep 27 21:48:10 UTC 2022 selfserv_9223 with PID 26929 started at Tue Sep 27 21:48:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #113: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26929 at Tue Sep 27 21:48:10 UTC 2022 kill -USR1 26929 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26929 killed at Tue Sep 27 21:48:10 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26981 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26981 found at Tue Sep 27 21:48:11 UTC 2022 selfserv_9223 with PID 26981 started at Tue Sep 27 21:48:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #114: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 26981 at Tue Sep 27 21:48:11 UTC 2022 kill -USR1 26981 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26981 killed at Tue Sep 27 21:48:11 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27048 found at Tue Sep 27 21:48:12 UTC 2022 selfserv_9223 with PID 27048 started at Tue Sep 27 21:48:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #115: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 27048 at Tue Sep 27 21:48:12 UTC 2022 kill -USR1 27048 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27048 killed at Tue Sep 27 21:48:12 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27100 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27100 found at Tue Sep 27 21:48:13 UTC 2022 selfserv_9223 with PID 27100 started at Tue Sep 27 21:48:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #116: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 27100 at Tue Sep 27 21:48:13 UTC 2022 kill -USR1 27100 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27100 killed at Tue Sep 27 21:48:13 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27152 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27152 found at Tue Sep 27 21:48:13 UTC 2022 selfserv_9223 with PID 27152 started at Tue Sep 27 21:48:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #117: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 27152 at Tue Sep 27 21:48:14 UTC 2022 kill -USR1 27152 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27152 killed at Tue Sep 27 21:48:14 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27218 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27218 found at Tue Sep 27 21:48:14 UTC 2022 selfserv_9223 with PID 27218 started at Tue Sep 27 21:48:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #118: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 27218 at Tue Sep 27 21:48:15 UTC 2022 kill -USR1 27218 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27218 killed at Tue Sep 27 21:48:15 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27270 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27270 found at Tue Sep 27 21:48:15 UTC 2022 selfserv_9223 with PID 27270 started at Tue Sep 27 21:48:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #119: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27270 at Tue Sep 27 21:48:16 UTC 2022 kill -USR1 27270 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27270 killed at Tue Sep 27 21:48:16 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27330 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27330 found at Tue Sep 27 21:48:16 UTC 2022 selfserv_9223 with PID 27330 started at Tue Sep 27 21:48:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #120: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 27330 at Tue Sep 27 21:48:17 UTC 2022 kill -USR1 27330 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27330 killed at Tue Sep 27 21:48:17 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27405 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27405 found at Tue Sep 27 21:48:17 UTC 2022 selfserv_9223 with PID 27405 started at Tue Sep 27 21:48:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #121: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27405 at Tue Sep 27 21:48:18 UTC 2022 kill -USR1 27405 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27405 killed at Tue Sep 27 21:48:18 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27457 found at Tue Sep 27 21:48:18 UTC 2022 selfserv_9223 with PID 27457 started at Tue Sep 27 21:48:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #122: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27457 at Tue Sep 27 21:48:19 UTC 2022 kill -USR1 27457 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27457 killed at Tue Sep 27 21:48:19 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27509 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27509 found at Tue Sep 27 21:48:19 UTC 2022 selfserv_9223 with PID 27509 started at Tue Sep 27 21:48:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #123: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27509 at Tue Sep 27 21:48:20 UTC 2022 kill -USR1 27509 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27509 killed at Tue Sep 27 21:48:20 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27576 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27576 found at Tue Sep 27 21:48:20 UTC 2022 selfserv_9223 with PID 27576 started at Tue Sep 27 21:48:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #124: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 27576 at Tue Sep 27 21:48:21 UTC 2022 kill -USR1 27576 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27576 killed at Tue Sep 27 21:48:21 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27628 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27628 found at Tue Sep 27 21:48:21 UTC 2022 selfserv_9223 with PID 27628 started at Tue Sep 27 21:48:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #125: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27628 at Tue Sep 27 21:48:22 UTC 2022 kill -USR1 27628 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27628 killed at Tue Sep 27 21:48:22 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27680 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27680 found at Tue Sep 27 21:48:22 UTC 2022 selfserv_9223 with PID 27680 started at Tue Sep 27 21:48:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #126: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 27680 at Tue Sep 27 21:48:23 UTC 2022 kill -USR1 27680 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27680 killed at Tue Sep 27 21:48:23 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27746 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27746 found at Tue Sep 27 21:48:23 UTC 2022 selfserv_9223 with PID 27746 started at Tue Sep 27 21:48:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #127: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 27746 at Tue Sep 27 21:48:23 UTC 2022 kill -USR1 27746 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27746 killed at Tue Sep 27 21:48:24 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27798 found at Tue Sep 27 21:48:24 UTC 2022 selfserv_9223 with PID 27798 started at Tue Sep 27 21:48:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #128: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 27798 at Tue Sep 27 21:48:24 UTC 2022 kill -USR1 27798 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27798 killed at Tue Sep 27 21:48:24 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27850 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27850 found at Tue Sep 27 21:48:25 UTC 2022 selfserv_9223 with PID 27850 started at Tue Sep 27 21:48:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #129: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 27850 at Tue Sep 27 21:48:25 UTC 2022 kill -USR1 27850 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27850 killed at Tue Sep 27 21:48:25 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27917 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27917 found at Tue Sep 27 21:48:26 UTC 2022 selfserv_9223 with PID 27917 started at Tue Sep 27 21:48:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #130: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 27917 at Tue Sep 27 21:48:26 UTC 2022 kill -USR1 27917 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27917 killed at Tue Sep 27 21:48:26 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27969 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27969 found at Tue Sep 27 21:48:27 UTC 2022 selfserv_9223 with PID 27969 started at Tue Sep 27 21:48:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #131: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27969 at Tue Sep 27 21:48:27 UTC 2022 kill -USR1 27969 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27969 killed at Tue Sep 27 21:48:27 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28021 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28021 found at Tue Sep 27 21:48:28 UTC 2022 selfserv_9223 with PID 28021 started at Tue Sep 27 21:48:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #132: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 28021 at Tue Sep 27 21:48:28 UTC 2022 kill -USR1 28021 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28021 killed at Tue Sep 27 21:48:28 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28087 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28087 found at Tue Sep 27 21:48:28 UTC 2022 selfserv_9223 with PID 28087 started at Tue Sep 27 21:48:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #133: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28087 at Tue Sep 27 21:48:29 UTC 2022 kill -USR1 28087 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28087 killed at Tue Sep 27 21:48:29 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28139 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28139 found at Tue Sep 27 21:48:30 UTC 2022 selfserv_9223 with PID 28139 started at Tue Sep 27 21:48:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #134: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28139 at Tue Sep 27 21:48:30 UTC 2022 kill -USR1 28139 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28139 killed at Tue Sep 27 21:48:30 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28191 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28191 found at Tue Sep 27 21:48:31 UTC 2022 selfserv_9223 with PID 28191 started at Tue Sep 27 21:48:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #135: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28191 at Tue Sep 27 21:48:31 UTC 2022 kill -USR1 28191 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28191 killed at Tue Sep 27 21:48:31 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28257 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28257 found at Tue Sep 27 21:48:32 UTC 2022 selfserv_9223 with PID 28257 started at Tue Sep 27 21:48:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #136: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28257 at Tue Sep 27 21:48:32 UTC 2022 kill -USR1 28257 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28257 killed at Tue Sep 27 21:48:32 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28309 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28309 found at Tue Sep 27 21:48:33 UTC 2022 selfserv_9223 with PID 28309 started at Tue Sep 27 21:48:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #137: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28309 at Tue Sep 27 21:48:33 UTC 2022 kill -USR1 28309 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28309 killed at Tue Sep 27 21:48:34 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28362 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28362 found at Tue Sep 27 21:48:34 UTC 2022 selfserv_9223 with PID 28362 started at Tue Sep 27 21:48:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #138: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28362 at Tue Sep 27 21:48:35 UTC 2022 kill -USR1 28362 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28362 killed at Tue Sep 27 21:48:35 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28428 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28428 found at Tue Sep 27 21:48:35 UTC 2022 selfserv_9223 with PID 28428 started at Tue Sep 27 21:48:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #139: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28428 at Tue Sep 27 21:48:36 UTC 2022 kill -USR1 28428 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28428 killed at Tue Sep 27 21:48:36 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28481 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28481 found at Tue Sep 27 21:48:36 UTC 2022 selfserv_9223 with PID 28481 started at Tue Sep 27 21:48:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #140: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28481 at Tue Sep 27 21:48:37 UTC 2022 kill -USR1 28481 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28481 killed at Tue Sep 27 21:48:37 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28533 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28533 found at Tue Sep 27 21:48:37 UTC 2022 selfserv_9223 with PID 28533 started at Tue Sep 27 21:48:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #141: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28533 at Tue Sep 27 21:48:38 UTC 2022 kill -USR1 28533 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28533 killed at Tue Sep 27 21:48:38 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28600 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28600 found at Tue Sep 27 21:48:38 UTC 2022 selfserv_9223 with PID 28600 started at Tue Sep 27 21:48:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #142: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28600 at Tue Sep 27 21:48:39 UTC 2022 kill -USR1 28600 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28600 killed at Tue Sep 27 21:48:39 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28652 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28652 found at Tue Sep 27 21:48:39 UTC 2022 selfserv_9223 with PID 28652 started at Tue Sep 27 21:48:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #143: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28652 at Tue Sep 27 21:48:40 UTC 2022 kill -USR1 28652 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28652 killed at Tue Sep 27 21:48:40 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28704 found at Tue Sep 27 21:48:41 UTC 2022 selfserv_9223 with PID 28704 started at Tue Sep 27 21:48:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #144: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28704 at Tue Sep 27 21:48:41 UTC 2022 kill -USR1 28704 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28704 killed at Tue Sep 27 21:48:41 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28770 found at Tue Sep 27 21:48:42 UTC 2022 selfserv_9223 with PID 28770 started at Tue Sep 27 21:48:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28770 at Tue Sep 27 21:48:42 UTC 2022 kill -USR1 28770 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28770 killed at Tue Sep 27 21:48:42 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28822 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28822 found at Tue Sep 27 21:48:43 UTC 2022 selfserv_9223 with PID 28822 started at Tue Sep 27 21:48:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28822 at Tue Sep 27 21:48:43 UTC 2022 kill -USR1 28822 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28822 killed at Tue Sep 27 21:48:43 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28874 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28874 found at Tue Sep 27 21:48:44 UTC 2022 selfserv_9223 with PID 28874 started at Tue Sep 27 21:48:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28874 at Tue Sep 27 21:48:44 UTC 2022 kill -USR1 28874 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28874 killed at Tue Sep 27 21:48:45 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28940 found at Tue Sep 27 21:48:45 UTC 2022 selfserv_9223 with PID 28940 started at Tue Sep 27 21:48:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28940 at Tue Sep 27 21:48:46 UTC 2022 kill -USR1 28940 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28940 killed at Tue Sep 27 21:48:46 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28992 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28992 found at Tue Sep 27 21:48:46 UTC 2022 selfserv_9223 with PID 28992 started at Tue Sep 27 21:48:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28992 at Tue Sep 27 21:48:47 UTC 2022 kill -USR1 28992 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28992 killed at Tue Sep 27 21:48:47 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29044 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29044 found at Tue Sep 27 21:48:47 UTC 2022 selfserv_9223 with PID 29044 started at Tue Sep 27 21:48:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29044 at Tue Sep 27 21:48:48 UTC 2022 kill -USR1 29044 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29044 killed at Tue Sep 27 21:48:48 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29110 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29110 found at Tue Sep 27 21:48:48 UTC 2022 selfserv_9223 with PID 29110 started at Tue Sep 27 21:48:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #151: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29110 at Tue Sep 27 21:48:49 UTC 2022 kill -USR1 29110 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29110 killed at Tue Sep 27 21:48:49 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29162 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29162 found at Tue Sep 27 21:48:49 UTC 2022 selfserv_9223 with PID 29162 started at Tue Sep 27 21:48:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #152: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29162 at Tue Sep 27 21:48:50 UTC 2022 kill -USR1 29162 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29162 killed at Tue Sep 27 21:48:50 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29214 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29214 found at Tue Sep 27 21:48:50 UTC 2022 selfserv_9223 with PID 29214 started at Tue Sep 27 21:48:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #153: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29214 at Tue Sep 27 21:48:51 UTC 2022 kill -USR1 29214 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29214 killed at Tue Sep 27 21:48:51 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29280 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29280 found at Tue Sep 27 21:48:52 UTC 2022 selfserv_9223 with PID 29280 started at Tue Sep 27 21:48:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #154: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29280 at Tue Sep 27 21:48:52 UTC 2022 kill -USR1 29280 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29280 killed at Tue Sep 27 21:48:52 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29332 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29332 found at Tue Sep 27 21:48:53 UTC 2022 selfserv_9223 with PID 29332 started at Tue Sep 27 21:48:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #155: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29332 at Tue Sep 27 21:48:53 UTC 2022 kill -USR1 29332 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29332 killed at Tue Sep 27 21:48:53 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29384 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29384 found at Tue Sep 27 21:48:54 UTC 2022 selfserv_9223 with PID 29384 started at Tue Sep 27 21:48:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #156: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29384 at Tue Sep 27 21:48:54 UTC 2022 kill -USR1 29384 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29384 killed at Tue Sep 27 21:48:55 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29450 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29450 found at Tue Sep 27 21:48:55 UTC 2022 selfserv_9223 with PID 29450 started at Tue Sep 27 21:48:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #157: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29450 at Tue Sep 27 21:48:55 UTC 2022 kill -USR1 29450 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29450 killed at Tue Sep 27 21:48:56 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29502 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29502 found at Tue Sep 27 21:48:56 UTC 2022 selfserv_9223 with PID 29502 started at Tue Sep 27 21:48:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #158: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29502 at Tue Sep 27 21:48:56 UTC 2022 kill -USR1 29502 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29502 killed at Tue Sep 27 21:48:57 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:48:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29554 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29554 found at Tue Sep 27 21:48:57 UTC 2022 selfserv_9223 with PID 29554 started at Tue Sep 27 21:48:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #159: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29554 at Tue Sep 27 21:48:57 UTC 2022 kill -USR1 29554 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29554 killed at Tue Sep 27 21:48:58 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29620 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29620 found at Tue Sep 27 21:48:58 UTC 2022 selfserv_9223 with PID 29620 started at Tue Sep 27 21:48:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #160: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29620 at Tue Sep 27 21:48:58 UTC 2022 kill -USR1 29620 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29620 killed at Tue Sep 27 21:48:59 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:48:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:48:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29672 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29672 found at Tue Sep 27 21:48:59 UTC 2022 selfserv_9223 with PID 29672 started at Tue Sep 27 21:48:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #161: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29672 at Tue Sep 27 21:48:59 UTC 2022 kill -USR1 29672 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29672 killed at Tue Sep 27 21:49:00 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:49:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:49:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29724 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29724 found at Tue Sep 27 21:49:00 UTC 2022 selfserv_9223 with PID 29724 started at Tue Sep 27 21:49:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #162: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29724 at Tue Sep 27 21:49:00 UTC 2022 kill -USR1 29724 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29724 killed at Tue Sep 27 21:49:01 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:49:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:49:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29790 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29790 found at Tue Sep 27 21:49:01 UTC 2022 selfserv_9223 with PID 29790 started at Tue Sep 27 21:49:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #163: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29790 at Tue Sep 27 21:49:01 UTC 2022 kill -USR1 29790 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29790 killed at Tue Sep 27 21:49:02 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:49:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:49:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29842 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29842 found at Tue Sep 27 21:49:02 UTC 2022 selfserv_9223 with PID 29842 started at Tue Sep 27 21:49:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #164: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29842 at Tue Sep 27 21:49:02 UTC 2022 kill -USR1 29842 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29842 killed at Tue Sep 27 21:49:03 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:49:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:49:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29894 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29894 found at Tue Sep 27 21:49:03 UTC 2022 selfserv_9223 with PID 29894 started at Tue Sep 27 21:49:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #165: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29894 at Tue Sep 27 21:49:03 UTC 2022 kill -USR1 29894 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29894 killed at Tue Sep 27 21:49:04 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:49:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:49:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29960 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29960 found at Tue Sep 27 21:49:04 UTC 2022 selfserv_9223 with PID 29960 started at Tue Sep 27 21:49:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #166: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29960 at Tue Sep 27 21:49:04 UTC 2022 kill -USR1 29960 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29960 killed at Tue Sep 27 21:49:05 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:49:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:49:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30012 found at Tue Sep 27 21:49:05 UTC 2022 selfserv_9223 with PID 30012 started at Tue Sep 27 21:49:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #167: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30012 at Tue Sep 27 21:49:05 UTC 2022 kill -USR1 30012 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30012 killed at Tue Sep 27 21:49:06 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:49:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:49:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30064 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30064 found at Tue Sep 27 21:49:06 UTC 2022 selfserv_9223 with PID 30064 started at Tue Sep 27 21:49:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #168: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 30064 at Tue Sep 27 21:49:06 UTC 2022 kill -USR1 30064 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30064 killed at Tue Sep 27 21:49:07 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:49:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:49:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30130 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30130 found at Tue Sep 27 21:49:07 UTC 2022 selfserv_9223 with PID 30130 started at Tue Sep 27 21:49:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #169: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30130 at Tue Sep 27 21:49:08 UTC 2022 kill -USR1 30130 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30130 killed at Tue Sep 27 21:49:08 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:49:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:49:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30182 found at Tue Sep 27 21:49:08 UTC 2022 selfserv_9223 with PID 30182 started at Tue Sep 27 21:49:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #170: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30182 at Tue Sep 27 21:49:09 UTC 2022 kill -USR1 30182 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30182 killed at Tue Sep 27 21:49:09 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:49:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:49:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30234 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30234 found at Tue Sep 27 21:49:10 UTC 2022 selfserv_9223 with PID 30234 started at Tue Sep 27 21:49:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #171: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30234 at Tue Sep 27 21:49:10 UTC 2022 kill -USR1 30234 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30234 killed at Tue Sep 27 21:49:11 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:49:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:49:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30300 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30300 found at Tue Sep 27 21:49:11 UTC 2022 selfserv_9223 with PID 30300 started at Tue Sep 27 21:49:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #172: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30300 at Tue Sep 27 21:49:11 UTC 2022 kill -USR1 30300 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30300 killed at Tue Sep 27 21:49:12 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:49:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:49:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30352 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30352 found at Tue Sep 27 21:49:12 UTC 2022 selfserv_9223 with PID 30352 started at Tue Sep 27 21:49:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #173: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30352 at Tue Sep 27 21:49:13 UTC 2022 kill -USR1 30352 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30352 killed at Tue Sep 27 21:49:13 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:49:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:49:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30404 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30404 found at Tue Sep 27 21:49:13 UTC 2022 selfserv_9223 with PID 30404 started at Tue Sep 27 21:49:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #174: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30404 at Tue Sep 27 21:49:14 UTC 2022 kill -USR1 30404 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30404 killed at Tue Sep 27 21:49:14 UTC 2022 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/authin.tl.tmp 0 selfserv_9223 starting at Tue Sep 27 21:49:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:49:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:14 UTC 2022 selfserv_9223 with PID 30477 started at Tue Sep 27 21:49:14 UTC 2022 Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:15 UTC 2022 ssl.sh: #1: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:15 UTC 2022 ssl.sh: #2: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:16 UTC 2022 ssl.sh: #3: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:16 UTC 2022 ssl.sh: #4: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:16 UTC 2022 ssl.sh: #5: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:17 UTC 2022 ssl.sh: #6: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:17 UTC 2022 ssl.sh: #7: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:18 UTC 2022 ssl.sh: #8: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:18 UTC 2022 ssl.sh: #9: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:19 UTC 2022 ssl.sh: #10: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:19 UTC 2022 ssl.sh: #11: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:19 UTC 2022 ssl.sh: #12: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:20 UTC 2022 ssl.sh: #13: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:20 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #14: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:21 UTC 2022 ssl.sh: #15: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:21 UTC 2022 ssl.sh: #16: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:21 UTC 2022 ssl.sh: #17: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:22 UTC 2022 ssl.sh: #18: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:22 UTC 2022 ssl.sh: #19: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:23 UTC 2022 ssl.sh: #20: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:23 UTC 2022 ssl.sh: #21: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:23 UTC 2022 ssl.sh: #22: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:24 UTC 2022 ssl.sh: #23: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:24 UTC 2022 ssl.sh: #24: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:25 UTC 2022 ssl.sh: #25: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:25 UTC 2022 ssl.sh: #26: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:26 UTC 2022 ssl.sh: #27: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:26 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #28: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:26 UTC 2022 ssl.sh: #29: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:27 UTC 2022 ssl.sh: #30: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:27 UTC 2022 ssl.sh: #31: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:28 UTC 2022 ssl.sh: #32: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:28 UTC 2022 ssl.sh: #33: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:28 UTC 2022 ssl.sh: #34: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:29 UTC 2022 ssl.sh: #35: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:29 UTC 2022 ssl.sh: #36: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:30 UTC 2022 ssl.sh: #37: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:30 UTC 2022 ssl.sh: #38: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:30 UTC 2022 ssl.sh: #39: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:31 UTC 2022 ssl.sh: #40: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30477 found at Tue Sep 27 21:49:31 UTC 2022 ssl.sh: #41: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 30477 at Tue Sep 27 21:49:31 UTC 2022 kill -USR1 30477 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30477 killed at Tue Sep 27 21:49:31 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:49:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:49:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:32 UTC 2022 selfserv_9223 with PID 31757 started at Tue Sep 27 21:49:32 UTC 2022 Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:32 UTC 2022 ssl.sh: #42: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:33 UTC 2022 ssl.sh: #43: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:33 UTC 2022 ssl.sh: #44: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:33 UTC 2022 ssl.sh: #45: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:34 UTC 2022 ssl.sh: #46: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:34 UTC 2022 ssl.sh: #47: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:34 UTC 2022 ssl.sh: #48: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:35 UTC 2022 ssl.sh: #49: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:35 UTC 2022 ssl.sh: #50: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:36 UTC 2022 ssl.sh: #51: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:36 UTC 2022 ssl.sh: #52: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:36 UTC 2022 ssl.sh: #53: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:37 UTC 2022 ssl.sh: #54: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:37 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #55: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:38 UTC 2022 ssl.sh: #56: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:38 UTC 2022 ssl.sh: #57: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:38 UTC 2022 ssl.sh: #58: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:39 UTC 2022 ssl.sh: #59: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:39 UTC 2022 ssl.sh: #60: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:39 UTC 2022 ssl.sh: #61: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:40 UTC 2022 ssl.sh: #62: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:40 UTC 2022 ssl.sh: #63: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:40 UTC 2022 ssl.sh: #64: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:41 UTC 2022 ssl.sh: #65: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:41 UTC 2022 ssl.sh: #66: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:41 UTC 2022 ssl.sh: #67: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:42 UTC 2022 ssl.sh: #68: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:42 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #69: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:43 UTC 2022 ssl.sh: #70: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:43 UTC 2022 ssl.sh: #71: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:43 UTC 2022 ssl.sh: #72: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:44 UTC 2022 ssl.sh: #73: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:44 UTC 2022 ssl.sh: #74: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:44 UTC 2022 ssl.sh: #75: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:45 UTC 2022 ssl.sh: #76: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:45 UTC 2022 ssl.sh: #77: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:45 UTC 2022 ssl.sh: #78: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:46 UTC 2022 ssl.sh: #79: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:46 UTC 2022 ssl.sh: #80: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:46 UTC 2022 ssl.sh: #81: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31757 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31757 found at Tue Sep 27 21:49:47 UTC 2022 ssl.sh: #82: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 31757 at Tue Sep 27 21:49:47 UTC 2022 kill -USR1 31757 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 31757 killed at Tue Sep 27 21:49:47 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:49:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:49:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:47 UTC 2022 selfserv_9223 with PID 33019 started at Tue Sep 27 21:49:47 UTC 2022 Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:48 UTC 2022 ssl.sh: #83: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:48 UTC 2022 ssl.sh: #84: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:49 UTC 2022 ssl.sh: #85: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:49 UTC 2022 ssl.sh: #86: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:49 UTC 2022 ssl.sh: #87: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:50 UTC 2022 ssl.sh: #88: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:50 UTC 2022 ssl.sh: #89: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:51 UTC 2022 ssl.sh: #90: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:51 UTC 2022 ssl.sh: #91: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:52 UTC 2022 ssl.sh: #92: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:52 UTC 2022 ssl.sh: #93: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:53 UTC 2022 ssl.sh: #94: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:53 UTC 2022 ssl.sh: #95: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:53 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #96: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:54 UTC 2022 ssl.sh: #97: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:54 UTC 2022 ssl.sh: #98: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:55 UTC 2022 ssl.sh: #99: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:55 UTC 2022 ssl.sh: #100: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:55 UTC 2022 ssl.sh: #101: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:56 UTC 2022 ssl.sh: #102: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:56 UTC 2022 ssl.sh: #103: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:57 UTC 2022 ssl.sh: #104: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:57 UTC 2022 ssl.sh: #105: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:57 UTC 2022 ssl.sh: #106: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:58 UTC 2022 ssl.sh: #107: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:58 UTC 2022 ssl.sh: #108: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:59 UTC 2022 ssl.sh: #109: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:49:59 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #110: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:50:00 UTC 2022 ssl.sh: #111: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:50:00 UTC 2022 ssl.sh: #112: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:50:00 UTC 2022 ssl.sh: #113: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:50:01 UTC 2022 ssl.sh: #114: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:50:01 UTC 2022 ssl.sh: #115: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:50:02 UTC 2022 ssl.sh: #116: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:50:02 UTC 2022 ssl.sh: #117: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:50:02 UTC 2022 ssl.sh: #118: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:50:03 UTC 2022 ssl.sh: #119: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:50:03 UTC 2022 ssl.sh: #120: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:50:04 UTC 2022 ssl.sh: #121: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:50:04 UTC 2022 ssl.sh: #122: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33019 found at Tue Sep 27 21:50:05 UTC 2022 ssl.sh: #123: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 33019 at Tue Sep 27 21:50:05 UTC 2022 kill -USR1 33019 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33019 killed at Tue Sep 27 21:50:05 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:50:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:50:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:05 UTC 2022 selfserv_9223 with PID 34278 started at Tue Sep 27 21:50:05 UTC 2022 Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:05 UTC 2022 ssl.sh: #124: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:06 UTC 2022 ssl.sh: #125: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:06 UTC 2022 ssl.sh: #126: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:06 UTC 2022 ssl.sh: #127: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:07 UTC 2022 ssl.sh: #128: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:07 UTC 2022 ssl.sh: #129: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:08 UTC 2022 ssl.sh: #130: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:08 UTC 2022 ssl.sh: #131: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:08 UTC 2022 ssl.sh: #132: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:09 UTC 2022 ssl.sh: #133: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:09 UTC 2022 ssl.sh: #134: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:09 UTC 2022 ssl.sh: #135: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:10 UTC 2022 ssl.sh: #136: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:10 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #137: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:10 UTC 2022 ssl.sh: #138: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:11 UTC 2022 ssl.sh: #139: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:11 UTC 2022 ssl.sh: #140: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:11 UTC 2022 ssl.sh: #141: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:12 UTC 2022 ssl.sh: #142: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:12 UTC 2022 ssl.sh: #143: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:12 UTC 2022 ssl.sh: #144: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:13 UTC 2022 ssl.sh: #145: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:13 UTC 2022 ssl.sh: #146: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:13 UTC 2022 ssl.sh: #147: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:14 UTC 2022 ssl.sh: #148: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:14 UTC 2022 ssl.sh: #149: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:15 UTC 2022 ssl.sh: #150: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:15 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #151: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:15 UTC 2022 ssl.sh: #152: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:16 UTC 2022 ssl.sh: #153: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:16 UTC 2022 ssl.sh: #154: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:16 UTC 2022 ssl.sh: #155: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:17 UTC 2022 ssl.sh: #156: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:17 UTC 2022 ssl.sh: #157: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:17 UTC 2022 ssl.sh: #158: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:18 UTC 2022 ssl.sh: #159: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:18 UTC 2022 ssl.sh: #160: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:18 UTC 2022 ssl.sh: #161: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:19 UTC 2022 ssl.sh: #162: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:19 UTC 2022 ssl.sh: #163: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34278 found at Tue Sep 27 21:50:19 UTC 2022 ssl.sh: #164: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 34278 at Tue Sep 27 21:50:19 UTC 2022 kill -USR1 34278 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34278 killed at Tue Sep 27 21:50:20 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:50:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:50:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35553 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35553 found at Tue Sep 27 21:50:20 UTC 2022 selfserv_9223 with PID 35553 started at Tue Sep 27 21:50:20 UTC 2022 trying to kill selfserv_9223 with PID 35553 at Tue Sep 27 21:50:20 UTC 2022 kill -USR1 35553 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35553 killed at Tue Sep 27 21:50:20 UTC 2022 selfserv_9223 starting at Tue Sep 27 21:50:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:50:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:20 UTC 2022 selfserv_9223 with PID 35595 started at Tue Sep 27 21:50:20 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:21 UTC 2022 ssl.sh: #165: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:21 UTC 2022 ssl.sh: #166: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:22 UTC 2022 ssl.sh: #167: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:23 UTC 2022 ssl.sh: #168: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:23 UTC 2022 ssl.sh: #169: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:24 UTC 2022 ssl.sh: #170: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:24 UTC 2022 ssl.sh: #171: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:25 UTC 2022 ssl.sh: #172: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:25 UTC 2022 ssl.sh: #173: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:26 UTC 2022 ssl.sh: #174: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:26 UTC 2022 ssl.sh: #175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:27 UTC 2022 ssl.sh: #176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:27 UTC 2022 ssl.sh: #177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:28 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #178: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:28 UTC 2022 ssl.sh: #179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:29 UTC 2022 ssl.sh: #180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:29 UTC 2022 ssl.sh: #181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:30 UTC 2022 ssl.sh: #182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:30 UTC 2022 ssl.sh: #183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:31 UTC 2022 ssl.sh: #184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:31 UTC 2022 ssl.sh: #185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:32 UTC 2022 ssl.sh: #186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:32 UTC 2022 ssl.sh: #187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:33 UTC 2022 ssl.sh: #188: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:33 UTC 2022 ssl.sh: #189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:34 UTC 2022 ssl.sh: #190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:34 UTC 2022 ssl.sh: #191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:35 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #192: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:35 UTC 2022 ssl.sh: #193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:36 UTC 2022 ssl.sh: #194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:36 UTC 2022 ssl.sh: #195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:37 UTC 2022 ssl.sh: #196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:37 UTC 2022 ssl.sh: #197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:38 UTC 2022 ssl.sh: #198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:38 UTC 2022 ssl.sh: #199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:39 UTC 2022 ssl.sh: #200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:39 UTC 2022 ssl.sh: #201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:40 UTC 2022 ssl.sh: #202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:40 UTC 2022 ssl.sh: #203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:41 UTC 2022 ssl.sh: #204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35595 found at Tue Sep 27 21:50:41 UTC 2022 ssl.sh: #205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 35595 at Tue Sep 27 21:50:41 UTC 2022 kill -USR1 35595 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35595 killed at Tue Sep 27 21:50:42 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:50:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:50:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:42 UTC 2022 selfserv_9223 with PID 36858 started at Tue Sep 27 21:50:42 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:43 UTC 2022 ssl.sh: #206: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:43 UTC 2022 ssl.sh: #207: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:44 UTC 2022 ssl.sh: #208: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:44 UTC 2022 ssl.sh: #209: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:45 UTC 2022 ssl.sh: #210: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:45 UTC 2022 ssl.sh: #211: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:46 UTC 2022 ssl.sh: #212: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:46 UTC 2022 ssl.sh: #213: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:47 UTC 2022 ssl.sh: #214: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:48 UTC 2022 ssl.sh: #215: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:48 UTC 2022 ssl.sh: #216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:49 UTC 2022 ssl.sh: #217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:49 UTC 2022 ssl.sh: #218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:50 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #219: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:50 UTC 2022 ssl.sh: #220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:51 UTC 2022 ssl.sh: #221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:51 UTC 2022 ssl.sh: #222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:52 UTC 2022 ssl.sh: #223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:53 UTC 2022 ssl.sh: #224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:53 UTC 2022 ssl.sh: #225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:54 UTC 2022 ssl.sh: #226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:54 UTC 2022 ssl.sh: #227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:55 UTC 2022 ssl.sh: #228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:55 UTC 2022 ssl.sh: #229: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:56 UTC 2022 ssl.sh: #230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:56 UTC 2022 ssl.sh: #231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:57 UTC 2022 ssl.sh: #232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:57 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #233: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:58 UTC 2022 ssl.sh: #234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:59 UTC 2022 ssl.sh: #235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:50:59 UTC 2022 ssl.sh: #236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:51:00 UTC 2022 ssl.sh: #237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:51:00 UTC 2022 ssl.sh: #238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:51:01 UTC 2022 ssl.sh: #239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:51:01 UTC 2022 ssl.sh: #240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:51:02 UTC 2022 ssl.sh: #241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:51:02 UTC 2022 ssl.sh: #242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:51:03 UTC 2022 ssl.sh: #243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:51:04 UTC 2022 ssl.sh: #244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:51:04 UTC 2022 ssl.sh: #245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36858 found at Tue Sep 27 21:51:05 UTC 2022 ssl.sh: #246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 36858 at Tue Sep 27 21:51:05 UTC 2022 kill -USR1 36858 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36858 killed at Tue Sep 27 21:51:05 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:51:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:51:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:05 UTC 2022 selfserv_9223 with PID 38117 started at Tue Sep 27 21:51:05 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:06 UTC 2022 ssl.sh: #247: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:06 UTC 2022 ssl.sh: #248: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:07 UTC 2022 ssl.sh: #249: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:07 UTC 2022 ssl.sh: #250: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:07 UTC 2022 ssl.sh: #251: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:08 UTC 2022 ssl.sh: #252: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:08 UTC 2022 ssl.sh: #253: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:09 UTC 2022 ssl.sh: #254: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:09 UTC 2022 ssl.sh: #255: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:10 UTC 2022 ssl.sh: #256: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:10 UTC 2022 ssl.sh: #257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:11 UTC 2022 ssl.sh: #258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:11 UTC 2022 ssl.sh: #259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:12 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #260: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:12 UTC 2022 ssl.sh: #261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:12 UTC 2022 ssl.sh: #262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:13 UTC 2022 ssl.sh: #263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:13 UTC 2022 ssl.sh: #264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:14 UTC 2022 ssl.sh: #265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:14 UTC 2022 ssl.sh: #266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:15 UTC 2022 ssl.sh: #267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:15 UTC 2022 ssl.sh: #268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:15 UTC 2022 ssl.sh: #269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:16 UTC 2022 ssl.sh: #270: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:16 UTC 2022 ssl.sh: #271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:17 UTC 2022 ssl.sh: #272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:17 UTC 2022 ssl.sh: #273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:18 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #274: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:18 UTC 2022 ssl.sh: #275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:19 UTC 2022 ssl.sh: #276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:19 UTC 2022 ssl.sh: #277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:19 UTC 2022 ssl.sh: #278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:20 UTC 2022 ssl.sh: #279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:20 UTC 2022 ssl.sh: #280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:21 UTC 2022 ssl.sh: #281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:21 UTC 2022 ssl.sh: #282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:22 UTC 2022 ssl.sh: #283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:22 UTC 2022 ssl.sh: #284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:23 UTC 2022 ssl.sh: #285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:23 UTC 2022 ssl.sh: #286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38117 found at Tue Sep 27 21:51:23 UTC 2022 ssl.sh: #287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 38117 at Tue Sep 27 21:51:23 UTC 2022 kill -USR1 38117 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 38117 killed at Tue Sep 27 21:51:24 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:51:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:51:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:24 UTC 2022 selfserv_9223 with PID 39396 started at Tue Sep 27 21:51:24 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:25 UTC 2022 ssl.sh: #288: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:25 UTC 2022 ssl.sh: #289: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:26 UTC 2022 ssl.sh: #290: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:26 UTC 2022 ssl.sh: #291: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:27 UTC 2022 ssl.sh: #292: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:27 UTC 2022 ssl.sh: #293: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:28 UTC 2022 ssl.sh: #294: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:28 UTC 2022 ssl.sh: #295: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:29 UTC 2022 ssl.sh: #296: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:29 UTC 2022 ssl.sh: #297: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:30 UTC 2022 ssl.sh: #298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:30 UTC 2022 ssl.sh: #299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:31 UTC 2022 ssl.sh: #300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:31 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #301: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:32 UTC 2022 ssl.sh: #302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:32 UTC 2022 ssl.sh: #303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:33 UTC 2022 ssl.sh: #304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:33 UTC 2022 ssl.sh: #305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:34 UTC 2022 ssl.sh: #306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:34 UTC 2022 ssl.sh: #307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:35 UTC 2022 ssl.sh: #308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:35 UTC 2022 ssl.sh: #309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:36 UTC 2022 ssl.sh: #310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:36 UTC 2022 ssl.sh: #311: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:37 UTC 2022 ssl.sh: #312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:38 UTC 2022 ssl.sh: #313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:38 UTC 2022 ssl.sh: #314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:39 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #315: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:39 UTC 2022 ssl.sh: #316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:40 UTC 2022 ssl.sh: #317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:40 UTC 2022 ssl.sh: #318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:41 UTC 2022 ssl.sh: #319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:41 UTC 2022 ssl.sh: #320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:42 UTC 2022 ssl.sh: #321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:42 UTC 2022 ssl.sh: #322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:43 UTC 2022 ssl.sh: #323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:43 UTC 2022 ssl.sh: #324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:44 UTC 2022 ssl.sh: #325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:44 UTC 2022 ssl.sh: #326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:45 UTC 2022 ssl.sh: #327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39396 found at Tue Sep 27 21:51:45 UTC 2022 ssl.sh: #328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 39396 at Tue Sep 27 21:51:45 UTC 2022 kill -USR1 39396 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39396 killed at Tue Sep 27 21:51:45 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:51:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:51:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:46 UTC 2022 selfserv_9223 with PID 40657 started at Tue Sep 27 21:51:46 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:46 UTC 2022 ssl.sh: #329: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:47 UTC 2022 ssl.sh: #330: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:47 UTC 2022 ssl.sh: #331: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:48 UTC 2022 ssl.sh: #332: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:49 UTC 2022 ssl.sh: #333: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:49 UTC 2022 ssl.sh: #334: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:50 UTC 2022 ssl.sh: #335: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:50 UTC 2022 ssl.sh: #336: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:51 UTC 2022 ssl.sh: #337: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:51 UTC 2022 ssl.sh: #338: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:52 UTC 2022 ssl.sh: #339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:53 UTC 2022 ssl.sh: #340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:53 UTC 2022 ssl.sh: #341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:54 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #342: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:54 UTC 2022 ssl.sh: #343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:55 UTC 2022 ssl.sh: #344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:55 UTC 2022 ssl.sh: #345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:56 UTC 2022 ssl.sh: #346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:56 UTC 2022 ssl.sh: #347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:57 UTC 2022 ssl.sh: #348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:58 UTC 2022 ssl.sh: #349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:58 UTC 2022 ssl.sh: #350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:59 UTC 2022 ssl.sh: #351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:51:59 UTC 2022 ssl.sh: #352: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:52:00 UTC 2022 ssl.sh: #353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:52:00 UTC 2022 ssl.sh: #354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:52:01 UTC 2022 ssl.sh: #355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:52:01 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #356: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:52:02 UTC 2022 ssl.sh: #357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:52:03 UTC 2022 ssl.sh: #358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:52:03 UTC 2022 ssl.sh: #359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:52:04 UTC 2022 ssl.sh: #360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:52:04 UTC 2022 ssl.sh: #361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:52:05 UTC 2022 ssl.sh: #362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:52:05 UTC 2022 ssl.sh: #363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:52:06 UTC 2022 ssl.sh: #364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:52:06 UTC 2022 ssl.sh: #365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:52:07 UTC 2022 ssl.sh: #366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:52:08 UTC 2022 ssl.sh: #367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:52:08 UTC 2022 ssl.sh: #368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40657 found at Tue Sep 27 21:52:09 UTC 2022 ssl.sh: #369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 40657 at Tue Sep 27 21:52:09 UTC 2022 kill -USR1 40657 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40657 killed at Tue Sep 27 21:52:09 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:52:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:52:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:09 UTC 2022 selfserv_9223 with PID 41921 started at Tue Sep 27 21:52:09 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:10 UTC 2022 ssl.sh: #370: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:10 UTC 2022 ssl.sh: #371: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:11 UTC 2022 ssl.sh: #372: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:11 UTC 2022 ssl.sh: #373: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:11 UTC 2022 ssl.sh: #374: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:12 UTC 2022 ssl.sh: #375: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:12 UTC 2022 ssl.sh: #376: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:13 UTC 2022 ssl.sh: #377: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:13 UTC 2022 ssl.sh: #378: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:14 UTC 2022 ssl.sh: #379: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:14 UTC 2022 ssl.sh: #380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:15 UTC 2022 ssl.sh: #381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:15 UTC 2022 ssl.sh: #382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:16 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #383: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:16 UTC 2022 ssl.sh: #384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:17 UTC 2022 ssl.sh: #385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:17 UTC 2022 ssl.sh: #386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:17 UTC 2022 ssl.sh: #387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:18 UTC 2022 ssl.sh: #388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:18 UTC 2022 ssl.sh: #389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:19 UTC 2022 ssl.sh: #390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:19 UTC 2022 ssl.sh: #391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:20 UTC 2022 ssl.sh: #392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:20 UTC 2022 ssl.sh: #393: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:21 UTC 2022 ssl.sh: #394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:21 UTC 2022 ssl.sh: #395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:21 UTC 2022 ssl.sh: #396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:22 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #397: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:22 UTC 2022 ssl.sh: #398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:23 UTC 2022 ssl.sh: #399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:23 UTC 2022 ssl.sh: #400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:24 UTC 2022 ssl.sh: #401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:24 UTC 2022 ssl.sh: #402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:25 UTC 2022 ssl.sh: #403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:25 UTC 2022 ssl.sh: #404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:25 UTC 2022 ssl.sh: #405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:26 UTC 2022 ssl.sh: #406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:26 UTC 2022 ssl.sh: #407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:27 UTC 2022 ssl.sh: #408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:27 UTC 2022 ssl.sh: #409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41921 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41921 found at Tue Sep 27 21:52:28 UTC 2022 ssl.sh: #410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 41921 at Tue Sep 27 21:52:28 UTC 2022 kill -USR1 41921 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41921 killed at Tue Sep 27 21:52:28 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:52:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:52:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 43211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43211 found at Tue Sep 27 21:52:28 UTC 2022 selfserv_9223 with PID 43211 started at Tue Sep 27 21:52:28 UTC 2022 trying to kill selfserv_9223 with PID 43211 at Tue Sep 27 21:52:28 UTC 2022 kill -USR1 43211 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 43211 killed at Tue Sep 27 21:52:28 UTC 2022 selfserv_9223 starting at Tue Sep 27 21:52:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:52:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:29 UTC 2022 selfserv_9223 with PID 43253 started at Tue Sep 27 21:52:29 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:29 UTC 2022 ssl.sh: #411: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:30 UTC 2022 ssl.sh: #412: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:30 UTC 2022 ssl.sh: #413: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:31 UTC 2022 ssl.sh: #414: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:31 UTC 2022 ssl.sh: #415: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:32 UTC 2022 ssl.sh: #416: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:32 UTC 2022 ssl.sh: #417: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:33 UTC 2022 ssl.sh: #418: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:33 UTC 2022 ssl.sh: #419: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:34 UTC 2022 ssl.sh: #420: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:34 UTC 2022 ssl.sh: #421: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:35 UTC 2022 ssl.sh: #422: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:36 UTC 2022 ssl.sh: #423: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:36 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #424: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:37 UTC 2022 ssl.sh: #425: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:37 UTC 2022 ssl.sh: #426: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:38 UTC 2022 ssl.sh: #427: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:38 UTC 2022 ssl.sh: #428: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:39 UTC 2022 ssl.sh: #429: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:39 UTC 2022 ssl.sh: #430: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:40 UTC 2022 ssl.sh: #431: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:40 UTC 2022 ssl.sh: #432: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:41 UTC 2022 ssl.sh: #433: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:41 UTC 2022 ssl.sh: #434: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:42 UTC 2022 ssl.sh: #435: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:42 UTC 2022 ssl.sh: #436: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:43 UTC 2022 ssl.sh: #437: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:43 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #438: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:44 UTC 2022 ssl.sh: #439: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:44 UTC 2022 ssl.sh: #440: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:45 UTC 2022 ssl.sh: #441: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:45 UTC 2022 ssl.sh: #442: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:46 UTC 2022 ssl.sh: #443: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:46 UTC 2022 ssl.sh: #444: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:47 UTC 2022 ssl.sh: #445: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:47 UTC 2022 ssl.sh: #446: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:48 UTC 2022 ssl.sh: #447: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:48 UTC 2022 ssl.sh: #448: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:49 UTC 2022 ssl.sh: #449: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:49 UTC 2022 ssl.sh: #450: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43253 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43253 found at Tue Sep 27 21:52:50 UTC 2022 ssl.sh: #451: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 43253 at Tue Sep 27 21:52:50 UTC 2022 kill -USR1 43253 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 43253 killed at Tue Sep 27 21:52:50 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:52:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:52:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:52:50 UTC 2022 selfserv_9223 with PID 44512 started at Tue Sep 27 21:52:50 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:52:51 UTC 2022 ssl.sh: #452: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:52:51 UTC 2022 ssl.sh: #453: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:52:52 UTC 2022 ssl.sh: #454: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:52:52 UTC 2022 ssl.sh: #455: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:52:53 UTC 2022 ssl.sh: #456: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:52:54 UTC 2022 ssl.sh: #457: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:52:54 UTC 2022 ssl.sh: #458: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:52:55 UTC 2022 ssl.sh: #459: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:52:55 UTC 2022 ssl.sh: #460: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:52:56 UTC 2022 ssl.sh: #461: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:52:56 UTC 2022 ssl.sh: #462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:52:57 UTC 2022 ssl.sh: #463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:52:58 UTC 2022 ssl.sh: #464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:52:58 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #465: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:52:59 UTC 2022 ssl.sh: #466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:52:59 UTC 2022 ssl.sh: #467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:00 UTC 2022 ssl.sh: #468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:00 UTC 2022 ssl.sh: #469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:01 UTC 2022 ssl.sh: #470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:01 UTC 2022 ssl.sh: #471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:02 UTC 2022 ssl.sh: #472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:02 UTC 2022 ssl.sh: #473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:03 UTC 2022 ssl.sh: #474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:04 UTC 2022 ssl.sh: #475: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:04 UTC 2022 ssl.sh: #476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:05 UTC 2022 ssl.sh: #477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:05 UTC 2022 ssl.sh: #478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:06 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #479: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:06 UTC 2022 ssl.sh: #480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:07 UTC 2022 ssl.sh: #481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:07 UTC 2022 ssl.sh: #482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:08 UTC 2022 ssl.sh: #483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:08 UTC 2022 ssl.sh: #484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:09 UTC 2022 ssl.sh: #485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:10 UTC 2022 ssl.sh: #486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:10 UTC 2022 ssl.sh: #487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:11 UTC 2022 ssl.sh: #488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:11 UTC 2022 ssl.sh: #489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:12 UTC 2022 ssl.sh: #490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:12 UTC 2022 ssl.sh: #491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44512 found at Tue Sep 27 21:53:13 UTC 2022 ssl.sh: #492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 44512 at Tue Sep 27 21:53:13 UTC 2022 kill -USR1 44512 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 44512 killed at Tue Sep 27 21:53:13 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:53:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:53:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:13 UTC 2022 selfserv_9223 with PID 45770 started at Tue Sep 27 21:53:13 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:14 UTC 2022 ssl.sh: #493: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:14 UTC 2022 ssl.sh: #494: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:15 UTC 2022 ssl.sh: #495: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:15 UTC 2022 ssl.sh: #496: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:16 UTC 2022 ssl.sh: #497: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:16 UTC 2022 ssl.sh: #498: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:17 UTC 2022 ssl.sh: #499: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:17 UTC 2022 ssl.sh: #500: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:17 UTC 2022 ssl.sh: #501: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:18 UTC 2022 ssl.sh: #502: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:18 UTC 2022 ssl.sh: #503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:19 UTC 2022 ssl.sh: #504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:19 UTC 2022 ssl.sh: #505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:20 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #506: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:20 UTC 2022 ssl.sh: #507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:21 UTC 2022 ssl.sh: #508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:21 UTC 2022 ssl.sh: #509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:22 UTC 2022 ssl.sh: #510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:22 UTC 2022 ssl.sh: #511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:22 UTC 2022 ssl.sh: #512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:23 UTC 2022 ssl.sh: #513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:23 UTC 2022 ssl.sh: #514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:24 UTC 2022 ssl.sh: #515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:24 UTC 2022 ssl.sh: #516: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:25 UTC 2022 ssl.sh: #517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:25 UTC 2022 ssl.sh: #518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:26 UTC 2022 ssl.sh: #519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:26 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #520: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:26 UTC 2022 ssl.sh: #521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:27 UTC 2022 ssl.sh: #522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:27 UTC 2022 ssl.sh: #523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:28 UTC 2022 ssl.sh: #524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:28 UTC 2022 ssl.sh: #525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:29 UTC 2022 ssl.sh: #526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:29 UTC 2022 ssl.sh: #527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:30 UTC 2022 ssl.sh: #528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:30 UTC 2022 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:30 UTC 2022 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:31 UTC 2022 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:31 UTC 2022 ssl.sh: #532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45770 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45770 found at Tue Sep 27 21:53:32 UTC 2022 ssl.sh: #533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 45770 at Tue Sep 27 21:53:32 UTC 2022 kill -USR1 45770 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45770 killed at Tue Sep 27 21:53:32 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:53:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:53:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:32 UTC 2022 selfserv_9223 with PID 47048 started at Tue Sep 27 21:53:32 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:33 UTC 2022 ssl.sh: #534: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:33 UTC 2022 ssl.sh: #535: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:34 UTC 2022 ssl.sh: #536: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:34 UTC 2022 ssl.sh: #537: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:35 UTC 2022 ssl.sh: #538: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:36 UTC 2022 ssl.sh: #539: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:36 UTC 2022 ssl.sh: #540: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:37 UTC 2022 ssl.sh: #541: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:37 UTC 2022 ssl.sh: #542: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:38 UTC 2022 ssl.sh: #543: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:38 UTC 2022 ssl.sh: #544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:39 UTC 2022 ssl.sh: #545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:39 UTC 2022 ssl.sh: #546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:40 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #547: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:40 UTC 2022 ssl.sh: #548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:41 UTC 2022 ssl.sh: #549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:41 UTC 2022 ssl.sh: #550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:42 UTC 2022 ssl.sh: #551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:42 UTC 2022 ssl.sh: #552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:43 UTC 2022 ssl.sh: #553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:43 UTC 2022 ssl.sh: #554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:44 UTC 2022 ssl.sh: #555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:44 UTC 2022 ssl.sh: #556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:45 UTC 2022 ssl.sh: #557: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:45 UTC 2022 ssl.sh: #558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:46 UTC 2022 ssl.sh: #559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:46 UTC 2022 ssl.sh: #560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:47 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #561: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:47 UTC 2022 ssl.sh: #562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:48 UTC 2022 ssl.sh: #563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:48 UTC 2022 ssl.sh: #564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:49 UTC 2022 ssl.sh: #565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:49 UTC 2022 ssl.sh: #566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:50 UTC 2022 ssl.sh: #567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:51 UTC 2022 ssl.sh: #568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:51 UTC 2022 ssl.sh: #569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:51 UTC 2022 ssl.sh: #570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:52 UTC 2022 ssl.sh: #571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:52 UTC 2022 ssl.sh: #572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:53 UTC 2022 ssl.sh: #573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47048 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47048 found at Tue Sep 27 21:53:54 UTC 2022 ssl.sh: #574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 47048 at Tue Sep 27 21:53:54 UTC 2022 kill -USR1 47048 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47048 killed at Tue Sep 27 21:53:54 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:53:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:53:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:53:54 UTC 2022 selfserv_9223 with PID 48306 started at Tue Sep 27 21:53:54 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:53:55 UTC 2022 ssl.sh: #575: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:53:55 UTC 2022 ssl.sh: #576: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:53:56 UTC 2022 ssl.sh: #577: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:53:56 UTC 2022 ssl.sh: #578: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:53:57 UTC 2022 ssl.sh: #579: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:53:58 UTC 2022 ssl.sh: #580: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:53:58 UTC 2022 ssl.sh: #581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:53:59 UTC 2022 ssl.sh: #582: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:53:59 UTC 2022 ssl.sh: #583: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:00 UTC 2022 ssl.sh: #584: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:00 UTC 2022 ssl.sh: #585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:01 UTC 2022 ssl.sh: #586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:02 UTC 2022 ssl.sh: #587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:02 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #588: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:03 UTC 2022 ssl.sh: #589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:03 UTC 2022 ssl.sh: #590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:04 UTC 2022 ssl.sh: #591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:04 UTC 2022 ssl.sh: #592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:05 UTC 2022 ssl.sh: #593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:05 UTC 2022 ssl.sh: #594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:06 UTC 2022 ssl.sh: #595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:06 UTC 2022 ssl.sh: #596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:07 UTC 2022 ssl.sh: #597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:08 UTC 2022 ssl.sh: #598: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:08 UTC 2022 ssl.sh: #599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:09 UTC 2022 ssl.sh: #600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:09 UTC 2022 ssl.sh: #601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:10 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #602: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:10 UTC 2022 ssl.sh: #603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:11 UTC 2022 ssl.sh: #604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:11 UTC 2022 ssl.sh: #605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:12 UTC 2022 ssl.sh: #606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:13 UTC 2022 ssl.sh: #607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:13 UTC 2022 ssl.sh: #608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:14 UTC 2022 ssl.sh: #609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:14 UTC 2022 ssl.sh: #610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:15 UTC 2022 ssl.sh: #611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:15 UTC 2022 ssl.sh: #612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:16 UTC 2022 ssl.sh: #613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:16 UTC 2022 ssl.sh: #614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48306 found at Tue Sep 27 21:54:17 UTC 2022 ssl.sh: #615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 48306 at Tue Sep 27 21:54:17 UTC 2022 kill -USR1 48306 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48306 killed at Tue Sep 27 21:54:17 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:54:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:54:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:18 UTC 2022 selfserv_9223 with PID 769 started at Tue Sep 27 21:54:18 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:18 UTC 2022 ssl.sh: #616: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:18 UTC 2022 ssl.sh: #617: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:19 UTC 2022 ssl.sh: #618: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:19 UTC 2022 ssl.sh: #619: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:20 UTC 2022 ssl.sh: #620: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:20 UTC 2022 ssl.sh: #621: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:21 UTC 2022 ssl.sh: #622: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:21 UTC 2022 ssl.sh: #623: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:22 UTC 2022 ssl.sh: #624: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:22 UTC 2022 ssl.sh: #625: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:23 UTC 2022 ssl.sh: #626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:23 UTC 2022 ssl.sh: #627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:24 UTC 2022 ssl.sh: #628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:24 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #629: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:25 UTC 2022 ssl.sh: #630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:25 UTC 2022 ssl.sh: #631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:25 UTC 2022 ssl.sh: #632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:26 UTC 2022 ssl.sh: #633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:26 UTC 2022 ssl.sh: #634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:27 UTC 2022 ssl.sh: #635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:27 UTC 2022 ssl.sh: #636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:28 UTC 2022 ssl.sh: #637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:28 UTC 2022 ssl.sh: #638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:28 UTC 2022 ssl.sh: #639: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:29 UTC 2022 ssl.sh: #640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:29 UTC 2022 ssl.sh: #641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:30 UTC 2022 ssl.sh: #642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:30 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #643: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:31 UTC 2022 ssl.sh: #644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:31 UTC 2022 ssl.sh: #645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:32 UTC 2022 ssl.sh: #646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:32 UTC 2022 ssl.sh: #647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:33 UTC 2022 ssl.sh: #648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:33 UTC 2022 ssl.sh: #649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:33 UTC 2022 ssl.sh: #650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:34 UTC 2022 ssl.sh: #651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:34 UTC 2022 ssl.sh: #652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:35 UTC 2022 ssl.sh: #653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:35 UTC 2022 ssl.sh: #654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:36 UTC 2022 ssl.sh: #655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 769 found at Tue Sep 27 21:54:36 UTC 2022 ssl.sh: #656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 769 at Tue Sep 27 21:54:36 UTC 2022 kill -USR1 769 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 769 killed at Tue Sep 27 21:54:36 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:54:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:54:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2158 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2158 found at Tue Sep 27 21:54:37 UTC 2022 selfserv_9223 with PID 2158 started at Tue Sep 27 21:54:37 UTC 2022 trying to kill selfserv_9223 with PID 2158 at Tue Sep 27 21:54:37 UTC 2022 kill -USR1 2158 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2158 killed at Tue Sep 27 21:54:37 UTC 2022 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9223 starting at Tue Sep 27 21:54:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:54:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 2203 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2203 found at Tue Sep 27 21:54:37 UTC 2022 selfserv_9223 with PID 2203 started at Tue Sep 27 21:54:37 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #657: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #658: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #659: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #660: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #661: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #662: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #663: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #664: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #665: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #666: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #667: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #668: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #669: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #670: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #671: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #672: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #673: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #674: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #675: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #676: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #677: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #678: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #679: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #680: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #681: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #682: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #683: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #684: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #685: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #686: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #687: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #688: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #689: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #690: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #691: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #692: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #693: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #694: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #695: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #696: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #697: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #698: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #699: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #700: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #701: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #702: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #703: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #704: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #705: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #706: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #707: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 2203 at Tue Sep 27 21:54:50 UTC 2022 kill -USR1 2203 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2203 killed at Tue Sep 27 21:54:51 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Tue Sep 27 21:54:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:54:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 2752 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2752 found at Tue Sep 27 21:54:51 UTC 2022 selfserv_9223 with PID 2752 started at Tue Sep 27 21:54:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #708: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #709: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #710: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #711: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #712: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #713: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #714: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #715: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #716: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #717: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #718: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #719: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #720: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #721: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #722: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #723: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #724: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #725: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #726: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #727: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #728: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #729: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #730: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #731: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #732: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #733: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #734: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #735: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #736: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #737: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #738: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #739: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #740: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #741: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #742: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #743: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #744: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #745: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #746: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #747: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #748: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #749: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #750: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #751: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #752: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #753: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #754: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #755: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #756: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #757: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #758: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #759: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #760: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #761: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #762: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #763: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #764: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #765: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #766: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #767: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #768: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #769: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #770: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #771: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #772: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #773: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #774: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #775: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #776: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #777: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #778: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #779: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #780: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #781: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #782: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #783: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2752 at Tue Sep 27 21:55:13 UTC 2022 kill -USR1 2752 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2752 killed at Tue Sep 27 21:55:13 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9223 starting at Tue Sep 27 21:55:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3555 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3555 found at Tue Sep 27 21:55:14 UTC 2022 selfserv_9223 with PID 3555 started at Tue Sep 27 21:55:14 UTC 2022 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3555 at Tue Sep 27 21:55:14 UTC 2022 kill -USR1 3555 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3555 killed at Tue Sep 27 21:55:14 UTC 2022 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3621 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3621 found at Tue Sep 27 21:55:15 UTC 2022 selfserv_9223 with PID 3621 started at Tue Sep 27 21:55:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3621 at Tue Sep 27 21:55:16 UTC 2022 kill -USR1 3621 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3621 killed at Tue Sep 27 21:55:16 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:55:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3673 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3673 found at Tue Sep 27 21:55:16 UTC 2022 selfserv_9223 with PID 3673 started at Tue Sep 27 21:55:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3673 at Tue Sep 27 21:55:17 UTC 2022 kill -USR1 3673 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3673 killed at Tue Sep 27 21:55:17 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3733 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3733 found at Tue Sep 27 21:55:17 UTC 2022 selfserv_9223 with PID 3733 started at Tue Sep 27 21:55:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #786: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3733 at Tue Sep 27 21:55:18 UTC 2022 kill -USR1 3733 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3733 killed at Tue Sep 27 21:55:18 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3792 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3792 found at Tue Sep 27 21:55:18 UTC 2022 selfserv_9223 with PID 3792 started at Tue Sep 27 21:55:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #787: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3792 at Tue Sep 27 21:55:19 UTC 2022 kill -USR1 3792 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3792 killed at Tue Sep 27 21:55:19 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:55:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3844 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3844 found at Tue Sep 27 21:55:19 UTC 2022 selfserv_9223 with PID 3844 started at Tue Sep 27 21:55:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #788: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3844 at Tue Sep 27 21:55:20 UTC 2022 kill -USR1 3844 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3844 killed at Tue Sep 27 21:55:20 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3896 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3896 found at Tue Sep 27 21:55:20 UTC 2022 selfserv_9223 with PID 3896 started at Tue Sep 27 21:55:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #789: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3896 at Tue Sep 27 21:55:21 UTC 2022 kill -USR1 3896 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3896 killed at Tue Sep 27 21:55:21 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3948 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3948 found at Tue Sep 27 21:55:21 UTC 2022 selfserv_9223 with PID 3948 started at Tue Sep 27 21:55:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3948 at Tue Sep 27 21:55:22 UTC 2022 kill -USR1 3948 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3948 killed at Tue Sep 27 21:55:22 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:55:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4000 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4000 found at Tue Sep 27 21:55:22 UTC 2022 selfserv_9223 with PID 4000 started at Tue Sep 27 21:55:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4000 at Tue Sep 27 21:55:23 UTC 2022 kill -USR1 4000 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4000 killed at Tue Sep 27 21:55:23 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4052 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4052 found at Tue Sep 27 21:55:23 UTC 2022 selfserv_9223 with PID 4052 started at Tue Sep 27 21:55:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4052 at Tue Sep 27 21:55:24 UTC 2022 kill -USR1 4052 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4052 killed at Tue Sep 27 21:55:24 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4104 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4104 found at Tue Sep 27 21:55:24 UTC 2022 selfserv_9223 with PID 4104 started at Tue Sep 27 21:55:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #793: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4104 at Tue Sep 27 21:55:25 UTC 2022 kill -USR1 4104 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4104 killed at Tue Sep 27 21:55:25 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:55:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4156 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4156 found at Tue Sep 27 21:55:25 UTC 2022 selfserv_9223 with PID 4156 started at Tue Sep 27 21:55:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #794: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4156 at Tue Sep 27 21:55:26 UTC 2022 kill -USR1 4156 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4156 killed at Tue Sep 27 21:55:26 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4208 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4208 found at Tue Sep 27 21:55:26 UTC 2022 selfserv_9223 with PID 4208 started at Tue Sep 27 21:55:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4208 at Tue Sep 27 21:55:27 UTC 2022 kill -USR1 4208 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4208 killed at Tue Sep 27 21:55:27 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4260 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4260 found at Tue Sep 27 21:55:27 UTC 2022 selfserv_9223 with PID 4260 started at Tue Sep 27 21:55:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4260 at Tue Sep 27 21:55:28 UTC 2022 kill -USR1 4260 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4260 killed at Tue Sep 27 21:55:28 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:55:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4312 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4312 found at Tue Sep 27 21:55:29 UTC 2022 selfserv_9223 with PID 4312 started at Tue Sep 27 21:55:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4312 at Tue Sep 27 21:55:29 UTC 2022 kill -USR1 4312 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4312 killed at Tue Sep 27 21:55:29 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4364 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4364 found at Tue Sep 27 21:55:30 UTC 2022 selfserv_9223 with PID 4364 started at Tue Sep 27 21:55:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4364 at Tue Sep 27 21:55:30 UTC 2022 kill -USR1 4364 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4364 killed at Tue Sep 27 21:55:30 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4416 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4416 found at Tue Sep 27 21:55:31 UTC 2022 selfserv_9223 with PID 4416 started at Tue Sep 27 21:55:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #799: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4416 at Tue Sep 27 21:55:32 UTC 2022 kill -USR1 4416 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4416 killed at Tue Sep 27 21:55:32 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:55:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4468 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4468 found at Tue Sep 27 21:55:32 UTC 2022 selfserv_9223 with PID 4468 started at Tue Sep 27 21:55:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4468 at Tue Sep 27 21:55:33 UTC 2022 kill -USR1 4468 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4468 killed at Tue Sep 27 21:55:33 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4520 found at Tue Sep 27 21:55:33 UTC 2022 selfserv_9223 with PID 4520 started at Tue Sep 27 21:55:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4520 at Tue Sep 27 21:55:34 UTC 2022 kill -USR1 4520 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4520 killed at Tue Sep 27 21:55:34 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4572 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4572 found at Tue Sep 27 21:55:34 UTC 2022 selfserv_9223 with PID 4572 started at Tue Sep 27 21:55:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #802: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4572 at Tue Sep 27 21:55:35 UTC 2022 kill -USR1 4572 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4572 killed at Tue Sep 27 21:55:35 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:55:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4624 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4624 found at Tue Sep 27 21:55:36 UTC 2022 selfserv_9223 with PID 4624 started at Tue Sep 27 21:55:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4624 at Tue Sep 27 21:55:36 UTC 2022 kill -USR1 4624 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4624 killed at Tue Sep 27 21:55:36 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4676 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4676 found at Tue Sep 27 21:55:37 UTC 2022 selfserv_9223 with PID 4676 started at Tue Sep 27 21:55:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4676 at Tue Sep 27 21:55:37 UTC 2022 kill -USR1 4676 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4676 killed at Tue Sep 27 21:55:37 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4728 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4728 found at Tue Sep 27 21:55:38 UTC 2022 selfserv_9223 with PID 4728 started at Tue Sep 27 21:55:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #805: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4728 at Tue Sep 27 21:55:39 UTC 2022 kill -USR1 4728 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4728 killed at Tue Sep 27 21:55:39 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:55:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4780 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4780 found at Tue Sep 27 21:55:39 UTC 2022 selfserv_9223 with PID 4780 started at Tue Sep 27 21:55:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #806: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4780 at Tue Sep 27 21:55:40 UTC 2022 kill -USR1 4780 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4780 killed at Tue Sep 27 21:55:40 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4832 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4832 found at Tue Sep 27 21:55:40 UTC 2022 selfserv_9223 with PID 4832 started at Tue Sep 27 21:55:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4832 at Tue Sep 27 21:55:41 UTC 2022 kill -USR1 4832 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4832 killed at Tue Sep 27 21:55:41 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4884 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4884 found at Tue Sep 27 21:55:41 UTC 2022 selfserv_9223 with PID 4884 started at Tue Sep 27 21:55:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4884 at Tue Sep 27 21:55:42 UTC 2022 kill -USR1 4884 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4884 killed at Tue Sep 27 21:55:42 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:55:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4936 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4936 found at Tue Sep 27 21:55:42 UTC 2022 selfserv_9223 with PID 4936 started at Tue Sep 27 21:55:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #809: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4936 at Tue Sep 27 21:55:43 UTC 2022 kill -USR1 4936 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4936 killed at Tue Sep 27 21:55:43 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4988 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4988 found at Tue Sep 27 21:55:43 UTC 2022 selfserv_9223 with PID 4988 started at Tue Sep 27 21:55:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4988 at Tue Sep 27 21:55:44 UTC 2022 kill -USR1 4988 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4988 killed at Tue Sep 27 21:55:44 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5040 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5040 found at Tue Sep 27 21:55:44 UTC 2022 selfserv_9223 with PID 5040 started at Tue Sep 27 21:55:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #811: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5040 at Tue Sep 27 21:55:45 UTC 2022 kill -USR1 5040 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5040 killed at Tue Sep 27 21:55:45 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:55:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5093 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5093 found at Tue Sep 27 21:55:46 UTC 2022 selfserv_9223 with PID 5093 started at Tue Sep 27 21:55:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #812: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5093 at Tue Sep 27 21:55:46 UTC 2022 kill -USR1 5093 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5093 killed at Tue Sep 27 21:55:46 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5145 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5145 found at Tue Sep 27 21:55:47 UTC 2022 selfserv_9223 with PID 5145 started at Tue Sep 27 21:55:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5145 at Tue Sep 27 21:55:47 UTC 2022 kill -USR1 5145 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5145 killed at Tue Sep 27 21:55:47 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5197 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5197 found at Tue Sep 27 21:55:48 UTC 2022 selfserv_9223 with PID 5197 started at Tue Sep 27 21:55:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #814: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5197 at Tue Sep 27 21:55:48 UTC 2022 kill -USR1 5197 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5197 killed at Tue Sep 27 21:55:48 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5249 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5249 found at Tue Sep 27 21:55:49 UTC 2022 selfserv_9223 with PID 5249 started at Tue Sep 27 21:55:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5249 at Tue Sep 27 21:55:49 UTC 2022 kill -USR1 5249 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5249 killed at Tue Sep 27 21:55:49 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5301 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5301 found at Tue Sep 27 21:55:49 UTC 2022 selfserv_9223 with PID 5301 started at Tue Sep 27 21:55:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5301 at Tue Sep 27 21:55:50 UTC 2022 kill -USR1 5301 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5301 killed at Tue Sep 27 21:55:50 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5353 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5353 found at Tue Sep 27 21:55:51 UTC 2022 selfserv_9223 with PID 5353 started at Tue Sep 27 21:55:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #817: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5353 at Tue Sep 27 21:55:51 UTC 2022 kill -USR1 5353 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5353 killed at Tue Sep 27 21:55:51 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5405 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5405 found at Tue Sep 27 21:55:52 UTC 2022 selfserv_9223 with PID 5405 started at Tue Sep 27 21:55:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #818: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5405 at Tue Sep 27 21:55:52 UTC 2022 kill -USR1 5405 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5405 killed at Tue Sep 27 21:55:52 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5457 found at Tue Sep 27 21:55:53 UTC 2022 selfserv_9223 with PID 5457 started at Tue Sep 27 21:55:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #819: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5457 at Tue Sep 27 21:55:53 UTC 2022 kill -USR1 5457 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5457 killed at Tue Sep 27 21:55:53 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:55:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5509 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5509 found at Tue Sep 27 21:55:54 UTC 2022 selfserv_9223 with PID 5509 started at Tue Sep 27 21:55:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5509 at Tue Sep 27 21:55:54 UTC 2022 kill -USR1 5509 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5509 killed at Tue Sep 27 21:55:54 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5561 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5561 found at Tue Sep 27 21:55:55 UTC 2022 selfserv_9223 with PID 5561 started at Tue Sep 27 21:55:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #821: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5561 at Tue Sep 27 21:55:55 UTC 2022 kill -USR1 5561 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5561 killed at Tue Sep 27 21:55:55 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:55:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5613 found at Tue Sep 27 21:55:56 UTC 2022 selfserv_9223 with PID 5613 started at Tue Sep 27 21:55:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #822: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5613 at Tue Sep 27 21:55:56 UTC 2022 kill -USR1 5613 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5613 killed at Tue Sep 27 21:55:56 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5665 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5665 found at Tue Sep 27 21:55:57 UTC 2022 selfserv_9223 with PID 5665 started at Tue Sep 27 21:55:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #823: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5665 at Tue Sep 27 21:55:57 UTC 2022 kill -USR1 5665 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5665 killed at Tue Sep 27 21:55:57 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:55:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5718 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5718 found at Tue Sep 27 21:55:58 UTC 2022 selfserv_9223 with PID 5718 started at Tue Sep 27 21:55:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #824: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5718 at Tue Sep 27 21:55:58 UTC 2022 kill -USR1 5718 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5718 killed at Tue Sep 27 21:55:58 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:55:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5777 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5777 found at Tue Sep 27 21:55:59 UTC 2022 selfserv_9223 with PID 5777 started at Tue Sep 27 21:55:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5777 at Tue Sep 27 21:55:59 UTC 2022 kill -USR1 5777 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5777 killed at Tue Sep 27 21:55:59 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:55:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:55:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5829 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5829 found at Tue Sep 27 21:56:00 UTC 2022 selfserv_9223 with PID 5829 started at Tue Sep 27 21:56:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #826: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5829 at Tue Sep 27 21:56:00 UTC 2022 kill -USR1 5829 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5829 killed at Tue Sep 27 21:56:00 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:56:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5881 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5881 found at Tue Sep 27 21:56:01 UTC 2022 selfserv_9223 with PID 5881 started at Tue Sep 27 21:56:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5881 at Tue Sep 27 21:56:01 UTC 2022 kill -USR1 5881 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5881 killed at Tue Sep 27 21:56:01 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:56:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5933 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5933 found at Tue Sep 27 21:56:01 UTC 2022 selfserv_9223 with PID 5933 started at Tue Sep 27 21:56:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #828: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5933 at Tue Sep 27 21:56:02 UTC 2022 kill -USR1 5933 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5933 killed at Tue Sep 27 21:56:02 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:56:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5985 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5985 found at Tue Sep 27 21:56:03 UTC 2022 selfserv_9223 with PID 5985 started at Tue Sep 27 21:56:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #829: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5985 at Tue Sep 27 21:56:03 UTC 2022 kill -USR1 5985 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5985 killed at Tue Sep 27 21:56:03 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:56:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6037 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6037 found at Tue Sep 27 21:56:04 UTC 2022 selfserv_9223 with PID 6037 started at Tue Sep 27 21:56:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #830: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6037 at Tue Sep 27 21:56:04 UTC 2022 kill -USR1 6037 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6037 killed at Tue Sep 27 21:56:04 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:56:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6089 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6089 found at Tue Sep 27 21:56:05 UTC 2022 selfserv_9223 with PID 6089 started at Tue Sep 27 21:56:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6089 at Tue Sep 27 21:56:05 UTC 2022 kill -USR1 6089 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6089 killed at Tue Sep 27 21:56:06 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:56:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6141 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6141 found at Tue Sep 27 21:56:06 UTC 2022 selfserv_9223 with PID 6141 started at Tue Sep 27 21:56:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #832: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6141 at Tue Sep 27 21:56:06 UTC 2022 kill -USR1 6141 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6141 killed at Tue Sep 27 21:56:07 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:56:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6193 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6193 found at Tue Sep 27 21:56:07 UTC 2022 selfserv_9223 with PID 6193 started at Tue Sep 27 21:56:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #833: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6193 at Tue Sep 27 21:56:08 UTC 2022 kill -USR1 6193 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6193 killed at Tue Sep 27 21:56:08 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:56:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6245 found at Tue Sep 27 21:56:08 UTC 2022 selfserv_9223 with PID 6245 started at Tue Sep 27 21:56:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #834: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6245 at Tue Sep 27 21:56:09 UTC 2022 kill -USR1 6245 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6245 killed at Tue Sep 27 21:56:09 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:56:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6297 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6297 found at Tue Sep 27 21:56:09 UTC 2022 selfserv_9223 with PID 6297 started at Tue Sep 27 21:56:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #835: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6297 at Tue Sep 27 21:56:10 UTC 2022 kill -USR1 6297 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6297 killed at Tue Sep 27 21:56:10 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:56:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6349 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6349 found at Tue Sep 27 21:56:10 UTC 2022 selfserv_9223 with PID 6349 started at Tue Sep 27 21:56:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #836: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6349 at Tue Sep 27 21:56:11 UTC 2022 kill -USR1 6349 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6349 killed at Tue Sep 27 21:56:11 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:56:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6401 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6401 found at Tue Sep 27 21:56:11 UTC 2022 selfserv_9223 with PID 6401 started at Tue Sep 27 21:56:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #837: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6401 at Tue Sep 27 21:56:12 UTC 2022 kill -USR1 6401 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6401 killed at Tue Sep 27 21:56:12 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:56:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6453 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6453 found at Tue Sep 27 21:56:12 UTC 2022 selfserv_9223 with PID 6453 started at Tue Sep 27 21:56:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #838: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6453 at Tue Sep 27 21:56:13 UTC 2022 kill -USR1 6453 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6453 killed at Tue Sep 27 21:56:13 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:56:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6505 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6505 found at Tue Sep 27 21:56:13 UTC 2022 selfserv_9223 with PID 6505 started at Tue Sep 27 21:56:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6505 at Tue Sep 27 21:56:14 UTC 2022 kill -USR1 6505 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6505 killed at Tue Sep 27 21:56:14 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:56:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6557 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6557 found at Tue Sep 27 21:56:14 UTC 2022 selfserv_9223 with PID 6557 started at Tue Sep 27 21:56:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #840: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6557 at Tue Sep 27 21:56:15 UTC 2022 kill -USR1 6557 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6557 killed at Tue Sep 27 21:56:15 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:56:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6609 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6609 found at Tue Sep 27 21:56:16 UTC 2022 selfserv_9223 with PID 6609 started at Tue Sep 27 21:56:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #841: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6609 at Tue Sep 27 21:56:16 UTC 2022 kill -USR1 6609 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6609 killed at Tue Sep 27 21:56:16 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Tue Sep 27 21:56:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6677 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6677 found at Tue Sep 27 21:56:17 UTC 2022 selfserv_9223 with PID 6677 started at Tue Sep 27 21:56:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #842: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6677 at Tue Sep 27 21:56:17 UTC 2022 kill -USR1 6677 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6677 killed at Tue Sep 27 21:56:17 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Tue Sep 27 21:56:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6742 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6742 found at Tue Sep 27 21:56:18 UTC 2022 selfserv_9223 with PID 6742 started at Tue Sep 27 21:56:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #843: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6742 at Tue Sep 27 21:56:18 UTC 2022 kill -USR1 6742 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6742 killed at Tue Sep 27 21:56:18 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Tue Sep 27 21:56:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6800 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6800 found at Tue Sep 27 21:56:19 UTC 2022 selfserv_9223 with PID 6800 started at Tue Sep 27 21:56:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #844: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6800 at Tue Sep 27 21:56:19 UTC 2022 kill -USR1 6800 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6800 killed at Tue Sep 27 21:56:19 UTC 2022 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9223 starting at Tue Sep 27 21:56:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6858 found at Tue Sep 27 21:56:19 UTC 2022 selfserv_9223 with PID 6858 started at Tue Sep 27 21:56:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #845: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6858 at Tue Sep 27 21:56:20 UTC 2022 kill -USR1 6858 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6858 killed at Tue Sep 27 21:56:20 UTC 2022 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9223 starting at Tue Sep 27 21:56:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6916 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6916 found at Tue Sep 27 21:56:20 UTC 2022 selfserv_9223 with PID 6916 started at Tue Sep 27 21:56:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #846: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6916 at Tue Sep 27 21:56:21 UTC 2022 kill -USR1 6916 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6916 killed at Tue Sep 27 21:56:21 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Tue Sep 27 21:56:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6974 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6974 found at Tue Sep 27 21:56:21 UTC 2022 selfserv_9223 with PID 6974 started at Tue Sep 27 21:56:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #847: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6974 at Tue Sep 27 21:56:21 UTC 2022 kill -USR1 6974 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6974 killed at Tue Sep 27 21:56:22 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Tue Sep 27 21:56:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7032 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7032 found at Tue Sep 27 21:56:22 UTC 2022 selfserv_9223 with PID 7032 started at Tue Sep 27 21:56:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #848: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7032 at Tue Sep 27 21:56:22 UTC 2022 kill -USR1 7032 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7032 killed at Tue Sep 27 21:56:23 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9223 starting at Tue Sep 27 21:56:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7090 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7090 found at Tue Sep 27 21:56:23 UTC 2022 selfserv_9223 with PID 7090 started at Tue Sep 27 21:56:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #849: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7090 at Tue Sep 27 21:56:23 UTC 2022 kill -USR1 7090 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7090 killed at Tue Sep 27 21:56:23 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9223 starting at Tue Sep 27 21:56:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7148 found at Tue Sep 27 21:56:24 UTC 2022 selfserv_9223 with PID 7148 started at Tue Sep 27 21:56:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #850: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7148 at Tue Sep 27 21:56:24 UTC 2022 kill -USR1 7148 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7148 killed at Tue Sep 27 21:56:24 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Tue Sep 27 21:56:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7206 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7206 found at Tue Sep 27 21:56:24 UTC 2022 selfserv_9223 with PID 7206 started at Tue Sep 27 21:56:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #851: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7206 at Tue Sep 27 21:56:25 UTC 2022 kill -USR1 7206 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7206 killed at Tue Sep 27 21:56:25 UTC 2022 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9223 starting at Tue Sep 27 21:56:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7248 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7248 found at Tue Sep 27 21:56:25 UTC 2022 selfserv_9223 with PID 7248 started at Tue Sep 27 21:56:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #784: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7248 at Tue Sep 27 21:56:25 UTC 2022 kill -USR1 7248 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7248 killed at Tue Sep 27 21:56:26 UTC 2022 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9223 starting at Tue Sep 27 21:56:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7290 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7290 found at Tue Sep 27 21:56:26 UTC 2022 selfserv_9223 with PID 7290 started at Tue Sep 27 21:56:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #785: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9223 with PID 7290 at Tue Sep 27 21:56:26 UTC 2022 kill -USR1 7290 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7290 killed at Tue Sep 27 21:56:26 UTC 2022 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9223 starting at Tue Sep 27 21:56:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7332 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7332 found at Tue Sep 27 21:56:27 UTC 2022 selfserv_9223 with PID 7332 started at Tue Sep 27 21:56:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #786: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 7332 at Tue Sep 27 21:56:27 UTC 2022 kill -USR1 7332 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7332 killed at Tue Sep 27 21:56:27 UTC 2022 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9223 starting at Tue Sep 27 21:56:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7374 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7374 found at Tue Sep 27 21:56:27 UTC 2022 selfserv_9223 with PID 7374 started at Tue Sep 27 21:56:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #787: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 7374 at Tue Sep 27 21:56:28 UTC 2022 kill -USR1 7374 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7374 killed at Tue Sep 27 21:56:28 UTC 2022 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9223 starting at Tue Sep 27 21:56:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7416 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7416 found at Tue Sep 27 21:56:28 UTC 2022 selfserv_9223 with PID 7416 started at Tue Sep 27 21:56:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #788: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 7416 at Tue Sep 27 21:56:28 UTC 2022 kill -USR1 7416 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7416 killed at Tue Sep 27 21:56:29 UTC 2022 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9223 starting at Tue Sep 27 21:56:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7458 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7458 found at Tue Sep 27 21:56:29 UTC 2022 selfserv_9223 with PID 7458 started at Tue Sep 27 21:56:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #789: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 7458 at Tue Sep 27 21:56:29 UTC 2022 kill -USR1 7458 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7458 killed at Tue Sep 27 21:56:29 UTC 2022 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9223 starting at Tue Sep 27 21:56:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7500 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7500 found at Tue Sep 27 21:56:30 UTC 2022 selfserv_9223 with PID 7500 started at Tue Sep 27 21:56:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #790: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 7500 at Tue Sep 27 21:56:30 UTC 2022 kill -USR1 7500 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7500 killed at Tue Sep 27 21:56:30 UTC 2022 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9223 starting at Tue Sep 27 21:56:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:56:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7542 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7542 found at Tue Sep 27 21:56:30 UTC 2022 selfserv_9223 with PID 7542 started at Tue Sep 27 21:56:30 UTC 2022 strsclnt -q -p 9223 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Tue Sep 27 21:56:30 UTC 2022 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Tue Sep 27 21:57:10 UTC 2022 ssl.sh: #791: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9223 with PID 7542 at Tue Sep 27 21:57:10 UTC 2022 kill -USR1 7542 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7542 killed at Tue Sep 27 21:57:10 UTC 2022 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Tue Sep 27 21:57:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:57:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7593 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7593 found at Tue Sep 27 21:57:11 UTC 2022 selfserv_9223 with PID 7593 started at Tue Sep 27 21:57:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7593 at Tue Sep 27 21:57:11 UTC 2022 kill -USR1 7593 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7593 killed at Tue Sep 27 21:57:11 UTC 2022 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:57:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:57:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7635 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7635 found at Tue Sep 27 21:57:11 UTC 2022 selfserv_9223 with PID 7635 started at Tue Sep 27 21:57:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #793: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7635 at Tue Sep 27 21:57:12 UTC 2022 kill -USR1 7635 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7635 killed at Tue Sep 27 21:57:12 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:57:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:57:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7674 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7674 found at Tue Sep 27 21:57:12 UTC 2022 selfserv_9223 with PID 7674 started at Tue Sep 27 21:57:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #794: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 7674 at Tue Sep 27 21:57:12 UTC 2022 kill -USR1 7674 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7674 killed at Tue Sep 27 21:57:13 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:57:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:57:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7713 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7713 found at Tue Sep 27 21:57:13 UTC 2022 selfserv_9223 with PID 7713 started at Tue Sep 27 21:57:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7713 at Tue Sep 27 21:57:13 UTC 2022 kill -USR1 7713 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7713 killed at Tue Sep 27 21:57:13 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:57:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:57:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7752 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7752 found at Tue Sep 27 21:57:14 UTC 2022 selfserv_9223 with PID 7752 started at Tue Sep 27 21:57:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #796: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 7752 at Tue Sep 27 21:57:14 UTC 2022 kill -USR1 7752 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7752 killed at Tue Sep 27 21:57:14 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:57:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:57:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7791 found at Tue Sep 27 21:57:14 UTC 2022 selfserv_9223 with PID 7791 started at Tue Sep 27 21:57:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7791 at Tue Sep 27 21:57:15 UTC 2022 kill -USR1 7791 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7791 killed at Tue Sep 27 21:57:15 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:57:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:57:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7830 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7830 found at Tue Sep 27 21:57:15 UTC 2022 selfserv_9223 with PID 7830 started at Tue Sep 27 21:57:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7830 at Tue Sep 27 21:57:15 UTC 2022 kill -USR1 7830 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7830 killed at Tue Sep 27 21:57:16 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:57:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:57:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7869 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7869 found at Tue Sep 27 21:57:16 UTC 2022 selfserv_9223 with PID 7869 started at Tue Sep 27 21:57:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7869 at Tue Sep 27 21:57:16 UTC 2022 kill -USR1 7869 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7869 killed at Tue Sep 27 21:57:16 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:57:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:57:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7916 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7916 found at Tue Sep 27 21:57:17 UTC 2022 selfserv_9223 with PID 7916 started at Tue Sep 27 21:57:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #800: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7916 at Tue Sep 27 21:57:17 UTC 2022 kill -USR1 7916 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7916 killed at Tue Sep 27 21:57:17 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:57:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:57:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7955 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7955 found at Tue Sep 27 21:57:17 UTC 2022 selfserv_9223 with PID 7955 started at Tue Sep 27 21:57:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7955 at Tue Sep 27 21:57:18 UTC 2022 kill -USR1 7955 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7955 killed at Tue Sep 27 21:57:18 UTC 2022 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:57:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:57:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8001 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8001 found at Tue Sep 27 21:57:18 UTC 2022 selfserv_9223 with PID 8001 started at Tue Sep 27 21:57:18 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #802: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8001 at Tue Sep 27 21:57:18 UTC 2022 kill -USR1 8001 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8001 killed at Tue Sep 27 21:57:19 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:57:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:57:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8041 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8041 found at Tue Sep 27 21:57:19 UTC 2022 selfserv_9223 with PID 8041 started at Tue Sep 27 21:57:19 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #803: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8041 at Tue Sep 27 21:57:19 UTC 2022 kill -USR1 8041 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8041 killed at Tue Sep 27 21:57:19 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:57:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:57:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8081 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8081 found at Tue Sep 27 21:57:20 UTC 2022 selfserv_9223 with PID 8081 started at Tue Sep 27 21:57:20 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #804: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8081 at Tue Sep 27 21:57:20 UTC 2022 kill -USR1 8081 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8081 killed at Tue Sep 27 21:57:20 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:57:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:57:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8121 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8121 found at Tue Sep 27 21:57:20 UTC 2022 selfserv_9223 with PID 8121 started at Tue Sep 27 21:57:20 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #805: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8121 at Tue Sep 27 21:57:21 UTC 2022 kill -USR1 8121 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8121 killed at Tue Sep 27 21:57:21 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:57:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:57:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8161 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8161 found at Tue Sep 27 21:57:21 UTC 2022 selfserv_9223 with PID 8161 started at Tue Sep 27 21:57:21 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #806: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8161 at Tue Sep 27 21:57:21 UTC 2022 kill -USR1 8161 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8161 killed at Tue Sep 27 21:57:22 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:57:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:57:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8201 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8201 found at Tue Sep 27 21:57:22 UTC 2022 selfserv_9223 with PID 8201 started at Tue Sep 27 21:57:22 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #807: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8201 at Tue Sep 27 21:57:22 UTC 2022 kill -USR1 8201 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8201 killed at Tue Sep 27 21:57:22 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:57:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:57:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8241 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8241 found at Tue Sep 27 21:57:23 UTC 2022 selfserv_9223 with PID 8241 started at Tue Sep 27 21:57:23 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #808: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8241 at Tue Sep 27 21:57:23 UTC 2022 kill -USR1 8241 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8241 killed at Tue Sep 27 21:57:23 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:57:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:57:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8281 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8281 found at Tue Sep 27 21:57:23 UTC 2022 selfserv_9223 with PID 8281 started at Tue Sep 27 21:57:23 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #809: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8281 at Tue Sep 27 21:57:24 UTC 2022 kill -USR1 8281 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8281 killed at Tue Sep 27 21:57:24 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:57:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:57:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8321 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8321 found at Tue Sep 27 21:57:24 UTC 2022 selfserv_9223 with PID 8321 started at Tue Sep 27 21:57:24 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #810: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8321 at Tue Sep 27 21:57:24 UTC 2022 kill -USR1 8321 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8321 killed at Tue Sep 27 21:57:25 UTC 2022 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9223 starting at Tue Sep 27 21:57:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:57:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 8361 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8361 found at Tue Sep 27 21:57:25 UTC 2022 selfserv_9223 with PID 8361 started at Tue Sep 27 21:57:25 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #811: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #812: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #813: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #814: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #815: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #816: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #817: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #821: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #822: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #827: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #828: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #833: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #834: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #839: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #840: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #844: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #846: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #849: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #850: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #851: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #852: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #853: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #854: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #855: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #856: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #857: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #858: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #859: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #860: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #861: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 8361 at Tue Sep 27 21:57:39 UTC 2022 kill -USR1 8361 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8361 killed at Tue Sep 27 21:57:39 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Tue Sep 27 21:57:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:57:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 8910 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8910 found at Tue Sep 27 21:57:39 UTC 2022 selfserv_9223 with PID 8910 started at Tue Sep 27 21:57:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #862: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #863: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #864: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #865: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #866: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #867: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #868: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #869: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #870: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #902: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #903: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #908: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #909: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #914: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #915: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #920: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #921: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #923: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #924: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #925: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #926: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #927: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #928: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #929: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #930: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #931: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #932: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #933: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #934: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #935: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #936: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8910 at Tue Sep 27 21:58:01 UTC 2022 kill -USR1 8910 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8910 killed at Tue Sep 27 21:58:01 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9720 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9720 found at Tue Sep 27 21:58:02 UTC 2022 selfserv_9223 with PID 9720 started at Tue Sep 27 21:58:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9720 at Tue Sep 27 21:58:02 UTC 2022 kill -USR1 9720 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9720 killed at Tue Sep 27 21:58:02 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:58:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9772 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9772 found at Tue Sep 27 21:58:03 UTC 2022 selfserv_9223 with PID 9772 started at Tue Sep 27 21:58:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9772 at Tue Sep 27 21:58:03 UTC 2022 kill -USR1 9772 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9772 killed at Tue Sep 27 21:58:03 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9824 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9824 found at Tue Sep 27 21:58:03 UTC 2022 selfserv_9223 with PID 9824 started at Tue Sep 27 21:58:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #940: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9824 at Tue Sep 27 21:58:04 UTC 2022 kill -USR1 9824 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9824 killed at Tue Sep 27 21:58:04 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9877 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9877 found at Tue Sep 27 21:58:04 UTC 2022 selfserv_9223 with PID 9877 started at Tue Sep 27 21:58:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #941: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9877 at Tue Sep 27 21:58:05 UTC 2022 kill -USR1 9877 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9877 killed at Tue Sep 27 21:58:05 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:58:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9929 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9929 found at Tue Sep 27 21:58:05 UTC 2022 selfserv_9223 with PID 9929 started at Tue Sep 27 21:58:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #942: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9929 at Tue Sep 27 21:58:06 UTC 2022 kill -USR1 9929 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9929 killed at Tue Sep 27 21:58:06 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9981 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9981 found at Tue Sep 27 21:58:06 UTC 2022 selfserv_9223 with PID 9981 started at Tue Sep 27 21:58:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9981 at Tue Sep 27 21:58:07 UTC 2022 kill -USR1 9981 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9981 killed at Tue Sep 27 21:58:07 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10033 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10033 found at Tue Sep 27 21:58:07 UTC 2022 selfserv_9223 with PID 10033 started at Tue Sep 27 21:58:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10033 at Tue Sep 27 21:58:08 UTC 2022 kill -USR1 10033 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10033 killed at Tue Sep 27 21:58:08 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:58:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10085 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10085 found at Tue Sep 27 21:58:08 UTC 2022 selfserv_9223 with PID 10085 started at Tue Sep 27 21:58:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10085 at Tue Sep 27 21:58:09 UTC 2022 kill -USR1 10085 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10085 killed at Tue Sep 27 21:58:09 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10137 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10137 found at Tue Sep 27 21:58:09 UTC 2022 selfserv_9223 with PID 10137 started at Tue Sep 27 21:58:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10137 at Tue Sep 27 21:58:10 UTC 2022 kill -USR1 10137 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10137 killed at Tue Sep 27 21:58:10 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10189 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10189 found at Tue Sep 27 21:58:10 UTC 2022 selfserv_9223 with PID 10189 started at Tue Sep 27 21:58:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #947: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10189 at Tue Sep 27 21:58:10 UTC 2022 kill -USR1 10189 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10189 killed at Tue Sep 27 21:58:11 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:58:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10241 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10241 found at Tue Sep 27 21:58:11 UTC 2022 selfserv_9223 with PID 10241 started at Tue Sep 27 21:58:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #948: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10241 at Tue Sep 27 21:58:11 UTC 2022 kill -USR1 10241 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10241 killed at Tue Sep 27 21:58:12 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10293 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10293 found at Tue Sep 27 21:58:12 UTC 2022 selfserv_9223 with PID 10293 started at Tue Sep 27 21:58:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10293 at Tue Sep 27 21:58:12 UTC 2022 kill -USR1 10293 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10293 killed at Tue Sep 27 21:58:12 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10345 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10345 found at Tue Sep 27 21:58:13 UTC 2022 selfserv_9223 with PID 10345 started at Tue Sep 27 21:58:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10345 at Tue Sep 27 21:58:13 UTC 2022 kill -USR1 10345 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10345 killed at Tue Sep 27 21:58:13 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:58:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10397 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10397 found at Tue Sep 27 21:58:14 UTC 2022 selfserv_9223 with PID 10397 started at Tue Sep 27 21:58:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10397 at Tue Sep 27 21:58:14 UTC 2022 kill -USR1 10397 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10397 killed at Tue Sep 27 21:58:14 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10452 found at Tue Sep 27 21:58:15 UTC 2022 selfserv_9223 with PID 10452 started at Tue Sep 27 21:58:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10452 at Tue Sep 27 21:58:15 UTC 2022 kill -USR1 10452 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10452 killed at Tue Sep 27 21:58:15 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10504 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10504 found at Tue Sep 27 21:58:16 UTC 2022 selfserv_9223 with PID 10504 started at Tue Sep 27 21:58:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #953: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10504 at Tue Sep 27 21:58:16 UTC 2022 kill -USR1 10504 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10504 killed at Tue Sep 27 21:58:16 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:58:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10556 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10556 found at Tue Sep 27 21:58:17 UTC 2022 selfserv_9223 with PID 10556 started at Tue Sep 27 21:58:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #954: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10556 at Tue Sep 27 21:58:17 UTC 2022 kill -USR1 10556 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10556 killed at Tue Sep 27 21:58:17 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10616 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10616 found at Tue Sep 27 21:58:18 UTC 2022 selfserv_9223 with PID 10616 started at Tue Sep 27 21:58:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #955: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10616 at Tue Sep 27 21:58:18 UTC 2022 kill -USR1 10616 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10616 killed at Tue Sep 27 21:58:18 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10675 found at Tue Sep 27 21:58:18 UTC 2022 selfserv_9223 with PID 10675 started at Tue Sep 27 21:58:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #956: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10675 at Tue Sep 27 21:58:19 UTC 2022 kill -USR1 10675 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10675 killed at Tue Sep 27 21:58:19 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:58:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10727 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10727 found at Tue Sep 27 21:58:20 UTC 2022 selfserv_9223 with PID 10727 started at Tue Sep 27 21:58:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #957: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10727 at Tue Sep 27 21:58:20 UTC 2022 kill -USR1 10727 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10727 killed at Tue Sep 27 21:58:20 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10779 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10779 found at Tue Sep 27 21:58:20 UTC 2022 selfserv_9223 with PID 10779 started at Tue Sep 27 21:58:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #958: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10779 at Tue Sep 27 21:58:21 UTC 2022 kill -USR1 10779 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10779 killed at Tue Sep 27 21:58:21 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10831 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10831 found at Tue Sep 27 21:58:21 UTC 2022 selfserv_9223 with PID 10831 started at Tue Sep 27 21:58:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #959: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10831 at Tue Sep 27 21:58:22 UTC 2022 kill -USR1 10831 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10831 killed at Tue Sep 27 21:58:22 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:58:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10883 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10883 found at Tue Sep 27 21:58:22 UTC 2022 selfserv_9223 with PID 10883 started at Tue Sep 27 21:58:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #960: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10883 at Tue Sep 27 21:58:23 UTC 2022 kill -USR1 10883 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10883 killed at Tue Sep 27 21:58:23 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10935 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10935 found at Tue Sep 27 21:58:23 UTC 2022 selfserv_9223 with PID 10935 started at Tue Sep 27 21:58:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #961: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10935 at Tue Sep 27 21:58:24 UTC 2022 kill -USR1 10935 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10935 killed at Tue Sep 27 21:58:24 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10987 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10987 found at Tue Sep 27 21:58:24 UTC 2022 selfserv_9223 with PID 10987 started at Tue Sep 27 21:58:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #962: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10987 at Tue Sep 27 21:58:25 UTC 2022 kill -USR1 10987 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10987 killed at Tue Sep 27 21:58:25 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:58:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11039 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11039 found at Tue Sep 27 21:58:25 UTC 2022 selfserv_9223 with PID 11039 started at Tue Sep 27 21:58:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #963: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11039 at Tue Sep 27 21:58:26 UTC 2022 kill -USR1 11039 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11039 killed at Tue Sep 27 21:58:26 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11091 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11091 found at Tue Sep 27 21:58:26 UTC 2022 selfserv_9223 with PID 11091 started at Tue Sep 27 21:58:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #964: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11091 at Tue Sep 27 21:58:27 UTC 2022 kill -USR1 11091 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11091 killed at Tue Sep 27 21:58:27 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11143 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11143 found at Tue Sep 27 21:58:27 UTC 2022 selfserv_9223 with PID 11143 started at Tue Sep 27 21:58:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #965: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 11143 at Tue Sep 27 21:58:28 UTC 2022 kill -USR1 11143 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11143 killed at Tue Sep 27 21:58:28 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:58:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11195 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11195 found at Tue Sep 27 21:58:29 UTC 2022 selfserv_9223 with PID 11195 started at Tue Sep 27 21:58:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #966: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 11195 at Tue Sep 27 21:58:29 UTC 2022 kill -USR1 11195 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11195 killed at Tue Sep 27 21:58:29 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11247 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11247 found at Tue Sep 27 21:58:29 UTC 2022 selfserv_9223 with PID 11247 started at Tue Sep 27 21:58:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #967: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11247 at Tue Sep 27 21:58:30 UTC 2022 kill -USR1 11247 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11247 killed at Tue Sep 27 21:58:30 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11299 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11299 found at Tue Sep 27 21:58:31 UTC 2022 selfserv_9223 with PID 11299 started at Tue Sep 27 21:58:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #968: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11299 at Tue Sep 27 21:58:31 UTC 2022 kill -USR1 11299 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11299 killed at Tue Sep 27 21:58:31 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11352 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11352 found at Tue Sep 27 21:58:31 UTC 2022 selfserv_9223 with PID 11352 started at Tue Sep 27 21:58:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #969: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11352 at Tue Sep 27 21:58:32 UTC 2022 kill -USR1 11352 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11352 killed at Tue Sep 27 21:58:32 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11404 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11404 found at Tue Sep 27 21:58:32 UTC 2022 selfserv_9223 with PID 11404 started at Tue Sep 27 21:58:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #970: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11404 at Tue Sep 27 21:58:33 UTC 2022 kill -USR1 11404 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11404 killed at Tue Sep 27 21:58:33 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11456 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11456 found at Tue Sep 27 21:58:33 UTC 2022 selfserv_9223 with PID 11456 started at Tue Sep 27 21:58:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #971: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 11456 at Tue Sep 27 21:58:34 UTC 2022 kill -USR1 11456 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11456 killed at Tue Sep 27 21:58:34 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11508 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11508 found at Tue Sep 27 21:58:34 UTC 2022 selfserv_9223 with PID 11508 started at Tue Sep 27 21:58:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #972: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11508 at Tue Sep 27 21:58:35 UTC 2022 kill -USR1 11508 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11508 killed at Tue Sep 27 21:58:35 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11560 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11560 found at Tue Sep 27 21:58:35 UTC 2022 selfserv_9223 with PID 11560 started at Tue Sep 27 21:58:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #973: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11560 at Tue Sep 27 21:58:36 UTC 2022 kill -USR1 11560 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11560 killed at Tue Sep 27 21:58:36 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:58:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11612 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11612 found at Tue Sep 27 21:58:36 UTC 2022 selfserv_9223 with PID 11612 started at Tue Sep 27 21:58:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #974: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11612 at Tue Sep 27 21:58:37 UTC 2022 kill -USR1 11612 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11612 killed at Tue Sep 27 21:58:37 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11664 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11664 found at Tue Sep 27 21:58:37 UTC 2022 selfserv_9223 with PID 11664 started at Tue Sep 27 21:58:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #975: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11664 at Tue Sep 27 21:58:38 UTC 2022 kill -USR1 11664 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11664 killed at Tue Sep 27 21:58:38 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:58:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11716 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11716 found at Tue Sep 27 21:58:38 UTC 2022 selfserv_9223 with PID 11716 started at Tue Sep 27 21:58:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #976: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 11716 at Tue Sep 27 21:58:38 UTC 2022 kill -USR1 11716 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11716 killed at Tue Sep 27 21:58:39 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11768 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11768 found at Tue Sep 27 21:58:39 UTC 2022 selfserv_9223 with PID 11768 started at Tue Sep 27 21:58:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #977: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11768 at Tue Sep 27 21:58:39 UTC 2022 kill -USR1 11768 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11768 killed at Tue Sep 27 21:58:40 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:58:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11820 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11820 found at Tue Sep 27 21:58:40 UTC 2022 selfserv_9223 with PID 11820 started at Tue Sep 27 21:58:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #978: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11820 at Tue Sep 27 21:58:40 UTC 2022 kill -USR1 11820 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11820 killed at Tue Sep 27 21:58:41 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11872 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11872 found at Tue Sep 27 21:58:41 UTC 2022 selfserv_9223 with PID 11872 started at Tue Sep 27 21:58:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #979: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11872 at Tue Sep 27 21:58:41 UTC 2022 kill -USR1 11872 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11872 killed at Tue Sep 27 21:58:41 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:58:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11926 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11926 found at Tue Sep 27 21:58:42 UTC 2022 selfserv_9223 with PID 11926 started at Tue Sep 27 21:58:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #980: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 11926 at Tue Sep 27 21:58:42 UTC 2022 kill -USR1 11926 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11926 killed at Tue Sep 27 21:58:42 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11978 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11978 found at Tue Sep 27 21:58:43 UTC 2022 selfserv_9223 with PID 11978 started at Tue Sep 27 21:58:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #981: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11978 at Tue Sep 27 21:58:43 UTC 2022 kill -USR1 11978 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11978 killed at Tue Sep 27 21:58:43 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:58:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12030 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12030 found at Tue Sep 27 21:58:44 UTC 2022 selfserv_9223 with PID 12030 started at Tue Sep 27 21:58:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #982: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12030 at Tue Sep 27 21:58:44 UTC 2022 kill -USR1 12030 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12030 killed at Tue Sep 27 21:58:44 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12082 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12082 found at Tue Sep 27 21:58:45 UTC 2022 selfserv_9223 with PID 12082 started at Tue Sep 27 21:58:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #983: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12082 at Tue Sep 27 21:58:45 UTC 2022 kill -USR1 12082 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12082 killed at Tue Sep 27 21:58:45 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:58:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12134 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12134 found at Tue Sep 27 21:58:46 UTC 2022 selfserv_9223 with PID 12134 started at Tue Sep 27 21:58:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #984: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12134 at Tue Sep 27 21:58:46 UTC 2022 kill -USR1 12134 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12134 killed at Tue Sep 27 21:58:46 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12186 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12186 found at Tue Sep 27 21:58:46 UTC 2022 selfserv_9223 with PID 12186 started at Tue Sep 27 21:58:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #985: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12186 at Tue Sep 27 21:58:47 UTC 2022 kill -USR1 12186 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12186 killed at Tue Sep 27 21:58:47 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:58:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12238 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12238 found at Tue Sep 27 21:58:47 UTC 2022 selfserv_9223 with PID 12238 started at Tue Sep 27 21:58:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #986: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12238 at Tue Sep 27 21:58:48 UTC 2022 kill -USR1 12238 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12238 killed at Tue Sep 27 21:58:48 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12290 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12290 found at Tue Sep 27 21:58:48 UTC 2022 selfserv_9223 with PID 12290 started at Tue Sep 27 21:58:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #987: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12290 at Tue Sep 27 21:58:49 UTC 2022 kill -USR1 12290 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12290 killed at Tue Sep 27 21:58:49 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:58:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12342 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12342 found at Tue Sep 27 21:58:49 UTC 2022 selfserv_9223 with PID 12342 started at Tue Sep 27 21:58:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #988: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12342 at Tue Sep 27 21:58:50 UTC 2022 kill -USR1 12342 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12342 killed at Tue Sep 27 21:58:50 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12394 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12394 found at Tue Sep 27 21:58:50 UTC 2022 selfserv_9223 with PID 12394 started at Tue Sep 27 21:58:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #989: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12394 at Tue Sep 27 21:58:51 UTC 2022 kill -USR1 12394 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12394 killed at Tue Sep 27 21:58:51 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:58:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12446 found at Tue Sep 27 21:58:51 UTC 2022 selfserv_9223 with PID 12446 started at Tue Sep 27 21:58:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12446 at Tue Sep 27 21:58:52 UTC 2022 kill -USR1 12446 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12446 killed at Tue Sep 27 21:58:52 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12499 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12499 found at Tue Sep 27 21:58:52 UTC 2022 selfserv_9223 with PID 12499 started at Tue Sep 27 21:58:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12499 at Tue Sep 27 21:58:53 UTC 2022 kill -USR1 12499 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12499 killed at Tue Sep 27 21:58:53 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:58:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12551 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12551 found at Tue Sep 27 21:58:53 UTC 2022 selfserv_9223 with PID 12551 started at Tue Sep 27 21:58:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #992: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12551 at Tue Sep 27 21:58:54 UTC 2022 kill -USR1 12551 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12551 killed at Tue Sep 27 21:58:54 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12603 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12603 found at Tue Sep 27 21:58:54 UTC 2022 selfserv_9223 with PID 12603 started at Tue Sep 27 21:58:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #993: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12603 at Tue Sep 27 21:58:55 UTC 2022 kill -USR1 12603 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12603 killed at Tue Sep 27 21:58:55 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12655 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12655 found at Tue Sep 27 21:58:55 UTC 2022 selfserv_9223 with PID 12655 started at Tue Sep 27 21:58:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #994: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12655 at Tue Sep 27 21:58:56 UTC 2022 kill -USR1 12655 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12655 killed at Tue Sep 27 21:58:56 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:58:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12707 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12707 found at Tue Sep 27 21:58:56 UTC 2022 selfserv_9223 with PID 12707 started at Tue Sep 27 21:58:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #995: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12707 at Tue Sep 27 21:58:57 UTC 2022 kill -USR1 12707 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12707 killed at Tue Sep 27 21:58:57 UTC 2022 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Tue Sep 27 21:58:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12789 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12789 found at Tue Sep 27 21:58:57 UTC 2022 selfserv_9223 with PID 12789 started at Tue Sep 27 21:58:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12789 at Tue Sep 27 21:58:58 UTC 2022 kill -USR1 12789 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12789 killed at Tue Sep 27 21:58:58 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:58:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12831 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12831 found at Tue Sep 27 21:58:58 UTC 2022 selfserv_9223 with PID 12831 started at Tue Sep 27 21:58:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12831 at Tue Sep 27 21:58:58 UTC 2022 kill -USR1 12831 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12831 killed at Tue Sep 27 21:58:59 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:58:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12870 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12870 found at Tue Sep 27 21:58:59 UTC 2022 selfserv_9223 with PID 12870 started at Tue Sep 27 21:58:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #940: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 12870 at Tue Sep 27 21:58:59 UTC 2022 kill -USR1 12870 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12870 killed at Tue Sep 27 21:58:59 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:58:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:58:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12909 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12909 found at Tue Sep 27 21:59:00 UTC 2022 selfserv_9223 with PID 12909 started at Tue Sep 27 21:59:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #941: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12909 at Tue Sep 27 21:59:00 UTC 2022 kill -USR1 12909 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12909 killed at Tue Sep 27 21:59:00 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:59:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12948 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12948 found at Tue Sep 27 21:59:00 UTC 2022 selfserv_9223 with PID 12948 started at Tue Sep 27 21:59:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #942: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 12948 at Tue Sep 27 21:59:01 UTC 2022 kill -USR1 12948 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12948 killed at Tue Sep 27 21:59:01 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:59:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12987 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12987 found at Tue Sep 27 21:59:01 UTC 2022 selfserv_9223 with PID 12987 started at Tue Sep 27 21:59:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12987 at Tue Sep 27 21:59:01 UTC 2022 kill -USR1 12987 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12987 killed at Tue Sep 27 21:59:02 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:59:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13026 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13026 found at Tue Sep 27 21:59:02 UTC 2022 selfserv_9223 with PID 13026 started at Tue Sep 27 21:59:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13026 at Tue Sep 27 21:59:02 UTC 2022 kill -USR1 13026 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13026 killed at Tue Sep 27 21:59:02 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:59:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13065 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13065 found at Tue Sep 27 21:59:03 UTC 2022 selfserv_9223 with PID 13065 started at Tue Sep 27 21:59:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13065 at Tue Sep 27 21:59:03 UTC 2022 kill -USR1 13065 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13065 killed at Tue Sep 27 21:59:03 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:59:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13106 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13106 found at Tue Sep 27 21:59:03 UTC 2022 selfserv_9223 with PID 13106 started at Tue Sep 27 21:59:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13106 at Tue Sep 27 21:59:04 UTC 2022 kill -USR1 13106 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13106 killed at Tue Sep 27 21:59:04 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:59:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13145 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13145 found at Tue Sep 27 21:59:04 UTC 2022 selfserv_9223 with PID 13145 started at Tue Sep 27 21:59:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #947: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13145 at Tue Sep 27 21:59:04 UTC 2022 kill -USR1 13145 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13145 killed at Tue Sep 27 21:59:05 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:59:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13184 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13184 found at Tue Sep 27 21:59:05 UTC 2022 selfserv_9223 with PID 13184 started at Tue Sep 27 21:59:05 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #948: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13184 at Tue Sep 27 21:59:05 UTC 2022 kill -USR1 13184 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13184 killed at Tue Sep 27 21:59:05 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:59:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13224 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13224 found at Tue Sep 27 21:59:06 UTC 2022 selfserv_9223 with PID 13224 started at Tue Sep 27 21:59:06 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #949: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 13224 at Tue Sep 27 21:59:06 UTC 2022 kill -USR1 13224 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13224 killed at Tue Sep 27 21:59:06 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:59:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13265 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13265 found at Tue Sep 27 21:59:06 UTC 2022 selfserv_9223 with PID 13265 started at Tue Sep 27 21:59:06 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #950: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13265 at Tue Sep 27 21:59:07 UTC 2022 kill -USR1 13265 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13265 killed at Tue Sep 27 21:59:07 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:59:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13305 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13305 found at Tue Sep 27 21:59:07 UTC 2022 selfserv_9223 with PID 13305 started at Tue Sep 27 21:59:07 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #951: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 13305 at Tue Sep 27 21:59:07 UTC 2022 kill -USR1 13305 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13305 killed at Tue Sep 27 21:59:08 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:59:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13345 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13345 found at Tue Sep 27 21:59:08 UTC 2022 selfserv_9223 with PID 13345 started at Tue Sep 27 21:59:08 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #952: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13345 at Tue Sep 27 21:59:08 UTC 2022 kill -USR1 13345 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13345 killed at Tue Sep 27 21:59:08 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:59:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13385 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13385 found at Tue Sep 27 21:59:09 UTC 2022 selfserv_9223 with PID 13385 started at Tue Sep 27 21:59:09 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #953: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13385 at Tue Sep 27 21:59:09 UTC 2022 kill -USR1 13385 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13385 killed at Tue Sep 27 21:59:09 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:59:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13425 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13425 found at Tue Sep 27 21:59:09 UTC 2022 selfserv_9223 with PID 13425 started at Tue Sep 27 21:59:09 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #954: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13425 at Tue Sep 27 21:59:10 UTC 2022 kill -USR1 13425 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13425 killed at Tue Sep 27 21:59:10 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:59:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13465 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13465 found at Tue Sep 27 21:59:10 UTC 2022 selfserv_9223 with PID 13465 started at Tue Sep 27 21:59:10 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #955: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13465 at Tue Sep 27 21:59:10 UTC 2022 kill -USR1 13465 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13465 killed at Tue Sep 27 21:59:11 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 21:59:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13505 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13505 found at Tue Sep 27 21:59:11 UTC 2022 selfserv_9223 with PID 13505 started at Tue Sep 27 21:59:11 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #956: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13505 at Tue Sep 27 21:59:11 UTC 2022 kill -USR1 13505 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13505 killed at Tue Sep 27 21:59:11 UTC 2022 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -fips true -force FIPS mode enabled. ssl.sh: #957: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -list ssl.sh: #958: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #959: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -fips true -force FIPS mode enabled. ssl.sh: #960: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -list ssl.sh: #961: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #962: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9223 starting at Tue Sep 27 21:59:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 13589 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13589 found at Tue Sep 27 21:59:13 UTC 2022 selfserv_9223 with PID 13589 started at Tue Sep 27 21:59:13 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #963: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #964: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #965: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #966: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #967: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #968: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #969: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #970: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #971: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #972: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #973: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #974: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #975: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #976: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #977: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #978: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #979: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #980: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #981: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #982: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #983: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #984: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #985: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #986: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #987: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #988: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #989: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #990: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #991: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #992: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #993: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #994: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #995: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #996: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #997: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #998: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #999: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1000: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1001: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1002: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1003: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1004: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1005: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1006: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1007: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1008: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1009: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1010: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1011: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1012: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1013: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 13589 at Tue Sep 27 21:59:27 UTC 2022 kill -USR1 13589 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13589 killed at Tue Sep 27 21:59:27 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Tue Sep 27 21:59:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 14160 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14160 found at Tue Sep 27 21:59:27 UTC 2022 selfserv_9223 with PID 14160 started at Tue Sep 27 21:59:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1014: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1015: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1016: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1017: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1018: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1019: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1020: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1021: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1022: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1023: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1024: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1025: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1026: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1027: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1028: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1029: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1030: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1031: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1032: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1033: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1034: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1035: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1036: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1037: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1038: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1039: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1040: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1041: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1042: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1043: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1044: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1045: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1046: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1047: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1048: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1049: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1050: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1051: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1052: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1053: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1054: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1055: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1056: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1057: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1058: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1059: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1060: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1061: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1062: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1063: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1064: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1065: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1066: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1067: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1068: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1069: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1070: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1071: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1072: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1073: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1074: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1075: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1076: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1077: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1078: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1079: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1080: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1081: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1082: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1083: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1084: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1085: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1086: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1087: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1088: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1089: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14160 at Tue Sep 27 21:59:50 UTC 2022 kill -USR1 14160 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14160 killed at Tue Sep 27 21:59:50 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9223 starting at Tue Sep 27 21:59:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14964 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14964 found at Tue Sep 27 21:59:51 UTC 2022 selfserv_9223 with PID 14964 started at Tue Sep 27 21:59:51 UTC 2022 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14964 at Tue Sep 27 21:59:51 UTC 2022 kill -USR1 14964 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14964 killed at Tue Sep 27 21:59:51 UTC 2022 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:59:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15030 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15030 found at Tue Sep 27 21:59:52 UTC 2022 selfserv_9223 with PID 15030 started at Tue Sep 27 21:59:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15030 at Tue Sep 27 21:59:52 UTC 2022 kill -USR1 15030 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15030 killed at Tue Sep 27 21:59:53 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:59:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15082 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15082 found at Tue Sep 27 21:59:53 UTC 2022 selfserv_9223 with PID 15082 started at Tue Sep 27 21:59:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15082 at Tue Sep 27 21:59:53 UTC 2022 kill -USR1 15082 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15082 killed at Tue Sep 27 21:59:54 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:59:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15134 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15134 found at Tue Sep 27 21:59:54 UTC 2022 selfserv_9223 with PID 15134 started at Tue Sep 27 21:59:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1092: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15134 at Tue Sep 27 21:59:54 UTC 2022 kill -USR1 15134 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15134 killed at Tue Sep 27 21:59:55 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:59:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15186 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15186 found at Tue Sep 27 21:59:55 UTC 2022 selfserv_9223 with PID 15186 started at Tue Sep 27 21:59:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1093: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 15186 at Tue Sep 27 21:59:56 UTC 2022 kill -USR1 15186 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15186 killed at Tue Sep 27 21:59:56 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:59:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15238 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15238 found at Tue Sep 27 21:59:56 UTC 2022 selfserv_9223 with PID 15238 started at Tue Sep 27 21:59:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1094: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 15238 at Tue Sep 27 21:59:57 UTC 2022 kill -USR1 15238 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15238 killed at Tue Sep 27 21:59:57 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 21:59:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15290 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15290 found at Tue Sep 27 21:59:57 UTC 2022 selfserv_9223 with PID 15290 started at Tue Sep 27 21:59:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1095: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15290 at Tue Sep 27 21:59:58 UTC 2022 kill -USR1 15290 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15290 killed at Tue Sep 27 21:59:58 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 21:59:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15342 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15342 found at Tue Sep 27 21:59:58 UTC 2022 selfserv_9223 with PID 15342 started at Tue Sep 27 21:59:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1096: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15342 at Tue Sep 27 21:59:59 UTC 2022 kill -USR1 15342 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15342 killed at Tue Sep 27 21:59:59 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 21:59:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 21:59:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15394 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15394 found at Tue Sep 27 21:59:59 UTC 2022 selfserv_9223 with PID 15394 started at Tue Sep 27 21:59:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15394 at Tue Sep 27 22:00:00 UTC 2022 kill -USR1 15394 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15394 killed at Tue Sep 27 22:00:00 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15446 found at Tue Sep 27 22:00:00 UTC 2022 selfserv_9223 with PID 15446 started at Tue Sep 27 22:00:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15446 at Tue Sep 27 22:00:01 UTC 2022 kill -USR1 15446 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15446 killed at Tue Sep 27 22:00:01 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15570 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15570 found at Tue Sep 27 22:00:01 UTC 2022 selfserv_9223 with PID 15570 started at Tue Sep 27 22:00:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1099: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 15570 at Tue Sep 27 22:00:02 UTC 2022 kill -USR1 15570 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15570 killed at Tue Sep 27 22:00:02 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:00:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15627 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15627 found at Tue Sep 27 22:00:02 UTC 2022 selfserv_9223 with PID 15627 started at Tue Sep 27 22:00:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1100: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 15627 at Tue Sep 27 22:00:03 UTC 2022 kill -USR1 15627 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15627 killed at Tue Sep 27 22:00:03 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15680 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15680 found at Tue Sep 27 22:00:03 UTC 2022 selfserv_9223 with PID 15680 started at Tue Sep 27 22:00:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15680 at Tue Sep 27 22:00:04 UTC 2022 kill -USR1 15680 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15680 killed at Tue Sep 27 22:00:04 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15732 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15732 found at Tue Sep 27 22:00:04 UTC 2022 selfserv_9223 with PID 15732 started at Tue Sep 27 22:00:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1102: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15732 at Tue Sep 27 22:00:05 UTC 2022 kill -USR1 15732 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15732 killed at Tue Sep 27 22:00:05 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:00:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15784 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15784 found at Tue Sep 27 22:00:06 UTC 2022 selfserv_9223 with PID 15784 started at Tue Sep 27 22:00:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15784 at Tue Sep 27 22:00:06 UTC 2022 kill -USR1 15784 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15784 killed at Tue Sep 27 22:00:06 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15836 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15836 found at Tue Sep 27 22:00:07 UTC 2022 selfserv_9223 with PID 15836 started at Tue Sep 27 22:00:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15836 at Tue Sep 27 22:00:07 UTC 2022 kill -USR1 15836 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15836 killed at Tue Sep 27 22:00:08 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15888 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15888 found at Tue Sep 27 22:00:08 UTC 2022 selfserv_9223 with PID 15888 started at Tue Sep 27 22:00:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1105: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 15888 at Tue Sep 27 22:00:09 UTC 2022 kill -USR1 15888 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15888 killed at Tue Sep 27 22:00:09 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:00:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15940 found at Tue Sep 27 22:00:09 UTC 2022 selfserv_9223 with PID 15940 started at Tue Sep 27 22:00:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1106: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 15940 at Tue Sep 27 22:00:10 UTC 2022 kill -USR1 15940 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15940 killed at Tue Sep 27 22:00:10 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15992 found at Tue Sep 27 22:00:10 UTC 2022 selfserv_9223 with PID 15992 started at Tue Sep 27 22:00:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15992 at Tue Sep 27 22:00:11 UTC 2022 kill -USR1 15992 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15992 killed at Tue Sep 27 22:00:11 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16044 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16044 found at Tue Sep 27 22:00:11 UTC 2022 selfserv_9223 with PID 16044 started at Tue Sep 27 22:00:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1108: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16044 at Tue Sep 27 22:00:12 UTC 2022 kill -USR1 16044 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16044 killed at Tue Sep 27 22:00:12 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:00:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16097 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16097 found at Tue Sep 27 22:00:13 UTC 2022 selfserv_9223 with PID 16097 started at Tue Sep 27 22:00:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16097 at Tue Sep 27 22:00:13 UTC 2022 kill -USR1 16097 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16097 killed at Tue Sep 27 22:00:13 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16149 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16149 found at Tue Sep 27 22:00:14 UTC 2022 selfserv_9223 with PID 16149 started at Tue Sep 27 22:00:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16149 at Tue Sep 27 22:00:14 UTC 2022 kill -USR1 16149 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16149 killed at Tue Sep 27 22:00:15 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16201 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16201 found at Tue Sep 27 22:00:15 UTC 2022 selfserv_9223 with PID 16201 started at Tue Sep 27 22:00:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1111: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 16201 at Tue Sep 27 22:00:16 UTC 2022 kill -USR1 16201 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16201 killed at Tue Sep 27 22:00:16 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:00:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16261 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16261 found at Tue Sep 27 22:00:16 UTC 2022 selfserv_9223 with PID 16261 started at Tue Sep 27 22:00:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1112: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 16261 at Tue Sep 27 22:00:17 UTC 2022 kill -USR1 16261 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16261 killed at Tue Sep 27 22:00:17 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16320 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16320 found at Tue Sep 27 22:00:17 UTC 2022 selfserv_9223 with PID 16320 started at Tue Sep 27 22:00:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16320 at Tue Sep 27 22:00:18 UTC 2022 kill -USR1 16320 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16320 killed at Tue Sep 27 22:00:18 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16372 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16372 found at Tue Sep 27 22:00:18 UTC 2022 selfserv_9223 with PID 16372 started at Tue Sep 27 22:00:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1114: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16372 at Tue Sep 27 22:00:19 UTC 2022 kill -USR1 16372 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16372 killed at Tue Sep 27 22:00:19 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:00:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16424 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16424 found at Tue Sep 27 22:00:20 UTC 2022 selfserv_9223 with PID 16424 started at Tue Sep 27 22:00:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1115: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16424 at Tue Sep 27 22:00:20 UTC 2022 kill -USR1 16424 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16424 killed at Tue Sep 27 22:00:21 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16476 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16476 found at Tue Sep 27 22:00:21 UTC 2022 selfserv_9223 with PID 16476 started at Tue Sep 27 22:00:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1116: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16476 at Tue Sep 27 22:00:21 UTC 2022 kill -USR1 16476 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16476 killed at Tue Sep 27 22:00:22 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16528 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16528 found at Tue Sep 27 22:00:22 UTC 2022 selfserv_9223 with PID 16528 started at Tue Sep 27 22:00:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1117: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 16528 at Tue Sep 27 22:00:23 UTC 2022 kill -USR1 16528 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16528 killed at Tue Sep 27 22:00:23 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:00:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16580 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16580 found at Tue Sep 27 22:00:23 UTC 2022 selfserv_9223 with PID 16580 started at Tue Sep 27 22:00:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1118: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 16580 at Tue Sep 27 22:00:24 UTC 2022 kill -USR1 16580 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16580 killed at Tue Sep 27 22:00:24 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16632 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16632 found at Tue Sep 27 22:00:24 UTC 2022 selfserv_9223 with PID 16632 started at Tue Sep 27 22:00:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1119: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16632 at Tue Sep 27 22:00:25 UTC 2022 kill -USR1 16632 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16632 killed at Tue Sep 27 22:00:25 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16684 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16684 found at Tue Sep 27 22:00:25 UTC 2022 selfserv_9223 with PID 16684 started at Tue Sep 27 22:00:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1120: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16684 at Tue Sep 27 22:00:26 UTC 2022 kill -USR1 16684 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16684 killed at Tue Sep 27 22:00:26 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16736 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16736 found at Tue Sep 27 22:00:26 UTC 2022 selfserv_9223 with PID 16736 started at Tue Sep 27 22:00:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1121: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16736 at Tue Sep 27 22:00:27 UTC 2022 kill -USR1 16736 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16736 killed at Tue Sep 27 22:00:27 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16788 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16788 found at Tue Sep 27 22:00:27 UTC 2022 selfserv_9223 with PID 16788 started at Tue Sep 27 22:00:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1122: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16788 at Tue Sep 27 22:00:28 UTC 2022 kill -USR1 16788 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16788 killed at Tue Sep 27 22:00:28 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16840 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16840 found at Tue Sep 27 22:00:28 UTC 2022 selfserv_9223 with PID 16840 started at Tue Sep 27 22:00:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1123: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 16840 at Tue Sep 27 22:00:29 UTC 2022 kill -USR1 16840 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16840 killed at Tue Sep 27 22:00:29 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16892 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16892 found at Tue Sep 27 22:00:30 UTC 2022 selfserv_9223 with PID 16892 started at Tue Sep 27 22:00:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1124: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16892 at Tue Sep 27 22:00:30 UTC 2022 kill -USR1 16892 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16892 killed at Tue Sep 27 22:00:30 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16945 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16945 found at Tue Sep 27 22:00:30 UTC 2022 selfserv_9223 with PID 16945 started at Tue Sep 27 22:00:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1125: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16945 at Tue Sep 27 22:00:31 UTC 2022 kill -USR1 16945 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16945 killed at Tue Sep 27 22:00:31 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:00:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16997 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16997 found at Tue Sep 27 22:00:32 UTC 2022 selfserv_9223 with PID 16997 started at Tue Sep 27 22:00:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1126: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16997 at Tue Sep 27 22:00:32 UTC 2022 kill -USR1 16997 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16997 killed at Tue Sep 27 22:00:32 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17049 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17049 found at Tue Sep 27 22:00:33 UTC 2022 selfserv_9223 with PID 17049 started at Tue Sep 27 22:00:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1127: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17049 at Tue Sep 27 22:00:33 UTC 2022 kill -USR1 17049 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17049 killed at Tue Sep 27 22:00:33 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:00:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17101 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17101 found at Tue Sep 27 22:00:34 UTC 2022 selfserv_9223 with PID 17101 started at Tue Sep 27 22:00:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1128: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 17101 at Tue Sep 27 22:00:34 UTC 2022 kill -USR1 17101 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17101 killed at Tue Sep 27 22:00:34 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17153 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17153 found at Tue Sep 27 22:00:35 UTC 2022 selfserv_9223 with PID 17153 started at Tue Sep 27 22:00:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1129: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17153 at Tue Sep 27 22:00:35 UTC 2022 kill -USR1 17153 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17153 killed at Tue Sep 27 22:00:35 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:00:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17205 found at Tue Sep 27 22:00:36 UTC 2022 selfserv_9223 with PID 17205 started at Tue Sep 27 22:00:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1130: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17205 at Tue Sep 27 22:00:36 UTC 2022 kill -USR1 17205 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17205 killed at Tue Sep 27 22:00:36 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17257 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17257 found at Tue Sep 27 22:00:37 UTC 2022 selfserv_9223 with PID 17257 started at Tue Sep 27 22:00:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1131: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17257 at Tue Sep 27 22:00:37 UTC 2022 kill -USR1 17257 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17257 killed at Tue Sep 27 22:00:37 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:00:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17309 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17309 found at Tue Sep 27 22:00:38 UTC 2022 selfserv_9223 with PID 17309 started at Tue Sep 27 22:00:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1132: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 17309 at Tue Sep 27 22:00:38 UTC 2022 kill -USR1 17309 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17309 killed at Tue Sep 27 22:00:38 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17362 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17362 found at Tue Sep 27 22:00:38 UTC 2022 selfserv_9223 with PID 17362 started at Tue Sep 27 22:00:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1133: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17362 at Tue Sep 27 22:00:39 UTC 2022 kill -USR1 17362 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17362 killed at Tue Sep 27 22:00:39 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:00:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17414 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17414 found at Tue Sep 27 22:00:39 UTC 2022 selfserv_9223 with PID 17414 started at Tue Sep 27 22:00:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1134: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17414 at Tue Sep 27 22:00:40 UTC 2022 kill -USR1 17414 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17414 killed at Tue Sep 27 22:00:40 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17466 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17466 found at Tue Sep 27 22:00:41 UTC 2022 selfserv_9223 with PID 17466 started at Tue Sep 27 22:00:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1135: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17466 at Tue Sep 27 22:00:41 UTC 2022 kill -USR1 17466 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17466 killed at Tue Sep 27 22:00:41 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:00:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17518 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17518 found at Tue Sep 27 22:00:42 UTC 2022 selfserv_9223 with PID 17518 started at Tue Sep 27 22:00:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1136: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 17518 at Tue Sep 27 22:00:42 UTC 2022 kill -USR1 17518 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17518 killed at Tue Sep 27 22:00:42 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17570 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17570 found at Tue Sep 27 22:00:43 UTC 2022 selfserv_9223 with PID 17570 started at Tue Sep 27 22:00:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1137: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17570 at Tue Sep 27 22:00:43 UTC 2022 kill -USR1 17570 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17570 killed at Tue Sep 27 22:00:44 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:00:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17622 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17622 found at Tue Sep 27 22:00:44 UTC 2022 selfserv_9223 with PID 17622 started at Tue Sep 27 22:00:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1138: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17622 at Tue Sep 27 22:00:44 UTC 2022 kill -USR1 17622 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17622 killed at Tue Sep 27 22:00:45 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17675 found at Tue Sep 27 22:00:45 UTC 2022 selfserv_9223 with PID 17675 started at Tue Sep 27 22:00:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1139: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17675 at Tue Sep 27 22:00:46 UTC 2022 kill -USR1 17675 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17675 killed at Tue Sep 27 22:00:46 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:00:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17727 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17727 found at Tue Sep 27 22:00:46 UTC 2022 selfserv_9223 with PID 17727 started at Tue Sep 27 22:00:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1140: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 17727 at Tue Sep 27 22:00:47 UTC 2022 kill -USR1 17727 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17727 killed at Tue Sep 27 22:00:47 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17779 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17779 found at Tue Sep 27 22:00:47 UTC 2022 selfserv_9223 with PID 17779 started at Tue Sep 27 22:00:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1141: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17779 at Tue Sep 27 22:00:48 UTC 2022 kill -USR1 17779 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17779 killed at Tue Sep 27 22:00:48 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:00:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17831 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17831 found at Tue Sep 27 22:00:48 UTC 2022 selfserv_9223 with PID 17831 started at Tue Sep 27 22:00:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1142: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17831 at Tue Sep 27 22:00:49 UTC 2022 kill -USR1 17831 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17831 killed at Tue Sep 27 22:00:49 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17883 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17883 found at Tue Sep 27 22:00:49 UTC 2022 selfserv_9223 with PID 17883 started at Tue Sep 27 22:00:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1143: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17883 at Tue Sep 27 22:00:50 UTC 2022 kill -USR1 17883 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17883 killed at Tue Sep 27 22:00:50 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:00:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17935 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17935 found at Tue Sep 27 22:00:51 UTC 2022 selfserv_9223 with PID 17935 started at Tue Sep 27 22:00:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1144: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 17935 at Tue Sep 27 22:00:51 UTC 2022 kill -USR1 17935 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17935 killed at Tue Sep 27 22:00:51 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17987 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17987 found at Tue Sep 27 22:00:52 UTC 2022 selfserv_9223 with PID 17987 started at Tue Sep 27 22:00:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1145: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17987 at Tue Sep 27 22:00:52 UTC 2022 kill -USR1 17987 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17987 killed at Tue Sep 27 22:00:53 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18039 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18039 found at Tue Sep 27 22:00:53 UTC 2022 selfserv_9223 with PID 18039 started at Tue Sep 27 22:00:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1146: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18039 at Tue Sep 27 22:00:54 UTC 2022 kill -USR1 18039 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18039 killed at Tue Sep 27 22:00:54 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:00:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18094 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18094 found at Tue Sep 27 22:00:54 UTC 2022 selfserv_9223 with PID 18094 started at Tue Sep 27 22:00:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1147: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18094 at Tue Sep 27 22:00:55 UTC 2022 kill -USR1 18094 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18094 killed at Tue Sep 27 22:00:55 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Tue Sep 27 22:00:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18152 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18152 found at Tue Sep 27 22:00:55 UTC 2022 selfserv_9223 with PID 18152 started at Tue Sep 27 22:00:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1148: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18152 at Tue Sep 27 22:00:56 UTC 2022 kill -USR1 18152 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18152 killed at Tue Sep 27 22:00:56 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Tue Sep 27 22:00:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18210 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18210 found at Tue Sep 27 22:00:56 UTC 2022 selfserv_9223 with PID 18210 started at Tue Sep 27 22:00:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1149: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18210 at Tue Sep 27 22:00:57 UTC 2022 kill -USR1 18210 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18210 killed at Tue Sep 27 22:00:57 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Tue Sep 27 22:00:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18268 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18268 found at Tue Sep 27 22:00:57 UTC 2022 selfserv_9223 with PID 18268 started at Tue Sep 27 22:00:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1150: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18268 at Tue Sep 27 22:00:57 UTC 2022 kill -USR1 18268 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18268 killed at Tue Sep 27 22:00:57 UTC 2022 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9223 starting at Tue Sep 27 22:00:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18326 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18326 found at Tue Sep 27 22:00:58 UTC 2022 selfserv_9223 with PID 18326 started at Tue Sep 27 22:00:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1151: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18326 at Tue Sep 27 22:00:58 UTC 2022 kill -USR1 18326 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18326 killed at Tue Sep 27 22:00:58 UTC 2022 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9223 starting at Tue Sep 27 22:00:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18384 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18384 found at Tue Sep 27 22:00:59 UTC 2022 selfserv_9223 with PID 18384 started at Tue Sep 27 22:00:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1152: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18384 at Tue Sep 27 22:00:59 UTC 2022 kill -USR1 18384 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18384 killed at Tue Sep 27 22:00:59 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Tue Sep 27 22:00:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:00:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18442 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18442 found at Tue Sep 27 22:00:59 UTC 2022 selfserv_9223 with PID 18442 started at Tue Sep 27 22:00:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1153: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18442 at Tue Sep 27 22:01:00 UTC 2022 kill -USR1 18442 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18442 killed at Tue Sep 27 22:01:00 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Tue Sep 27 22:01:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18500 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18500 found at Tue Sep 27 22:01:00 UTC 2022 selfserv_9223 with PID 18500 started at Tue Sep 27 22:01:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1154: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18500 at Tue Sep 27 22:01:01 UTC 2022 kill -USR1 18500 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18500 killed at Tue Sep 27 22:01:01 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9223 starting at Tue Sep 27 22:01:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18573 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18573 found at Tue Sep 27 22:01:01 UTC 2022 selfserv_9223 with PID 18573 started at Tue Sep 27 22:01:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1155: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18573 at Tue Sep 27 22:01:02 UTC 2022 kill -USR1 18573 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18573 killed at Tue Sep 27 22:01:02 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9223 starting at Tue Sep 27 22:01:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18631 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18631 found at Tue Sep 27 22:01:02 UTC 2022 selfserv_9223 with PID 18631 started at Tue Sep 27 22:01:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1156: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18631 at Tue Sep 27 22:01:02 UTC 2022 kill -USR1 18631 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18631 killed at Tue Sep 27 22:01:03 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Tue Sep 27 22:01:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18692 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18692 found at Tue Sep 27 22:01:03 UTC 2022 selfserv_9223 with PID 18692 started at Tue Sep 27 22:01:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1157: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18692 at Tue Sep 27 22:01:03 UTC 2022 kill -USR1 18692 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18692 killed at Tue Sep 27 22:01:03 UTC 2022 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9223 starting at Tue Sep 27 22:01:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18734 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18734 found at Tue Sep 27 22:01:04 UTC 2022 selfserv_9223 with PID 18734 started at Tue Sep 27 22:01:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1090: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18734 at Tue Sep 27 22:01:04 UTC 2022 kill -USR1 18734 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18734 killed at Tue Sep 27 22:01:04 UTC 2022 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9223 starting at Tue Sep 27 22:01:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18776 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18776 found at Tue Sep 27 22:01:04 UTC 2022 selfserv_9223 with PID 18776 started at Tue Sep 27 22:01:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1091: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9223 with PID 18776 at Tue Sep 27 22:01:05 UTC 2022 kill -USR1 18776 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18776 killed at Tue Sep 27 22:01:05 UTC 2022 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9223 starting at Tue Sep 27 22:01:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18818 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18818 found at Tue Sep 27 22:01:05 UTC 2022 selfserv_9223 with PID 18818 started at Tue Sep 27 22:01:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1092: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 18818 at Tue Sep 27 22:01:05 UTC 2022 kill -USR1 18818 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18818 killed at Tue Sep 27 22:01:06 UTC 2022 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9223 starting at Tue Sep 27 22:01:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18860 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18860 found at Tue Sep 27 22:01:06 UTC 2022 selfserv_9223 with PID 18860 started at Tue Sep 27 22:01:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1093: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 18860 at Tue Sep 27 22:01:06 UTC 2022 kill -USR1 18860 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18860 killed at Tue Sep 27 22:01:06 UTC 2022 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9223 starting at Tue Sep 27 22:01:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18902 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18902 found at Tue Sep 27 22:01:07 UTC 2022 selfserv_9223 with PID 18902 started at Tue Sep 27 22:01:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1094: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 18902 at Tue Sep 27 22:01:07 UTC 2022 kill -USR1 18902 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18902 killed at Tue Sep 27 22:01:07 UTC 2022 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9223 starting at Tue Sep 27 22:01:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18944 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18944 found at Tue Sep 27 22:01:07 UTC 2022 selfserv_9223 with PID 18944 started at Tue Sep 27 22:01:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1095: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 18944 at Tue Sep 27 22:01:08 UTC 2022 kill -USR1 18944 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18944 killed at Tue Sep 27 22:01:08 UTC 2022 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9223 starting at Tue Sep 27 22:01:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18986 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18986 found at Tue Sep 27 22:01:08 UTC 2022 selfserv_9223 with PID 18986 started at Tue Sep 27 22:01:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1096: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 18986 at Tue Sep 27 22:01:08 UTC 2022 kill -USR1 18986 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18986 killed at Tue Sep 27 22:01:09 UTC 2022 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9223 starting at Tue Sep 27 22:01:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19028 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19028 found at Tue Sep 27 22:01:09 UTC 2022 selfserv_9223 with PID 19028 started at Tue Sep 27 22:01:09 UTC 2022 strsclnt -q -p 9223 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Tue Sep 27 22:01:09 UTC 2022 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Tue Sep 27 22:01:48 UTC 2022 ssl.sh: #1097: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9223 with PID 19028 at Tue Sep 27 22:01:48 UTC 2022 kill -USR1 19028 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19028 killed at Tue Sep 27 22:01:48 UTC 2022 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Tue Sep 27 22:01:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19094 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19094 found at Tue Sep 27 22:01:48 UTC 2022 selfserv_9223 with PID 19094 started at Tue Sep 27 22:01:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19094 at Tue Sep 27 22:01:49 UTC 2022 kill -USR1 19094 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19094 killed at Tue Sep 27 22:01:49 UTC 2022 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:01:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19136 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19136 found at Tue Sep 27 22:01:49 UTC 2022 selfserv_9223 with PID 19136 started at Tue Sep 27 22:01:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1099: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19136 at Tue Sep 27 22:01:50 UTC 2022 kill -USR1 19136 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19136 killed at Tue Sep 27 22:01:50 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:01:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19176 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19176 found at Tue Sep 27 22:01:50 UTC 2022 selfserv_9223 with PID 19176 started at Tue Sep 27 22:01:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1100: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 19176 at Tue Sep 27 22:01:50 UTC 2022 kill -USR1 19176 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19176 killed at Tue Sep 27 22:01:50 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:01:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19215 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19215 found at Tue Sep 27 22:01:51 UTC 2022 selfserv_9223 with PID 19215 started at Tue Sep 27 22:01:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19215 at Tue Sep 27 22:01:51 UTC 2022 kill -USR1 19215 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19215 killed at Tue Sep 27 22:01:51 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:01:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19254 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19254 found at Tue Sep 27 22:01:52 UTC 2022 selfserv_9223 with PID 19254 started at Tue Sep 27 22:01:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1102: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 19254 at Tue Sep 27 22:01:52 UTC 2022 kill -USR1 19254 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19254 killed at Tue Sep 27 22:01:52 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:01:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19293 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19293 found at Tue Sep 27 22:01:52 UTC 2022 selfserv_9223 with PID 19293 started at Tue Sep 27 22:01:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19293 at Tue Sep 27 22:01:53 UTC 2022 kill -USR1 19293 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19293 killed at Tue Sep 27 22:01:53 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:01:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19332 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19332 found at Tue Sep 27 22:01:53 UTC 2022 selfserv_9223 with PID 19332 started at Tue Sep 27 22:01:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19332 at Tue Sep 27 22:01:53 UTC 2022 kill -USR1 19332 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19332 killed at Tue Sep 27 22:01:53 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:01:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19371 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19371 found at Tue Sep 27 22:01:54 UTC 2022 selfserv_9223 with PID 19371 started at Tue Sep 27 22:01:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1105: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19371 at Tue Sep 27 22:01:54 UTC 2022 kill -USR1 19371 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19371 killed at Tue Sep 27 22:01:54 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:01:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19410 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19410 found at Tue Sep 27 22:01:55 UTC 2022 selfserv_9223 with PID 19410 started at Tue Sep 27 22:01:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1106: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19410 at Tue Sep 27 22:01:55 UTC 2022 kill -USR1 19410 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19410 killed at Tue Sep 27 22:01:55 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:01:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19449 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19449 found at Tue Sep 27 22:01:55 UTC 2022 selfserv_9223 with PID 19449 started at Tue Sep 27 22:01:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19449 at Tue Sep 27 22:01:56 UTC 2022 kill -USR1 19449 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19449 killed at Tue Sep 27 22:01:56 UTC 2022 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:01:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19488 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19488 found at Tue Sep 27 22:01:56 UTC 2022 selfserv_9223 with PID 19488 started at Tue Sep 27 22:01:56 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1108: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19488 at Tue Sep 27 22:01:56 UTC 2022 kill -USR1 19488 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19488 killed at Tue Sep 27 22:01:56 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:01:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19528 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19528 found at Tue Sep 27 22:01:57 UTC 2022 selfserv_9223 with PID 19528 started at Tue Sep 27 22:01:57 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1109: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 19528 at Tue Sep 27 22:01:57 UTC 2022 kill -USR1 19528 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19528 killed at Tue Sep 27 22:01:57 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:01:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19568 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19568 found at Tue Sep 27 22:01:57 UTC 2022 selfserv_9223 with PID 19568 started at Tue Sep 27 22:01:57 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1110: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19568 at Tue Sep 27 22:01:58 UTC 2022 kill -USR1 19568 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19568 killed at Tue Sep 27 22:01:58 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:01:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19608 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19608 found at Tue Sep 27 22:01:58 UTC 2022 selfserv_9223 with PID 19608 started at Tue Sep 27 22:01:58 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1111: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 19608 at Tue Sep 27 22:01:58 UTC 2022 kill -USR1 19608 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19608 killed at Tue Sep 27 22:01:59 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:01:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19648 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19648 found at Tue Sep 27 22:01:59 UTC 2022 selfserv_9223 with PID 19648 started at Tue Sep 27 22:01:59 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1112: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19648 at Tue Sep 27 22:01:59 UTC 2022 kill -USR1 19648 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19648 killed at Tue Sep 27 22:01:59 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:01:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:01:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19688 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19688 found at Tue Sep 27 22:02:00 UTC 2022 selfserv_9223 with PID 19688 started at Tue Sep 27 22:02:00 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1113: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19688 at Tue Sep 27 22:02:00 UTC 2022 kill -USR1 19688 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19688 killed at Tue Sep 27 22:02:00 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:02:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19728 found at Tue Sep 27 22:02:00 UTC 2022 selfserv_9223 with PID 19728 started at Tue Sep 27 22:02:00 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1114: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19728 at Tue Sep 27 22:02:01 UTC 2022 kill -USR1 19728 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19728 killed at Tue Sep 27 22:02:01 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:02:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19768 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19768 found at Tue Sep 27 22:02:01 UTC 2022 selfserv_9223 with PID 19768 started at Tue Sep 27 22:02:01 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1115: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19768 at Tue Sep 27 22:02:02 UTC 2022 kill -USR1 19768 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19768 killed at Tue Sep 27 22:02:02 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:02:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19808 found at Tue Sep 27 22:02:02 UTC 2022 selfserv_9223 with PID 19808 started at Tue Sep 27 22:02:02 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1116: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19808 at Tue Sep 27 22:02:02 UTC 2022 kill -USR1 19808 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19808 killed at Tue Sep 27 22:02:02 UTC 2022 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9223 starting at Tue Sep 27 22:02:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 19848 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19848 found at Tue Sep 27 22:02:03 UTC 2022 selfserv_9223 with PID 19848 started at Tue Sep 27 22:02:03 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1117: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1118: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1119: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1120: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1121: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1122: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1123: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1124: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1125: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1126: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1127: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1128: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1129: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1130: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1131: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1132: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1133: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1134: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1135: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1136: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1137: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1138: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1139: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1140: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1141: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1142: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1143: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1144: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1145: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1146: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1147: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1148: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1149: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1150: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1151: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1152: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1153: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1154: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1155: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1156: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1157: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1158: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1159: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1160: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1161: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1162: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1163: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1164: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1165: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1166: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1167: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 19848 at Tue Sep 27 22:02:17 UTC 2022 kill -USR1 19848 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19848 killed at Tue Sep 27 22:02:17 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Tue Sep 27 22:02:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 20413 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20413 found at Tue Sep 27 22:02:18 UTC 2022 selfserv_9223 with PID 20413 started at Tue Sep 27 22:02:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1168: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1169: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1170: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1171: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1172: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1173: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1174: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1175: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1176: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1177: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1178: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1179: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1180: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1181: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1182: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1183: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1184: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1185: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1186: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1187: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1188: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1189: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1190: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1191: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1192: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1193: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1194: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1195: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1196: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1197: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1198: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1199: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1200: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1201: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1202: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1203: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1204: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1205: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1206: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1207: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1208: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1209: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1210: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1211: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1212: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1213: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1214: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1215: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1216: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1217: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1218: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1219: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1220: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1221: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1222: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1223: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1224: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1225: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1226: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1227: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1228: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1229: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1230: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1231: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1232: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1233: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1234: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1235: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1236: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1237: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1238: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1239: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1240: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1241: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1242: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1243: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20413 at Tue Sep 27 22:02:40 UTC 2022 kill -USR1 20413 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20413 killed at Tue Sep 27 22:02:40 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:02:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21226 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21226 found at Tue Sep 27 22:02:41 UTC 2022 selfserv_9223 with PID 21226 started at Tue Sep 27 22:02:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21226 at Tue Sep 27 22:02:41 UTC 2022 kill -USR1 21226 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21226 killed at Tue Sep 27 22:02:41 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:02:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21278 found at Tue Sep 27 22:02:42 UTC 2022 selfserv_9223 with PID 21278 started at Tue Sep 27 22:02:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21278 at Tue Sep 27 22:02:42 UTC 2022 kill -USR1 21278 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21278 killed at Tue Sep 27 22:02:42 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:02:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21330 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21330 found at Tue Sep 27 22:02:43 UTC 2022 selfserv_9223 with PID 21330 started at Tue Sep 27 22:02:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1246: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21330 at Tue Sep 27 22:02:43 UTC 2022 kill -USR1 21330 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21330 killed at Tue Sep 27 22:02:43 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:02:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21382 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21382 found at Tue Sep 27 22:02:44 UTC 2022 selfserv_9223 with PID 21382 started at Tue Sep 27 22:02:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1247: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 21382 at Tue Sep 27 22:02:44 UTC 2022 kill -USR1 21382 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21382 killed at Tue Sep 27 22:02:44 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:02:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21434 found at Tue Sep 27 22:02:45 UTC 2022 selfserv_9223 with PID 21434 started at Tue Sep 27 22:02:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1248: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 21434 at Tue Sep 27 22:02:45 UTC 2022 kill -USR1 21434 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21434 killed at Tue Sep 27 22:02:45 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:02:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21487 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21487 found at Tue Sep 27 22:02:45 UTC 2022 selfserv_9223 with PID 21487 started at Tue Sep 27 22:02:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21487 at Tue Sep 27 22:02:46 UTC 2022 kill -USR1 21487 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21487 killed at Tue Sep 27 22:02:46 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:02:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21539 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21539 found at Tue Sep 27 22:02:46 UTC 2022 selfserv_9223 with PID 21539 started at Tue Sep 27 22:02:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21539 at Tue Sep 27 22:02:47 UTC 2022 kill -USR1 21539 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21539 killed at Tue Sep 27 22:02:47 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:02:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21591 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21591 found at Tue Sep 27 22:02:47 UTC 2022 selfserv_9223 with PID 21591 started at Tue Sep 27 22:02:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21591 at Tue Sep 27 22:02:48 UTC 2022 kill -USR1 21591 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21591 killed at Tue Sep 27 22:02:48 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:02:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21643 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21643 found at Tue Sep 27 22:02:48 UTC 2022 selfserv_9223 with PID 21643 started at Tue Sep 27 22:02:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21643 at Tue Sep 27 22:02:49 UTC 2022 kill -USR1 21643 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21643 killed at Tue Sep 27 22:02:49 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:02:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21695 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21695 found at Tue Sep 27 22:02:49 UTC 2022 selfserv_9223 with PID 21695 started at Tue Sep 27 22:02:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1253: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 21695 at Tue Sep 27 22:02:50 UTC 2022 kill -USR1 21695 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21695 killed at Tue Sep 27 22:02:50 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:02:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21747 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21747 found at Tue Sep 27 22:02:50 UTC 2022 selfserv_9223 with PID 21747 started at Tue Sep 27 22:02:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1254: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 21747 at Tue Sep 27 22:02:51 UTC 2022 kill -USR1 21747 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21747 killed at Tue Sep 27 22:02:51 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:02:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21799 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21799 found at Tue Sep 27 22:02:51 UTC 2022 selfserv_9223 with PID 21799 started at Tue Sep 27 22:02:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1255: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21799 at Tue Sep 27 22:02:52 UTC 2022 kill -USR1 21799 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21799 killed at Tue Sep 27 22:02:52 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:02:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21851 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21851 found at Tue Sep 27 22:02:52 UTC 2022 selfserv_9223 with PID 21851 started at Tue Sep 27 22:02:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21851 at Tue Sep 27 22:02:53 UTC 2022 kill -USR1 21851 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21851 killed at Tue Sep 27 22:02:53 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:02:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21903 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21903 found at Tue Sep 27 22:02:53 UTC 2022 selfserv_9223 with PID 21903 started at Tue Sep 27 22:02:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21903 at Tue Sep 27 22:02:54 UTC 2022 kill -USR1 21903 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21903 killed at Tue Sep 27 22:02:54 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:02:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21955 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21955 found at Tue Sep 27 22:02:54 UTC 2022 selfserv_9223 with PID 21955 started at Tue Sep 27 22:02:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21955 at Tue Sep 27 22:02:55 UTC 2022 kill -USR1 21955 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21955 killed at Tue Sep 27 22:02:55 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:02:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22007 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22007 found at Tue Sep 27 22:02:55 UTC 2022 selfserv_9223 with PID 22007 started at Tue Sep 27 22:02:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1259: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22007 at Tue Sep 27 22:02:56 UTC 2022 kill -USR1 22007 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22007 killed at Tue Sep 27 22:02:56 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:02:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22060 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22060 found at Tue Sep 27 22:02:56 UTC 2022 selfserv_9223 with PID 22060 started at Tue Sep 27 22:02:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1260: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22060 at Tue Sep 27 22:02:57 UTC 2022 kill -USR1 22060 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22060 killed at Tue Sep 27 22:02:57 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:02:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22112 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22112 found at Tue Sep 27 22:02:57 UTC 2022 selfserv_9223 with PID 22112 started at Tue Sep 27 22:02:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1261: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22112 at Tue Sep 27 22:02:58 UTC 2022 kill -USR1 22112 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22112 killed at Tue Sep 27 22:02:58 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:02:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22165 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22165 found at Tue Sep 27 22:02:58 UTC 2022 selfserv_9223 with PID 22165 started at Tue Sep 27 22:02:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1262: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22165 at Tue Sep 27 22:02:59 UTC 2022 kill -USR1 22165 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22165 killed at Tue Sep 27 22:02:59 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:02:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:02:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22217 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22217 found at Tue Sep 27 22:02:59 UTC 2022 selfserv_9223 with PID 22217 started at Tue Sep 27 22:02:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1263: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22217 at Tue Sep 27 22:02:59 UTC 2022 kill -USR1 22217 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22217 killed at Tue Sep 27 22:03:00 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22269 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22269 found at Tue Sep 27 22:03:00 UTC 2022 selfserv_9223 with PID 22269 started at Tue Sep 27 22:03:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1264: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22269 at Tue Sep 27 22:03:00 UTC 2022 kill -USR1 22269 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22269 killed at Tue Sep 27 22:03:01 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22321 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22321 found at Tue Sep 27 22:03:01 UTC 2022 selfserv_9223 with PID 22321 started at Tue Sep 27 22:03:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1265: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22321 at Tue Sep 27 22:03:01 UTC 2022 kill -USR1 22321 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22321 killed at Tue Sep 27 22:03:02 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:03:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22373 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22373 found at Tue Sep 27 22:03:02 UTC 2022 selfserv_9223 with PID 22373 started at Tue Sep 27 22:03:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1266: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22373 at Tue Sep 27 22:03:02 UTC 2022 kill -USR1 22373 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22373 killed at Tue Sep 27 22:03:03 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22425 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22425 found at Tue Sep 27 22:03:03 UTC 2022 selfserv_9223 with PID 22425 started at Tue Sep 27 22:03:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1267: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22425 at Tue Sep 27 22:03:03 UTC 2022 kill -USR1 22425 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22425 killed at Tue Sep 27 22:03:04 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22477 found at Tue Sep 27 22:03:04 UTC 2022 selfserv_9223 with PID 22477 started at Tue Sep 27 22:03:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1268: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22477 at Tue Sep 27 22:03:05 UTC 2022 kill -USR1 22477 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22477 killed at Tue Sep 27 22:03:05 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:03:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22529 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22529 found at Tue Sep 27 22:03:05 UTC 2022 selfserv_9223 with PID 22529 started at Tue Sep 27 22:03:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1269: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22529 at Tue Sep 27 22:03:06 UTC 2022 kill -USR1 22529 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22529 killed at Tue Sep 27 22:03:06 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22581 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22581 found at Tue Sep 27 22:03:06 UTC 2022 selfserv_9223 with PID 22581 started at Tue Sep 27 22:03:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1270: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22581 at Tue Sep 27 22:03:07 UTC 2022 kill -USR1 22581 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22581 killed at Tue Sep 27 22:03:07 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22638 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22638 found at Tue Sep 27 22:03:07 UTC 2022 selfserv_9223 with PID 22638 started at Tue Sep 27 22:03:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1271: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22638 at Tue Sep 27 22:03:08 UTC 2022 kill -USR1 22638 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22638 killed at Tue Sep 27 22:03:08 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:03:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22690 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22690 found at Tue Sep 27 22:03:08 UTC 2022 selfserv_9223 with PID 22690 started at Tue Sep 27 22:03:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1272: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22690 at Tue Sep 27 22:03:09 UTC 2022 kill -USR1 22690 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22690 killed at Tue Sep 27 22:03:09 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22742 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22742 found at Tue Sep 27 22:03:10 UTC 2022 selfserv_9223 with PID 22742 started at Tue Sep 27 22:03:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1273: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22742 at Tue Sep 27 22:03:10 UTC 2022 kill -USR1 22742 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22742 killed at Tue Sep 27 22:03:10 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22794 found at Tue Sep 27 22:03:11 UTC 2022 selfserv_9223 with PID 22794 started at Tue Sep 27 22:03:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1274: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22794 at Tue Sep 27 22:03:11 UTC 2022 kill -USR1 22794 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22794 killed at Tue Sep 27 22:03:11 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22846 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22846 found at Tue Sep 27 22:03:12 UTC 2022 selfserv_9223 with PID 22846 started at Tue Sep 27 22:03:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1275: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22846 at Tue Sep 27 22:03:12 UTC 2022 kill -USR1 22846 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22846 killed at Tue Sep 27 22:03:12 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22898 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22898 found at Tue Sep 27 22:03:13 UTC 2022 selfserv_9223 with PID 22898 started at Tue Sep 27 22:03:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1276: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22898 at Tue Sep 27 22:03:13 UTC 2022 kill -USR1 22898 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22898 killed at Tue Sep 27 22:03:13 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22950 found at Tue Sep 27 22:03:14 UTC 2022 selfserv_9223 with PID 22950 started at Tue Sep 27 22:03:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1277: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22950 at Tue Sep 27 22:03:14 UTC 2022 kill -USR1 22950 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22950 killed at Tue Sep 27 22:03:14 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23002 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23002 found at Tue Sep 27 22:03:14 UTC 2022 selfserv_9223 with PID 23002 started at Tue Sep 27 22:03:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1278: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23002 at Tue Sep 27 22:03:15 UTC 2022 kill -USR1 23002 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23002 killed at Tue Sep 27 22:03:15 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23054 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23054 found at Tue Sep 27 22:03:15 UTC 2022 selfserv_9223 with PID 23054 started at Tue Sep 27 22:03:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1279: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23054 at Tue Sep 27 22:03:16 UTC 2022 kill -USR1 23054 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23054 killed at Tue Sep 27 22:03:16 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:03:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23106 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23106 found at Tue Sep 27 22:03:16 UTC 2022 selfserv_9223 with PID 23106 started at Tue Sep 27 22:03:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1280: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23106 at Tue Sep 27 22:03:17 UTC 2022 kill -USR1 23106 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23106 killed at Tue Sep 27 22:03:17 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23166 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23166 found at Tue Sep 27 22:03:17 UTC 2022 selfserv_9223 with PID 23166 started at Tue Sep 27 22:03:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1281: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23166 at Tue Sep 27 22:03:18 UTC 2022 kill -USR1 23166 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23166 killed at Tue Sep 27 22:03:18 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:03:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23225 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23225 found at Tue Sep 27 22:03:18 UTC 2022 selfserv_9223 with PID 23225 started at Tue Sep 27 22:03:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1282: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23225 at Tue Sep 27 22:03:19 UTC 2022 kill -USR1 23225 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23225 killed at Tue Sep 27 22:03:19 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23277 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23277 found at Tue Sep 27 22:03:19 UTC 2022 selfserv_9223 with PID 23277 started at Tue Sep 27 22:03:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1283: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23277 at Tue Sep 27 22:03:20 UTC 2022 kill -USR1 23277 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23277 killed at Tue Sep 27 22:03:20 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:03:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23329 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23329 found at Tue Sep 27 22:03:20 UTC 2022 selfserv_9223 with PID 23329 started at Tue Sep 27 22:03:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1284: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23329 at Tue Sep 27 22:03:21 UTC 2022 kill -USR1 23329 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23329 killed at Tue Sep 27 22:03:21 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23381 found at Tue Sep 27 22:03:21 UTC 2022 selfserv_9223 with PID 23381 started at Tue Sep 27 22:03:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1285: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23381 at Tue Sep 27 22:03:22 UTC 2022 kill -USR1 23381 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23381 killed at Tue Sep 27 22:03:22 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:03:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23433 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23433 found at Tue Sep 27 22:03:22 UTC 2022 selfserv_9223 with PID 23433 started at Tue Sep 27 22:03:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1286: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23433 at Tue Sep 27 22:03:23 UTC 2022 kill -USR1 23433 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23433 killed at Tue Sep 27 22:03:23 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23485 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23485 found at Tue Sep 27 22:03:23 UTC 2022 selfserv_9223 with PID 23485 started at Tue Sep 27 22:03:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1287: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23485 at Tue Sep 27 22:03:24 UTC 2022 kill -USR1 23485 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23485 killed at Tue Sep 27 22:03:24 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:03:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23537 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23537 found at Tue Sep 27 22:03:24 UTC 2022 selfserv_9223 with PID 23537 started at Tue Sep 27 22:03:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1288: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23537 at Tue Sep 27 22:03:24 UTC 2022 kill -USR1 23537 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23537 killed at Tue Sep 27 22:03:25 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23589 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23589 found at Tue Sep 27 22:03:25 UTC 2022 selfserv_9223 with PID 23589 started at Tue Sep 27 22:03:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1289: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23589 at Tue Sep 27 22:03:25 UTC 2022 kill -USR1 23589 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23589 killed at Tue Sep 27 22:03:26 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:03:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23641 found at Tue Sep 27 22:03:26 UTC 2022 selfserv_9223 with PID 23641 started at Tue Sep 27 22:03:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1290: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23641 at Tue Sep 27 22:03:26 UTC 2022 kill -USR1 23641 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23641 killed at Tue Sep 27 22:03:27 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23693 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23693 found at Tue Sep 27 22:03:27 UTC 2022 selfserv_9223 with PID 23693 started at Tue Sep 27 22:03:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1291: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23693 at Tue Sep 27 22:03:27 UTC 2022 kill -USR1 23693 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23693 killed at Tue Sep 27 22:03:27 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:03:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23745 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23745 found at Tue Sep 27 22:03:28 UTC 2022 selfserv_9223 with PID 23745 started at Tue Sep 27 22:03:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1292: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23745 at Tue Sep 27 22:03:28 UTC 2022 kill -USR1 23745 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23745 killed at Tue Sep 27 22:03:28 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23799 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23799 found at Tue Sep 27 22:03:29 UTC 2022 selfserv_9223 with PID 23799 started at Tue Sep 27 22:03:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1293: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23799 at Tue Sep 27 22:03:29 UTC 2022 kill -USR1 23799 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23799 killed at Tue Sep 27 22:03:29 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:03:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23851 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23851 found at Tue Sep 27 22:03:30 UTC 2022 selfserv_9223 with PID 23851 started at Tue Sep 27 22:03:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1294: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23851 at Tue Sep 27 22:03:30 UTC 2022 kill -USR1 23851 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23851 killed at Tue Sep 27 22:03:30 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23903 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23903 found at Tue Sep 27 22:03:31 UTC 2022 selfserv_9223 with PID 23903 started at Tue Sep 27 22:03:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1295: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23903 at Tue Sep 27 22:03:31 UTC 2022 kill -USR1 23903 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23903 killed at Tue Sep 27 22:03:31 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:03:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23955 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23955 found at Tue Sep 27 22:03:32 UTC 2022 selfserv_9223 with PID 23955 started at Tue Sep 27 22:03:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1296: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23955 at Tue Sep 27 22:03:32 UTC 2022 kill -USR1 23955 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23955 killed at Tue Sep 27 22:03:33 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24007 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24007 found at Tue Sep 27 22:03:33 UTC 2022 selfserv_9223 with PID 24007 started at Tue Sep 27 22:03:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1297: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24007 at Tue Sep 27 22:03:34 UTC 2022 kill -USR1 24007 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24007 killed at Tue Sep 27 22:03:34 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:03:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24059 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24059 found at Tue Sep 27 22:03:34 UTC 2022 selfserv_9223 with PID 24059 started at Tue Sep 27 22:03:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1298: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24059 at Tue Sep 27 22:03:35 UTC 2022 kill -USR1 24059 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24059 killed at Tue Sep 27 22:03:35 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24111 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24111 found at Tue Sep 27 22:03:35 UTC 2022 selfserv_9223 with PID 24111 started at Tue Sep 27 22:03:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1299: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24111 at Tue Sep 27 22:03:36 UTC 2022 kill -USR1 24111 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24111 killed at Tue Sep 27 22:03:36 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24163 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24163 found at Tue Sep 27 22:03:36 UTC 2022 selfserv_9223 with PID 24163 started at Tue Sep 27 22:03:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1300: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24163 at Tue Sep 27 22:03:37 UTC 2022 kill -USR1 24163 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24163 killed at Tue Sep 27 22:03:37 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:03:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24215 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24215 found at Tue Sep 27 22:03:37 UTC 2022 selfserv_9223 with PID 24215 started at Tue Sep 27 22:03:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1301: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24215 at Tue Sep 27 22:03:38 UTC 2022 kill -USR1 24215 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24215 killed at Tue Sep 27 22:03:38 UTC 2022 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Tue Sep 27 22:03:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24297 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24297 found at Tue Sep 27 22:03:38 UTC 2022 selfserv_9223 with PID 24297 started at Tue Sep 27 22:03:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24297 at Tue Sep 27 22:03:39 UTC 2022 kill -USR1 24297 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24297 killed at Tue Sep 27 22:03:39 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:03:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24339 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24339 found at Tue Sep 27 22:03:39 UTC 2022 selfserv_9223 with PID 24339 started at Tue Sep 27 22:03:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24339 at Tue Sep 27 22:03:39 UTC 2022 kill -USR1 24339 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24339 killed at Tue Sep 27 22:03:40 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:03:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24378 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24378 found at Tue Sep 27 22:03:40 UTC 2022 selfserv_9223 with PID 24378 started at Tue Sep 27 22:03:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1246: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 24378 at Tue Sep 27 22:03:40 UTC 2022 kill -USR1 24378 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24378 killed at Tue Sep 27 22:03:40 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:03:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24417 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24417 found at Tue Sep 27 22:03:41 UTC 2022 selfserv_9223 with PID 24417 started at Tue Sep 27 22:03:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1247: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24417 at Tue Sep 27 22:03:41 UTC 2022 kill -USR1 24417 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24417 killed at Tue Sep 27 22:03:41 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:03:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24457 found at Tue Sep 27 22:03:41 UTC 2022 selfserv_9223 with PID 24457 started at Tue Sep 27 22:03:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1248: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 24457 at Tue Sep 27 22:03:41 UTC 2022 kill -USR1 24457 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24457 killed at Tue Sep 27 22:03:42 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:03:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24496 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24496 found at Tue Sep 27 22:03:42 UTC 2022 selfserv_9223 with PID 24496 started at Tue Sep 27 22:03:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24496 at Tue Sep 27 22:03:42 UTC 2022 kill -USR1 24496 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24496 killed at Tue Sep 27 22:03:42 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:03:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24535 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24535 found at Tue Sep 27 22:03:43 UTC 2022 selfserv_9223 with PID 24535 started at Tue Sep 27 22:03:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24535 at Tue Sep 27 22:03:43 UTC 2022 kill -USR1 24535 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24535 killed at Tue Sep 27 22:03:43 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:03:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24574 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24574 found at Tue Sep 27 22:03:43 UTC 2022 selfserv_9223 with PID 24574 started at Tue Sep 27 22:03:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24574 at Tue Sep 27 22:03:44 UTC 2022 kill -USR1 24574 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24574 killed at Tue Sep 27 22:03:44 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:03:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24613 found at Tue Sep 27 22:03:44 UTC 2022 selfserv_9223 with PID 24613 started at Tue Sep 27 22:03:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24613 at Tue Sep 27 22:03:45 UTC 2022 kill -USR1 24613 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24613 killed at Tue Sep 27 22:03:45 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:03:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24652 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24652 found at Tue Sep 27 22:03:45 UTC 2022 selfserv_9223 with PID 24652 started at Tue Sep 27 22:03:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1253: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24652 at Tue Sep 27 22:03:45 UTC 2022 kill -USR1 24652 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24652 killed at Tue Sep 27 22:03:45 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:03:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24691 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24691 found at Tue Sep 27 22:03:46 UTC 2022 selfserv_9223 with PID 24691 started at Tue Sep 27 22:03:46 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1254: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24691 at Tue Sep 27 22:03:46 UTC 2022 kill -USR1 24691 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24691 killed at Tue Sep 27 22:03:46 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:03:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24731 found at Tue Sep 27 22:03:47 UTC 2022 selfserv_9223 with PID 24731 started at Tue Sep 27 22:03:47 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1255: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24731 at Tue Sep 27 22:03:47 UTC 2022 kill -USR1 24731 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24731 killed at Tue Sep 27 22:03:47 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:03:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24771 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24771 found at Tue Sep 27 22:03:47 UTC 2022 selfserv_9223 with PID 24771 started at Tue Sep 27 22:03:47 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1256: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24771 at Tue Sep 27 22:03:48 UTC 2022 kill -USR1 24771 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24771 killed at Tue Sep 27 22:03:48 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:03:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24811 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24811 found at Tue Sep 27 22:03:48 UTC 2022 selfserv_9223 with PID 24811 started at Tue Sep 27 22:03:48 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1257: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24811 at Tue Sep 27 22:03:48 UTC 2022 kill -USR1 24811 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24811 killed at Tue Sep 27 22:03:48 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:03:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24851 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24851 found at Tue Sep 27 22:03:49 UTC 2022 selfserv_9223 with PID 24851 started at Tue Sep 27 22:03:49 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1258: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24851 at Tue Sep 27 22:03:49 UTC 2022 kill -USR1 24851 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24851 killed at Tue Sep 27 22:03:49 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:03:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24891 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24891 found at Tue Sep 27 22:03:49 UTC 2022 selfserv_9223 with PID 24891 started at Tue Sep 27 22:03:49 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1259: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24891 at Tue Sep 27 22:03:50 UTC 2022 kill -USR1 24891 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24891 killed at Tue Sep 27 22:03:50 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:03:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24931 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24931 found at Tue Sep 27 22:03:50 UTC 2022 selfserv_9223 with PID 24931 started at Tue Sep 27 22:03:50 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1260: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24931 at Tue Sep 27 22:03:51 UTC 2022 kill -USR1 24931 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24931 killed at Tue Sep 27 22:03:51 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:03:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24971 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24971 found at Tue Sep 27 22:03:51 UTC 2022 selfserv_9223 with PID 24971 started at Tue Sep 27 22:03:51 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1261: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24971 at Tue Sep 27 22:03:51 UTC 2022 kill -USR1 24971 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24971 killed at Tue Sep 27 22:03:51 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:03:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25011 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25011 found at Tue Sep 27 22:03:52 UTC 2022 selfserv_9223 with PID 25011 started at Tue Sep 27 22:03:52 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1262: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25011 at Tue Sep 27 22:03:52 UTC 2022 kill -USR1 25011 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25011 killed at Tue Sep 27 22:03:52 UTC 2022 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -fips false -force FIPS mode disabled. ssl.sh: #1263: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/server -list ssl.sh: #1264: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1265: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1266: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_server -list ssl.sh: #1267: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1268: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -fips true -force FIPS mode enabled. ssl.sh: #1269: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -list ssl.sh: #1270: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1271: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1272: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -list ssl.sh: #1273: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1274: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9223 starting at Tue Sep 27 22:03:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:03:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 25134 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25134 found at Tue Sep 27 22:03:54 UTC 2022 selfserv_9223 with PID 25134 started at Tue Sep 27 22:03:54 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1275: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1276: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1277: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1278: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1279: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1280: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1281: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1282: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1283: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1284: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1285: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1286: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1287: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1288: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1289: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1290: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1291: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1292: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1293: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1294: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1295: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1296: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1297: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1298: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1299: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1300: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1301: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1302: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1303: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1304: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1305: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1306: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1307: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1308: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1309: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1310: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1311: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1312: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1313: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1314: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1315: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1316: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1317: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1318: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1319: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1320: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1321: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1322: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1323: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1324: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1325: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 25134 at Tue Sep 27 22:04:09 UTC 2022 kill -USR1 25134 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25134 killed at Tue Sep 27 22:04:09 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Tue Sep 27 22:04:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:04:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 25683 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25683 found at Tue Sep 27 22:04:09 UTC 2022 selfserv_9223 with PID 25683 started at Tue Sep 27 22:04:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1326: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1327: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1328: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1329: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1330: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1331: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1332: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1333: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1334: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1335: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1336: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1337: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1338: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1339: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1340: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1341: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1342: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1343: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1344: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1345: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1346: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1347: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1348: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1349: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1350: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1351: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1352: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1353: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1354: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1355: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1356: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1357: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1358: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1359: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1360: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1361: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1362: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1363: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1364: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1365: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1366: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1367: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1368: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1369: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1370: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1371: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1372: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1373: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1374: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25683 at Tue Sep 27 22:04:32 UTC 2022 kill -USR1 25683 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25683 killed at Tue Sep 27 22:04:32 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9223 starting at Tue Sep 27 22:04:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:04:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26500 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26500 found at Tue Sep 27 22:04:32 UTC 2022 selfserv_9223 with PID 26500 started at Tue Sep 27 22:04:32 UTC 2022 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1402: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1403: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26500 at Tue Sep 27 22:04:33 UTC 2022 kill -USR1 26500 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26500 killed at Tue Sep 27 22:04:33 UTC 2022 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:04:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:04:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26578 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26578 found at Tue Sep 27 22:04:33 UTC 2022 selfserv_9223 with PID 26578 started at Tue Sep 27 22:04:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1402: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 26578 at Tue Sep 27 22:04:34 UTC 2022 kill -USR1 26578 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26578 killed at Tue Sep 27 22:04:34 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:04:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:04:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26630 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26630 found at Tue Sep 27 22:04:34 UTC 2022 selfserv_9223 with PID 26630 started at Tue Sep 27 22:04:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1403: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 26630 at Tue Sep 27 22:04:59 UTC 2022 kill -USR1 26630 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26630 killed at Tue Sep 27 22:04:59 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:04:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:04:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26682 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26682 found at Tue Sep 27 22:04:59 UTC 2022 selfserv_9223 with PID 26682 started at Tue Sep 27 22:04:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1404: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26682 at Tue Sep 27 22:05:00 UTC 2022 kill -USR1 26682 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26682 killed at Tue Sep 27 22:05:00 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:05:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:05:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26746 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26746 found at Tue Sep 27 22:05:00 UTC 2022 selfserv_9223 with PID 26746 started at Tue Sep 27 22:05:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1405: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 26746 at Tue Sep 27 22:05:01 UTC 2022 kill -USR1 26746 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26746 killed at Tue Sep 27 22:05:01 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:05:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:05:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26798 found at Tue Sep 27 22:05:01 UTC 2022 selfserv_9223 with PID 26798 started at Tue Sep 27 22:05:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1406: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 26798 at Tue Sep 27 22:05:25 UTC 2022 kill -USR1 26798 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26798 killed at Tue Sep 27 22:05:25 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:05:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:05:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26865 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26865 found at Tue Sep 27 22:05:25 UTC 2022 selfserv_9223 with PID 26865 started at Tue Sep 27 22:05:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1407: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26865 at Tue Sep 27 22:05:26 UTC 2022 kill -USR1 26865 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26865 killed at Tue Sep 27 22:05:26 UTC 2022 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:05:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:05:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26930 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26930 found at Tue Sep 27 22:05:26 UTC 2022 selfserv_9223 with PID 26930 started at Tue Sep 27 22:05:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1408: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 26930 at Tue Sep 27 22:05:27 UTC 2022 kill -USR1 26930 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26930 killed at Tue Sep 27 22:05:27 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:05:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:05:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26982 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26982 found at Tue Sep 27 22:05:28 UTC 2022 selfserv_9223 with PID 26982 started at Tue Sep 27 22:05:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1409: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 26982 at Tue Sep 27 22:05:52 UTC 2022 kill -USR1 26982 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26982 killed at Tue Sep 27 22:05:52 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:05:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:05:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27035 found at Tue Sep 27 22:05:52 UTC 2022 selfserv_9223 with PID 27035 started at Tue Sep 27 22:05:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27035 at Tue Sep 27 22:05:53 UTC 2022 kill -USR1 27035 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27035 killed at Tue Sep 27 22:05:53 UTC 2022 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:05:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:05:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27099 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27099 found at Tue Sep 27 22:05:54 UTC 2022 selfserv_9223 with PID 27099 started at Tue Sep 27 22:05:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1411: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27099 at Tue Sep 27 22:05:54 UTC 2022 kill -USR1 27099 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27099 killed at Tue Sep 27 22:05:55 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:05:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:05:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27151 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27151 found at Tue Sep 27 22:05:55 UTC 2022 selfserv_9223 with PID 27151 started at Tue Sep 27 22:05:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27151 at Tue Sep 27 22:06:19 UTC 2022 kill -USR1 27151 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27151 killed at Tue Sep 27 22:06:19 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:06:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:06:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27218 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27218 found at Tue Sep 27 22:06:20 UTC 2022 selfserv_9223 with PID 27218 started at Tue Sep 27 22:06:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27218 at Tue Sep 27 22:06:20 UTC 2022 kill -USR1 27218 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27218 killed at Tue Sep 27 22:06:20 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:06:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:06:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27282 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27282 found at Tue Sep 27 22:06:21 UTC 2022 selfserv_9223 with PID 27282 started at Tue Sep 27 22:06:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1414: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27282 at Tue Sep 27 22:06:22 UTC 2022 kill -USR1 27282 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27282 killed at Tue Sep 27 22:06:22 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:06:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:06:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27334 found at Tue Sep 27 22:06:22 UTC 2022 selfserv_9223 with PID 27334 started at Tue Sep 27 22:06:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1415: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27334 at Tue Sep 27 22:06:45 UTC 2022 kill -USR1 27334 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27334 killed at Tue Sep 27 22:06:46 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:06:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:06:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Tue Sep 27 22:06:46 UTC 2022 selfserv_9223 with PID 27388 started at Tue Sep 27 22:06:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27388 at Tue Sep 27 22:06:47 UTC 2022 kill -USR1 27388 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27388 killed at Tue Sep 27 22:06:47 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:06:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:06:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27444 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27444 found at Tue Sep 27 22:06:47 UTC 2022 selfserv_9223 with PID 27444 started at Tue Sep 27 22:06:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27444 at Tue Sep 27 22:06:47 UTC 2022 kill -USR1 27444 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27444 killed at Tue Sep 27 22:06:48 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:06:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:06:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27500 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27500 found at Tue Sep 27 22:06:48 UTC 2022 selfserv_9223 with PID 27500 started at Tue Sep 27 22:06:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1418: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27500 at Tue Sep 27 22:06:49 UTC 2022 kill -USR1 27500 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27500 killed at Tue Sep 27 22:06:49 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:06:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:06:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27557 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27557 found at Tue Sep 27 22:06:49 UTC 2022 selfserv_9223 with PID 27557 started at Tue Sep 27 22:06:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27557 at Tue Sep 27 22:06:50 UTC 2022 kill -USR1 27557 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27557 killed at Tue Sep 27 22:06:50 UTC 2022 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:06:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:06:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27617 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27617 found at Tue Sep 27 22:06:50 UTC 2022 selfserv_9223 with PID 27617 started at Tue Sep 27 22:06:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1420: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27617 at Tue Sep 27 22:07:15 UTC 2022 kill -USR1 27617 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27617 killed at Tue Sep 27 22:07:15 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:07:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:07:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27669 found at Tue Sep 27 22:07:15 UTC 2022 selfserv_9223 with PID 27669 started at Tue Sep 27 22:07:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1421: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27669 at Tue Sep 27 22:07:16 UTC 2022 kill -USR1 27669 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27669 killed at Tue Sep 27 22:07:16 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:07:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:07:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27729 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27729 found at Tue Sep 27 22:07:16 UTC 2022 selfserv_9223 with PID 27729 started at Tue Sep 27 22:07:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1422: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27729 at Tue Sep 27 22:07:39 UTC 2022 kill -USR1 27729 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27729 killed at Tue Sep 27 22:07:40 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:07:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:07:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27796 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27796 found at Tue Sep 27 22:07:40 UTC 2022 selfserv_9223 with PID 27796 started at Tue Sep 27 22:07:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27796 at Tue Sep 27 22:07:40 UTC 2022 kill -USR1 27796 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27796 killed at Tue Sep 27 22:07:41 UTC 2022 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:07:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:07:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27856 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27856 found at Tue Sep 27 22:07:41 UTC 2022 selfserv_9223 with PID 27856 started at Tue Sep 27 22:07:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1424: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27856 at Tue Sep 27 22:08:05 UTC 2022 kill -USR1 27856 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27856 killed at Tue Sep 27 22:08:05 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:08:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:08:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27909 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27909 found at Tue Sep 27 22:08:06 UTC 2022 selfserv_9223 with PID 27909 started at Tue Sep 27 22:08:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27909 at Tue Sep 27 22:08:06 UTC 2022 kill -USR1 27909 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27909 killed at Tue Sep 27 22:08:07 UTC 2022 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:08:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:08:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27969 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27969 found at Tue Sep 27 22:08:07 UTC 2022 selfserv_9223 with PID 27969 started at Tue Sep 27 22:08:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1426: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27969 at Tue Sep 27 22:08:31 UTC 2022 kill -USR1 27969 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27969 killed at Tue Sep 27 22:08:31 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:08:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:08:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28036 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28036 found at Tue Sep 27 22:08:32 UTC 2022 selfserv_9223 with PID 28036 started at Tue Sep 27 22:08:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1427: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28036 at Tue Sep 27 22:08:32 UTC 2022 kill -USR1 28036 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28036 killed at Tue Sep 27 22:08:32 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:08:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:08:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28096 found at Tue Sep 27 22:08:33 UTC 2022 selfserv_9223 with PID 28096 started at Tue Sep 27 22:08:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1428: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28096 at Tue Sep 27 22:08:56 UTC 2022 kill -USR1 28096 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28096 killed at Tue Sep 27 22:08:56 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:08:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:08:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28148 found at Tue Sep 27 22:08:57 UTC 2022 selfserv_9223 with PID 28148 started at Tue Sep 27 22:08:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1429: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28148 at Tue Sep 27 22:08:57 UTC 2022 kill -USR1 28148 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28148 killed at Tue Sep 27 22:08:57 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:08:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:08:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28200 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28200 found at Tue Sep 27 22:08:58 UTC 2022 selfserv_9223 with PID 28200 started at Tue Sep 27 22:08:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1430: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28200 at Tue Sep 27 22:08:59 UTC 2022 kill -USR1 28200 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28200 killed at Tue Sep 27 22:08:59 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:08:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:08:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28252 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28252 found at Tue Sep 27 22:08:59 UTC 2022 selfserv_9223 with PID 28252 started at Tue Sep 27 22:08:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1431: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28252 at Tue Sep 27 22:09:00 UTC 2022 kill -USR1 28252 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28252 killed at Tue Sep 27 22:09:00 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Tue Sep 27 22:09:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28310 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28310 found at Tue Sep 27 22:09:00 UTC 2022 selfserv_9223 with PID 28310 started at Tue Sep 27 22:09:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1432: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28310 at Tue Sep 27 22:09:01 UTC 2022 kill -USR1 28310 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28310 killed at Tue Sep 27 22:09:01 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Tue Sep 27 22:09:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28369 found at Tue Sep 27 22:09:01 UTC 2022 selfserv_9223 with PID 28369 started at Tue Sep 27 22:09:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1433: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28369 at Tue Sep 27 22:09:01 UTC 2022 kill -USR1 28369 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28369 killed at Tue Sep 27 22:09:02 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Tue Sep 27 22:09:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28427 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28427 found at Tue Sep 27 22:09:02 UTC 2022 selfserv_9223 with PID 28427 started at Tue Sep 27 22:09:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1434: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28427 at Tue Sep 27 22:09:02 UTC 2022 kill -USR1 28427 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28427 killed at Tue Sep 27 22:09:02 UTC 2022 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9223 starting at Tue Sep 27 22:09:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28486 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28486 found at Tue Sep 27 22:09:03 UTC 2022 selfserv_9223 with PID 28486 started at Tue Sep 27 22:09:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1435: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28486 at Tue Sep 27 22:09:03 UTC 2022 kill -USR1 28486 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28486 killed at Tue Sep 27 22:09:03 UTC 2022 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9223 starting at Tue Sep 27 22:09:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28544 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28544 found at Tue Sep 27 22:09:04 UTC 2022 selfserv_9223 with PID 28544 started at Tue Sep 27 22:09:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1436: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28544 at Tue Sep 27 22:09:04 UTC 2022 kill -USR1 28544 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28544 killed at Tue Sep 27 22:09:04 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Tue Sep 27 22:09:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28603 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28603 found at Tue Sep 27 22:09:04 UTC 2022 selfserv_9223 with PID 28603 started at Tue Sep 27 22:09:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1437: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28603 at Tue Sep 27 22:09:05 UTC 2022 kill -USR1 28603 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28603 killed at Tue Sep 27 22:09:05 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Tue Sep 27 22:09:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28661 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28661 found at Tue Sep 27 22:09:05 UTC 2022 selfserv_9223 with PID 28661 started at Tue Sep 27 22:09:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1438: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28661 at Tue Sep 27 22:09:06 UTC 2022 kill -USR1 28661 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28661 killed at Tue Sep 27 22:09:06 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9223 starting at Tue Sep 27 22:09:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28719 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28719 found at Tue Sep 27 22:09:06 UTC 2022 selfserv_9223 with PID 28719 started at Tue Sep 27 22:09:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1439: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28719 at Tue Sep 27 22:09:07 UTC 2022 kill -USR1 28719 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28719 killed at Tue Sep 27 22:09:07 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9223 starting at Tue Sep 27 22:09:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28777 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28777 found at Tue Sep 27 22:09:07 UTC 2022 selfserv_9223 with PID 28777 started at Tue Sep 27 22:09:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1440: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28777 at Tue Sep 27 22:09:07 UTC 2022 kill -USR1 28777 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28777 killed at Tue Sep 27 22:09:08 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Tue Sep 27 22:09:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28835 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28835 found at Tue Sep 27 22:09:08 UTC 2022 selfserv_9223 with PID 28835 started at Tue Sep 27 22:09:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1441: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28835 at Tue Sep 27 22:09:08 UTC 2022 kill -USR1 28835 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28835 killed at Tue Sep 27 22:09:08 UTC 2022 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9223 starting at Tue Sep 27 22:09:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28877 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28877 found at Tue Sep 27 22:09:09 UTC 2022 selfserv_9223 with PID 28877 started at Tue Sep 27 22:09:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1402: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28877 at Tue Sep 27 22:09:09 UTC 2022 kill -USR1 28877 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28877 killed at Tue Sep 27 22:09:09 UTC 2022 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9223 starting at Tue Sep 27 22:09:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28919 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28919 found at Tue Sep 27 22:09:09 UTC 2022 selfserv_9223 with PID 28919 started at Tue Sep 27 22:09:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1403: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9223 with PID 28919 at Tue Sep 27 22:09:10 UTC 2022 kill -USR1 28919 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28919 killed at Tue Sep 27 22:09:10 UTC 2022 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9223 starting at Tue Sep 27 22:09:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28961 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28961 found at Tue Sep 27 22:09:10 UTC 2022 selfserv_9223 with PID 28961 started at Tue Sep 27 22:09:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1404: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 28961 at Tue Sep 27 22:09:10 UTC 2022 kill -USR1 28961 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28961 killed at Tue Sep 27 22:09:11 UTC 2022 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9223 starting at Tue Sep 27 22:09:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29003 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29003 found at Tue Sep 27 22:09:11 UTC 2022 selfserv_9223 with PID 29003 started at Tue Sep 27 22:09:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1405: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 29003 at Tue Sep 27 22:09:11 UTC 2022 kill -USR1 29003 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29003 killed at Tue Sep 27 22:09:11 UTC 2022 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9223 starting at Tue Sep 27 22:09:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29045 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29045 found at Tue Sep 27 22:09:12 UTC 2022 selfserv_9223 with PID 29045 started at Tue Sep 27 22:09:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1406: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 29045 at Tue Sep 27 22:09:12 UTC 2022 kill -USR1 29045 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29045 killed at Tue Sep 27 22:09:12 UTC 2022 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9223 starting at Tue Sep 27 22:09:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29087 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29087 found at Tue Sep 27 22:09:12 UTC 2022 selfserv_9223 with PID 29087 started at Tue Sep 27 22:09:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1407: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 29087 at Tue Sep 27 22:09:13 UTC 2022 kill -USR1 29087 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29087 killed at Tue Sep 27 22:09:13 UTC 2022 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9223 starting at Tue Sep 27 22:09:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29129 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29129 found at Tue Sep 27 22:09:13 UTC 2022 selfserv_9223 with PID 29129 started at Tue Sep 27 22:09:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1408: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 29129 at Tue Sep 27 22:09:13 UTC 2022 kill -USR1 29129 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29129 killed at Tue Sep 27 22:09:14 UTC 2022 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9223 starting at Tue Sep 27 22:09:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29171 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29171 found at Tue Sep 27 22:09:14 UTC 2022 selfserv_9223 with PID 29171 started at Tue Sep 27 22:09:14 UTC 2022 strsclnt -q -p 9223 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Tue Sep 27 22:09:14 UTC 2022 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Tue Sep 27 22:09:53 UTC 2022 ssl.sh: #1409: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9223 with PID 29171 at Tue Sep 27 22:09:53 UTC 2022 kill -USR1 29171 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29171 killed at Tue Sep 27 22:09:53 UTC 2022 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Tue Sep 27 22:09:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29238 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29238 found at Tue Sep 27 22:09:53 UTC 2022 selfserv_9223 with PID 29238 started at Tue Sep 27 22:09:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29238 at Tue Sep 27 22:09:54 UTC 2022 kill -USR1 29238 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29238 killed at Tue Sep 27 22:09:54 UTC 2022 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:09:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29280 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29280 found at Tue Sep 27 22:09:54 UTC 2022 selfserv_9223 with PID 29280 started at Tue Sep 27 22:09:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1411: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29280 at Tue Sep 27 22:09:55 UTC 2022 kill -USR1 29280 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29280 killed at Tue Sep 27 22:09:55 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:09:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29319 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29319 found at Tue Sep 27 22:09:55 UTC 2022 selfserv_9223 with PID 29319 started at Tue Sep 27 22:09:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 29319 at Tue Sep 27 22:09:55 UTC 2022 kill -USR1 29319 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29319 killed at Tue Sep 27 22:09:56 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:09:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29358 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29358 found at Tue Sep 27 22:09:56 UTC 2022 selfserv_9223 with PID 29358 started at Tue Sep 27 22:09:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29358 at Tue Sep 27 22:09:56 UTC 2022 kill -USR1 29358 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29358 killed at Tue Sep 27 22:09:56 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:09:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29397 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29397 found at Tue Sep 27 22:09:57 UTC 2022 selfserv_9223 with PID 29397 started at Tue Sep 27 22:09:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1414: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 29397 at Tue Sep 27 22:09:57 UTC 2022 kill -USR1 29397 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29397 killed at Tue Sep 27 22:09:57 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:09:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29436 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29436 found at Tue Sep 27 22:09:57 UTC 2022 selfserv_9223 with PID 29436 started at Tue Sep 27 22:09:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1415: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29436 at Tue Sep 27 22:09:58 UTC 2022 kill -USR1 29436 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29436 killed at Tue Sep 27 22:09:58 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:09:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29475 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29475 found at Tue Sep 27 22:09:58 UTC 2022 selfserv_9223 with PID 29475 started at Tue Sep 27 22:09:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29475 at Tue Sep 27 22:09:58 UTC 2022 kill -USR1 29475 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29475 killed at Tue Sep 27 22:09:58 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:09:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29514 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29514 found at Tue Sep 27 22:09:59 UTC 2022 selfserv_9223 with PID 29514 started at Tue Sep 27 22:09:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29514 at Tue Sep 27 22:09:59 UTC 2022 kill -USR1 29514 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29514 killed at Tue Sep 27 22:09:59 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:09:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:09:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29553 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29553 found at Tue Sep 27 22:10:00 UTC 2022 selfserv_9223 with PID 29553 started at Tue Sep 27 22:10:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1418: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29553 at Tue Sep 27 22:10:00 UTC 2022 kill -USR1 29553 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29553 killed at Tue Sep 27 22:10:00 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:10:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:10:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29592 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29592 found at Tue Sep 27 22:10:00 UTC 2022 selfserv_9223 with PID 29592 started at Tue Sep 27 22:10:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29592 at Tue Sep 27 22:10:01 UTC 2022 kill -USR1 29592 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29592 killed at Tue Sep 27 22:10:01 UTC 2022 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:10:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:10:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29631 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29631 found at Tue Sep 27 22:10:01 UTC 2022 selfserv_9223 with PID 29631 started at Tue Sep 27 22:10:01 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1420: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29631 at Tue Sep 27 22:10:01 UTC 2022 kill -USR1 29631 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29631 killed at Tue Sep 27 22:10:02 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:10:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:10:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29671 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29671 found at Tue Sep 27 22:10:02 UTC 2022 selfserv_9223 with PID 29671 started at Tue Sep 27 22:10:02 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1421: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29671 at Tue Sep 27 22:10:02 UTC 2022 kill -USR1 29671 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29671 killed at Tue Sep 27 22:10:02 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:10:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:10:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29711 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29711 found at Tue Sep 27 22:10:03 UTC 2022 selfserv_9223 with PID 29711 started at Tue Sep 27 22:10:03 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1422: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29711 at Tue Sep 27 22:10:03 UTC 2022 kill -USR1 29711 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29711 killed at Tue Sep 27 22:10:03 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:10:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:10:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29751 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29751 found at Tue Sep 27 22:10:03 UTC 2022 selfserv_9223 with PID 29751 started at Tue Sep 27 22:10:03 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1423: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29751 at Tue Sep 27 22:10:04 UTC 2022 kill -USR1 29751 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29751 killed at Tue Sep 27 22:10:04 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:10:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:10:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29791 found at Tue Sep 27 22:10:04 UTC 2022 selfserv_9223 with PID 29791 started at Tue Sep 27 22:10:04 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1424: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29791 at Tue Sep 27 22:10:04 UTC 2022 kill -USR1 29791 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29791 killed at Tue Sep 27 22:10:04 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:10:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:10:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29831 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29831 found at Tue Sep 27 22:10:05 UTC 2022 selfserv_9223 with PID 29831 started at Tue Sep 27 22:10:05 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1425: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29831 at Tue Sep 27 22:10:05 UTC 2022 kill -USR1 29831 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29831 killed at Tue Sep 27 22:10:05 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:10:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:10:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29871 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29871 found at Tue Sep 27 22:10:06 UTC 2022 selfserv_9223 with PID 29871 started at Tue Sep 27 22:10:06 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1426: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29871 at Tue Sep 27 22:10:06 UTC 2022 kill -USR1 29871 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29871 killed at Tue Sep 27 22:10:06 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:10:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:10:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29911 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29911 found at Tue Sep 27 22:10:06 UTC 2022 selfserv_9223 with PID 29911 started at Tue Sep 27 22:10:06 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1427: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29911 at Tue Sep 27 22:10:07 UTC 2022 kill -USR1 29911 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29911 killed at Tue Sep 27 22:10:07 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:10:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:10:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29951 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29951 found at Tue Sep 27 22:10:07 UTC 2022 selfserv_9223 with PID 29951 started at Tue Sep 27 22:10:07 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1428: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29951 at Tue Sep 27 22:10:07 UTC 2022 kill -USR1 29951 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29951 killed at Tue Sep 27 22:10:07 UTC 2022 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9223 starting at Tue Sep 27 22:10:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:10:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 29991 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29991 found at Tue Sep 27 22:10:08 UTC 2022 selfserv_9223 with PID 29991 started at Tue Sep 27 22:10:08 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1429: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1430: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1431: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1432: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1433: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1434: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1435: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 29991 at Tue Sep 27 22:10:22 UTC 2022 kill -USR1 29991 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29991 killed at Tue Sep 27 22:10:22 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Tue Sep 27 22:10:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:10:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 30557 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30557 found at Tue Sep 27 22:10:23 UTC 2022 selfserv_9223 with PID 30557 started at Tue Sep 27 22:10:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1500: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1501: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1502: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1503: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1504: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1505: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1506: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1507: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1508: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1509: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1510: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1511: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1512: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1513: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1514: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1515: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1516: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1517: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1518: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1519: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1520: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1521: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1522: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1523: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1524: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1525: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1526: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1527: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1528: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30557 at Tue Sep 27 22:10:45 UTC 2022 kill -USR1 30557 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30557 killed at Tue Sep 27 22:10:45 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:10:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:10:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31384 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31384 found at Tue Sep 27 22:10:46 UTC 2022 selfserv_9223 with PID 31384 started at Tue Sep 27 22:10:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1556: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 31384 at Tue Sep 27 22:10:46 UTC 2022 kill -USR1 31384 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 31384 killed at Tue Sep 27 22:10:46 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:10:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:10:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31436 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31436 found at Tue Sep 27 22:10:47 UTC 2022 selfserv_9223 with PID 31436 started at Tue Sep 27 22:10:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1557: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 31436 at Tue Sep 27 22:11:12 UTC 2022 kill -USR1 31436 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 31436 killed at Tue Sep 27 22:11:12 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:11:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:11:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31488 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31488 found at Tue Sep 27 22:11:12 UTC 2022 selfserv_9223 with PID 31488 started at Tue Sep 27 22:11:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1558: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 31488 at Tue Sep 27 22:11:13 UTC 2022 kill -USR1 31488 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 31488 killed at Tue Sep 27 22:11:13 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:11:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:11:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31553 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31553 found at Tue Sep 27 22:11:13 UTC 2022 selfserv_9223 with PID 31553 started at Tue Sep 27 22:11:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1559: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 31553 at Tue Sep 27 22:11:14 UTC 2022 kill -USR1 31553 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 31553 killed at Tue Sep 27 22:11:14 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:11:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:11:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31605 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31605 found at Tue Sep 27 22:11:14 UTC 2022 selfserv_9223 with PID 31605 started at Tue Sep 27 22:11:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1560: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 31605 at Tue Sep 27 22:11:38 UTC 2022 kill -USR1 31605 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 31605 killed at Tue Sep 27 22:11:38 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:11:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:11:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31673 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31673 found at Tue Sep 27 22:11:38 UTC 2022 selfserv_9223 with PID 31673 started at Tue Sep 27 22:11:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 31673 at Tue Sep 27 22:11:39 UTC 2022 kill -USR1 31673 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 31673 killed at Tue Sep 27 22:11:39 UTC 2022 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:11:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:11:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31737 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31737 found at Tue Sep 27 22:11:39 UTC 2022 selfserv_9223 with PID 31737 started at Tue Sep 27 22:11:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1562: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 31737 at Tue Sep 27 22:11:40 UTC 2022 kill -USR1 31737 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 31737 killed at Tue Sep 27 22:11:40 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:11:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:11:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31789 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31789 found at Tue Sep 27 22:11:40 UTC 2022 selfserv_9223 with PID 31789 started at Tue Sep 27 22:11:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1563: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 31789 at Tue Sep 27 22:12:06 UTC 2022 kill -USR1 31789 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 31789 killed at Tue Sep 27 22:12:06 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:12:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:12:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31841 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31841 found at Tue Sep 27 22:12:06 UTC 2022 selfserv_9223 with PID 31841 started at Tue Sep 27 22:12:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 31841 at Tue Sep 27 22:12:07 UTC 2022 kill -USR1 31841 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 31841 killed at Tue Sep 27 22:12:07 UTC 2022 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:12:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:12:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31906 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31906 found at Tue Sep 27 22:12:07 UTC 2022 selfserv_9223 with PID 31906 started at Tue Sep 27 22:12:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1565: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 31906 at Tue Sep 27 22:12:08 UTC 2022 kill -USR1 31906 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 31906 killed at Tue Sep 27 22:12:08 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:12:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:12:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31958 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31958 found at Tue Sep 27 22:12:08 UTC 2022 selfserv_9223 with PID 31958 started at Tue Sep 27 22:12:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1566: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 31958 at Tue Sep 27 22:12:33 UTC 2022 kill -USR1 31958 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 31958 killed at Tue Sep 27 22:12:34 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:12:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:12:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32025 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32025 found at Tue Sep 27 22:12:34 UTC 2022 selfserv_9223 with PID 32025 started at Tue Sep 27 22:12:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1567: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 32025 at Tue Sep 27 22:12:34 UTC 2022 kill -USR1 32025 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32025 killed at Tue Sep 27 22:12:35 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:12:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:12:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32089 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32089 found at Tue Sep 27 22:12:35 UTC 2022 selfserv_9223 with PID 32089 started at Tue Sep 27 22:12:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1568: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 32089 at Tue Sep 27 22:12:35 UTC 2022 kill -USR1 32089 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32089 killed at Tue Sep 27 22:12:36 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:12:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:12:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32141 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32141 found at Tue Sep 27 22:12:36 UTC 2022 selfserv_9223 with PID 32141 started at Tue Sep 27 22:12:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1569: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 32141 at Tue Sep 27 22:12:59 UTC 2022 kill -USR1 32141 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32141 killed at Tue Sep 27 22:12:59 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:13:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:13:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32193 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32193 found at Tue Sep 27 22:13:00 UTC 2022 selfserv_9223 with PID 32193 started at Tue Sep 27 22:13:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 32193 at Tue Sep 27 22:13:00 UTC 2022 kill -USR1 32193 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32193 killed at Tue Sep 27 22:13:01 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:13:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:13:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32249 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32249 found at Tue Sep 27 22:13:01 UTC 2022 selfserv_9223 with PID 32249 started at Tue Sep 27 22:13:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1571: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 32249 at Tue Sep 27 22:13:01 UTC 2022 kill -USR1 32249 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32249 killed at Tue Sep 27 22:13:02 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 22:13:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:13:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32305 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32305 found at Tue Sep 27 22:13:02 UTC 2022 selfserv_9223 with PID 32305 started at Tue Sep 27 22:13:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1572: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 32305 at Tue Sep 27 22:13:02 UTC 2022 kill -USR1 32305 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32305 killed at Tue Sep 27 22:13:02 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:13:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:13:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32361 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32361 found at Tue Sep 27 22:13:03 UTC 2022 selfserv_9223 with PID 32361 started at Tue Sep 27 22:13:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1573: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 32361 at Tue Sep 27 22:13:03 UTC 2022 kill -USR1 32361 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32361 killed at Tue Sep 27 22:13:03 UTC 2022 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:13:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:13:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32421 found at Tue Sep 27 22:13:04 UTC 2022 selfserv_9223 with PID 32421 started at Tue Sep 27 22:13:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1574: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 32421 at Tue Sep 27 22:13:29 UTC 2022 kill -USR1 32421 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32421 killed at Tue Sep 27 22:13:29 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:13:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:13:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32488 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32488 found at Tue Sep 27 22:13:30 UTC 2022 selfserv_9223 with PID 32488 started at Tue Sep 27 22:13:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1575: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 32488 at Tue Sep 27 22:13:30 UTC 2022 kill -USR1 32488 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32488 killed at Tue Sep 27 22:13:30 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:13:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:13:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32548 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32548 found at Tue Sep 27 22:13:31 UTC 2022 selfserv_9223 with PID 32548 started at Tue Sep 27 22:13:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1576: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 32548 at Tue Sep 27 22:13:54 UTC 2022 kill -USR1 32548 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32548 killed at Tue Sep 27 22:13:54 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:13:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:13:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32600 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32600 found at Tue Sep 27 22:13:54 UTC 2022 selfserv_9223 with PID 32600 started at Tue Sep 27 22:13:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1577: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 32600 at Tue Sep 27 22:13:55 UTC 2022 kill -USR1 32600 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32600 killed at Tue Sep 27 22:13:55 UTC 2022 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:13:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:13:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32662 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32662 found at Tue Sep 27 22:13:56 UTC 2022 selfserv_9223 with PID 32662 started at Tue Sep 27 22:13:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1578: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 32662 at Tue Sep 27 22:14:21 UTC 2022 kill -USR1 32662 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32662 killed at Tue Sep 27 22:14:21 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:14:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:14:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32729 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32729 found at Tue Sep 27 22:14:21 UTC 2022 selfserv_9223 with PID 32729 started at Tue Sep 27 22:14:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1579: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 32729 at Tue Sep 27 22:14:22 UTC 2022 kill -USR1 32729 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32729 killed at Tue Sep 27 22:14:22 UTC 2022 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:14:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:14:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32789 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32789 found at Tue Sep 27 22:14:22 UTC 2022 selfserv_9223 with PID 32789 started at Tue Sep 27 22:14:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1580: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 32789 at Tue Sep 27 22:14:48 UTC 2022 kill -USR1 32789 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32789 killed at Tue Sep 27 22:14:48 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:14:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:14:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32891 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32891 found at Tue Sep 27 22:14:48 UTC 2022 selfserv_9223 with PID 32891 started at Tue Sep 27 22:14:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 32891 at Tue Sep 27 22:14:49 UTC 2022 kill -USR1 32891 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32891 killed at Tue Sep 27 22:14:49 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 22:14:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:14:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32951 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32951 found at Tue Sep 27 22:14:49 UTC 2022 selfserv_9223 with PID 32951 started at Tue Sep 27 22:14:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1582: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 32951 at Tue Sep 27 22:15:12 UTC 2022 kill -USR1 32951 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32951 killed at Tue Sep 27 22:15:13 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:15:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:15:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33046 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33046 found at Tue Sep 27 22:15:13 UTC 2022 selfserv_9223 with PID 33046 started at Tue Sep 27 22:15:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1583: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33046 at Tue Sep 27 22:15:14 UTC 2022 kill -USR1 33046 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33046 killed at Tue Sep 27 22:15:14 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:15:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:15:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33102 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33102 found at Tue Sep 27 22:15:14 UTC 2022 selfserv_9223 with PID 33102 started at Tue Sep 27 22:15:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1584: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33102 at Tue Sep 27 22:15:15 UTC 2022 kill -USR1 33102 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33102 killed at Tue Sep 27 22:15:15 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 22:15:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:15:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33154 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33154 found at Tue Sep 27 22:15:15 UTC 2022 selfserv_9223 with PID 33154 started at Tue Sep 27 22:15:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1585: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33154 at Tue Sep 27 22:15:15 UTC 2022 kill -USR1 33154 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33154 killed at Tue Sep 27 22:15:16 UTC 2022 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Tue Sep 27 22:15:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:15:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33236 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33236 found at Tue Sep 27 22:15:16 UTC 2022 selfserv_9223 with PID 33236 started at Tue Sep 27 22:15:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1556: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33236 at Tue Sep 27 22:15:16 UTC 2022 kill -USR1 33236 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33236 killed at Tue Sep 27 22:15:17 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:15:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:15:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33286 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33286 found at Tue Sep 27 22:15:17 UTC 2022 selfserv_9223 with PID 33286 started at Tue Sep 27 22:15:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1557: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33286 at Tue Sep 27 22:15:17 UTC 2022 kill -USR1 33286 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33286 killed at Tue Sep 27 22:15:17 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:15:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:15:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33329 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33329 found at Tue Sep 27 22:15:18 UTC 2022 selfserv_9223 with PID 33329 started at Tue Sep 27 22:15:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1558: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 33329 at Tue Sep 27 22:15:18 UTC 2022 kill -USR1 33329 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33329 killed at Tue Sep 27 22:15:18 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:15:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:15:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33380 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33380 found at Tue Sep 27 22:15:18 UTC 2022 selfserv_9223 with PID 33380 started at Tue Sep 27 22:15:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1559: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33380 at Tue Sep 27 22:15:19 UTC 2022 kill -USR1 33380 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33380 killed at Tue Sep 27 22:15:19 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:15:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:15:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33422 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33422 found at Tue Sep 27 22:15:19 UTC 2022 selfserv_9223 with PID 33422 started at Tue Sep 27 22:15:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1560: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 33422 at Tue Sep 27 22:15:19 UTC 2022 kill -USR1 33422 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33422 killed at Tue Sep 27 22:15:19 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:15:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:15:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33461 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33461 found at Tue Sep 27 22:15:20 UTC 2022 selfserv_9223 with PID 33461 started at Tue Sep 27 22:15:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33461 at Tue Sep 27 22:15:20 UTC 2022 kill -USR1 33461 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33461 killed at Tue Sep 27 22:15:20 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:15:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:15:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33500 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33500 found at Tue Sep 27 22:15:21 UTC 2022 selfserv_9223 with PID 33500 started at Tue Sep 27 22:15:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1562: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33500 at Tue Sep 27 22:15:21 UTC 2022 kill -USR1 33500 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33500 killed at Tue Sep 27 22:15:21 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:15:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:15:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33539 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33539 found at Tue Sep 27 22:15:21 UTC 2022 selfserv_9223 with PID 33539 started at Tue Sep 27 22:15:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33539 at Tue Sep 27 22:15:22 UTC 2022 kill -USR1 33539 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33539 killed at Tue Sep 27 22:15:22 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:15:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:15:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33590 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33590 found at Tue Sep 27 22:15:22 UTC 2022 selfserv_9223 with PID 33590 started at Tue Sep 27 22:15:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33590 at Tue Sep 27 22:15:22 UTC 2022 kill -USR1 33590 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33590 killed at Tue Sep 27 22:15:23 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:15:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:15:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33641 found at Tue Sep 27 22:15:23 UTC 2022 selfserv_9223 with PID 33641 started at Tue Sep 27 22:15:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1565: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33641 at Tue Sep 27 22:15:23 UTC 2022 kill -USR1 33641 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33641 killed at Tue Sep 27 22:15:23 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:15:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:15:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33695 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33695 found at Tue Sep 27 22:15:24 UTC 2022 selfserv_9223 with PID 33695 started at Tue Sep 27 22:15:24 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1566: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33695 at Tue Sep 27 22:15:24 UTC 2022 kill -USR1 33695 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33695 killed at Tue Sep 27 22:15:24 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:15:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:15:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33811 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33811 found at Tue Sep 27 22:15:24 UTC 2022 selfserv_9223 with PID 33811 started at Tue Sep 27 22:15:24 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1567: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 33811 at Tue Sep 27 22:15:25 UTC 2022 kill -USR1 33811 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33811 killed at Tue Sep 27 22:15:25 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:15:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:15:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33854 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33854 found at Tue Sep 27 22:15:25 UTC 2022 selfserv_9223 with PID 33854 started at Tue Sep 27 22:15:25 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1568: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33854 at Tue Sep 27 22:15:25 UTC 2022 kill -USR1 33854 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33854 killed at Tue Sep 27 22:15:26 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:15:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:15:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33894 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33894 found at Tue Sep 27 22:15:26 UTC 2022 selfserv_9223 with PID 33894 started at Tue Sep 27 22:15:26 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1569: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 33894 at Tue Sep 27 22:15:26 UTC 2022 kill -USR1 33894 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33894 killed at Tue Sep 27 22:15:26 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:15:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:15:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33936 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33936 found at Tue Sep 27 22:15:27 UTC 2022 selfserv_9223 with PID 33936 started at Tue Sep 27 22:15:27 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1570: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33936 at Tue Sep 27 22:15:27 UTC 2022 kill -USR1 33936 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33936 killed at Tue Sep 27 22:15:27 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:15:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:15:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33976 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33976 found at Tue Sep 27 22:15:27 UTC 2022 selfserv_9223 with PID 33976 started at Tue Sep 27 22:15:27 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1571: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33976 at Tue Sep 27 22:15:28 UTC 2022 kill -USR1 33976 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33976 killed at Tue Sep 27 22:15:28 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:15:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:15:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34016 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34016 found at Tue Sep 27 22:15:28 UTC 2022 selfserv_9223 with PID 34016 started at Tue Sep 27 22:15:28 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1572: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34016 at Tue Sep 27 22:15:28 UTC 2022 kill -USR1 34016 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34016 killed at Tue Sep 27 22:15:29 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:15:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:15:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34057 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34057 found at Tue Sep 27 22:15:29 UTC 2022 selfserv_9223 with PID 34057 started at Tue Sep 27 22:15:29 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1573: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34057 at Tue Sep 27 22:15:29 UTC 2022 kill -USR1 34057 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34057 killed at Tue Sep 27 22:15:29 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 22:15:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 22:15:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34098 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34098 found at Tue Sep 27 22:15:30 UTC 2022 selfserv_9223 with PID 34098 started at Tue Sep 27 22:15:30 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1574: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34098 at Tue Sep 27 22:15:30 UTC 2022 kill -USR1 34098 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34098 killed at Tue Sep 27 22:15:30 UTC 2022 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -fips false -force FIPS mode disabled. ssl.sh: #1575: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/client -list ssl.sh: #1576: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1577: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -fips false -force FIPS mode disabled. ssl.sh: #1578: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/ext_client -list ssl.sh: #1579: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1580: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Tue Sep 27 22:15:31 UTC 2022 Running tests for ocsp TIMESTAMP ocsp BEGIN: Tue Sep 27 22:15:31 UTC 2022 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Tue Sep 27 22:15:31 UTC 2022 Running tests for pkits TIMESTAMP pkits BEGIN: Tue Sep 27 22:15:31 UTC 2022 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Tue Sep 27 22:15:31 UTC 2022 Running tests for chains TIMESTAMP chains BEGIN: Tue Sep 27 22:15:31 UTC 2022 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #1: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221532 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #3: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #4: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #5: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #9: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #10: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #14: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #15: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #16: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9234 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #17: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #18: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #19: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #20: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -2 -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #21: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #22: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #23: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #24: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -2 -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #25: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #26: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #27: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #28: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -2 -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #29: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #30: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #31: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #32: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -2 -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #33: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #34: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #35: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #36: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -2 -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #37: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9234 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #38: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #39: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #40: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -2 -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #41: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #42: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #43: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #44: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -2 -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #45: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #46: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #47: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #48: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -2 -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #49: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9234 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #50: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #51: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #52: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -2 -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #53: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #54: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #55: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #56: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -2 -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #57: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #58: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #59: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #60: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -2 -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #61: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9234 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #62: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #63: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20220927221618Z nextupdate=20230927221619Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Tue Sep 27 22:16:18 2022 Next Update: Wed Sep 27 22:16:19 2023 CRL Extensions: chains.sh: #64: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20220927221619Z addcert 2 20220927221619Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Tue Sep 27 22:16:19 2022 Next Update: Wed Sep 27 22:16:19 2023 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Tue Sep 27 22:16:19 2022 CRL Extensions: chains.sh: #65: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20220927221619Z nextupdate=20230927221619Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Tue Sep 27 22:16:19 2022 Next Update: Wed Sep 27 22:16:19 2023 CRL Extensions: chains.sh: #66: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20220927221620Z addcert 2 20220927221620Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Tue Sep 27 22:16:20 2022 Next Update: Wed Sep 27 22:16:19 2023 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Tue Sep 27 22:16:20 2022 CRL Extensions: chains.sh: #67: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20220927221621Z addcert 4 20220927221621Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Tue Sep 27 22:16:21 2022 Next Update: Wed Sep 27 22:16:19 2023 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Tue Sep 27 22:16:20 2022 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Tue Sep 27 22:16:21 2022 CRL Extensions: chains.sh: #68: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20220927221621Z nextupdate=20230927221621Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Tue Sep 27 22:16:21 2022 Next Update: Wed Sep 27 22:16:21 2023 CRL Extensions: chains.sh: #69: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20220927221622Z addcert 2 20220927221622Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Tue Sep 27 22:16:22 2022 Next Update: Wed Sep 27 22:16:21 2023 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Tue Sep 27 22:16:22 2022 CRL Extensions: chains.sh: #70: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20220927221623Z addcert 3 20220927221623Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Tue Sep 27 22:16:23 2022 Next Update: Wed Sep 27 22:16:21 2023 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Tue Sep 27 22:16:22 2022 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Tue Sep 27 22:16:23 2022 CRL Extensions: chains.sh: #71: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20220927221624Z nextupdate=20230927221624Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Tue Sep 27 22:16:24 2022 Next Update: Wed Sep 27 22:16:24 2023 CRL Extensions: chains.sh: #72: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20220927221625Z addcert 2 20220927221625Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Tue Sep 27 22:16:25 2022 Next Update: Wed Sep 27 22:16:24 2023 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Tue Sep 27 22:16:25 2022 CRL Extensions: chains.sh: #73: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20220927221626Z addcert 3 20220927221626Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Tue Sep 27 22:16:26 2022 Next Update: Wed Sep 27 22:16:24 2023 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Tue Sep 27 22:16:25 2022 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Tue Sep 27 22:16:26 2022 CRL Extensions: chains.sh: #74: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #75: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #76: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #77: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #78: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #79: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #80: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #81: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #82: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #83: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #84: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #85: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #86: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #87: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #88: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #89: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #90: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #91: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #92: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #93: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #94: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #95: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #96: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #97: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #98: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #99: IPsec: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221533 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #100: IPsec: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #101: IPsec: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #102: IPsec: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #103: IPsec: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927221534 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #104: IPsec: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #105: IPsec: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB NoKUDB certutil -N -d NoKUDB -f NoKUDB/dbpasswd chains.sh: #106: IPsec: Creating DB NoKUDB - PASSED chains.sh: Creating EE certifiate request NoKUReq.der certutil -s "CN=NoKU EE, O=NoKU, C=US" -R -2 -d NoKUDB -f NoKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o NoKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #107: IPsec: Creating EE certifiate request NoKUReq.der - PASSED chains.sh: Creating certficate NoKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoKUReq.der -o NoKUCA1.der -f CA1DB/dbpasswd -m 927221535 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #108: IPsec: Creating certficate NoKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoKUCA1.der to NoKUDB database certutil -A -n NoKU -t u,u,u -d NoKUDB -f NoKUDB/dbpasswd -i NoKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #109: IPsec: Importing certificate NoKUCA1.der to NoKUDB database - PASSED chains.sh: Creating DB DigSigDB certutil -N -d DigSigDB -f DigSigDB/dbpasswd chains.sh: #110: IPsec: Creating DB DigSigDB - PASSED chains.sh: Creating EE certifiate request DigSigReq.der certutil -s "CN=DigSig EE, O=DigSig, C=US" -R -2 -d DigSigDB -f DigSigDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o DigSigReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #111: IPsec: Creating EE certifiate request DigSigReq.der - PASSED chains.sh: Creating certficate DigSigCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigReq.der -o DigSigCA1.der -f CA1DB/dbpasswd -m 927221536 --keyUsage digitalSignature < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #112: IPsec: Creating certficate DigSigCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigCA1.der to DigSigDB database certutil -A -n DigSig -t u,u,u -d DigSigDB -f DigSigDB/dbpasswd -i DigSigCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #113: IPsec: Importing certificate DigSigCA1.der to DigSigDB database - PASSED chains.sh: Creating DB NonRepDB certutil -N -d NonRepDB -f NonRepDB/dbpasswd chains.sh: #114: IPsec: Creating DB NonRepDB - PASSED chains.sh: Creating EE certifiate request NonRepReq.der certutil -s "CN=NonRep EE, O=NonRep, C=US" -R -2 -d NonRepDB -f NonRepDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o NonRepReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #115: IPsec: Creating EE certifiate request NonRepReq.der - PASSED chains.sh: Creating certficate NonRepCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonRepReq.der -o NonRepCA1.der -f CA1DB/dbpasswd -m 927221537 --keyUsage nonRepudiation < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #116: IPsec: Creating certficate NonRepCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonRepCA1.der to NonRepDB database certutil -A -n NonRep -t u,u,u -d NonRepDB -f NonRepDB/dbpasswd -i NonRepCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #117: IPsec: Importing certificate NonRepCA1.der to NonRepDB database - PASSED chains.sh: Creating DB DigSigNonRepAndExtraDB certutil -N -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd chains.sh: #118: IPsec: Creating DB DigSigNonRepAndExtraDB - PASSED chains.sh: Creating EE certifiate request DigSigNonRepAndExtraReq.der certutil -s "CN=DigSigNonRepAndExtra EE, O=DigSigNonRepAndExtra, C=US" -R -2 -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o DigSigNonRepAndExtraReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #119: IPsec: Creating EE certifiate request DigSigNonRepAndExtraReq.der - PASSED chains.sh: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigNonRepAndExtraReq.der -o DigSigNonRepAndExtraCA1.der -f CA1DB/dbpasswd -m 927221538 --keyUsage digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #120: IPsec: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database certutil -A -n DigSigNonRepAndExtra -t u,u,u -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -i DigSigNonRepAndExtraCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #121: IPsec: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database - PASSED chains.sh: Creating DB NoMatchDB certutil -N -d NoMatchDB -f NoMatchDB/dbpasswd chains.sh: #122: IPsec: Creating DB NoMatchDB - PASSED chains.sh: Creating EE certifiate request NoMatchReq.der certutil -s "CN=NoMatch EE, O=NoMatch, C=US" -R -2 -d NoMatchDB -f NoMatchDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o NoMatchReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #123: IPsec: Creating EE certifiate request NoMatchReq.der - PASSED chains.sh: Creating certficate NoMatchCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoMatchReq.der -o NoMatchCA1.der -f CA1DB/dbpasswd -m 927221539 --keyUsage keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #124: IPsec: Creating certficate NoMatchCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoMatchCA1.der to NoMatchDB database certutil -A -n NoMatch -t u,u,u -d NoMatchDB -f NoMatchDB/dbpasswd -i NoMatchCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #125: IPsec: Importing certificate NoMatchCA1.der to NoMatchDB database - PASSED chains.sh: Creating DB NonCriticalServerAuthEKUDB certutil -N -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd chains.sh: #126: IPsec: Creating DB NonCriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request NonCriticalServerAuthEKUReq.der certutil -s "CN=NonCriticalServerAuthEKU EE, O=NonCriticalServerAuthEKU, C=US" -R -2 -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o NonCriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #127: IPsec: Creating EE certifiate request NonCriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonCriticalServerAuthEKUReq.der -o NonCriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 927221540 --extKeyUsage serverAuth < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #128: IPsec: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database certutil -A -n NonCriticalServerAuthEKU -t u,u,u -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -i NonCriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #129: IPsec: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB NonIPSECEKUDB certutil -N -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd chains.sh: #130: IPsec: Creating DB NonIPSECEKUDB - PASSED chains.sh: Creating EE certifiate request NonIPSECEKUReq.der certutil -s "CN=NonIPSECEKU EE, O=NonIPSECEKU, C=US" -R -2 -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o NonIPSECEKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #131: IPsec: Creating EE certifiate request NonIPSECEKUReq.der - PASSED chains.sh: Creating certficate NonIPSECEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonIPSECEKUReq.der -o NonIPSECEKUCA1.der -f CA1DB/dbpasswd -m 927221541 --extKeyUsage codeSigning < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #132: IPsec: Creating certficate NonIPSECEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database certutil -A -n NonIPSECEKU -t u,u,u -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -i NonIPSECEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #133: IPsec: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database - PASSED chains.sh: Creating DB CriticalServerAuthEKUDB certutil -N -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd chains.sh: #134: IPsec: Creating DB CriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request CriticalServerAuthEKUReq.der certutil -s "CN=CriticalServerAuthEKU EE, O=CriticalServerAuthEKU, C=US" -R -2 -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #135: IPsec: Creating EE certifiate request CriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CriticalServerAuthEKUReq.der -o CriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 927221542 --keyUsage digitalSignature --extKeyUsage critical,serverAuth < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #136: IPsec: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database certutil -A -n CriticalServerAuthEKU -t u,u,u -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -i CriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #137: IPsec: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB EKUIPsecIKEDB certutil -N -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd chains.sh: #138: IPsec: Creating DB EKUIPsecIKEDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEReq.der certutil -s "CN=EKUIPsecIKE EE, O=EKUIPsecIKE, C=US" -R -2 -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EKUIPsecIKEReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #139: IPsec: Creating EE certifiate request EKUIPsecIKEReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKECA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEReq.der -o EKUIPsecIKECA1.der -f CA1DB/dbpasswd -m 927221543 --keyUsage digitalSignature --extKeyUsage critical,ipsecIKE < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #140: IPsec: Creating certficate EKUIPsecIKECA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database certutil -A -n EKUIPsecIKE -t u,u,u -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -i EKUIPsecIKECA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #141: IPsec: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database - PASSED chains.sh: Creating DB EKUIPsecIKEEndDB certutil -N -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd chains.sh: #142: IPsec: Creating DB EKUIPsecIKEEndDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEEndReq.der certutil -s "CN=EKUIPsecIKEEnd EE, O=EKUIPsecIKEEnd, C=US" -R -2 -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EKUIPsecIKEEndReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #143: IPsec: Creating EE certifiate request EKUIPsecIKEEndReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEEndReq.der -o EKUIPsecIKEEndCA1.der -f CA1DB/dbpasswd -m 927221544 --keyUsage digitalSignature --extKeyUsage ipsecIKEEnd < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #144: IPsec: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database certutil -A -n EKUIPsecIKEEnd -t u,u,u -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -i EKUIPsecIKEEndCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #145: IPsec: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database - PASSED chains.sh: Creating DB EKUIPsecIKEIntermediateDB certutil -N -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd chains.sh: #146: IPsec: Creating DB EKUIPsecIKEIntermediateDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der certutil -s "CN=EKUIPsecIKEIntermediate EE, O=EKUIPsecIKEIntermediate, C=US" -R -2 -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EKUIPsecIKEIntermediateReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #147: IPsec: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEIntermediateReq.der -o EKUIPsecIKEIntermediateCA1.der -f CA1DB/dbpasswd -m 927221545 --keyUsage digitalSignature --extKeyUsage codeSigning,serverAuth,ipsecIKEIntermediate < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #148: IPsec: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database certutil -A -n EKUIPsecIKEIntermediate -t u,u,u -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -i EKUIPsecIKEIntermediateCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #149: IPsec: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database - PASSED chains.sh: Creating DB EKUAnyDB certutil -N -d EKUAnyDB -f EKUAnyDB/dbpasswd chains.sh: #150: IPsec: Creating DB EKUAnyDB - PASSED chains.sh: Creating EE certifiate request EKUAnyReq.der certutil -s "CN=EKUAny EE, O=EKUAny, C=US" -R -2 -d EKUAnyDB -f EKUAnyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EKUAnyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #151: IPsec: Creating EE certifiate request EKUAnyReq.der - PASSED chains.sh: Creating certficate EKUAnyCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUAnyReq.der -o EKUAnyCA1.der -f CA1DB/dbpasswd -m 927221546 --keyUsage digitalSignature --extKeyUsage x509Any < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #152: IPsec: Creating certficate EKUAnyCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUAnyCA1.der to EKUAnyDB database certutil -A -n EKUAny -t u,u,u -d EKUAnyDB -f EKUAnyDB/dbpasswd -i EKUAnyCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #153: IPsec: Importing certificate EKUAnyCA1.der to EKUAnyDB database - PASSED chains.sh: Creating DB EKUEmailDB certutil -N -d EKUEmailDB -f EKUEmailDB/dbpasswd chains.sh: #154: IPsec: Creating DB EKUEmailDB - PASSED chains.sh: Creating EE certifiate request EKUEmailReq.der certutil -s "CN=EKUEmail EE, O=EKUEmail, C=US" -R -2 -d EKUEmailDB -f EKUEmailDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EKUEmailReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #155: IPsec: Creating EE certifiate request EKUEmailReq.der - PASSED chains.sh: Creating certficate EKUEmailCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUEmailReq.der -o EKUEmailCA1.der -f CA1DB/dbpasswd -m 927221547 --keyUsage digitalSignature --extKeyUsage emailProtection < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #156: IPsec: Creating certficate EKUEmailCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUEmailCA1.der to EKUEmailDB database certutil -A -n EKUEmail -t u,u,u -d EKUEmailDB -f EKUEmailDB/dbpasswd -i EKUEmailCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #157: IPsec: Importing certificate EKUEmailCA1.der to EKUEmailDB database - PASSED chains.sh: Creating DB EKUIPsecUserDB certutil -N -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd chains.sh: #158: IPsec: Creating DB EKUIPsecUserDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecUserReq.der certutil -s "CN=EKUIPsecUser EE, O=EKUIPsecUser, C=US" -R -2 -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EKUIPsecUserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #159: IPsec: Creating EE certifiate request EKUIPsecUserReq.der - PASSED chains.sh: Creating certficate EKUIPsecUserCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecUserReq.der -o EKUIPsecUserCA1.der -f CA1DB/dbpasswd -m 927221548 --keyUsage digitalSignature --extKeyUsage ipsecUser < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #160: IPsec: Creating certficate EKUIPsecUserCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database certutil -A -n EKUIPsecUser -t u,u,u -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -i EKUIPsecUserCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #161: IPsec: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #162: IPsec: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,," -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #163: IPsec: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #164: IPsec: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221533 (0x3744471d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:16:55 2022 Not After : Tue Sep 27 22:16:55 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6f:13:61:a3:2d:6d:65:6f:9d:77:b0:ac:c5:dc:a4: 2e:6f:ef:19:b7:b5:a3:ce:70:9c:1b:a7:45:a6:b4:d3: c5:6c:e4:8e:f1:d9:a2:6c:f9:21:8c:14:8d:f5:49:d7: 6f:cd:69:fd:f1:20:93:09:33:bc:9b:00:4e:94:66:fd: ba:6f:fd:6a:53:72:a9:d3:b3:5c:71:4f:b7:da:b1:a1: db:05:a8:18:d4:02:23:c0:90:2b:b5:24:69:58:ac:f0: c4:cd:59:60:84:0c:b5:6a:1c:2f:06:c3:a6:78:97:90: 85:6c:8b:e6:1b:52:fb:bf:84:75:cd:28:1d:63:a3:84: 8c:b0:e2:c7:29:f5:78:f7:e4:1f:fc:7b:e6:8c:24:b9: 32:3a:d5:ef:5c:78:f4:9f:a2:72:3b:d4:c4:b3:e3:b7: db:a4:f8:5d:e9:7f:45:09:06:1e:cd:2d:bd:93:7d:31: d0:e7:eb:ac:ac:aa:d5:df:63:b7:10:2f:61:af:51:93: 15:83:02:b3:dd:cd:d8:2b:4f:f4:74:91:10:06:56:c2: 7e:f7:af:aa:a9:b3:70:23:2c:c3:01:26:de:98:fa:7a: 22:c7:79:87:a9:4b:61:1f:53:dc:2f:f5:da:44:d4:cd: 19:b2:03:fe:11:02:c7:28:7a:9a:6e:9a:22:48:87:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:30:4b:40:3e:c7:05:36:18:60:89:25:ce:9f:f0:7e: 87:41:d1:91:bd:2e:26:69:9e:98:43:89:d9:77:6d:d5: 4e:b1:31:2b:fc:a8:6e:62:96:05:c6:b2:b2:e1:07:2a: eb:9c:08:a8:b4:f4:ea:d4:4c:4f:af:4e:72:5f:13:e4: 5f:41:ab:dc:56:12:91:e7:20:bd:7a:de:cc:2b:09:33: e1:d6:2b:13:9b:ee:db:49:cd:b2:d6:db:5d:ba:10:7b: cb:2e:89:ea:93:e8:1a:5e:49:19:49:02:be:7f:29:97: 63:0d:ac:1b:ee:39:68:5c:1e:3e:cf:71:8f:1e:8e:a7: ec:6c:af:6b:92:5a:f8:ce:83:ac:34:30:08:80:67:40: d1:05:d5:a4:b3:03:cd:41:4e:3e:79:97:b6:f6:bd:44: 5f:c5:56:7c:c9:33:33:18:21:f4:dd:8d:c0:1a:fe:bb: 26:53:ad:c2:95:95:c9:6f:8b:85:d3:55:c9:ea:0a:71: b0:7e:43:90:92:68:dd:47:b1:0c:94:f2:be:55:70:ae: e6:24:04:6b:e9:8c:0a:59:bf:74:cd:6e:f7:b1:d5:17: 52:9b:eb:9c:d3:65:b8:51:aa:eb:1b:be:3a:7b:50:ad: 60:7f:f4:93:14:8e:2d:09:e3:0d:44:8a:77:15:f0:a3 Fingerprint (SHA-256): 2E:F0:21:4E:46:CF:F2:17:AC:EF:07:BF:78:EF:C0:6D:66:BB:F8:1E:F6:9E:C0:E0:17:11:A4:31:22:DF:8A:D4 Fingerprint (SHA1): F0:48:78:51:2C:B5:72:9C:CB:B7:67:D2:38:82:AB:5E:1D:78:CA:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NoKU EE,O=NoKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #165: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #166: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #167: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221533 (0x3744471d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:16:55 2022 Not After : Tue Sep 27 22:16:55 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6f:13:61:a3:2d:6d:65:6f:9d:77:b0:ac:c5:dc:a4: 2e:6f:ef:19:b7:b5:a3:ce:70:9c:1b:a7:45:a6:b4:d3: c5:6c:e4:8e:f1:d9:a2:6c:f9:21:8c:14:8d:f5:49:d7: 6f:cd:69:fd:f1:20:93:09:33:bc:9b:00:4e:94:66:fd: ba:6f:fd:6a:53:72:a9:d3:b3:5c:71:4f:b7:da:b1:a1: db:05:a8:18:d4:02:23:c0:90:2b:b5:24:69:58:ac:f0: c4:cd:59:60:84:0c:b5:6a:1c:2f:06:c3:a6:78:97:90: 85:6c:8b:e6:1b:52:fb:bf:84:75:cd:28:1d:63:a3:84: 8c:b0:e2:c7:29:f5:78:f7:e4:1f:fc:7b:e6:8c:24:b9: 32:3a:d5:ef:5c:78:f4:9f:a2:72:3b:d4:c4:b3:e3:b7: db:a4:f8:5d:e9:7f:45:09:06:1e:cd:2d:bd:93:7d:31: d0:e7:eb:ac:ac:aa:d5:df:63:b7:10:2f:61:af:51:93: 15:83:02:b3:dd:cd:d8:2b:4f:f4:74:91:10:06:56:c2: 7e:f7:af:aa:a9:b3:70:23:2c:c3:01:26:de:98:fa:7a: 22:c7:79:87:a9:4b:61:1f:53:dc:2f:f5:da:44:d4:cd: 19:b2:03:fe:11:02:c7:28:7a:9a:6e:9a:22:48:87:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:30:4b:40:3e:c7:05:36:18:60:89:25:ce:9f:f0:7e: 87:41:d1:91:bd:2e:26:69:9e:98:43:89:d9:77:6d:d5: 4e:b1:31:2b:fc:a8:6e:62:96:05:c6:b2:b2:e1:07:2a: eb:9c:08:a8:b4:f4:ea:d4:4c:4f:af:4e:72:5f:13:e4: 5f:41:ab:dc:56:12:91:e7:20:bd:7a:de:cc:2b:09:33: e1:d6:2b:13:9b:ee:db:49:cd:b2:d6:db:5d:ba:10:7b: cb:2e:89:ea:93:e8:1a:5e:49:19:49:02:be:7f:29:97: 63:0d:ac:1b:ee:39:68:5c:1e:3e:cf:71:8f:1e:8e:a7: ec:6c:af:6b:92:5a:f8:ce:83:ac:34:30:08:80:67:40: d1:05:d5:a4:b3:03:cd:41:4e:3e:79:97:b6:f6:bd:44: 5f:c5:56:7c:c9:33:33:18:21:f4:dd:8d:c0:1a:fe:bb: 26:53:ad:c2:95:95:c9:6f:8b:85:d3:55:c9:ea:0a:71: b0:7e:43:90:92:68:dd:47:b1:0c:94:f2:be:55:70:ae: e6:24:04:6b:e9:8c:0a:59:bf:74:cd:6e:f7:b1:d5:17: 52:9b:eb:9c:d3:65:b8:51:aa:eb:1b:be:3a:7b:50:ad: 60:7f:f4:93:14:8e:2d:09:e3:0d:44:8a:77:15:f0:a3 Fingerprint (SHA-256): 2E:F0:21:4E:46:CF:F2:17:AC:EF:07:BF:78:EF:C0:6D:66:BB:F8:1E:F6:9E:C0:E0:17:11:A4:31:22:DF:8A:D4 Fingerprint (SHA1): F0:48:78:51:2C:B5:72:9C:CB:B7:67:D2:38:82:AB:5E:1D:78:CA:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSig EE,O=DigSig,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #168: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #169: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #170: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonRepCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221533 (0x3744471d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:16:55 2022 Not After : Tue Sep 27 22:16:55 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6f:13:61:a3:2d:6d:65:6f:9d:77:b0:ac:c5:dc:a4: 2e:6f:ef:19:b7:b5:a3:ce:70:9c:1b:a7:45:a6:b4:d3: c5:6c:e4:8e:f1:d9:a2:6c:f9:21:8c:14:8d:f5:49:d7: 6f:cd:69:fd:f1:20:93:09:33:bc:9b:00:4e:94:66:fd: ba:6f:fd:6a:53:72:a9:d3:b3:5c:71:4f:b7:da:b1:a1: db:05:a8:18:d4:02:23:c0:90:2b:b5:24:69:58:ac:f0: c4:cd:59:60:84:0c:b5:6a:1c:2f:06:c3:a6:78:97:90: 85:6c:8b:e6:1b:52:fb:bf:84:75:cd:28:1d:63:a3:84: 8c:b0:e2:c7:29:f5:78:f7:e4:1f:fc:7b:e6:8c:24:b9: 32:3a:d5:ef:5c:78:f4:9f:a2:72:3b:d4:c4:b3:e3:b7: db:a4:f8:5d:e9:7f:45:09:06:1e:cd:2d:bd:93:7d:31: d0:e7:eb:ac:ac:aa:d5:df:63:b7:10:2f:61:af:51:93: 15:83:02:b3:dd:cd:d8:2b:4f:f4:74:91:10:06:56:c2: 7e:f7:af:aa:a9:b3:70:23:2c:c3:01:26:de:98:fa:7a: 22:c7:79:87:a9:4b:61:1f:53:dc:2f:f5:da:44:d4:cd: 19:b2:03:fe:11:02:c7:28:7a:9a:6e:9a:22:48:87:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:30:4b:40:3e:c7:05:36:18:60:89:25:ce:9f:f0:7e: 87:41:d1:91:bd:2e:26:69:9e:98:43:89:d9:77:6d:d5: 4e:b1:31:2b:fc:a8:6e:62:96:05:c6:b2:b2:e1:07:2a: eb:9c:08:a8:b4:f4:ea:d4:4c:4f:af:4e:72:5f:13:e4: 5f:41:ab:dc:56:12:91:e7:20:bd:7a:de:cc:2b:09:33: e1:d6:2b:13:9b:ee:db:49:cd:b2:d6:db:5d:ba:10:7b: cb:2e:89:ea:93:e8:1a:5e:49:19:49:02:be:7f:29:97: 63:0d:ac:1b:ee:39:68:5c:1e:3e:cf:71:8f:1e:8e:a7: ec:6c:af:6b:92:5a:f8:ce:83:ac:34:30:08:80:67:40: d1:05:d5:a4:b3:03:cd:41:4e:3e:79:97:b6:f6:bd:44: 5f:c5:56:7c:c9:33:33:18:21:f4:dd:8d:c0:1a:fe:bb: 26:53:ad:c2:95:95:c9:6f:8b:85:d3:55:c9:ea:0a:71: b0:7e:43:90:92:68:dd:47:b1:0c:94:f2:be:55:70:ae: e6:24:04:6b:e9:8c:0a:59:bf:74:cd:6e:f7:b1:d5:17: 52:9b:eb:9c:d3:65:b8:51:aa:eb:1b:be:3a:7b:50:ad: 60:7f:f4:93:14:8e:2d:09:e3:0d:44:8a:77:15:f0:a3 Fingerprint (SHA-256): 2E:F0:21:4E:46:CF:F2:17:AC:EF:07:BF:78:EF:C0:6D:66:BB:F8:1E:F6:9E:C0:E0:17:11:A4:31:22:DF:8A:D4 Fingerprint (SHA1): F0:48:78:51:2C:B5:72:9C:CB:B7:67:D2:38:82:AB:5E:1D:78:CA:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonRep EE,O=NonRep,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #171: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #172: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #173: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221533 (0x3744471d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:16:55 2022 Not After : Tue Sep 27 22:16:55 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6f:13:61:a3:2d:6d:65:6f:9d:77:b0:ac:c5:dc:a4: 2e:6f:ef:19:b7:b5:a3:ce:70:9c:1b:a7:45:a6:b4:d3: c5:6c:e4:8e:f1:d9:a2:6c:f9:21:8c:14:8d:f5:49:d7: 6f:cd:69:fd:f1:20:93:09:33:bc:9b:00:4e:94:66:fd: ba:6f:fd:6a:53:72:a9:d3:b3:5c:71:4f:b7:da:b1:a1: db:05:a8:18:d4:02:23:c0:90:2b:b5:24:69:58:ac:f0: c4:cd:59:60:84:0c:b5:6a:1c:2f:06:c3:a6:78:97:90: 85:6c:8b:e6:1b:52:fb:bf:84:75:cd:28:1d:63:a3:84: 8c:b0:e2:c7:29:f5:78:f7:e4:1f:fc:7b:e6:8c:24:b9: 32:3a:d5:ef:5c:78:f4:9f:a2:72:3b:d4:c4:b3:e3:b7: db:a4:f8:5d:e9:7f:45:09:06:1e:cd:2d:bd:93:7d:31: d0:e7:eb:ac:ac:aa:d5:df:63:b7:10:2f:61:af:51:93: 15:83:02:b3:dd:cd:d8:2b:4f:f4:74:91:10:06:56:c2: 7e:f7:af:aa:a9:b3:70:23:2c:c3:01:26:de:98:fa:7a: 22:c7:79:87:a9:4b:61:1f:53:dc:2f:f5:da:44:d4:cd: 19:b2:03:fe:11:02:c7:28:7a:9a:6e:9a:22:48:87:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:30:4b:40:3e:c7:05:36:18:60:89:25:ce:9f:f0:7e: 87:41:d1:91:bd:2e:26:69:9e:98:43:89:d9:77:6d:d5: 4e:b1:31:2b:fc:a8:6e:62:96:05:c6:b2:b2:e1:07:2a: eb:9c:08:a8:b4:f4:ea:d4:4c:4f:af:4e:72:5f:13:e4: 5f:41:ab:dc:56:12:91:e7:20:bd:7a:de:cc:2b:09:33: e1:d6:2b:13:9b:ee:db:49:cd:b2:d6:db:5d:ba:10:7b: cb:2e:89:ea:93:e8:1a:5e:49:19:49:02:be:7f:29:97: 63:0d:ac:1b:ee:39:68:5c:1e:3e:cf:71:8f:1e:8e:a7: ec:6c:af:6b:92:5a:f8:ce:83:ac:34:30:08:80:67:40: d1:05:d5:a4:b3:03:cd:41:4e:3e:79:97:b6:f6:bd:44: 5f:c5:56:7c:c9:33:33:18:21:f4:dd:8d:c0:1a:fe:bb: 26:53:ad:c2:95:95:c9:6f:8b:85:d3:55:c9:ea:0a:71: b0:7e:43:90:92:68:dd:47:b1:0c:94:f2:be:55:70:ae: e6:24:04:6b:e9:8c:0a:59:bf:74:cd:6e:f7:b1:d5:17: 52:9b:eb:9c:d3:65:b8:51:aa:eb:1b:be:3a:7b:50:ad: 60:7f:f4:93:14:8e:2d:09:e3:0d:44:8a:77:15:f0:a3 Fingerprint (SHA-256): 2E:F0:21:4E:46:CF:F2:17:AC:EF:07:BF:78:EF:C0:6D:66:BB:F8:1E:F6:9E:C0:E0:17:11:A4:31:22:DF:8A:D4 Fingerprint (SHA1): F0:48:78:51:2C:B5:72:9C:CB:B7:67:D2:38:82:AB:5E:1D:78:CA:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSigNonRepAndExtra EE,O=DigSigNonRepAndExtra,C=U S" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #174: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #175: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #176: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #177: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #178: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #179: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #180: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #181: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #182: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221533 (0x3744471d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:16:55 2022 Not After : Tue Sep 27 22:16:55 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6f:13:61:a3:2d:6d:65:6f:9d:77:b0:ac:c5:dc:a4: 2e:6f:ef:19:b7:b5:a3:ce:70:9c:1b:a7:45:a6:b4:d3: c5:6c:e4:8e:f1:d9:a2:6c:f9:21:8c:14:8d:f5:49:d7: 6f:cd:69:fd:f1:20:93:09:33:bc:9b:00:4e:94:66:fd: ba:6f:fd:6a:53:72:a9:d3:b3:5c:71:4f:b7:da:b1:a1: db:05:a8:18:d4:02:23:c0:90:2b:b5:24:69:58:ac:f0: c4:cd:59:60:84:0c:b5:6a:1c:2f:06:c3:a6:78:97:90: 85:6c:8b:e6:1b:52:fb:bf:84:75:cd:28:1d:63:a3:84: 8c:b0:e2:c7:29:f5:78:f7:e4:1f:fc:7b:e6:8c:24:b9: 32:3a:d5:ef:5c:78:f4:9f:a2:72:3b:d4:c4:b3:e3:b7: db:a4:f8:5d:e9:7f:45:09:06:1e:cd:2d:bd:93:7d:31: d0:e7:eb:ac:ac:aa:d5:df:63:b7:10:2f:61:af:51:93: 15:83:02:b3:dd:cd:d8:2b:4f:f4:74:91:10:06:56:c2: 7e:f7:af:aa:a9:b3:70:23:2c:c3:01:26:de:98:fa:7a: 22:c7:79:87:a9:4b:61:1f:53:dc:2f:f5:da:44:d4:cd: 19:b2:03:fe:11:02:c7:28:7a:9a:6e:9a:22:48:87:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:30:4b:40:3e:c7:05:36:18:60:89:25:ce:9f:f0:7e: 87:41:d1:91:bd:2e:26:69:9e:98:43:89:d9:77:6d:d5: 4e:b1:31:2b:fc:a8:6e:62:96:05:c6:b2:b2:e1:07:2a: eb:9c:08:a8:b4:f4:ea:d4:4c:4f:af:4e:72:5f:13:e4: 5f:41:ab:dc:56:12:91:e7:20:bd:7a:de:cc:2b:09:33: e1:d6:2b:13:9b:ee:db:49:cd:b2:d6:db:5d:ba:10:7b: cb:2e:89:ea:93:e8:1a:5e:49:19:49:02:be:7f:29:97: 63:0d:ac:1b:ee:39:68:5c:1e:3e:cf:71:8f:1e:8e:a7: ec:6c:af:6b:92:5a:f8:ce:83:ac:34:30:08:80:67:40: d1:05:d5:a4:b3:03:cd:41:4e:3e:79:97:b6:f6:bd:44: 5f:c5:56:7c:c9:33:33:18:21:f4:dd:8d:c0:1a:fe:bb: 26:53:ad:c2:95:95:c9:6f:8b:85:d3:55:c9:ea:0a:71: b0:7e:43:90:92:68:dd:47:b1:0c:94:f2:be:55:70:ae: e6:24:04:6b:e9:8c:0a:59:bf:74:cd:6e:f7:b1:d5:17: 52:9b:eb:9c:d3:65:b8:51:aa:eb:1b:be:3a:7b:50:ad: 60:7f:f4:93:14:8e:2d:09:e3:0d:44:8a:77:15:f0:a3 Fingerprint (SHA-256): 2E:F0:21:4E:46:CF:F2:17:AC:EF:07:BF:78:EF:C0:6D:66:BB:F8:1E:F6:9E:C0:E0:17:11:A4:31:22:DF:8A:D4 Fingerprint (SHA1): F0:48:78:51:2C:B5:72:9C:CB:B7:67:D2:38:82:AB:5E:1D:78:CA:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonCriticalServerAuthEKU EE,O=NonCriticalServerAut hEKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #183: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #184: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #185: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221533 (0x3744471d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:16:55 2022 Not After : Tue Sep 27 22:16:55 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6f:13:61:a3:2d:6d:65:6f:9d:77:b0:ac:c5:dc:a4: 2e:6f:ef:19:b7:b5:a3:ce:70:9c:1b:a7:45:a6:b4:d3: c5:6c:e4:8e:f1:d9:a2:6c:f9:21:8c:14:8d:f5:49:d7: 6f:cd:69:fd:f1:20:93:09:33:bc:9b:00:4e:94:66:fd: ba:6f:fd:6a:53:72:a9:d3:b3:5c:71:4f:b7:da:b1:a1: db:05:a8:18:d4:02:23:c0:90:2b:b5:24:69:58:ac:f0: c4:cd:59:60:84:0c:b5:6a:1c:2f:06:c3:a6:78:97:90: 85:6c:8b:e6:1b:52:fb:bf:84:75:cd:28:1d:63:a3:84: 8c:b0:e2:c7:29:f5:78:f7:e4:1f:fc:7b:e6:8c:24:b9: 32:3a:d5:ef:5c:78:f4:9f:a2:72:3b:d4:c4:b3:e3:b7: db:a4:f8:5d:e9:7f:45:09:06:1e:cd:2d:bd:93:7d:31: d0:e7:eb:ac:ac:aa:d5:df:63:b7:10:2f:61:af:51:93: 15:83:02:b3:dd:cd:d8:2b:4f:f4:74:91:10:06:56:c2: 7e:f7:af:aa:a9:b3:70:23:2c:c3:01:26:de:98:fa:7a: 22:c7:79:87:a9:4b:61:1f:53:dc:2f:f5:da:44:d4:cd: 19:b2:03:fe:11:02:c7:28:7a:9a:6e:9a:22:48:87:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:30:4b:40:3e:c7:05:36:18:60:89:25:ce:9f:f0:7e: 87:41:d1:91:bd:2e:26:69:9e:98:43:89:d9:77:6d:d5: 4e:b1:31:2b:fc:a8:6e:62:96:05:c6:b2:b2:e1:07:2a: eb:9c:08:a8:b4:f4:ea:d4:4c:4f:af:4e:72:5f:13:e4: 5f:41:ab:dc:56:12:91:e7:20:bd:7a:de:cc:2b:09:33: e1:d6:2b:13:9b:ee:db:49:cd:b2:d6:db:5d:ba:10:7b: cb:2e:89:ea:93:e8:1a:5e:49:19:49:02:be:7f:29:97: 63:0d:ac:1b:ee:39:68:5c:1e:3e:cf:71:8f:1e:8e:a7: ec:6c:af:6b:92:5a:f8:ce:83:ac:34:30:08:80:67:40: d1:05:d5:a4:b3:03:cd:41:4e:3e:79:97:b6:f6:bd:44: 5f:c5:56:7c:c9:33:33:18:21:f4:dd:8d:c0:1a:fe:bb: 26:53:ad:c2:95:95:c9:6f:8b:85:d3:55:c9:ea:0a:71: b0:7e:43:90:92:68:dd:47:b1:0c:94:f2:be:55:70:ae: e6:24:04:6b:e9:8c:0a:59:bf:74:cd:6e:f7:b1:d5:17: 52:9b:eb:9c:d3:65:b8:51:aa:eb:1b:be:3a:7b:50:ad: 60:7f:f4:93:14:8e:2d:09:e3:0d:44:8a:77:15:f0:a3 Fingerprint (SHA-256): 2E:F0:21:4E:46:CF:F2:17:AC:EF:07:BF:78:EF:C0:6D:66:BB:F8:1E:F6:9E:C0:E0:17:11:A4:31:22:DF:8A:D4 Fingerprint (SHA1): F0:48:78:51:2C:B5:72:9C:CB:B7:67:D2:38:82:AB:5E:1D:78:CA:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=CriticalServerAuthEKU EE,O=CriticalServerAuthEKU,C =US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #186: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #187: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #188: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKECA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221533 (0x3744471d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:16:55 2022 Not After : Tue Sep 27 22:16:55 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6f:13:61:a3:2d:6d:65:6f:9d:77:b0:ac:c5:dc:a4: 2e:6f:ef:19:b7:b5:a3:ce:70:9c:1b:a7:45:a6:b4:d3: c5:6c:e4:8e:f1:d9:a2:6c:f9:21:8c:14:8d:f5:49:d7: 6f:cd:69:fd:f1:20:93:09:33:bc:9b:00:4e:94:66:fd: ba:6f:fd:6a:53:72:a9:d3:b3:5c:71:4f:b7:da:b1:a1: db:05:a8:18:d4:02:23:c0:90:2b:b5:24:69:58:ac:f0: c4:cd:59:60:84:0c:b5:6a:1c:2f:06:c3:a6:78:97:90: 85:6c:8b:e6:1b:52:fb:bf:84:75:cd:28:1d:63:a3:84: 8c:b0:e2:c7:29:f5:78:f7:e4:1f:fc:7b:e6:8c:24:b9: 32:3a:d5:ef:5c:78:f4:9f:a2:72:3b:d4:c4:b3:e3:b7: db:a4:f8:5d:e9:7f:45:09:06:1e:cd:2d:bd:93:7d:31: d0:e7:eb:ac:ac:aa:d5:df:63:b7:10:2f:61:af:51:93: 15:83:02:b3:dd:cd:d8:2b:4f:f4:74:91:10:06:56:c2: 7e:f7:af:aa:a9:b3:70:23:2c:c3:01:26:de:98:fa:7a: 22:c7:79:87:a9:4b:61:1f:53:dc:2f:f5:da:44:d4:cd: 19:b2:03:fe:11:02:c7:28:7a:9a:6e:9a:22:48:87:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:30:4b:40:3e:c7:05:36:18:60:89:25:ce:9f:f0:7e: 87:41:d1:91:bd:2e:26:69:9e:98:43:89:d9:77:6d:d5: 4e:b1:31:2b:fc:a8:6e:62:96:05:c6:b2:b2:e1:07:2a: eb:9c:08:a8:b4:f4:ea:d4:4c:4f:af:4e:72:5f:13:e4: 5f:41:ab:dc:56:12:91:e7:20:bd:7a:de:cc:2b:09:33: e1:d6:2b:13:9b:ee:db:49:cd:b2:d6:db:5d:ba:10:7b: cb:2e:89:ea:93:e8:1a:5e:49:19:49:02:be:7f:29:97: 63:0d:ac:1b:ee:39:68:5c:1e:3e:cf:71:8f:1e:8e:a7: ec:6c:af:6b:92:5a:f8:ce:83:ac:34:30:08:80:67:40: d1:05:d5:a4:b3:03:cd:41:4e:3e:79:97:b6:f6:bd:44: 5f:c5:56:7c:c9:33:33:18:21:f4:dd:8d:c0:1a:fe:bb: 26:53:ad:c2:95:95:c9:6f:8b:85:d3:55:c9:ea:0a:71: b0:7e:43:90:92:68:dd:47:b1:0c:94:f2:be:55:70:ae: e6:24:04:6b:e9:8c:0a:59:bf:74:cd:6e:f7:b1:d5:17: 52:9b:eb:9c:d3:65:b8:51:aa:eb:1b:be:3a:7b:50:ad: 60:7f:f4:93:14:8e:2d:09:e3:0d:44:8a:77:15:f0:a3 Fingerprint (SHA-256): 2E:F0:21:4E:46:CF:F2:17:AC:EF:07:BF:78:EF:C0:6D:66:BB:F8:1E:F6:9E:C0:E0:17:11:A4:31:22:DF:8A:D4 Fingerprint (SHA1): F0:48:78:51:2C:B5:72:9C:CB:B7:67:D2:38:82:AB:5E:1D:78:CA:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKE EE,O=EKUIPsecIKE,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #189: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #190: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #191: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221533 (0x3744471d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:16:55 2022 Not After : Tue Sep 27 22:16:55 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6f:13:61:a3:2d:6d:65:6f:9d:77:b0:ac:c5:dc:a4: 2e:6f:ef:19:b7:b5:a3:ce:70:9c:1b:a7:45:a6:b4:d3: c5:6c:e4:8e:f1:d9:a2:6c:f9:21:8c:14:8d:f5:49:d7: 6f:cd:69:fd:f1:20:93:09:33:bc:9b:00:4e:94:66:fd: ba:6f:fd:6a:53:72:a9:d3:b3:5c:71:4f:b7:da:b1:a1: db:05:a8:18:d4:02:23:c0:90:2b:b5:24:69:58:ac:f0: c4:cd:59:60:84:0c:b5:6a:1c:2f:06:c3:a6:78:97:90: 85:6c:8b:e6:1b:52:fb:bf:84:75:cd:28:1d:63:a3:84: 8c:b0:e2:c7:29:f5:78:f7:e4:1f:fc:7b:e6:8c:24:b9: 32:3a:d5:ef:5c:78:f4:9f:a2:72:3b:d4:c4:b3:e3:b7: db:a4:f8:5d:e9:7f:45:09:06:1e:cd:2d:bd:93:7d:31: d0:e7:eb:ac:ac:aa:d5:df:63:b7:10:2f:61:af:51:93: 15:83:02:b3:dd:cd:d8:2b:4f:f4:74:91:10:06:56:c2: 7e:f7:af:aa:a9:b3:70:23:2c:c3:01:26:de:98:fa:7a: 22:c7:79:87:a9:4b:61:1f:53:dc:2f:f5:da:44:d4:cd: 19:b2:03:fe:11:02:c7:28:7a:9a:6e:9a:22:48:87:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:30:4b:40:3e:c7:05:36:18:60:89:25:ce:9f:f0:7e: 87:41:d1:91:bd:2e:26:69:9e:98:43:89:d9:77:6d:d5: 4e:b1:31:2b:fc:a8:6e:62:96:05:c6:b2:b2:e1:07:2a: eb:9c:08:a8:b4:f4:ea:d4:4c:4f:af:4e:72:5f:13:e4: 5f:41:ab:dc:56:12:91:e7:20:bd:7a:de:cc:2b:09:33: e1:d6:2b:13:9b:ee:db:49:cd:b2:d6:db:5d:ba:10:7b: cb:2e:89:ea:93:e8:1a:5e:49:19:49:02:be:7f:29:97: 63:0d:ac:1b:ee:39:68:5c:1e:3e:cf:71:8f:1e:8e:a7: ec:6c:af:6b:92:5a:f8:ce:83:ac:34:30:08:80:67:40: d1:05:d5:a4:b3:03:cd:41:4e:3e:79:97:b6:f6:bd:44: 5f:c5:56:7c:c9:33:33:18:21:f4:dd:8d:c0:1a:fe:bb: 26:53:ad:c2:95:95:c9:6f:8b:85:d3:55:c9:ea:0a:71: b0:7e:43:90:92:68:dd:47:b1:0c:94:f2:be:55:70:ae: e6:24:04:6b:e9:8c:0a:59:bf:74:cd:6e:f7:b1:d5:17: 52:9b:eb:9c:d3:65:b8:51:aa:eb:1b:be:3a:7b:50:ad: 60:7f:f4:93:14:8e:2d:09:e3:0d:44:8a:77:15:f0:a3 Fingerprint (SHA-256): 2E:F0:21:4E:46:CF:F2:17:AC:EF:07:BF:78:EF:C0:6D:66:BB:F8:1E:F6:9E:C0:E0:17:11:A4:31:22:DF:8A:D4 Fingerprint (SHA1): F0:48:78:51:2C:B5:72:9C:CB:B7:67:D2:38:82:AB:5E:1D:78:CA:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEEnd EE,O=EKUIPsecIKEEnd,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #192: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #193: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #194: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221533 (0x3744471d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:16:55 2022 Not After : Tue Sep 27 22:16:55 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6f:13:61:a3:2d:6d:65:6f:9d:77:b0:ac:c5:dc:a4: 2e:6f:ef:19:b7:b5:a3:ce:70:9c:1b:a7:45:a6:b4:d3: c5:6c:e4:8e:f1:d9:a2:6c:f9:21:8c:14:8d:f5:49:d7: 6f:cd:69:fd:f1:20:93:09:33:bc:9b:00:4e:94:66:fd: ba:6f:fd:6a:53:72:a9:d3:b3:5c:71:4f:b7:da:b1:a1: db:05:a8:18:d4:02:23:c0:90:2b:b5:24:69:58:ac:f0: c4:cd:59:60:84:0c:b5:6a:1c:2f:06:c3:a6:78:97:90: 85:6c:8b:e6:1b:52:fb:bf:84:75:cd:28:1d:63:a3:84: 8c:b0:e2:c7:29:f5:78:f7:e4:1f:fc:7b:e6:8c:24:b9: 32:3a:d5:ef:5c:78:f4:9f:a2:72:3b:d4:c4:b3:e3:b7: db:a4:f8:5d:e9:7f:45:09:06:1e:cd:2d:bd:93:7d:31: d0:e7:eb:ac:ac:aa:d5:df:63:b7:10:2f:61:af:51:93: 15:83:02:b3:dd:cd:d8:2b:4f:f4:74:91:10:06:56:c2: 7e:f7:af:aa:a9:b3:70:23:2c:c3:01:26:de:98:fa:7a: 22:c7:79:87:a9:4b:61:1f:53:dc:2f:f5:da:44:d4:cd: 19:b2:03:fe:11:02:c7:28:7a:9a:6e:9a:22:48:87:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:30:4b:40:3e:c7:05:36:18:60:89:25:ce:9f:f0:7e: 87:41:d1:91:bd:2e:26:69:9e:98:43:89:d9:77:6d:d5: 4e:b1:31:2b:fc:a8:6e:62:96:05:c6:b2:b2:e1:07:2a: eb:9c:08:a8:b4:f4:ea:d4:4c:4f:af:4e:72:5f:13:e4: 5f:41:ab:dc:56:12:91:e7:20:bd:7a:de:cc:2b:09:33: e1:d6:2b:13:9b:ee:db:49:cd:b2:d6:db:5d:ba:10:7b: cb:2e:89:ea:93:e8:1a:5e:49:19:49:02:be:7f:29:97: 63:0d:ac:1b:ee:39:68:5c:1e:3e:cf:71:8f:1e:8e:a7: ec:6c:af:6b:92:5a:f8:ce:83:ac:34:30:08:80:67:40: d1:05:d5:a4:b3:03:cd:41:4e:3e:79:97:b6:f6:bd:44: 5f:c5:56:7c:c9:33:33:18:21:f4:dd:8d:c0:1a:fe:bb: 26:53:ad:c2:95:95:c9:6f:8b:85:d3:55:c9:ea:0a:71: b0:7e:43:90:92:68:dd:47:b1:0c:94:f2:be:55:70:ae: e6:24:04:6b:e9:8c:0a:59:bf:74:cd:6e:f7:b1:d5:17: 52:9b:eb:9c:d3:65:b8:51:aa:eb:1b:be:3a:7b:50:ad: 60:7f:f4:93:14:8e:2d:09:e3:0d:44:8a:77:15:f0:a3 Fingerprint (SHA-256): 2E:F0:21:4E:46:CF:F2:17:AC:EF:07:BF:78:EF:C0:6D:66:BB:F8:1E:F6:9E:C0:E0:17:11:A4:31:22:DF:8A:D4 Fingerprint (SHA1): F0:48:78:51:2C:B5:72:9C:CB:B7:67:D2:38:82:AB:5E:1D:78:CA:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEIntermediate EE,O=EKUIPsecIKEIntermedia te,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #195: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #196: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #197: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUAnyCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221533 (0x3744471d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:16:55 2022 Not After : Tue Sep 27 22:16:55 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6f:13:61:a3:2d:6d:65:6f:9d:77:b0:ac:c5:dc:a4: 2e:6f:ef:19:b7:b5:a3:ce:70:9c:1b:a7:45:a6:b4:d3: c5:6c:e4:8e:f1:d9:a2:6c:f9:21:8c:14:8d:f5:49:d7: 6f:cd:69:fd:f1:20:93:09:33:bc:9b:00:4e:94:66:fd: ba:6f:fd:6a:53:72:a9:d3:b3:5c:71:4f:b7:da:b1:a1: db:05:a8:18:d4:02:23:c0:90:2b:b5:24:69:58:ac:f0: c4:cd:59:60:84:0c:b5:6a:1c:2f:06:c3:a6:78:97:90: 85:6c:8b:e6:1b:52:fb:bf:84:75:cd:28:1d:63:a3:84: 8c:b0:e2:c7:29:f5:78:f7:e4:1f:fc:7b:e6:8c:24:b9: 32:3a:d5:ef:5c:78:f4:9f:a2:72:3b:d4:c4:b3:e3:b7: db:a4:f8:5d:e9:7f:45:09:06:1e:cd:2d:bd:93:7d:31: d0:e7:eb:ac:ac:aa:d5:df:63:b7:10:2f:61:af:51:93: 15:83:02:b3:dd:cd:d8:2b:4f:f4:74:91:10:06:56:c2: 7e:f7:af:aa:a9:b3:70:23:2c:c3:01:26:de:98:fa:7a: 22:c7:79:87:a9:4b:61:1f:53:dc:2f:f5:da:44:d4:cd: 19:b2:03:fe:11:02:c7:28:7a:9a:6e:9a:22:48:87:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:30:4b:40:3e:c7:05:36:18:60:89:25:ce:9f:f0:7e: 87:41:d1:91:bd:2e:26:69:9e:98:43:89:d9:77:6d:d5: 4e:b1:31:2b:fc:a8:6e:62:96:05:c6:b2:b2:e1:07:2a: eb:9c:08:a8:b4:f4:ea:d4:4c:4f:af:4e:72:5f:13:e4: 5f:41:ab:dc:56:12:91:e7:20:bd:7a:de:cc:2b:09:33: e1:d6:2b:13:9b:ee:db:49:cd:b2:d6:db:5d:ba:10:7b: cb:2e:89:ea:93:e8:1a:5e:49:19:49:02:be:7f:29:97: 63:0d:ac:1b:ee:39:68:5c:1e:3e:cf:71:8f:1e:8e:a7: ec:6c:af:6b:92:5a:f8:ce:83:ac:34:30:08:80:67:40: d1:05:d5:a4:b3:03:cd:41:4e:3e:79:97:b6:f6:bd:44: 5f:c5:56:7c:c9:33:33:18:21:f4:dd:8d:c0:1a:fe:bb: 26:53:ad:c2:95:95:c9:6f:8b:85:d3:55:c9:ea:0a:71: b0:7e:43:90:92:68:dd:47:b1:0c:94:f2:be:55:70:ae: e6:24:04:6b:e9:8c:0a:59:bf:74:cd:6e:f7:b1:d5:17: 52:9b:eb:9c:d3:65:b8:51:aa:eb:1b:be:3a:7b:50:ad: 60:7f:f4:93:14:8e:2d:09:e3:0d:44:8a:77:15:f0:a3 Fingerprint (SHA-256): 2E:F0:21:4E:46:CF:F2:17:AC:EF:07:BF:78:EF:C0:6D:66:BB:F8:1E:F6:9E:C0:E0:17:11:A4:31:22:DF:8A:D4 Fingerprint (SHA1): F0:48:78:51:2C:B5:72:9C:CB:B7:67:D2:38:82:AB:5E:1D:78:CA:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUAny EE,O=EKUAny,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #198: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #199: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #200: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUEmailCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221533 (0x3744471d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:16:55 2022 Not After : Tue Sep 27 22:16:55 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6f:13:61:a3:2d:6d:65:6f:9d:77:b0:ac:c5:dc:a4: 2e:6f:ef:19:b7:b5:a3:ce:70:9c:1b:a7:45:a6:b4:d3: c5:6c:e4:8e:f1:d9:a2:6c:f9:21:8c:14:8d:f5:49:d7: 6f:cd:69:fd:f1:20:93:09:33:bc:9b:00:4e:94:66:fd: ba:6f:fd:6a:53:72:a9:d3:b3:5c:71:4f:b7:da:b1:a1: db:05:a8:18:d4:02:23:c0:90:2b:b5:24:69:58:ac:f0: c4:cd:59:60:84:0c:b5:6a:1c:2f:06:c3:a6:78:97:90: 85:6c:8b:e6:1b:52:fb:bf:84:75:cd:28:1d:63:a3:84: 8c:b0:e2:c7:29:f5:78:f7:e4:1f:fc:7b:e6:8c:24:b9: 32:3a:d5:ef:5c:78:f4:9f:a2:72:3b:d4:c4:b3:e3:b7: db:a4:f8:5d:e9:7f:45:09:06:1e:cd:2d:bd:93:7d:31: d0:e7:eb:ac:ac:aa:d5:df:63:b7:10:2f:61:af:51:93: 15:83:02:b3:dd:cd:d8:2b:4f:f4:74:91:10:06:56:c2: 7e:f7:af:aa:a9:b3:70:23:2c:c3:01:26:de:98:fa:7a: 22:c7:79:87:a9:4b:61:1f:53:dc:2f:f5:da:44:d4:cd: 19:b2:03:fe:11:02:c7:28:7a:9a:6e:9a:22:48:87:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:30:4b:40:3e:c7:05:36:18:60:89:25:ce:9f:f0:7e: 87:41:d1:91:bd:2e:26:69:9e:98:43:89:d9:77:6d:d5: 4e:b1:31:2b:fc:a8:6e:62:96:05:c6:b2:b2:e1:07:2a: eb:9c:08:a8:b4:f4:ea:d4:4c:4f:af:4e:72:5f:13:e4: 5f:41:ab:dc:56:12:91:e7:20:bd:7a:de:cc:2b:09:33: e1:d6:2b:13:9b:ee:db:49:cd:b2:d6:db:5d:ba:10:7b: cb:2e:89:ea:93:e8:1a:5e:49:19:49:02:be:7f:29:97: 63:0d:ac:1b:ee:39:68:5c:1e:3e:cf:71:8f:1e:8e:a7: ec:6c:af:6b:92:5a:f8:ce:83:ac:34:30:08:80:67:40: d1:05:d5:a4:b3:03:cd:41:4e:3e:79:97:b6:f6:bd:44: 5f:c5:56:7c:c9:33:33:18:21:f4:dd:8d:c0:1a:fe:bb: 26:53:ad:c2:95:95:c9:6f:8b:85:d3:55:c9:ea:0a:71: b0:7e:43:90:92:68:dd:47:b1:0c:94:f2:be:55:70:ae: e6:24:04:6b:e9:8c:0a:59:bf:74:cd:6e:f7:b1:d5:17: 52:9b:eb:9c:d3:65:b8:51:aa:eb:1b:be:3a:7b:50:ad: 60:7f:f4:93:14:8e:2d:09:e3:0d:44:8a:77:15:f0:a3 Fingerprint (SHA-256): 2E:F0:21:4E:46:CF:F2:17:AC:EF:07:BF:78:EF:C0:6D:66:BB:F8:1E:F6:9E:C0:E0:17:11:A4:31:22:DF:8A:D4 Fingerprint (SHA1): F0:48:78:51:2C:B5:72:9C:CB:B7:67:D2:38:82:AB:5E:1D:78:CA:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUEmail EE,O=EKUEmail,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #201: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #202: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #203: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 - PASSED httpserv starting at Tue Sep 27 22:17:31 UTC 2022 httpserv -D -p 9233 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/aiahttp/http_pid.3122 & trying to connect to httpserv at Tue Sep 27 22:17:31 UTC 2022 tstclnt -4 -p 9233 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9233 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 36594 >/dev/null 2>/dev/null httpserv with PID 36594 found at Tue Sep 27 22:17:31 UTC 2022 httpserv with PID 36594 started at Tue Sep 27 22:17:31 UTC 2022 chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecUserCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221533 (0x3744471d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:16:55 2022 Not After : Tue Sep 27 22:16:55 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6f:13:61:a3:2d:6d:65:6f:9d:77:b0:ac:c5:dc:a4: 2e:6f:ef:19:b7:b5:a3:ce:70:9c:1b:a7:45:a6:b4:d3: c5:6c:e4:8e:f1:d9:a2:6c:f9:21:8c:14:8d:f5:49:d7: 6f:cd:69:fd:f1:20:93:09:33:bc:9b:00:4e:94:66:fd: ba:6f:fd:6a:53:72:a9:d3:b3:5c:71:4f:b7:da:b1:a1: db:05:a8:18:d4:02:23:c0:90:2b:b5:24:69:58:ac:f0: c4:cd:59:60:84:0c:b5:6a:1c:2f:06:c3:a6:78:97:90: 85:6c:8b:e6:1b:52:fb:bf:84:75:cd:28:1d:63:a3:84: 8c:b0:e2:c7:29:f5:78:f7:e4:1f:fc:7b:e6:8c:24:b9: 32:3a:d5:ef:5c:78:f4:9f:a2:72:3b:d4:c4:b3:e3:b7: db:a4:f8:5d:e9:7f:45:09:06:1e:cd:2d:bd:93:7d:31: d0:e7:eb:ac:ac:aa:d5:df:63:b7:10:2f:61:af:51:93: 15:83:02:b3:dd:cd:d8:2b:4f:f4:74:91:10:06:56:c2: 7e:f7:af:aa:a9:b3:70:23:2c:c3:01:26:de:98:fa:7a: 22:c7:79:87:a9:4b:61:1f:53:dc:2f:f5:da:44:d4:cd: 19:b2:03:fe:11:02:c7:28:7a:9a:6e:9a:22:48:87:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:30:4b:40:3e:c7:05:36:18:60:89:25:ce:9f:f0:7e: 87:41:d1:91:bd:2e:26:69:9e:98:43:89:d9:77:6d:d5: 4e:b1:31:2b:fc:a8:6e:62:96:05:c6:b2:b2:e1:07:2a: eb:9c:08:a8:b4:f4:ea:d4:4c:4f:af:4e:72:5f:13:e4: 5f:41:ab:dc:56:12:91:e7:20:bd:7a:de:cc:2b:09:33: e1:d6:2b:13:9b:ee:db:49:cd:b2:d6:db:5d:ba:10:7b: cb:2e:89:ea:93:e8:1a:5e:49:19:49:02:be:7f:29:97: 63:0d:ac:1b:ee:39:68:5c:1e:3e:cf:71:8f:1e:8e:a7: ec:6c:af:6b:92:5a:f8:ce:83:ac:34:30:08:80:67:40: d1:05:d5:a4:b3:03:cd:41:4e:3e:79:97:b6:f6:bd:44: 5f:c5:56:7c:c9:33:33:18:21:f4:dd:8d:c0:1a:fe:bb: 26:53:ad:c2:95:95:c9:6f:8b:85:d3:55:c9:ea:0a:71: b0:7e:43:90:92:68:dd:47:b1:0c:94:f2:be:55:70:ae: e6:24:04:6b:e9:8c:0a:59:bf:74:cd:6e:f7:b1:d5:17: 52:9b:eb:9c:d3:65:b8:51:aa:eb:1b:be:3a:7b:50:ad: 60:7f:f4:93:14:8e:2d:09:e3:0d:44:8a:77:15:f0:a3 Fingerprint (SHA-256): 2E:F0:21:4E:46:CF:F2:17:AC:EF:07:BF:78:EF:C0:6D:66:BB:F8:1E:F6:9E:C0:E0:17:11:A4:31:22:DF:8A:D4 Fingerprint (SHA1): F0:48:78:51:2C:B5:72:9C:CB:B7:67:D2:38:82:AB:5E:1D:78:CA:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecUser EE,O=EKUIPsecUser,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #204: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #205: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #206: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 - PASSED tstclnt -4 -h localhost.localdomain -p 9233 -q -t 20 chains.sh: #207: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221532 (0x3744471c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Tue Sep 27 22:15:32 2022 Not After : Tue Sep 27 22:15:32 2072 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:01:1d:1f:dc:09:47:a4:7c:75:c5:39:8b:17:9f:a4: 32:14:41:65:95:42:ab:06:bb:0a:84:30:4a:d0:d3:0a: 8c:95:ab:01:bb:f8:d2:c2:5c:08:d5:e3:c9:a1:68:79: 69:a0:fd:b8:29:f2:66:27:ce:44:e7:88:89:57:fe:7e: 6d:b7:d7:06:85:3f:ee:0d:d6:67:20:1a:41:92:bf:84: f4:89:a9:a4:7b:ad:79:e1:27:f3:12:dc:ff:86:c3:da: 04:4a:37:ac:d3:e4:e9:9b:44:12:5e:bc:97:27:5b:6d: 4b:bc:73:d2:ac:ba:58:ef:d3:03:56:df:de:36:70:fb: a9:55:11:71:7d:3b:3a:2f:15:9b:61:e1:2b:33:17:d0: 59:7e:a8:e8:af:8b:65:6b:59:f5:4e:bf:49:aa:4f:d6: 00:47:66:69:0d:bc:8b:c7:3c:0b:f8:a5:3e:47:33:65: 11:53:d6:a1:9e:5b:5a:87:df:00:df:7d:db:70:1d:3f: 20:fe:f6:71:3e:03:32:e2:4f:2a:fe:ba:24:7d:03:e8: cf:9f:76:ac:2d:2f:dd:8a:14:7f:05:65:bb:13:74:68: c2:5c:45:8d:55:02:78:1f:ce:1f:1d:d3:26:e1:c5:18: 57:ee:5d:f4:f9:55:9f:53:4c:22:60:c0:fe:99:27:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:44:51:5c:0f:1e:37:84:7c:b1:2b:65:50:7a:d5:ba: 6a:33:76:af:65:81:3f:9b:14:41:a4:32:7d:d1:b9:5e: 94:5e:78:32:f9:b0:12:36:75:c2:63:ec:ee:69:a1:ea: 38:72:80:c6:89:49:57:f0:16:4d:2b:34:c0:b5:65:08: eb:1e:d8:fe:c3:b0:cc:26:f5:05:6e:a2:b3:0b:98:80: 06:66:b3:8f:ed:24:60:c4:2b:6b:7c:ef:36:85:e6:c7: 49:73:7c:80:b4:51:ba:44:85:83:5b:15:71:6b:d8:00: 59:46:60:e3:4e:17:f1:13:e7:f4:ed:f0:fa:d7:cf:89: 1b:22:02:ae:50:4b:3f:dc:5e:5f:2d:29:ba:43:73:f3: 88:62:42:df:84:9e:2a:e1:a3:ad:12:21:f9:d4:1e:c2: 23:2a:41:84:a7:44:ed:5e:9c:9d:a1:ce:d0:10:5e:57: 37:be:ba:71:76:b8:84:f4:72:4a:09:d5:64:74:f3:09: 9a:e5:cf:b3:ee:a5:ff:d2:09:02:0c:4c:d9:df:11:21: 9c:8d:bf:ce:b3:6d:e8:be:68:ea:7b:b3:24:3c:de:9b: 77:f9:42:71:f2:18:8d:8a:47:02:15:ba:7c:d2:ba:19: 26:e0:f8:82:63:ed:78:f7:8e:f3:8f:05:7d:24:15:a4 Fingerprint (SHA-256): 75:98:6A:AC:EF:45:68:82:B7:02:2F:CA:F7:33:43:51:53:E2:58:66:26:D1:8E:DD:57:2D:36:FD:26:9E:CB:36 Fingerprint (SHA1): D8:60:4B:F0:61:9C:18:E1:E0:88:CA:53:C1:C7:49:47:6F:A6:40:66 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #208: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #209: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #210: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 36594 at Tue Sep 27 22:17:33 UTC 2022 kill -USR1 36594 httpserv: normal termination httpserv -b -p 9233 2>/dev/null; httpserv with PID 36594 killed at Tue Sep 27 22:17:33 UTC 2022 httpserv starting at Tue Sep 27 22:17:33 UTC 2022 httpserv -D -p 9233 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/aiahttp/http_pid.3122 & trying to connect to httpserv at Tue Sep 27 22:17:33 UTC 2022 tstclnt -4 -p 9233 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9233 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 36796 >/dev/null 2>/dev/null httpserv with PID 36796 found at Tue Sep 27 22:17:33 UTC 2022 httpserv with PID 36796 started at Tue Sep 27 22:17:33 UTC 2022 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #211: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #212: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #213: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED tstclnt -4 -h localhost.localdomain -p 9233 -q -t 20 chains.sh: #214: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221532 (0x3744471c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Tue Sep 27 22:15:32 2022 Not After : Tue Sep 27 22:15:32 2072 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:01:1d:1f:dc:09:47:a4:7c:75:c5:39:8b:17:9f:a4: 32:14:41:65:95:42:ab:06:bb:0a:84:30:4a:d0:d3:0a: 8c:95:ab:01:bb:f8:d2:c2:5c:08:d5:e3:c9:a1:68:79: 69:a0:fd:b8:29:f2:66:27:ce:44:e7:88:89:57:fe:7e: 6d:b7:d7:06:85:3f:ee:0d:d6:67:20:1a:41:92:bf:84: f4:89:a9:a4:7b:ad:79:e1:27:f3:12:dc:ff:86:c3:da: 04:4a:37:ac:d3:e4:e9:9b:44:12:5e:bc:97:27:5b:6d: 4b:bc:73:d2:ac:ba:58:ef:d3:03:56:df:de:36:70:fb: a9:55:11:71:7d:3b:3a:2f:15:9b:61:e1:2b:33:17:d0: 59:7e:a8:e8:af:8b:65:6b:59:f5:4e:bf:49:aa:4f:d6: 00:47:66:69:0d:bc:8b:c7:3c:0b:f8:a5:3e:47:33:65: 11:53:d6:a1:9e:5b:5a:87:df:00:df:7d:db:70:1d:3f: 20:fe:f6:71:3e:03:32:e2:4f:2a:fe:ba:24:7d:03:e8: cf:9f:76:ac:2d:2f:dd:8a:14:7f:05:65:bb:13:74:68: c2:5c:45:8d:55:02:78:1f:ce:1f:1d:d3:26:e1:c5:18: 57:ee:5d:f4:f9:55:9f:53:4c:22:60:c0:fe:99:27:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:44:51:5c:0f:1e:37:84:7c:b1:2b:65:50:7a:d5:ba: 6a:33:76:af:65:81:3f:9b:14:41:a4:32:7d:d1:b9:5e: 94:5e:78:32:f9:b0:12:36:75:c2:63:ec:ee:69:a1:ea: 38:72:80:c6:89:49:57:f0:16:4d:2b:34:c0:b5:65:08: eb:1e:d8:fe:c3:b0:cc:26:f5:05:6e:a2:b3:0b:98:80: 06:66:b3:8f:ed:24:60:c4:2b:6b:7c:ef:36:85:e6:c7: 49:73:7c:80:b4:51:ba:44:85:83:5b:15:71:6b:d8:00: 59:46:60:e3:4e:17:f1:13:e7:f4:ed:f0:fa:d7:cf:89: 1b:22:02:ae:50:4b:3f:dc:5e:5f:2d:29:ba:43:73:f3: 88:62:42:df:84:9e:2a:e1:a3:ad:12:21:f9:d4:1e:c2: 23:2a:41:84:a7:44:ed:5e:9c:9d:a1:ce:d0:10:5e:57: 37:be:ba:71:76:b8:84:f4:72:4a:09:d5:64:74:f3:09: 9a:e5:cf:b3:ee:a5:ff:d2:09:02:0c:4c:d9:df:11:21: 9c:8d:bf:ce:b3:6d:e8:be:68:ea:7b:b3:24:3c:de:9b: 77:f9:42:71:f2:18:8d:8a:47:02:15:ba:7c:d2:ba:19: 26:e0:f8:82:63:ed:78:f7:8e:f3:8f:05:7d:24:15:a4 Fingerprint (SHA-256): 75:98:6A:AC:EF:45:68:82:B7:02:2F:CA:F7:33:43:51:53:E2:58:66:26:D1:8E:DD:57:2D:36:FD:26:9E:CB:36 Fingerprint (SHA1): D8:60:4B:F0:61:9C:18:E1:E0:88:CA:53:C1:C7:49:47:6F:A6:40:66 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #215: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #216: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #217: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 36796 at Tue Sep 27 22:17:36 UTC 2022 kill -USR1 36796 httpserv: normal termination httpserv -b -p 9233 2>/dev/null; httpserv with PID 36796 killed at Tue Sep 27 22:17:36 UTC 2022 httpserv starting at Tue Sep 27 22:17:36 UTC 2022 httpserv -D -p 9233 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/aiahttp/http_pid.3122 & trying to connect to httpserv at Tue Sep 27 22:17:36 UTC 2022 tstclnt -4 -p 9233 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9233 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 37016 >/dev/null 2>/dev/null httpserv with PID 37016 found at Tue Sep 27 22:17:36 UTC 2022 httpserv with PID 37016 started at Tue Sep 27 22:17:36 UTC 2022 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #218: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #219: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221549 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #220: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #221: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #222: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221550 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #223: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #224: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #225: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #226: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 927221551 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #227: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #228: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 927221552 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #229: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #230: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #231: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #232: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #233: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 927221553 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #234: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #235: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #236: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #237: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #238: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221550 (0x3744472e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 22:17:39 2022 Not After : Tue Sep 27 22:17:39 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:0d:8e:d9:9f:52:29:1a:65:4b:fe:1c:b2:ee:3a:1b: b5:42:6e:a8:a2:b1:38:58:45:83:e2:37:28:27:f7:70: 77:f9:84:ea:08:79:90:20:8f:56:6d:6d:f7:11:2e:56: bb:a7:92:52:bf:e4:fc:27:70:0b:07:63:75:4d:ec:c7: 27:86:63:ba:1a:02:77:d7:39:62:54:03:24:3b:a8:54: 3b:db:23:33:c6:f8:ef:30:33:83:e9:7f:c3:d6:7b:b2: 21:da:fa:c9:e6:3d:0f:f6:10:39:2e:b8:98:6b:d5:d2: 0c:cb:06:d8:df:34:5d:23:5d:27:41:2b:2c:10:2d:3d: 4b:b8:7f:7e:3c:18:9a:f4:31:f4:19:9c:d1:44:ef:38: 70:7c:93:e1:97:82:e2:1b:f5:f6:f2:c9:04:e6:40:08: ff:d4:5e:ae:dd:b1:21:27:69:c6:ff:f9:1e:a8:9a:ad: ae:73:85:1a:4e:a0:b9:b1:76:b5:03:a8:a2:86:e1:f1: eb:8e:1f:b1:8a:4d:7e:b1:34:77:0d:d2:c1:ce:47:89: 56:37:2f:02:9c:d9:46:c3:f8:af:9e:a7:d9:6b:79:b6: 66:b4:15:7f:f6:73:01:f2:39:0d:6e:15:29:f9:dd:37: 54:13:5e:17:0f:45:ef:f8:aa:15:26:8d:de:65:cf:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:01:92:27:c6:1e:52:8c:de:a1:af:8b:ad:59:83:6f: 59:57:6a:09:7c:06:d3:83:2b:d1:ab:a1:ed:71:61:a4: f7:36:58:bb:b7:f4:8b:b4:8c:aa:e3:04:d1:f3:19:41: 88:52:63:47:1e:7b:f8:71:34:b6:2f:4c:f8:bb:73:9d: a8:d4:76:6e:c5:00:29:f0:64:36:0a:7b:1e:0d:67:f7: 08:ce:20:f2:6b:9f:c1:24:d4:66:2b:96:91:5b:a0:3a: 1a:92:86:0d:90:06:8c:d7:82:84:df:59:46:e7:81:59: a6:f9:71:92:4c:00:98:42:fb:d9:df:fd:d6:1f:a3:8c: a4:33:0c:b4:44:61:32:7d:40:a1:ec:f4:0e:f2:3f:44: 99:dc:3e:1e:c4:2c:f1:b1:fa:ac:ff:b6:4c:20:4e:0b: 2e:a1:11:ca:64:d9:27:18:5e:84:4f:55:84:fd:f9:ae: ef:43:11:0f:bb:d4:39:23:a1:b9:63:b0:d2:ff:f5:98: 4d:ea:9b:aa:c6:bd:c9:14:cd:e4:f2:2b:28:c8:1c:19: 87:86:bd:e0:bf:02:98:f6:34:0d:ed:18:c2:29:d5:d9: 3a:2e:7f:4c:dd:33:f9:c4:c6:60:ce:ea:a0:8d:4d:23: 8c:c8:ef:aa:2d:69:06:47:35:61:cd:13:82:ef:db:99 Fingerprint (SHA-256): 3F:6B:8C:A2:FC:F4:85:63:43:3E:E9:04:49:60:D1:48:5D:A5:0E:2A:6D:0A:F6:A4:DE:9F:FD:C0:EB:7D:25:67 Fingerprint (SHA1): B3:36:00:DA:6C:35:87:26:4C:45:36:20:4C:C8:F0:8D:A3:AC:E2:0A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #239: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221549 (0x3744472d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 22:17:38 2022 Not After : Tue Sep 27 22:17:38 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:ca:0a:c8:ca:f0:ba:02:da:c3:5c:3e:3d:cc:79:34: b3:dc:51:3f:e2:fe:f7:2a:0f:57:e9:7a:a4:ee:50:31: 80:f0:cf:94:e0:40:dc:7b:ed:b5:af:7a:7f:cd:95:95: 53:d0:3f:78:6f:a0:95:eb:7b:e6:63:66:d0:fc:35:f5: 52:6c:b9:f5:0b:93:b5:c3:93:e0:9d:00:85:5b:9f:35: c9:f6:5f:6e:bf:28:e1:92:ea:04:1b:9b:87:f3:53:49: 30:46:4a:26:57:8d:89:85:fb:d3:f3:09:2c:71:51:53: ad:ab:36:69:f8:8e:18:66:90:52:1e:fc:7c:05:d5:cd: bf:5d:e1:1e:92:08:f2:d2:dc:4e:73:70:a1:70:3d:0b: a1:13:92:ec:e0:8e:2c:b2:a1:bc:fb:c1:ab:9f:03:e3: 3a:83:14:8f:c6:e4:ed:e3:cc:80:1c:5c:51:fb:04:c1: de:37:5d:88:4a:dc:d9:1d:55:bd:08:a5:8e:9d:77:e8: f4:c7:27:f3:fe:92:23:28:d9:65:f0:b7:8c:e9:42:ac: 90:49:5e:d2:bb:d2:40:7b:6f:8c:1f:1e:dd:d0:bf:8c: 55:50:e2:4d:46:69:15:b6:08:1e:47:9c:98:49:a9:cd: 11:ae:38:91:8c:2e:f4:e1:fb:fa:e0:57:57:0c:86:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:8e:f7:02:b5:3b:52:0a:26:bd:36:83:b9:84:be:b5: ef:dc:05:b6:67:6c:83:85:69:cb:7f:85:95:c8:75:32: d3:3e:05:ae:52:37:c7:d1:30:5b:27:cf:d9:9a:5f:fd: 24:4e:f6:b3:1d:3c:5d:20:b7:a2:9e:eb:86:44:e8:40: 5a:e8:83:1a:15:0d:8e:09:63:81:7e:d4:79:9a:76:2a: 9a:b2:a3:b1:a1:5b:fe:c9:9b:70:13:9c:c9:13:61:c7: 2a:3b:3e:8e:86:81:75:b8:ac:46:03:3d:1c:40:ab:e8: 9b:a2:ed:c6:da:56:1c:fe:16:ea:fa:c1:62:6a:6d:81: 02:85:35:d7:e4:5d:8b:73:1c:39:8c:6b:d7:88:6d:80: 45:43:fa:49:1a:0f:03:96:53:a7:d5:75:86:00:b6:63: 53:85:c4:45:9e:53:d0:d6:4e:2e:dd:13:68:a7:db:23: 1b:8a:80:be:46:47:00:fa:44:b7:4b:44:51:71:7b:b0: 46:d8:4a:9a:5f:d8:08:5f:ca:9a:cf:94:31:a9:17:31: 3d:ea:86:50:9e:b1:46:21:a5:4c:c4:f7:0d:3f:86:93: b1:ab:b2:ac:45:38:00:f4:23:e5:10:3e:d4:00:e2:f9: f5:b8:1b:69:4b:cf:39:05:6e:5c:a8:61:1b:21:86:54 Fingerprint (SHA-256): 14:AA:C2:A0:E4:1E:C2:FB:4F:83:37:62:13:EC:65:F7:78:7F:A0:8B:B6:C4:F4:65:5D:D4:ED:2D:9F:77:12:58 Fingerprint (SHA1): BF:D6:88:58:39:54:57:A9:86:4D:FF:A2:FD:67:88:29:83:FC:2F:95 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #240: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #241: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #242: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #243: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221549 (0x3744472d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 22:17:38 2022 Not After : Tue Sep 27 22:17:38 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:ca:0a:c8:ca:f0:ba:02:da:c3:5c:3e:3d:cc:79:34: b3:dc:51:3f:e2:fe:f7:2a:0f:57:e9:7a:a4:ee:50:31: 80:f0:cf:94:e0:40:dc:7b:ed:b5:af:7a:7f:cd:95:95: 53:d0:3f:78:6f:a0:95:eb:7b:e6:63:66:d0:fc:35:f5: 52:6c:b9:f5:0b:93:b5:c3:93:e0:9d:00:85:5b:9f:35: c9:f6:5f:6e:bf:28:e1:92:ea:04:1b:9b:87:f3:53:49: 30:46:4a:26:57:8d:89:85:fb:d3:f3:09:2c:71:51:53: ad:ab:36:69:f8:8e:18:66:90:52:1e:fc:7c:05:d5:cd: bf:5d:e1:1e:92:08:f2:d2:dc:4e:73:70:a1:70:3d:0b: a1:13:92:ec:e0:8e:2c:b2:a1:bc:fb:c1:ab:9f:03:e3: 3a:83:14:8f:c6:e4:ed:e3:cc:80:1c:5c:51:fb:04:c1: de:37:5d:88:4a:dc:d9:1d:55:bd:08:a5:8e:9d:77:e8: f4:c7:27:f3:fe:92:23:28:d9:65:f0:b7:8c:e9:42:ac: 90:49:5e:d2:bb:d2:40:7b:6f:8c:1f:1e:dd:d0:bf:8c: 55:50:e2:4d:46:69:15:b6:08:1e:47:9c:98:49:a9:cd: 11:ae:38:91:8c:2e:f4:e1:fb:fa:e0:57:57:0c:86:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:8e:f7:02:b5:3b:52:0a:26:bd:36:83:b9:84:be:b5: ef:dc:05:b6:67:6c:83:85:69:cb:7f:85:95:c8:75:32: d3:3e:05:ae:52:37:c7:d1:30:5b:27:cf:d9:9a:5f:fd: 24:4e:f6:b3:1d:3c:5d:20:b7:a2:9e:eb:86:44:e8:40: 5a:e8:83:1a:15:0d:8e:09:63:81:7e:d4:79:9a:76:2a: 9a:b2:a3:b1:a1:5b:fe:c9:9b:70:13:9c:c9:13:61:c7: 2a:3b:3e:8e:86:81:75:b8:ac:46:03:3d:1c:40:ab:e8: 9b:a2:ed:c6:da:56:1c:fe:16:ea:fa:c1:62:6a:6d:81: 02:85:35:d7:e4:5d:8b:73:1c:39:8c:6b:d7:88:6d:80: 45:43:fa:49:1a:0f:03:96:53:a7:d5:75:86:00:b6:63: 53:85:c4:45:9e:53:d0:d6:4e:2e:dd:13:68:a7:db:23: 1b:8a:80:be:46:47:00:fa:44:b7:4b:44:51:71:7b:b0: 46:d8:4a:9a:5f:d8:08:5f:ca:9a:cf:94:31:a9:17:31: 3d:ea:86:50:9e:b1:46:21:a5:4c:c4:f7:0d:3f:86:93: b1:ab:b2:ac:45:38:00:f4:23:e5:10:3e:d4:00:e2:f9: f5:b8:1b:69:4b:cf:39:05:6e:5c:a8:61:1b:21:86:54 Fingerprint (SHA-256): 14:AA:C2:A0:E4:1E:C2:FB:4F:83:37:62:13:EC:65:F7:78:7F:A0:8B:B6:C4:F4:65:5D:D4:ED:2D:9F:77:12:58 Fingerprint (SHA1): BF:D6:88:58:39:54:57:A9:86:4D:FF:A2:FD:67:88:29:83:FC:2F:95 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #244: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221550 (0x3744472e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 22:17:39 2022 Not After : Tue Sep 27 22:17:39 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:0d:8e:d9:9f:52:29:1a:65:4b:fe:1c:b2:ee:3a:1b: b5:42:6e:a8:a2:b1:38:58:45:83:e2:37:28:27:f7:70: 77:f9:84:ea:08:79:90:20:8f:56:6d:6d:f7:11:2e:56: bb:a7:92:52:bf:e4:fc:27:70:0b:07:63:75:4d:ec:c7: 27:86:63:ba:1a:02:77:d7:39:62:54:03:24:3b:a8:54: 3b:db:23:33:c6:f8:ef:30:33:83:e9:7f:c3:d6:7b:b2: 21:da:fa:c9:e6:3d:0f:f6:10:39:2e:b8:98:6b:d5:d2: 0c:cb:06:d8:df:34:5d:23:5d:27:41:2b:2c:10:2d:3d: 4b:b8:7f:7e:3c:18:9a:f4:31:f4:19:9c:d1:44:ef:38: 70:7c:93:e1:97:82:e2:1b:f5:f6:f2:c9:04:e6:40:08: ff:d4:5e:ae:dd:b1:21:27:69:c6:ff:f9:1e:a8:9a:ad: ae:73:85:1a:4e:a0:b9:b1:76:b5:03:a8:a2:86:e1:f1: eb:8e:1f:b1:8a:4d:7e:b1:34:77:0d:d2:c1:ce:47:89: 56:37:2f:02:9c:d9:46:c3:f8:af:9e:a7:d9:6b:79:b6: 66:b4:15:7f:f6:73:01:f2:39:0d:6e:15:29:f9:dd:37: 54:13:5e:17:0f:45:ef:f8:aa:15:26:8d:de:65:cf:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:01:92:27:c6:1e:52:8c:de:a1:af:8b:ad:59:83:6f: 59:57:6a:09:7c:06:d3:83:2b:d1:ab:a1:ed:71:61:a4: f7:36:58:bb:b7:f4:8b:b4:8c:aa:e3:04:d1:f3:19:41: 88:52:63:47:1e:7b:f8:71:34:b6:2f:4c:f8:bb:73:9d: a8:d4:76:6e:c5:00:29:f0:64:36:0a:7b:1e:0d:67:f7: 08:ce:20:f2:6b:9f:c1:24:d4:66:2b:96:91:5b:a0:3a: 1a:92:86:0d:90:06:8c:d7:82:84:df:59:46:e7:81:59: a6:f9:71:92:4c:00:98:42:fb:d9:df:fd:d6:1f:a3:8c: a4:33:0c:b4:44:61:32:7d:40:a1:ec:f4:0e:f2:3f:44: 99:dc:3e:1e:c4:2c:f1:b1:fa:ac:ff:b6:4c:20:4e:0b: 2e:a1:11:ca:64:d9:27:18:5e:84:4f:55:84:fd:f9:ae: ef:43:11:0f:bb:d4:39:23:a1:b9:63:b0:d2:ff:f5:98: 4d:ea:9b:aa:c6:bd:c9:14:cd:e4:f2:2b:28:c8:1c:19: 87:86:bd:e0:bf:02:98:f6:34:0d:ed:18:c2:29:d5:d9: 3a:2e:7f:4c:dd:33:f9:c4:c6:60:ce:ea:a0:8d:4d:23: 8c:c8:ef:aa:2d:69:06:47:35:61:cd:13:82:ef:db:99 Fingerprint (SHA-256): 3F:6B:8C:A2:FC:F4:85:63:43:3E:E9:04:49:60:D1:48:5D:A5:0E:2A:6D:0A:F6:A4:DE:9F:FD:C0:EB:7D:25:67 Fingerprint (SHA1): B3:36:00:DA:6C:35:87:26:4C:45:36:20:4C:C8:F0:8D:A3:AC:E2:0A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #245: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #246: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #247: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #248: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #249: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #250: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221550 (0x3744472e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 22:17:39 2022 Not After : Tue Sep 27 22:17:39 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:0d:8e:d9:9f:52:29:1a:65:4b:fe:1c:b2:ee:3a:1b: b5:42:6e:a8:a2:b1:38:58:45:83:e2:37:28:27:f7:70: 77:f9:84:ea:08:79:90:20:8f:56:6d:6d:f7:11:2e:56: bb:a7:92:52:bf:e4:fc:27:70:0b:07:63:75:4d:ec:c7: 27:86:63:ba:1a:02:77:d7:39:62:54:03:24:3b:a8:54: 3b:db:23:33:c6:f8:ef:30:33:83:e9:7f:c3:d6:7b:b2: 21:da:fa:c9:e6:3d:0f:f6:10:39:2e:b8:98:6b:d5:d2: 0c:cb:06:d8:df:34:5d:23:5d:27:41:2b:2c:10:2d:3d: 4b:b8:7f:7e:3c:18:9a:f4:31:f4:19:9c:d1:44:ef:38: 70:7c:93:e1:97:82:e2:1b:f5:f6:f2:c9:04:e6:40:08: ff:d4:5e:ae:dd:b1:21:27:69:c6:ff:f9:1e:a8:9a:ad: ae:73:85:1a:4e:a0:b9:b1:76:b5:03:a8:a2:86:e1:f1: eb:8e:1f:b1:8a:4d:7e:b1:34:77:0d:d2:c1:ce:47:89: 56:37:2f:02:9c:d9:46:c3:f8:af:9e:a7:d9:6b:79:b6: 66:b4:15:7f:f6:73:01:f2:39:0d:6e:15:29:f9:dd:37: 54:13:5e:17:0f:45:ef:f8:aa:15:26:8d:de:65:cf:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:01:92:27:c6:1e:52:8c:de:a1:af:8b:ad:59:83:6f: 59:57:6a:09:7c:06:d3:83:2b:d1:ab:a1:ed:71:61:a4: f7:36:58:bb:b7:f4:8b:b4:8c:aa:e3:04:d1:f3:19:41: 88:52:63:47:1e:7b:f8:71:34:b6:2f:4c:f8:bb:73:9d: a8:d4:76:6e:c5:00:29:f0:64:36:0a:7b:1e:0d:67:f7: 08:ce:20:f2:6b:9f:c1:24:d4:66:2b:96:91:5b:a0:3a: 1a:92:86:0d:90:06:8c:d7:82:84:df:59:46:e7:81:59: a6:f9:71:92:4c:00:98:42:fb:d9:df:fd:d6:1f:a3:8c: a4:33:0c:b4:44:61:32:7d:40:a1:ec:f4:0e:f2:3f:44: 99:dc:3e:1e:c4:2c:f1:b1:fa:ac:ff:b6:4c:20:4e:0b: 2e:a1:11:ca:64:d9:27:18:5e:84:4f:55:84:fd:f9:ae: ef:43:11:0f:bb:d4:39:23:a1:b9:63:b0:d2:ff:f5:98: 4d:ea:9b:aa:c6:bd:c9:14:cd:e4:f2:2b:28:c8:1c:19: 87:86:bd:e0:bf:02:98:f6:34:0d:ed:18:c2:29:d5:d9: 3a:2e:7f:4c:dd:33:f9:c4:c6:60:ce:ea:a0:8d:4d:23: 8c:c8:ef:aa:2d:69:06:47:35:61:cd:13:82:ef:db:99 Fingerprint (SHA-256): 3F:6B:8C:A2:FC:F4:85:63:43:3E:E9:04:49:60:D1:48:5D:A5:0E:2A:6D:0A:F6:A4:DE:9F:FD:C0:EB:7D:25:67 Fingerprint (SHA1): B3:36:00:DA:6C:35:87:26:4C:45:36:20:4C:C8:F0:8D:A3:AC:E2:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #251: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221550 (0x3744472e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 22:17:39 2022 Not After : Tue Sep 27 22:17:39 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:0d:8e:d9:9f:52:29:1a:65:4b:fe:1c:b2:ee:3a:1b: b5:42:6e:a8:a2:b1:38:58:45:83:e2:37:28:27:f7:70: 77:f9:84:ea:08:79:90:20:8f:56:6d:6d:f7:11:2e:56: bb:a7:92:52:bf:e4:fc:27:70:0b:07:63:75:4d:ec:c7: 27:86:63:ba:1a:02:77:d7:39:62:54:03:24:3b:a8:54: 3b:db:23:33:c6:f8:ef:30:33:83:e9:7f:c3:d6:7b:b2: 21:da:fa:c9:e6:3d:0f:f6:10:39:2e:b8:98:6b:d5:d2: 0c:cb:06:d8:df:34:5d:23:5d:27:41:2b:2c:10:2d:3d: 4b:b8:7f:7e:3c:18:9a:f4:31:f4:19:9c:d1:44:ef:38: 70:7c:93:e1:97:82:e2:1b:f5:f6:f2:c9:04:e6:40:08: ff:d4:5e:ae:dd:b1:21:27:69:c6:ff:f9:1e:a8:9a:ad: ae:73:85:1a:4e:a0:b9:b1:76:b5:03:a8:a2:86:e1:f1: eb:8e:1f:b1:8a:4d:7e:b1:34:77:0d:d2:c1:ce:47:89: 56:37:2f:02:9c:d9:46:c3:f8:af:9e:a7:d9:6b:79:b6: 66:b4:15:7f:f6:73:01:f2:39:0d:6e:15:29:f9:dd:37: 54:13:5e:17:0f:45:ef:f8:aa:15:26:8d:de:65:cf:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:01:92:27:c6:1e:52:8c:de:a1:af:8b:ad:59:83:6f: 59:57:6a:09:7c:06:d3:83:2b:d1:ab:a1:ed:71:61:a4: f7:36:58:bb:b7:f4:8b:b4:8c:aa:e3:04:d1:f3:19:41: 88:52:63:47:1e:7b:f8:71:34:b6:2f:4c:f8:bb:73:9d: a8:d4:76:6e:c5:00:29:f0:64:36:0a:7b:1e:0d:67:f7: 08:ce:20:f2:6b:9f:c1:24:d4:66:2b:96:91:5b:a0:3a: 1a:92:86:0d:90:06:8c:d7:82:84:df:59:46:e7:81:59: a6:f9:71:92:4c:00:98:42:fb:d9:df:fd:d6:1f:a3:8c: a4:33:0c:b4:44:61:32:7d:40:a1:ec:f4:0e:f2:3f:44: 99:dc:3e:1e:c4:2c:f1:b1:fa:ac:ff:b6:4c:20:4e:0b: 2e:a1:11:ca:64:d9:27:18:5e:84:4f:55:84:fd:f9:ae: ef:43:11:0f:bb:d4:39:23:a1:b9:63:b0:d2:ff:f5:98: 4d:ea:9b:aa:c6:bd:c9:14:cd:e4:f2:2b:28:c8:1c:19: 87:86:bd:e0:bf:02:98:f6:34:0d:ed:18:c2:29:d5:d9: 3a:2e:7f:4c:dd:33:f9:c4:c6:60:ce:ea:a0:8d:4d:23: 8c:c8:ef:aa:2d:69:06:47:35:61:cd:13:82:ef:db:99 Fingerprint (SHA-256): 3F:6B:8C:A2:FC:F4:85:63:43:3E:E9:04:49:60:D1:48:5D:A5:0E:2A:6D:0A:F6:A4:DE:9F:FD:C0:EB:7D:25:67 Fingerprint (SHA1): B3:36:00:DA:6C:35:87:26:4C:45:36:20:4C:C8:F0:8D:A3:AC:E2:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #252: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #253: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #254: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #255: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #256: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #257: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221549 (0x3744472d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 22:17:38 2022 Not After : Tue Sep 27 22:17:38 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:ca:0a:c8:ca:f0:ba:02:da:c3:5c:3e:3d:cc:79:34: b3:dc:51:3f:e2:fe:f7:2a:0f:57:e9:7a:a4:ee:50:31: 80:f0:cf:94:e0:40:dc:7b:ed:b5:af:7a:7f:cd:95:95: 53:d0:3f:78:6f:a0:95:eb:7b:e6:63:66:d0:fc:35:f5: 52:6c:b9:f5:0b:93:b5:c3:93:e0:9d:00:85:5b:9f:35: c9:f6:5f:6e:bf:28:e1:92:ea:04:1b:9b:87:f3:53:49: 30:46:4a:26:57:8d:89:85:fb:d3:f3:09:2c:71:51:53: ad:ab:36:69:f8:8e:18:66:90:52:1e:fc:7c:05:d5:cd: bf:5d:e1:1e:92:08:f2:d2:dc:4e:73:70:a1:70:3d:0b: a1:13:92:ec:e0:8e:2c:b2:a1:bc:fb:c1:ab:9f:03:e3: 3a:83:14:8f:c6:e4:ed:e3:cc:80:1c:5c:51:fb:04:c1: de:37:5d:88:4a:dc:d9:1d:55:bd:08:a5:8e:9d:77:e8: f4:c7:27:f3:fe:92:23:28:d9:65:f0:b7:8c:e9:42:ac: 90:49:5e:d2:bb:d2:40:7b:6f:8c:1f:1e:dd:d0:bf:8c: 55:50:e2:4d:46:69:15:b6:08:1e:47:9c:98:49:a9:cd: 11:ae:38:91:8c:2e:f4:e1:fb:fa:e0:57:57:0c:86:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:8e:f7:02:b5:3b:52:0a:26:bd:36:83:b9:84:be:b5: ef:dc:05:b6:67:6c:83:85:69:cb:7f:85:95:c8:75:32: d3:3e:05:ae:52:37:c7:d1:30:5b:27:cf:d9:9a:5f:fd: 24:4e:f6:b3:1d:3c:5d:20:b7:a2:9e:eb:86:44:e8:40: 5a:e8:83:1a:15:0d:8e:09:63:81:7e:d4:79:9a:76:2a: 9a:b2:a3:b1:a1:5b:fe:c9:9b:70:13:9c:c9:13:61:c7: 2a:3b:3e:8e:86:81:75:b8:ac:46:03:3d:1c:40:ab:e8: 9b:a2:ed:c6:da:56:1c:fe:16:ea:fa:c1:62:6a:6d:81: 02:85:35:d7:e4:5d:8b:73:1c:39:8c:6b:d7:88:6d:80: 45:43:fa:49:1a:0f:03:96:53:a7:d5:75:86:00:b6:63: 53:85:c4:45:9e:53:d0:d6:4e:2e:dd:13:68:a7:db:23: 1b:8a:80:be:46:47:00:fa:44:b7:4b:44:51:71:7b:b0: 46:d8:4a:9a:5f:d8:08:5f:ca:9a:cf:94:31:a9:17:31: 3d:ea:86:50:9e:b1:46:21:a5:4c:c4:f7:0d:3f:86:93: b1:ab:b2:ac:45:38:00:f4:23:e5:10:3e:d4:00:e2:f9: f5:b8:1b:69:4b:cf:39:05:6e:5c:a8:61:1b:21:86:54 Fingerprint (SHA-256): 14:AA:C2:A0:E4:1E:C2:FB:4F:83:37:62:13:EC:65:F7:78:7F:A0:8B:B6:C4:F4:65:5D:D4:ED:2D:9F:77:12:58 Fingerprint (SHA1): BF:D6:88:58:39:54:57:A9:86:4D:FF:A2:FD:67:88:29:83:FC:2F:95 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #258: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221549 (0x3744472d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 22:17:38 2022 Not After : Tue Sep 27 22:17:38 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:ca:0a:c8:ca:f0:ba:02:da:c3:5c:3e:3d:cc:79:34: b3:dc:51:3f:e2:fe:f7:2a:0f:57:e9:7a:a4:ee:50:31: 80:f0:cf:94:e0:40:dc:7b:ed:b5:af:7a:7f:cd:95:95: 53:d0:3f:78:6f:a0:95:eb:7b:e6:63:66:d0:fc:35:f5: 52:6c:b9:f5:0b:93:b5:c3:93:e0:9d:00:85:5b:9f:35: c9:f6:5f:6e:bf:28:e1:92:ea:04:1b:9b:87:f3:53:49: 30:46:4a:26:57:8d:89:85:fb:d3:f3:09:2c:71:51:53: ad:ab:36:69:f8:8e:18:66:90:52:1e:fc:7c:05:d5:cd: bf:5d:e1:1e:92:08:f2:d2:dc:4e:73:70:a1:70:3d:0b: a1:13:92:ec:e0:8e:2c:b2:a1:bc:fb:c1:ab:9f:03:e3: 3a:83:14:8f:c6:e4:ed:e3:cc:80:1c:5c:51:fb:04:c1: de:37:5d:88:4a:dc:d9:1d:55:bd:08:a5:8e:9d:77:e8: f4:c7:27:f3:fe:92:23:28:d9:65:f0:b7:8c:e9:42:ac: 90:49:5e:d2:bb:d2:40:7b:6f:8c:1f:1e:dd:d0:bf:8c: 55:50:e2:4d:46:69:15:b6:08:1e:47:9c:98:49:a9:cd: 11:ae:38:91:8c:2e:f4:e1:fb:fa:e0:57:57:0c:86:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:8e:f7:02:b5:3b:52:0a:26:bd:36:83:b9:84:be:b5: ef:dc:05:b6:67:6c:83:85:69:cb:7f:85:95:c8:75:32: d3:3e:05:ae:52:37:c7:d1:30:5b:27:cf:d9:9a:5f:fd: 24:4e:f6:b3:1d:3c:5d:20:b7:a2:9e:eb:86:44:e8:40: 5a:e8:83:1a:15:0d:8e:09:63:81:7e:d4:79:9a:76:2a: 9a:b2:a3:b1:a1:5b:fe:c9:9b:70:13:9c:c9:13:61:c7: 2a:3b:3e:8e:86:81:75:b8:ac:46:03:3d:1c:40:ab:e8: 9b:a2:ed:c6:da:56:1c:fe:16:ea:fa:c1:62:6a:6d:81: 02:85:35:d7:e4:5d:8b:73:1c:39:8c:6b:d7:88:6d:80: 45:43:fa:49:1a:0f:03:96:53:a7:d5:75:86:00:b6:63: 53:85:c4:45:9e:53:d0:d6:4e:2e:dd:13:68:a7:db:23: 1b:8a:80:be:46:47:00:fa:44:b7:4b:44:51:71:7b:b0: 46:d8:4a:9a:5f:d8:08:5f:ca:9a:cf:94:31:a9:17:31: 3d:ea:86:50:9e:b1:46:21:a5:4c:c4:f7:0d:3f:86:93: b1:ab:b2:ac:45:38:00:f4:23:e5:10:3e:d4:00:e2:f9: f5:b8:1b:69:4b:cf:39:05:6e:5c:a8:61:1b:21:86:54 Fingerprint (SHA-256): 14:AA:C2:A0:E4:1E:C2:FB:4F:83:37:62:13:EC:65:F7:78:7F:A0:8B:B6:C4:F4:65:5D:D4:ED:2D:9F:77:12:58 Fingerprint (SHA1): BF:D6:88:58:39:54:57:A9:86:4D:FF:A2:FD:67:88:29:83:FC:2F:95 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #259: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #260: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221554 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #261: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #262: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #263: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221555 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #264: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #265: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #266: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221556 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #267: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #268: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #269: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221557 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #270: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #271: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #272: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221558 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #273: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #274: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #275: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221559 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #276: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #277: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #278: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221560 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #279: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #280: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #281: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221561 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #282: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #283: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #284: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221562 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #285: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #286: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #287: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #288: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 927221563 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #289: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #290: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 927221564 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #291: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #292: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 927221565 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #293: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #294: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #295: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #296: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #297: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 927221566 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #298: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #299: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 927221567 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #300: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #301: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 927221568 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #302: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #303: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #304: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #305: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #306: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 927221569 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #307: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #308: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 927221570 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #309: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #310: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 927221571 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #311: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #312: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #313: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #314: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #315: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 927221572 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #316: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #317: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 927221573 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #318: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #319: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 927221574 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #320: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #321: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #322: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #323: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #324: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 927221575 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #325: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #326: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #327: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #328: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 927221576 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #329: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #330: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221554 (0x37444732) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Tue Sep 27 22:17:50 2022 Not After : Tue Sep 27 22:17:50 2072 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:32:c4:dd:cc:d7:dc:0e:ab:ad:8f:d5:bf:72:8d:7e: 65:74:86:51:b8:64:0f:43:66:16:ad:76:3f:e5:b0:5e: 6c:9f:c3:f3:dd:51:1c:48:41:c7:52:41:53:19:2e:af: 78:91:43:67:57:d6:03:9f:ce:4c:c5:64:51:eb:ef:bc: 66:62:70:1a:79:b1:38:6e:9f:99:e1:34:04:6e:23:4d: 75:a3:4f:89:8c:f3:a0:1f:54:d3:79:6d:00:0f:e3:70: ce:00:4c:c7:34:12:b4:e5:f9:1e:1a:90:a0:4b:81:58: 46:ca:a4:08:0a:6f:c5:ef:7e:71:78:e1:eb:b0:9e:a0: 17:a0:3a:fc:3f:b7:2c:89:04:9d:20:8d:59:0a:ff:fd: 78:20:31:c2:df:a1:23:6d:ee:fc:d0:b5:91:31:98:c9: 0b:24:7f:6e:c3:02:53:9a:ec:87:ce:bb:ce:38:69:19: 4c:a1:b4:49:74:6f:93:24:5c:c0:e7:1d:2c:c1:6f:2a: 43:35:2e:ad:28:ca:91:72:44:55:b8:2b:8a:6c:92:79: 02:77:92:67:3a:e1:ed:51:22:e0:f7:00:fa:33:12:74: eb:25:54:42:35:a8:ff:e9:31:a4:73:1e:b7:44:c7:47: 97:91:a8:a6:96:b0:8c:19:aa:61:b2:7e:51:6c:94:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:e9:78:1c:28:15:11:41:2e:43:11:85:85:0d:d4:b9: 85:67:ab:29:dc:ac:4f:1a:b4:2c:89:fc:9e:46:4a:21: da:dc:1f:e2:77:fa:08:e4:39:f2:88:d5:b4:26:e7:db: 01:34:8f:8d:45:98:ee:ec:bf:c3:75:f0:11:d6:24:23: 76:05:c7:33:bc:7d:f9:31:80:5f:1f:d7:05:fa:96:e4: c5:af:b4:d8:08:95:14:7e:f9:ee:83:ca:2c:e3:8b:c5: fc:4e:a3:75:cb:16:c5:5b:39:75:ec:ea:6c:42:a5:91: 44:24:8b:82:a7:dc:10:e2:33:98:98:13:94:54:89:5c: f9:c9:b6:9a:80:20:e5:22:aa:03:e8:6e:ca:69:26:85: 79:a1:4e:42:88:b5:18:60:9c:eb:1f:42:d1:82:fa:7d: 53:f9:a9:d4:42:aa:bc:9a:c1:5e:8a:ac:0f:e5:cd:74: c6:39:01:28:b8:1a:27:34:91:10:da:57:ac:cc:bb:18: 3b:85:20:33:ea:70:ba:04:09:f6:b0:78:fc:dc:e6:ce: d3:c5:6a:46:61:f6:03:e3:e7:22:a6:0d:e2:bc:cb:14: 21:62:6e:5a:00:d7:75:5e:cc:b2:4d:e1:02:94:c6:12: 8a:dd:2d:77:a3:0c:c7:18:5e:56:de:8e:05:0e:ed:56 Fingerprint (SHA-256): 25:85:C4:2B:ED:F9:9C:79:FE:55:23:9B:11:46:D7:8D:D2:41:47:96:14:3F:B3:FB:17:51:22:5B:67:23:75:77 Fingerprint (SHA1): 42:7B:BB:20:66:2C:A0:B0:48:38:1F:5F:66:6C:C7:46:52:DB:FB:0F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #331: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221555 (0x37444733) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Tue Sep 27 22:17:53 2022 Not After : Tue Sep 27 22:17:53 2072 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:df:f2:5d:26:fb:8e:8b:f7:f7:6e:bb:b5:c7:98:89: bc:37:2a:0a:12:c9:f5:15:5b:43:1f:7b:0b:3a:d0:86: 1a:0d:ba:89:e2:e3:04:f5:4d:ef:7d:d6:6b:24:02:8c: 0a:86:95:fa:58:8f:2d:a4:02:27:9e:b2:2c:11:ab:db: fc:af:1f:8a:4d:46:22:13:de:a9:20:93:45:57:39:c6: 1e:05:41:e4:97:b2:f6:31:0c:06:54:52:74:2c:69:fb: 93:0c:a8:98:58:72:4c:db:2c:27:8c:be:9d:c9:77:89: 3f:43:1b:49:4b:af:99:0a:3f:46:bb:be:75:1a:d9:a9: 7a:ef:ce:8c:12:68:5b:e5:c2:d4:08:2f:c8:af:ea:e4: 40:fd:0f:74:cf:b5:5b:37:9f:66:67:58:8a:b4:65:c6: 74:89:49:f3:7a:4d:cb:06:8b:56:f6:12:36:1a:b1:63: f5:13:33:0f:e9:2b:ce:db:74:78:46:58:b5:51:e5:3b: 44:96:7a:d5:65:0a:51:09:ab:27:d3:64:93:27:50:0d: 83:bf:39:b9:03:b7:c5:34:93:38:6d:cf:ae:b7:35:00: 3a:f7:b3:92:0e:67:8a:1b:45:f3:6b:4a:da:06:47:60: 1f:5d:b5:08:91:0f:b1:e7:12:7f:c6:41:58:25:2c:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c3:30:f4:c5:e4:40:c4:a2:d8:f6:2f:6d:07:7b:ff:c9: a7:f3:e1:e4:79:da:26:5b:f0:92:85:ef:24:3c:ea:30: 93:f7:45:39:d8:45:f0:8e:70:86:5f:f4:5c:53:b6:1a: d6:ef:66:fe:16:50:25:5b:a3:c6:12:b1:f2:2e:f8:07: f0:e0:eb:17:1d:cd:e0:8e:60:29:29:79:bb:a9:0d:44: 9d:1d:6f:55:2f:45:dc:5e:8a:ac:98:94:0c:d2:9f:a3: 90:ba:85:14:05:63:d3:77:7f:fa:92:2f:5e:32:dd:b0: 76:51:63:c6:91:0c:7e:43:1c:23:bc:6e:5b:55:12:5c: da:60:e9:1f:06:47:e5:d1:7f:2c:06:1b:45:b0:91:60: 0d:63:0f:9c:ab:fa:e8:3f:51:e5:b7:5d:d0:2a:44:cb: 12:1c:a9:d4:5a:36:2a:fd:69:61:fd:ed:1a:2c:46:f8: 34:ee:25:cf:2a:fb:4b:f1:1f:eb:e4:ae:43:13:a9:fa: 2c:8f:c2:f8:9e:5e:18:47:5d:25:b8:f3:24:f0:42:fc: 3a:72:36:03:47:11:5e:7b:4d:26:43:39:ad:11:cc:ed: 69:57:f3:f4:c0:eb:0a:05:4a:19:4c:33:79:71:66:c6: d8:60:6a:b3:ca:60:fa:ab:b3:7c:da:a1:5c:9d:96:ce Fingerprint (SHA-256): B5:F7:4A:14:C2:AE:D1:89:E5:17:A1:8D:56:ED:4C:F8:21:55:6E:F7:DE:9D:F8:6A:E5:6D:CC:91:FD:7E:5C:DC Fingerprint (SHA1): 6B:11:96:96:C3:DD:91:A2:AB:41:55:34:D6:9B:DC:0D:0B:A8:CD:27 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #332: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221556 (0x37444734) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Tue Sep 27 22:17:54 2022 Not After : Tue Sep 27 22:17:54 2072 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:7d:cd:fc:62:35:92:51:57:1e:d0:f8:d4:b2:4f:18: fb:51:17:ca:9a:29:fe:a2:9d:ef:4d:4b:2e:51:3a:38: 8b:58:b4:8b:7d:59:50:f9:82:44:22:29:b8:55:37:8c: 87:d0:b9:cb:bd:d8:43:c3:c5:f0:ed:78:1b:c4:17:40: c4:eb:34:c2:15:bd:5e:c9:55:08:73:1e:06:4f:7c:fd: 4b:fe:98:91:e1:72:8a:5b:06:4c:04:cb:2b:6b:f5:04: 3c:57:3a:be:a5:96:88:21:5d:51:b1:c6:6f:40:23:ce: 74:08:16:24:4e:85:6e:95:4e:e7:b0:38:1a:39:bf:b6: 8e:e8:ec:db:fc:19:79:92:a1:1e:62:4c:7b:4e:3a:27: 7e:cc:d3:c1:72:d1:40:44:0a:9b:65:95:08:19:72:db: 02:98:18:d5:d9:55:1b:79:52:0d:da:5a:57:8f:79:e3: 11:12:9a:58:9e:51:e7:bd:a2:bc:96:d7:42:6e:7c:70: 18:18:9f:13:4e:f6:b6:04:2d:d6:6e:da:bc:99:f6:07: 5b:2d:9f:f8:81:36:39:89:58:69:72:99:68:18:28:ad: d8:f8:a6:a0:63:3c:44:25:51:c7:4d:34:60:33:60:a6: 28:9e:b0:e2:f6:e4:7d:62:61:1a:52:45:d0:4a:cf:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:6f:6f:c9:13:14:bd:f2:3c:09:84:34:80:d9:ab:27: 55:84:1c:3e:b4:ce:07:2f:81:38:f8:22:a9:98:1c:aa: 90:19:f5:7b:b3:25:c6:ed:c0:00:ba:6b:2f:73:72:d8: d6:25:49:40:08:b1:b9:5f:a7:42:31:be:e7:56:42:52: a2:dc:6c:43:26:66:bf:11:e7:6c:9a:42:c6:34:1c:86: 84:43:b0:49:c2:ac:f8:ee:fe:d0:79:dd:d4:6b:8c:3f: 16:d8:4c:14:78:16:87:a8:3f:d2:6d:2c:11:57:8b:81: 24:46:3f:bc:68:66:67:94:e1:1e:6b:64:9a:7a:35:52: 7f:85:de:2b:19:79:d3:b0:a9:95:8b:f6:ba:30:69:4f: 43:d4:64:0b:f6:5b:38:5a:56:0e:f0:5f:d9:ed:a2:be: 71:2f:af:81:35:9f:15:a4:8c:d0:07:d7:14:13:7d:38: 95:ea:10:d2:3b:cc:58:b7:a0:3a:6e:02:3e:f1:a1:a9: 2d:d6:0e:59:a8:ca:09:32:06:9d:99:34:fe:04:a0:7e: 60:36:53:26:f6:36:bc:19:61:c8:cc:67:80:db:34:0a: f6:ee:e0:e2:af:9a:c5:b9:f9:44:d1:0b:15:a1:1f:e1: 47:97:0c:f8:56:bb:23:16:77:d5:30:72:bb:76:f6:86 Fingerprint (SHA-256): 73:8B:62:FA:A9:D0:FE:1A:07:0A:F5:C0:68:E2:D0:64:F6:16:E9:64:1B:5B:5C:81:F9:C9:09:EB:E1:E0:9A:06 Fingerprint (SHA1): 94:DA:4F:13:33:6A:37:BF:D8:8B:F3:A6:EA:DC:CD:25:38:C9:BC:57 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #333: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221557 (0x37444735) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Tue Sep 27 22:17:56 2022 Not After : Tue Sep 27 22:17:56 2072 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:6a:7e:08:2c:c3:94:b0:dd:c8:ce:15:c7:af:5c:9e: c7:8c:da:47:93:99:5b:ef:20:60:ed:85:fb:fa:c0:0c: bf:cf:c8:fc:7c:bb:dd:51:e3:51:82:e3:d8:39:43:8d: 37:ec:b5:7a:3f:43:b6:b8:4d:7d:34:93:20:66:ee:a1: 10:cc:ca:13:5a:19:b0:0a:7c:f4:f6:db:8f:1f:4d:2c: e3:c0:41:36:aa:9d:93:c7:d3:da:c2:04:c2:bc:87:da: c2:6d:ba:cc:e7:e4:68:1d:ad:d9:51:75:e0:77:94:53: 6c:10:2c:b8:88:2b:42:eb:66:fa:74:7a:4a:64:f2:f9: 00:6e:23:a4:bb:b2:b6:3d:3e:ec:b0:6f:87:24:66:a8: 34:c7:ca:a3:ff:9c:ba:22:1d:71:0d:09:89:f8:5b:7b: 8a:9b:14:80:b6:d6:2e:d2:1e:f2:4e:5a:92:48:b8:e2: 82:b5:cd:29:a7:ae:23:17:61:33:63:fd:a8:74:a7:af: 4c:50:df:97:9b:fa:52:08:f7:2b:c6:52:de:4c:ee:fc: f4:09:eb:a6:4c:8f:35:01:10:c2:3e:29:75:41:82:9b: c9:ad:70:24:a2:c9:b6:fb:a4:17:a9:f1:69:ff:ae:68: ae:4d:b6:ba:78:37:40:17:75:51:c3:9f:07:8b:23:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:4c:92:69:de:1e:78:28:a7:ae:47:21:89:7d:91:61: 51:bc:a5:2b:c4:d2:aa:5f:51:37:7a:47:1a:8b:97:34: 95:0c:ee:37:0e:9a:29:34:cd:1d:5a:e3:76:9a:6e:ff: 00:55:47:e2:08:1c:24:2a:8a:2d:06:50:3c:c0:82:6c: 3b:fc:03:2d:a6:95:e1:03:39:18:60:8d:5a:46:0e:db: 2b:90:5a:f5:ce:fa:4d:1b:66:bb:d7:0f:1d:a0:72:ed: 1e:76:6d:d9:f4:a7:7e:4e:d2:21:12:9c:22:96:6f:17: e3:ac:fa:ce:28:c0:a7:19:2c:e8:32:cc:11:c6:bb:f6: 99:67:38:a1:91:e7:bb:8d:67:3d:6e:d0:0d:34:0d:0b: 4b:78:62:91:1e:cd:58:b4:6c:2a:32:b0:92:e4:55:6a: 60:fc:33:15:09:d1:92:d4:d8:3e:7c:f0:48:8f:5c:b3: 48:39:a6:10:bb:3f:48:7b:b8:23:31:87:ff:f4:95:2d: 61:36:07:8f:81:90:c8:e2:75:e1:19:5b:e4:dc:a8:96: 0d:60:87:11:aa:61:fb:11:04:24:c4:ac:d1:c6:0c:92: 85:d2:31:5a:84:73:2c:9b:2f:b8:78:42:74:59:13:9c: a9:8f:54:c3:2c:1d:59:19:be:36:17:0a:89:b6:9d:c9 Fingerprint (SHA-256): 21:1C:D2:23:CE:1E:A1:E7:20:1D:CC:17:1B:37:07:DB:E6:9C:AF:17:82:9C:B4:24:BE:D7:AB:80:82:9D:02:D1 Fingerprint (SHA1): 1F:EF:A8:E0:B9:CF:74:C9:70:64:00:47:8D:DC:08:61:61:4A:84:78 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #334: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221558 (0x37444736) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Tue Sep 27 22:17:58 2022 Not After : Tue Sep 27 22:17:58 2072 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:dd:db:5d:01:0a:07:da:66:e3:a5:41:e1:b0:b3:64: d0:3d:ab:f9:ca:6c:fb:2e:69:d5:6a:ff:bd:b9:ca:c2: 2d:c6:da:93:00:7f:ca:c9:31:88:c1:2f:7d:59:87:46: 37:e6:42:04:c1:64:53:4c:c9:85:36:14:c3:37:ae:a7: 96:2a:6a:11:48:84:b6:1f:9c:4d:17:e8:de:39:0d:47: f0:05:75:f8:f4:fd:fa:bf:ce:2c:75:55:9c:3a:d5:09: 81:a0:b8:1b:b0:f7:a3:66:aa:02:68:cb:35:5b:53:ef: 3f:44:49:d7:12:55:c0:42:c6:1b:48:45:61:1e:ad:62: b3:d9:1e:c8:f9:ba:09:06:c5:3f:ca:4c:a2:88:f0:81: a8:97:86:81:ca:d7:b1:c2:64:d8:61:fa:f9:97:d3:b4: 06:d4:e3:58:a5:14:a7:29:96:2c:5f:85:30:03:27:f2: fc:8d:d9:48:57:83:f7:14:e4:9f:2b:25:f7:19:af:17: 0d:bd:90:61:44:bc:9e:ec:65:90:5b:ef:29:bf:f7:13: e4:a6:65:cd:4f:57:99:de:15:e0:cf:9e:d1:73:86:3d: db:b4:24:19:09:40:b0:06:60:4a:96:18:23:9d:2b:92: 0d:7b:12:4d:8b:8b:ba:42:3b:90:cd:f3:80:69:86:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:ba:c5:4d:46:81:a5:9a:4d:97:f9:f8:46:11:85:f8: 52:31:32:7b:cf:73:81:3e:21:f3:3c:34:15:bf:9c:9d: ed:96:48:3d:f3:5d:0a:0b:c6:71:a1:02:4b:a1:3e:c3: 43:01:f6:5a:a9:e0:0f:31:53:c2:4d:b0:2f:cf:4f:e9: 62:82:92:d0:f8:54:dc:0f:23:67:b5:aa:a4:94:6b:22: 33:ad:96:24:36:dd:97:33:6a:51:47:79:ad:e8:79:34: 15:5d:12:7c:d3:0f:4b:c5:f3:b0:cf:e9:12:ae:bc:04: 47:5b:a3:09:10:cb:85:6c:70:c3:9d:33:42:69:12:2f: 46:36:ef:1e:0a:b7:16:28:cc:ef:4e:65:99:03:59:32: ea:eb:3e:d6:3b:6e:52:50:67:6c:24:f9:26:bb:a6:5d: df:f4:61:3b:aa:58:d3:13:33:b6:05:78:5b:9b:32:a5: 3a:72:d8:6c:f7:97:68:f7:ee:03:da:02:1a:52:73:45: 45:a8:cc:2e:39:22:87:86:bf:1f:80:27:af:3b:d3:b5: 1a:46:fa:30:af:99:90:aa:bc:76:8d:82:5b:ef:df:7e: da:5e:75:c3:df:22:02:88:3f:63:da:29:0d:a8:04:86: c7:3b:2c:72:96:31:9d:2b:b8:26:6f:a7:93:eb:3a:f9 Fingerprint (SHA-256): 8C:47:BC:BF:86:EE:DA:F5:95:B8:D1:E2:62:7E:9D:AE:AE:B2:C1:38:07:B8:FD:DD:95:14:1B:AC:BB:0E:31:5C Fingerprint (SHA1): 04:91:64:50:F2:ED:33:0D:18:FB:DF:22:BF:59:D9:75:51:6B:99:A2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #335: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221559 (0x37444737) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Tue Sep 27 22:17:59 2022 Not After : Tue Sep 27 22:17:59 2072 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:1e:86:f3:09:5e:7f:70:2d:72:9f:c3:a2:d5:fe:38: 0e:29:ea:3b:c4:7d:05:d9:62:1f:5a:69:2e:bc:e0:18: 95:1a:c7:5e:43:f9:f2:d9:05:e8:15:d8:4b:80:6a:25: da:dc:3b:26:8c:05:83:10:4d:8d:de:03:0b:a1:a2:da: c4:0b:2f:c8:7a:5b:17:10:75:d9:41:e5:f6:1f:be:f3: 7d:78:ac:7b:57:bb:5f:85:eb:b0:51:d2:7d:99:08:52: 29:6d:ec:db:1a:4d:26:6f:38:2d:15:49:f6:54:d0:19: 9c:f0:ba:0e:5b:0d:e5:8f:94:cd:8a:b0:df:54:1c:d8: 5d:9c:97:98:1c:f1:b5:ac:ae:e5:b2:19:6d:b8:80:86: 1a:47:00:00:28:53:50:a0:cb:ea:98:11:31:84:13:ef: 9f:ae:c2:25:9c:3d:01:8b:3e:80:3c:52:0d:8e:b3:ab: e6:32:f3:08:45:c2:a7:0d:9a:fb:81:fc:f6:f4:19:e7: 8f:12:8d:0e:75:e5:57:84:64:60:ce:ed:c4:29:b3:e8: 09:62:b2:09:9e:95:0b:8e:c6:df:dd:f4:93:54:c5:16: 59:a8:e9:8e:36:cb:de:7b:1d:b9:4e:ca:11:88:93:c0: 30:8f:1e:75:ff:7e:8c:a5:2f:21:0f:d4:dd:93:bd:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:75:b9:80:46:56:d1:9d:a0:6a:26:bb:00:1d:32:b1: c6:c5:04:54:db:45:65:12:45:d8:44:d4:b8:f0:d4:75: da:3b:56:9d:df:16:6d:bf:2b:58:9f:eb:aa:cd:e8:08: c3:02:88:76:53:93:74:b3:01:28:d4:fa:b8:1d:ce:e7: e5:31:1e:eb:47:15:c4:9a:b1:09:de:8e:45:d9:91:a5: 18:24:6e:62:18:43:68:08:58:f4:27:62:a5:94:67:9b: 83:b4:8b:72:21:51:cc:d7:8b:6f:04:62:b7:d8:fb:51: 97:66:27:e9:f0:69:a0:d2:72:99:90:2a:15:12:98:2d: 9f:ba:b6:5d:09:6b:72:8a:7f:f1:41:b0:37:dd:f6:b3: b3:a1:81:d6:c3:b7:9a:f6:a5:0e:dd:61:00:71:77:40: e1:99:7e:2c:99:14:91:78:a6:a0:19:ab:67:ea:d7:19: 1a:5c:9f:80:71:d2:38:53:e4:78:53:e3:cc:98:de:2f: ad:37:1a:56:48:d3:94:da:ba:2a:a2:77:05:a2:9a:c2: db:fa:e0:2e:b9:8f:21:e4:50:cc:2a:b9:e3:66:a1:df: a1:3a:e3:57:03:a2:cc:66:5d:f8:a1:d5:84:bd:60:25: 45:d1:0a:ff:09:4a:13:37:08:8a:d7:27:9f:b8:31:36 Fingerprint (SHA-256): 51:37:73:BD:44:62:EF:8D:97:55:3B:D9:EE:21:B0:67:5A:3E:B6:16:76:4B:76:3F:68:ED:05:0D:EC:96:48:52 Fingerprint (SHA1): E5:C1:47:FE:3F:84:31:7A:8C:B2:FA:43:92:77:62:5F:CA:FC:09:6B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #336: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221560 (0x37444738) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Tue Sep 27 22:18:01 2022 Not After : Tue Sep 27 22:18:01 2072 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:04:6d:1f:27:f4:91:8d:80:03:1b:34:8f:d9:16:76: 48:75:c6:ac:01:a9:53:c8:9d:c3:2b:bd:68:40:f2:29: eb:5a:54:b5:1f:df:ec:b6:4c:de:cf:1a:50:8b:a5:00: 86:d9:8c:b6:a3:6a:09:32:5c:75:65:af:29:a8:ad:d2: bc:88:6c:46:40:a0:fd:0b:a4:dd:e2:3e:c2:a9:94:80: ee:48:39:e5:bd:6a:03:3a:5f:6f:df:30:ff:ba:e8:12: 41:50:1a:60:1b:fd:2f:92:09:53:d0:3e:02:37:7a:39: 59:53:24:bc:8e:d1:5f:53:8b:79:02:d1:6f:cd:82:46: b2:94:f4:de:70:9a:f4:4e:08:89:5a:b1:bd:66:c2:8a: 9a:c1:56:14:3a:bd:7e:bc:30:8e:88:76:81:1b:d8:c2: 2d:54:a3:fa:24:e9:ab:8d:54:51:94:cc:f8:2f:bd:18: fd:86:d3:85:19:95:32:49:08:0d:58:2f:4b:52:b0:be: cd:4f:cf:ea:63:6a:7a:c4:d6:94:cf:b3:e6:27:91:25: ed:3a:ff:6d:41:ea:ea:50:c9:2a:68:2a:ae:db:a2:75: 76:9b:89:f2:6d:63:34:01:bb:89:cd:70:f2:84:84:79: 50:84:c1:6e:e4:72:48:70:df:1d:64:b8:e4:a8:fc:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:a9:41:55:c5:ef:ed:be:96:3a:1b:56:f9:25:a1:d1: 12:00:dc:23:0a:e0:e4:b6:1f:93:8d:7c:bd:4f:a5:0c: ce:bb:84:db:7a:a4:aa:34:3e:37:1c:19:9e:9a:79:9c: 6a:4a:52:de:5b:84:06:18:41:81:33:b2:1f:c3:44:5b: d5:40:da:ef:45:91:ba:0d:53:e4:21:b7:d8:9d:5a:1c: bc:0a:aa:1a:82:18:2b:6a:2f:ec:49:13:c0:33:45:82: 2a:ba:a0:20:4a:0a:59:28:cf:04:bb:33:7e:49:c2:ce: 6a:cf:d4:ee:fc:41:6e:9e:3b:8f:b5:30:f0:a6:3b:b8: bf:69:ae:8d:f4:87:65:c3:25:f9:eb:78:b4:b7:d0:0e: 68:ee:09:61:6d:87:6f:f1:10:42:95:e7:43:b5:66:b1: 2c:b3:bd:d4:47:a2:84:b1:01:40:63:c8:8b:70:b7:d2: f7:ff:51:b7:b8:f8:e9:82:6d:05:68:0e:49:da:b1:66: 05:1e:2e:9a:f7:d9:7f:56:d5:25:93:c0:af:e3:77:db: 29:63:d2:cb:05:4b:8f:5e:6a:85:e6:47:3d:4c:b9:04: 08:c3:c0:ea:5d:07:e5:69:ed:74:c5:a9:ef:94:ce:fc: d8:2e:3c:8c:d8:ac:df:70:7c:6f:67:cb:5e:e5:e1:a9 Fingerprint (SHA-256): 54:76:AF:F0:DD:BA:66:02:A2:73:B6:46:53:D8:03:C8:71:2D:AD:72:50:EB:6B:3B:A6:6C:56:49:97:D1:19:48 Fingerprint (SHA1): E4:68:AD:D2:0E:F0:EB:EC:AB:2D:E4:B5:26:BA:62:65:BA:38:98:75 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #337: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221561 (0x37444739) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Tue Sep 27 22:18:03 2022 Not After : Tue Sep 27 22:18:03 2072 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:ed:5f:bc:4b:39:64:ca:77:5d:43:dc:1d:9b:23:6a: c4:67:65:d6:10:e7:d9:2b:a3:fc:c1:9f:73:55:65:e4: ef:a5:32:d5:d2:e9:fe:6c:24:00:dd:5d:b3:65:cd:cd: db:a0:66:68:3c:de:14:08:8c:e3:bc:82:c4:09:74:75: 75:cc:08:66:65:74:ba:e3:10:01:3c:17:c1:9d:5e:62: e8:da:c1:f3:19:0a:d1:f5:5e:6d:9b:35:ad:9f:be:97: bd:cc:21:76:0c:14:fb:0e:b9:54:90:c2:4e:13:a4:86: 92:bb:c2:d0:15:40:5f:7e:3b:96:54:ac:ad:46:37:7e: 8d:c5:2a:a8:ba:96:92:19:67:11:b2:49:73:2e:2d:69: 94:8d:d4:16:49:cf:32:c8:56:e8:47:2c:93:85:35:62: 16:da:b7:a7:05:0e:3d:dc:8d:4a:57:02:9a:dc:4d:6d: d7:bd:63:0e:64:e6:0b:43:f8:31:2c:0a:1c:0a:4d:ce: 95:a8:07:62:f3:88:2b:da:ef:b0:6f:a8:e3:57:6f:dd: af:d4:73:04:22:9e:6b:05:9d:9f:bb:1b:dc:7d:1a:ce: 5d:94:0a:32:83:c5:c4:ab:e1:16:5d:81:46:0e:41:1c: d0:49:96:95:b1:cb:70:cf:47:df:0b:87:79:13:b6:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:2e:19:e6:a3:ee:a0:29:b0:7f:c4:6e:b6:3d:34:6b: b9:71:0d:fc:c0:40:f1:8e:2e:81:c6:39:8a:36:04:2f: 23:73:52:5b:d1:7e:27:a7:aa:c6:fb:e3:5c:06:c3:ed: 4e:84:b3:7e:3e:f7:f2:e5:ad:a2:4c:be:0d:62:4b:f3: 8c:71:9e:11:0b:6e:f8:0a:21:f3:50:c1:5b:5b:45:9f: 31:cf:58:c8:58:00:13:b6:2b:48:9f:63:01:18:6d:28: 60:8b:b4:89:c5:1b:ee:17:d3:1c:ae:71:5c:c1:4a:89: 3c:8d:c2:7a:06:bb:ed:dc:f1:a4:1c:10:40:d0:2c:69: ab:eb:60:92:71:ef:e9:e0:28:4b:f2:a3:16:9c:56:b7: c1:7c:4d:bf:77:03:54:13:39:cc:80:f0:58:2c:4e:27: 1d:34:a8:da:8b:7f:68:7e:ca:31:d0:5e:f0:e5:74:7a: e5:27:f0:21:50:66:b5:b1:51:c4:1e:84:38:18:fb:1a: 45:f8:f0:08:dd:b9:a5:3e:90:80:28:48:ad:21:c3:cf: d0:12:f8:3d:24:1e:e2:6b:ad:62:7d:cc:09:9e:59:aa: 13:e7:72:6b:0a:2c:b2:3e:b9:2b:ca:31:f5:2a:d2:4d: 1c:19:8a:d0:ee:47:92:af:9e:3f:89:08:fa:de:2a:c2 Fingerprint (SHA-256): 8D:5D:A8:D2:67:67:2F:3D:02:C6:95:ED:74:4E:E8:B5:6D:DC:01:8E:CC:51:35:C6:12:BB:EC:90:ED:6B:87:D1 Fingerprint (SHA1): C4:3C:36:E7:F8:4A:68:66:DA:C4:B2:E6:42:3C:23:05:AF:AF:97:D0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #338: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221562 (0x3744473a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Tue Sep 27 22:18:04 2022 Not After : Tue Sep 27 22:18:04 2072 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:5c:a4:6d:e8:d5:03:ec:ff:39:c1:8a:8e:19:00:7c: 38:7b:90:02:f8:e8:c7:96:15:9d:46:48:d1:65:57:10: 6e:00:2e:7c:2a:36:58:4c:86:bd:9a:cc:c3:b5:66:73: c4:95:be:ae:55:75:ac:3b:e9:70:ff:ac:c9:1c:d7:56: da:55:4d:bf:00:07:04:27:90:30:53:a9:56:7b:cc:d9: 0f:e7:69:6e:3f:a6:17:13:66:db:35:8e:d0:b6:c3:bc: eb:a6:66:ff:81:f9:7e:ce:f3:b5:f9:62:06:47:0b:ea: fa:d8:3d:7d:5c:66:8f:fd:45:73:c6:38:64:4b:d1:a0: 84:b4:af:94:39:5a:25:0a:41:61:55:56:26:32:56:19: 4a:68:4e:fa:48:90:2b:cd:b7:cf:12:d6:89:6b:37:15: 74:c9:53:32:67:89:a9:16:aa:b3:87:03:90:6c:3c:c2: 77:e5:c3:f4:48:65:ed:78:9e:f4:91:f0:47:24:8e:df: 69:77:3d:93:05:87:64:2f:c5:e9:69:1d:26:91:c8:42: a3:d1:9a:e6:75:27:84:64:0e:63:ef:31:99:92:d3:72: 24:57:e3:bd:87:8a:85:3c:22:63:b7:54:f6:28:85:1d: d1:39:a5:83:6f:84:bc:07:b7:8e:ee:39:ac:0b:20:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:1b:85:dd:16:61:bd:95:58:d0:31:ff:6e:12:59:dd: eb:79:9d:92:9a:29:1b:33:1f:1b:bf:59:74:5b:63:e6: 7c:2b:a5:40:4a:b8:5e:c3:a5:bf:c9:92:83:4f:4a:60: 6f:c3:c0:fd:67:33:40:21:a9:60:6b:6d:3f:25:f3:80: da:f0:61:ce:0f:25:45:ba:36:bc:e6:9d:af:d0:ba:4a: 1c:4d:42:b1:3a:12:6a:b8:d1:46:48:44:21:8c:1c:ec: 84:12:32:87:73:06:98:65:f1:21:e1:f1:4c:fd:4d:38: 07:7c:8b:15:13:ef:5b:ab:91:55:4b:0a:a6:7d:96:b9: 11:4f:b5:e0:0a:30:62:ba:e9:65:0a:61:3c:c3:ba:cb: 55:69:2a:fb:58:b6:82:62:ee:de:af:0e:7c:9a:83:3c: 84:e2:92:47:94:3a:dc:08:d1:06:7b:1c:51:5e:b0:3a: 0a:3d:db:e1:33:d5:2c:c1:cb:3a:0b:1d:9e:f3:71:f8: 0f:6a:83:0a:c6:e5:ff:c4:00:5e:a9:aa:44:d9:28:e2: aa:dd:5b:bd:03:4b:f6:51:88:83:d1:3a:1f:52:be:bd: 40:7d:b0:a9:c4:2b:ac:da:14:33:69:67:79:c4:46:f2: 32:ab:99:47:6d:c9:9c:bd:c2:b5:1c:73:72:ee:b1:b7 Fingerprint (SHA-256): 94:25:D8:67:ED:F9:6B:A7:64:30:DF:81:19:2E:15:B9:BE:77:15:8C:A1:1A:E1:9B:3C:68:85:E4:38:9A:40:24 Fingerprint (SHA1): B9:80:61:CA:F4:4F:E9:63:11:E2:59:0C:74:FB:72:E1:5D:5A:2C:E2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #339: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #340: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221577 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #341: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #342: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #343: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #344: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927221578 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #345: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #346: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #347: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #348: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927221579 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #349: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #350: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #351: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #352: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 927221580 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #353: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #354: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #355: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221577 (0x37444749) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:18:24 2022 Not After : Tue Sep 27 22:18:24 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:a3:91:e6:16:fa:da:ab:64:9d:3f:36:fe:c7:b8:77: a0:32:85:71:07:51:f5:8d:46:e2:84:9b:aa:1c:68:3a: 95:3f:28:84:95:d4:72:7e:dd:94:0f:5a:55:f5:55:f3: 82:6c:c2:ed:a3:51:0e:03:a1:9f:12:ed:e0:b0:e6:09: e9:de:86:6a:87:6b:ed:0f:2c:ae:c8:d1:84:0f:fb:3f: 59:d6:94:04:3a:50:e0:cd:87:4c:94:ed:d1:2a:9e:d6: 23:44:47:09:0f:f0:51:90:1f:eb:0b:04:05:1c:18:cb: 45:09:f3:bc:50:d6:6e:2e:4f:9c:dc:e3:fd:04:ef:54: 93:d5:2b:82:ae:90:85:22:de:19:9d:af:09:c6:07:8d: 58:f2:e2:cb:6b:df:8d:01:2a:9b:0b:88:cc:1b:2f:3f: 67:7d:87:a6:1f:ac:0c:4d:34:86:29:13:b9:99:59:dd: ac:d2:5b:4a:0b:ac:be:bf:6f:56:92:5e:ea:86:c0:d9: 8a:e8:70:eb:10:38:64:a3:fb:fb:e3:61:7e:76:8e:a7: 88:98:4a:3d:63:a4:86:73:e2:f5:63:bf:d7:6a:42:7d: 66:45:e8:e1:53:b7:38:85:59:4e:f7:1e:21:01:4d:23: 97:05:dc:cf:76:7b:5d:89:15:37:8e:12:e3:bb:b4:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:d4:51:53:28:eb:1f:6e:c0:c7:75:6e:c6:d2:57:48: f5:46:cc:c2:3d:0d:78:5b:ec:10:0d:9a:4a:40:49:ca: c9:a9:a5:a5:b4:80:57:3d:c4:5e:72:13:fa:5c:3a:40: 82:e4:f0:bd:ea:1f:9e:7e:31:bb:76:90:9c:a2:17:c5: d0:23:65:1b:34:0e:ac:fd:09:82:e4:c2:31:e6:3d:24: fc:c9:55:7f:84:a2:4a:02:2a:ed:75:72:0d:39:3c:0f: 02:c6:a2:04:cf:86:6c:35:9a:e1:1a:a7:7f:72:86:7f: ae:ec:e2:c5:47:e5:09:64:c1:bf:cf:9b:e7:9c:b9:3a: c9:3d:12:1b:05:fd:4c:f3:c6:1b:be:ab:12:6e:ee:41: 99:f4:cf:8d:2b:21:1d:ce:27:4e:92:73:11:af:60:4a: b2:4d:a9:48:54:61:69:ba:01:61:44:2b:17:9d:a3:bc: ce:bb:8f:62:42:7e:60:1f:cb:8c:0c:c6:6e:ec:2e:b4: 27:7a:d9:91:aa:44:52:27:d7:4b:75:f1:f5:96:a0:c2: 74:ff:f1:f5:cf:cd:68:71:2d:d6:63:e4:7b:68:ba:19: b7:b2:1f:24:45:5e:cb:fd:af:11:ae:e6:fb:5e:22:d1: 45:a4:4a:e3:d9:b2:b2:72:dd:82:c4:98:c7:03:e3:c2 Fingerprint (SHA-256): 70:90:0D:B3:2E:42:36:95:F9:65:6B:F4:BF:25:06:3E:B2:C4:EB:D2:F2:8C:72:B3:6D:81:6A:BB:17:5F:03:B8 Fingerprint (SHA1): 4E:DD:FB:82:17:9B:2E:A4:8C:E8:2D:98:B6:4C:B2:FB:B6:99:8E:57 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #356: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #357: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221578 (0x3744474a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:18:25 2022 Not After : Mon Sep 27 22:18:25 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:24:c8:8f:9d:cf:0c:a0:17:65:79:0f:86:82:ef:5a: b6:86:89:eb:f1:38:e8:df:2f:29:5f:9f:09:6e:a9:18: 0d:98:e7:d1:37:a0:5f:00:f6:cd:30:05:33:48:e3:f5: de:49:4e:54:81:95:74:90:a7:fb:19:20:1d:b5:1c:97: 5a:c6:ce:fb:22:a6:97:8d:e9:8e:f2:57:75:61:1c:a5: 08:3d:6a:67:83:e0:e6:b1:26:96:ce:83:b6:fa:95:33: 54:bc:2c:fd:21:fa:79:ad:9d:4e:ce:2f:a4:fb:fc:88: 1c:7d:71:b7:ac:de:bb:72:27:fa:eb:ec:d9:b6:99:fd: 54:1e:94:c4:9c:b0:08:cb:ee:3f:25:0b:b6:c7:ae:2c: f1:3d:38:51:cc:c2:22:59:4f:d0:8a:66:0c:dc:e0:48: 11:25:fd:63:70:6a:9a:fa:f0:97:68:6b:f2:62:c0:87: 66:67:55:cd:4e:47:1e:d0:c0:c2:71:72:54:2f:aa:e4: f4:45:32:6b:e0:dd:d6:77:3f:74:40:3b:c1:ec:99:3c: 23:79:93:23:73:04:bc:30:e2:a9:48:7a:1c:84:f5:f4: ce:22:3d:48:19:be:56:78:6a:fb:c8:e3:86:89:57:e6: f4:ab:38:33:15:26:bd:7e:67:95:e3:c2:c2:6e:a7:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:aa:a8:7f:0b:45:cb:97:d5:5f:0d:11:28:fa:f7:cf: 0d:73:f8:4f:cf:43:ef:3b:47:09:e5:ce:36:90:1c:c5: ec:6c:f2:e1:33:38:e7:cd:b9:b0:b0:64:e4:75:e7:10: 6a:e7:d5:e8:dd:61:54:14:d9:03:02:ff:d0:9f:5b:81: 8d:53:c5:b3:2d:59:89:75:0a:ef:73:7d:b5:ef:09:12: 41:77:7f:00:a5:a6:39:19:3a:d5:94:f0:3d:4b:3e:23: 6d:eb:2e:ae:58:54:16:e0:5b:6f:ae:c5:23:ea:23:e8: 38:34:95:88:a3:da:69:7c:43:48:8a:03:6f:81:0e:3a: 8a:d3:44:2a:e6:bd:0b:bd:0d:03:92:81:eb:fa:e1:16: 78:e4:81:9f:0f:a7:af:0e:5c:77:02:38:32:45:17:99: 6c:b7:57:7d:6e:81:fa:4b:e3:c2:b0:a9:c0:a6:80:3c: 38:e4:41:50:24:d1:b2:17:4c:66:7c:ed:c6:a5:34:71: 4f:ca:a7:fe:fc:03:ee:d4:7e:23:2f:f9:f4:5c:08:80: ec:55:a4:9e:9a:db:e6:3d:ee:0d:09:c4:ed:fd:71:4a: 4c:e5:ed:81:13:08:da:71:70:27:d1:da:50:8e:99:2e: b4:7f:45:80:a2:91:fc:cc:7e:16:18:04:02:4a:1a:96 Fingerprint (SHA-256): 0B:20:98:EE:AD:F6:79:48:DC:FA:D8:FF:7F:93:36:1C:4E:DF:05:27:0F:9E:86:B7:2A:F7:07:11:25:75:F6:A6 Fingerprint (SHA1): C6:D3:82:A3:74:E1:27:06:16:F8:EC:1E:E6:77:7C:9C:08:6E:DC:3C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #358: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #359: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221579 (0x3744474b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 22:18:27 2022 Not After : Mon Sep 27 22:18:27 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:ae:ca:b6:d7:b8:4e:af:48:13:19:c2:b1:e1:60:2d: c3:7b:4e:b6:fa:c7:09:0f:f5:0d:3a:7c:4b:0f:63:cd: 13:f5:14:fc:6b:b1:31:e3:e8:ec:58:cd:d1:c8:a3:6c: f6:26:bd:69:fa:df:25:35:b1:03:69:dc:76:05:ed:c8: 5f:d9:c1:ce:6f:dc:e0:8e:48:71:06:6a:8b:f0:02:02: d1:1f:38:88:fd:9f:15:4d:10:9d:20:0d:98:31:59:dd: 77:0e:de:82:e3:64:e0:d2:98:90:b5:3a:0c:90:06:7b: fe:52:78:47:68:a2:5d:21:66:16:63:46:e6:0b:63:f3: a3:08:70:08:d8:2a:ad:60:94:41:52:50:a5:b6:3c:6f: e9:80:92:d0:c3:85:3c:42:45:6b:b7:cc:d5:68:cc:f9: b8:a9:e6:0a:6e:37:73:9a:8d:a0:0c:22:87:54:28:7a: 5a:6e:59:df:1c:7a:98:e9:fb:03:8f:4e:4a:2b:dc:40: 90:b9:0c:43:14:c1:22:b2:75:4c:62:94:83:14:af:e4: 6a:d3:7e:2e:28:29:98:59:8c:6a:5f:63:e5:c4:68:2f: 37:17:21:27:4d:96:8a:4c:9b:6e:44:e9:7e:2b:64:fe: c2:56:91:59:a7:7b:17:e1:68:ad:71:00:fd:6e:8a:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:b4:f0:a6:d9:0b:36:ba:e2:05:91:24:fd:3f:a1:84: 8e:a1:17:f5:d5:65:02:eb:a6:4b:fd:eb:c4:7f:c6:81: 62:27:66:a3:b4:06:70:63:0f:5c:e5:1b:22:a2:3d:ca: dc:29:2f:03:a9:86:7d:d0:fe:6e:96:7e:28:4a:77:1b: b2:93:4e:e2:27:83:f0:dc:bc:7c:60:cc:1e:22:32:07: 6d:da:7d:83:f3:fb:a1:67:04:71:06:54:db:76:1c:30: ee:37:55:0e:6c:89:99:96:3b:68:fe:68:7f:cc:c4:9e: 2a:78:97:f0:c0:08:f3:06:bb:f6:c5:b3:8b:17:4b:13: c8:c8:97:aa:5f:e9:87:7f:90:e7:a4:fc:59:ea:3d:d4: a5:10:a8:7b:4c:0e:45:07:55:03:bc:c4:40:51:8a:fa: d6:fc:29:13:5a:28:ab:61:80:32:5c:46:e1:2a:bd:62: 1a:4c:da:05:95:95:86:0a:6f:f0:d2:f2:2d:d0:32:f3: b5:c4:b7:dc:48:db:06:09:1f:2e:54:48:ca:22:4b:88: 7d:2d:c0:90:f7:ab:f7:46:fc:de:e4:13:e2:5d:73:bc: ea:4d:62:8e:3c:89:53:ee:be:7b:87:1e:58:cf:70:e6: a8:bd:34:e9:11:94:46:72:45:39:3d:e8:a7:4c:dd:7e Fingerprint (SHA-256): 2D:59:BB:AE:A0:2D:FB:76:45:37:FD:7F:A7:D7:88:9A:9A:82:52:9D:AE:1F:13:92:38:5E:99:CB:C2:A1:A0:6C Fingerprint (SHA1): 04:6C:C4:F0:D6:80:FE:F6:6E:EA:36:E2:16:F4:F3:A5:81:07:76:63 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #360: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #361: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #362: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #363: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #364: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221577 (0x37444749) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:18:24 2022 Not After : Tue Sep 27 22:18:24 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:a3:91:e6:16:fa:da:ab:64:9d:3f:36:fe:c7:b8:77: a0:32:85:71:07:51:f5:8d:46:e2:84:9b:aa:1c:68:3a: 95:3f:28:84:95:d4:72:7e:dd:94:0f:5a:55:f5:55:f3: 82:6c:c2:ed:a3:51:0e:03:a1:9f:12:ed:e0:b0:e6:09: e9:de:86:6a:87:6b:ed:0f:2c:ae:c8:d1:84:0f:fb:3f: 59:d6:94:04:3a:50:e0:cd:87:4c:94:ed:d1:2a:9e:d6: 23:44:47:09:0f:f0:51:90:1f:eb:0b:04:05:1c:18:cb: 45:09:f3:bc:50:d6:6e:2e:4f:9c:dc:e3:fd:04:ef:54: 93:d5:2b:82:ae:90:85:22:de:19:9d:af:09:c6:07:8d: 58:f2:e2:cb:6b:df:8d:01:2a:9b:0b:88:cc:1b:2f:3f: 67:7d:87:a6:1f:ac:0c:4d:34:86:29:13:b9:99:59:dd: ac:d2:5b:4a:0b:ac:be:bf:6f:56:92:5e:ea:86:c0:d9: 8a:e8:70:eb:10:38:64:a3:fb:fb:e3:61:7e:76:8e:a7: 88:98:4a:3d:63:a4:86:73:e2:f5:63:bf:d7:6a:42:7d: 66:45:e8:e1:53:b7:38:85:59:4e:f7:1e:21:01:4d:23: 97:05:dc:cf:76:7b:5d:89:15:37:8e:12:e3:bb:b4:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:d4:51:53:28:eb:1f:6e:c0:c7:75:6e:c6:d2:57:48: f5:46:cc:c2:3d:0d:78:5b:ec:10:0d:9a:4a:40:49:ca: c9:a9:a5:a5:b4:80:57:3d:c4:5e:72:13:fa:5c:3a:40: 82:e4:f0:bd:ea:1f:9e:7e:31:bb:76:90:9c:a2:17:c5: d0:23:65:1b:34:0e:ac:fd:09:82:e4:c2:31:e6:3d:24: fc:c9:55:7f:84:a2:4a:02:2a:ed:75:72:0d:39:3c:0f: 02:c6:a2:04:cf:86:6c:35:9a:e1:1a:a7:7f:72:86:7f: ae:ec:e2:c5:47:e5:09:64:c1:bf:cf:9b:e7:9c:b9:3a: c9:3d:12:1b:05:fd:4c:f3:c6:1b:be:ab:12:6e:ee:41: 99:f4:cf:8d:2b:21:1d:ce:27:4e:92:73:11:af:60:4a: b2:4d:a9:48:54:61:69:ba:01:61:44:2b:17:9d:a3:bc: ce:bb:8f:62:42:7e:60:1f:cb:8c:0c:c6:6e:ec:2e:b4: 27:7a:d9:91:aa:44:52:27:d7:4b:75:f1:f5:96:a0:c2: 74:ff:f1:f5:cf:cd:68:71:2d:d6:63:e4:7b:68:ba:19: b7:b2:1f:24:45:5e:cb:fd:af:11:ae:e6:fb:5e:22:d1: 45:a4:4a:e3:d9:b2:b2:72:dd:82:c4:98:c7:03:e3:c2 Fingerprint (SHA-256): 70:90:0D:B3:2E:42:36:95:F9:65:6B:F4:BF:25:06:3E:B2:C4:EB:D2:F2:8C:72:B3:6D:81:6A:BB:17:5F:03:B8 Fingerprint (SHA1): 4E:DD:FB:82:17:9B:2E:A4:8C:E8:2D:98:B6:4C:B2:FB:B6:99:8E:57 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #365: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #366: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221578 (0x3744474a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:18:25 2022 Not After : Mon Sep 27 22:18:25 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:24:c8:8f:9d:cf:0c:a0:17:65:79:0f:86:82:ef:5a: b6:86:89:eb:f1:38:e8:df:2f:29:5f:9f:09:6e:a9:18: 0d:98:e7:d1:37:a0:5f:00:f6:cd:30:05:33:48:e3:f5: de:49:4e:54:81:95:74:90:a7:fb:19:20:1d:b5:1c:97: 5a:c6:ce:fb:22:a6:97:8d:e9:8e:f2:57:75:61:1c:a5: 08:3d:6a:67:83:e0:e6:b1:26:96:ce:83:b6:fa:95:33: 54:bc:2c:fd:21:fa:79:ad:9d:4e:ce:2f:a4:fb:fc:88: 1c:7d:71:b7:ac:de:bb:72:27:fa:eb:ec:d9:b6:99:fd: 54:1e:94:c4:9c:b0:08:cb:ee:3f:25:0b:b6:c7:ae:2c: f1:3d:38:51:cc:c2:22:59:4f:d0:8a:66:0c:dc:e0:48: 11:25:fd:63:70:6a:9a:fa:f0:97:68:6b:f2:62:c0:87: 66:67:55:cd:4e:47:1e:d0:c0:c2:71:72:54:2f:aa:e4: f4:45:32:6b:e0:dd:d6:77:3f:74:40:3b:c1:ec:99:3c: 23:79:93:23:73:04:bc:30:e2:a9:48:7a:1c:84:f5:f4: ce:22:3d:48:19:be:56:78:6a:fb:c8:e3:86:89:57:e6: f4:ab:38:33:15:26:bd:7e:67:95:e3:c2:c2:6e:a7:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:aa:a8:7f:0b:45:cb:97:d5:5f:0d:11:28:fa:f7:cf: 0d:73:f8:4f:cf:43:ef:3b:47:09:e5:ce:36:90:1c:c5: ec:6c:f2:e1:33:38:e7:cd:b9:b0:b0:64:e4:75:e7:10: 6a:e7:d5:e8:dd:61:54:14:d9:03:02:ff:d0:9f:5b:81: 8d:53:c5:b3:2d:59:89:75:0a:ef:73:7d:b5:ef:09:12: 41:77:7f:00:a5:a6:39:19:3a:d5:94:f0:3d:4b:3e:23: 6d:eb:2e:ae:58:54:16:e0:5b:6f:ae:c5:23:ea:23:e8: 38:34:95:88:a3:da:69:7c:43:48:8a:03:6f:81:0e:3a: 8a:d3:44:2a:e6:bd:0b:bd:0d:03:92:81:eb:fa:e1:16: 78:e4:81:9f:0f:a7:af:0e:5c:77:02:38:32:45:17:99: 6c:b7:57:7d:6e:81:fa:4b:e3:c2:b0:a9:c0:a6:80:3c: 38:e4:41:50:24:d1:b2:17:4c:66:7c:ed:c6:a5:34:71: 4f:ca:a7:fe:fc:03:ee:d4:7e:23:2f:f9:f4:5c:08:80: ec:55:a4:9e:9a:db:e6:3d:ee:0d:09:c4:ed:fd:71:4a: 4c:e5:ed:81:13:08:da:71:70:27:d1:da:50:8e:99:2e: b4:7f:45:80:a2:91:fc:cc:7e:16:18:04:02:4a:1a:96 Fingerprint (SHA-256): 0B:20:98:EE:AD:F6:79:48:DC:FA:D8:FF:7F:93:36:1C:4E:DF:05:27:0F:9E:86:B7:2A:F7:07:11:25:75:F6:A6 Fingerprint (SHA1): C6:D3:82:A3:74:E1:27:06:16:F8:EC:1E:E6:77:7C:9C:08:6E:DC:3C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #367: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #368: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221579 (0x3744474b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 22:18:27 2022 Not After : Mon Sep 27 22:18:27 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:ae:ca:b6:d7:b8:4e:af:48:13:19:c2:b1:e1:60:2d: c3:7b:4e:b6:fa:c7:09:0f:f5:0d:3a:7c:4b:0f:63:cd: 13:f5:14:fc:6b:b1:31:e3:e8:ec:58:cd:d1:c8:a3:6c: f6:26:bd:69:fa:df:25:35:b1:03:69:dc:76:05:ed:c8: 5f:d9:c1:ce:6f:dc:e0:8e:48:71:06:6a:8b:f0:02:02: d1:1f:38:88:fd:9f:15:4d:10:9d:20:0d:98:31:59:dd: 77:0e:de:82:e3:64:e0:d2:98:90:b5:3a:0c:90:06:7b: fe:52:78:47:68:a2:5d:21:66:16:63:46:e6:0b:63:f3: a3:08:70:08:d8:2a:ad:60:94:41:52:50:a5:b6:3c:6f: e9:80:92:d0:c3:85:3c:42:45:6b:b7:cc:d5:68:cc:f9: b8:a9:e6:0a:6e:37:73:9a:8d:a0:0c:22:87:54:28:7a: 5a:6e:59:df:1c:7a:98:e9:fb:03:8f:4e:4a:2b:dc:40: 90:b9:0c:43:14:c1:22:b2:75:4c:62:94:83:14:af:e4: 6a:d3:7e:2e:28:29:98:59:8c:6a:5f:63:e5:c4:68:2f: 37:17:21:27:4d:96:8a:4c:9b:6e:44:e9:7e:2b:64:fe: c2:56:91:59:a7:7b:17:e1:68:ad:71:00:fd:6e:8a:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:b4:f0:a6:d9:0b:36:ba:e2:05:91:24:fd:3f:a1:84: 8e:a1:17:f5:d5:65:02:eb:a6:4b:fd:eb:c4:7f:c6:81: 62:27:66:a3:b4:06:70:63:0f:5c:e5:1b:22:a2:3d:ca: dc:29:2f:03:a9:86:7d:d0:fe:6e:96:7e:28:4a:77:1b: b2:93:4e:e2:27:83:f0:dc:bc:7c:60:cc:1e:22:32:07: 6d:da:7d:83:f3:fb:a1:67:04:71:06:54:db:76:1c:30: ee:37:55:0e:6c:89:99:96:3b:68:fe:68:7f:cc:c4:9e: 2a:78:97:f0:c0:08:f3:06:bb:f6:c5:b3:8b:17:4b:13: c8:c8:97:aa:5f:e9:87:7f:90:e7:a4:fc:59:ea:3d:d4: a5:10:a8:7b:4c:0e:45:07:55:03:bc:c4:40:51:8a:fa: d6:fc:29:13:5a:28:ab:61:80:32:5c:46:e1:2a:bd:62: 1a:4c:da:05:95:95:86:0a:6f:f0:d2:f2:2d:d0:32:f3: b5:c4:b7:dc:48:db:06:09:1f:2e:54:48:ca:22:4b:88: 7d:2d:c0:90:f7:ab:f7:46:fc:de:e4:13:e2:5d:73:bc: ea:4d:62:8e:3c:89:53:ee:be:7b:87:1e:58:cf:70:e6: a8:bd:34:e9:11:94:46:72:45:39:3d:e8:a7:4c:dd:7e Fingerprint (SHA-256): 2D:59:BB:AE:A0:2D:FB:76:45:37:FD:7F:A7:D7:88:9A:9A:82:52:9D:AE:1F:13:92:38:5E:99:CB:C2:A1:A0:6C Fingerprint (SHA1): 04:6C:C4:F0:D6:80:FE:F6:6E:EA:36:E2:16:F4:F3:A5:81:07:76:63 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #369: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #370: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #371: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221581 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #372: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #373: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #374: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #375: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927221582 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #376: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #377: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #378: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #379: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927221583 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #380: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #381: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #382: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #383: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 927221584 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #384: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #385: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #386: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #387: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 927221585 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #388: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #389: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #390: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221581 (0x3744474d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:18:33 2022 Not After : Tue Sep 27 22:18:33 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:05:80:41:00:c8:3d:db:ff:13:6f:eb:f4:42:95:2d: 4e:44:2d:0a:ec:40:eb:53:db:01:1a:2b:74:2c:e2:94: 8f:f0:f8:0f:9d:41:f7:f8:5b:65:4d:69:fc:f7:ca:df: e2:2a:38:b9:82:07:0b:30:09:73:9a:e2:30:eb:a5:0a: 56:77:4c:81:c2:26:56:d3:3c:49:90:82:2c:9d:9a:d8: 31:00:c6:68:fd:cb:85:29:d6:ca:1e:7a:2c:8c:4c:92: 0a:49:8d:33:73:e6:d4:eb:06:1a:f1:c0:13:b5:0c:7f: 41:bd:20:e2:04:4f:a4:30:fe:21:87:d5:b1:c7:9b:ce: 7f:34:03:02:05:11:f3:2f:9f:ae:eb:21:08:38:94:06: 1b:7e:e0:a4:1c:ef:a1:ae:63:7c:4d:a8:a7:33:f0:f4: 70:27:f2:7b:36:51:04:64:22:74:ae:66:9c:6d:51:2c: d3:c9:d6:a3:aa:74:8d:f8:b5:5f:cf:6b:71:dd:d4:ec: 7e:61:89:81:84:89:4c:25:42:f2:0c:f4:83:b9:ab:b9: 81:9d:65:fd:21:11:62:f0:df:a2:b5:98:8f:24:6f:52: d0:07:69:66:c2:c8:b9:35:46:c1:ed:84:1b:9d:a2:51: 7e:e3:b7:70:5d:de:be:86:47:8e:1e:2a:c2:87:31:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c4:5c:0d:82:ca:46:97:61:49:58:7a:18:ab:1f:e2:9c: 7e:4f:39:7c:5a:c9:17:e2:6f:64:d8:72:c3:44:1f:04: 98:a6:2a:32:95:67:d8:8a:33:44:48:a9:bb:99:6b:53: f8:95:08:e1:d7:47:0c:4f:de:fc:97:33:97:89:82:e8: 97:11:e7:87:12:35:12:a4:e7:20:d3:8d:42:3f:d5:d8: d9:7a:23:d8:40:e6:87:3b:ee:f4:20:58:a7:39:04:d2: fd:8e:21:eb:96:60:fc:65:22:ec:63:43:f2:6b:f5:f0: f0:c7:0f:3e:75:53:c0:6f:b8:bb:89:e9:ba:d6:ce:b1: 22:76:2a:8c:dc:0f:a6:39:fc:29:0a:02:ac:05:2e:f5: f3:e5:61:9d:bd:82:39:4f:bd:ee:ed:d5:42:24:35:14: b5:5b:39:38:24:4e:08:92:46:0e:b0:49:1a:07:0e:e2: e4:94:4b:ab:ed:4f:38:47:33:09:1e:e9:a4:82:ac:09: 7f:88:b0:f9:a0:68:83:86:a0:ba:d9:bb:cd:0f:cc:24: 9d:49:dd:9a:59:c3:c8:39:4a:d9:fb:8b:7c:a9:9e:b7: 84:8f:99:90:f1:1c:7b:84:cf:66:fc:86:35:0e:74:94: 78:d1:4b:f0:88:be:a0:bc:fd:66:3f:e1:f4:c6:d7:79 Fingerprint (SHA-256): 4C:71:25:82:66:E0:EA:59:90:B7:EE:EE:AB:EE:BF:8A:29:B7:0F:E0:F8:B7:8F:84:80:A6:99:9C:8A:6C:37:CA Fingerprint (SHA1): BF:E7:3C:2E:A2:58:5C:4C:2B:A8:88:7D:1D:AB:88:AE:89:75:35:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #391: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #392: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221582 (0x3744474e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:18:35 2022 Not After : Mon Sep 27 22:18:35 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:c5:46:b0:52:0b:2b:f3:42:98:4c:2d:03:fa:31:1d: 5f:c3:6d:96:dc:b2:3c:98:b4:d5:bc:b8:1f:51:55:5b: 15:1e:05:6d:44:4a:22:94:14:74:4d:8c:33:aa:49:71: 88:ee:6d:a4:ea:5c:96:1e:00:f8:d1:61:dc:03:ba:41: 34:c9:db:8f:74:f5:8c:35:d1:dd:27:12:60:29:b9:06: 7d:a0:83:5e:67:44:aa:71:aa:67:65:48:c1:d6:ee:32: 56:b0:2e:67:a1:06:c8:cb:d9:28:85:3e:eb:d6:7e:94: 21:30:66:fd:a4:c1:22:46:67:26:70:36:81:40:38:07: a3:f1:aa:ba:8d:b2:71:3f:51:c4:68:36:f9:93:dd:4b: 02:4a:f5:35:20:ad:8e:46:d1:8b:9e:ba:d6:c6:43:fb: 47:8c:de:dd:5d:dd:ad:13:94:82:9f:26:5b:b1:bf:77: 55:f0:12:7c:3e:8d:66:de:d8:92:dc:26:48:6e:a1:3c: 09:fa:29:d9:44:41:1c:ac:0d:9f:00:85:d5:43:a1:4c: 8c:5d:06:d5:6c:34:6e:2f:0f:d9:d2:52:7b:78:af:15: a7:66:32:6d:bb:ec:a8:57:be:02:65:72:a7:47:52:87: 5e:3f:f3:60:9b:3d:c6:24:e5:16:37:97:94:8d:44:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:11:cd:7a:25:56:7f:63:6d:6f:fc:2d:b6:cb:d3:e3: 14:f9:5e:d4:0e:bc:7b:83:62:83:ff:07:b4:46:a2:a8: 71:7a:a7:04:e6:5d:f2:4d:f8:64:a0:8c:b5:0a:cf:ce: 06:c7:ba:42:3c:b6:7c:d0:9e:d3:12:04:b5:0d:d9:dd: 0c:53:40:22:e7:da:08:b7:45:69:4f:b8:7f:95:c3:a4: d8:30:28:78:ff:4a:7e:d2:b3:3e:5f:12:8d:46:fb:e2: 12:ef:c3:3f:a4:6d:f7:39:be:5a:ca:29:4e:43:cc:72: 7c:58:9b:c6:e6:39:ba:65:a8:a5:bc:c9:9e:51:88:d4: 52:95:d5:4c:a3:74:79:f2:6b:6a:51:9f:db:85:74:4f: ac:73:a0:6b:28:ed:ab:88:6d:34:60:2e:16:7c:ea:20: b1:a8:cc:6f:a0:bd:c5:6c:99:e3:ba:68:fa:77:17:b3: 50:59:84:07:cc:74:d4:02:e5:b0:dd:7e:aa:4f:29:32: e9:7d:3c:55:03:9f:b9:8e:96:0c:eb:3e:05:c5:56:02: 74:44:1f:7a:f3:c8:97:b9:25:e8:4f:2d:b9:54:3f:c1: 78:ad:e2:12:8c:c1:de:b6:af:1b:e8:54:90:6f:4e:a7: b1:93:e5:34:ba:cd:93:fd:0d:0c:31:ea:63:78:85:55 Fingerprint (SHA-256): 40:9E:71:B7:25:63:80:85:83:6D:81:C7:36:AD:AF:42:ED:4A:1F:32:94:98:04:58:AD:AB:7D:91:8E:50:98:8F Fingerprint (SHA1): 7C:07:B1:F1:A0:BF:77:CD:74:FD:4C:06:1C:BA:E4:C6:C9:0B:01:0E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #393: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #394: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221583 (0x3744474f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 22:18:37 2022 Not After : Mon Sep 27 22:18:37 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:5d:ba:2e:73:cd:05:94:34:65:f3:88:6a:3a:71:12: 0b:a5:10:91:15:44:61:12:5e:53:05:92:84:d4:80:8f: d2:f4:43:e3:7c:66:22:19:7c:75:5a:47:ec:2b:52:3c: 48:4c:f8:d3:20:a9:75:8b:80:c4:9e:0b:76:24:f3:d4: ed:bb:a2:61:20:7d:bc:82:8a:5e:b6:3d:73:0c:fa:6b: 9c:b1:02:34:a3:3e:23:09:0a:5d:e0:bd:77:46:9a:f1: e0:67:12:5f:86:06:c0:94:6a:14:b1:eb:0f:86:16:d2: 08:3b:38:d9:7c:39:02:39:1b:32:49:3f:28:5e:be:6a: 2a:c8:e5:ee:6f:52:97:d9:aa:67:c4:9e:e3:b6:d3:a3: 84:15:4c:8a:e9:0e:22:51:20:21:91:09:60:8d:60:12: cd:08:94:37:54:09:c4:28:40:f4:21:15:3f:1a:2d:e1: cd:e1:33:8b:9e:b7:e9:3c:6e:a7:33:d2:b9:d2:8f:6b: 0a:aa:5b:46:f4:9f:0e:43:d4:09:27:44:a8:1b:e0:5b: 9d:de:c9:b7:48:cb:7f:88:9b:e3:37:85:5a:6e:ca:92: d6:65:c6:cf:1e:db:76:5d:9d:8c:21:ca:02:cd:bf:d6: a0:3f:f8:bf:82:14:97:2b:b9:30:f6:b8:15:2e:d6:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:95:5a:d0:87:de:59:ec:86:e8:cd:f8:84:f6:0e:45: ff:50:79:c3:f9:8b:fa:4f:b5:0f:9b:24:7d:b6:85:a1: ac:84:9c:e1:bf:28:e6:4a:40:fc:ee:fa:48:8b:e1:ee: aa:16:af:ab:e5:46:42:9b:5c:b0:f5:1f:68:29:ba:3a: 78:bd:f1:28:25:a8:ab:9c:2a:fe:61:7a:0c:eb:9c:2d: 0d:96:d3:b4:8c:c4:ed:8d:88:10:73:1d:d1:d3:79:e0: de:9a:49:36:7c:86:7d:ea:2d:a3:19:b5:d4:d0:34:61: 7a:49:0b:10:7e:95:fd:6d:1a:54:aa:0f:be:34:58:96: 72:23:ce:6f:76:4b:3f:44:00:ae:46:bf:32:18:4a:11: c4:38:c4:1b:22:e5:0b:ee:e5:90:9d:af:3c:6d:40:b5: 9d:5b:f5:2e:db:71:e3:aa:45:40:52:79:9a:fa:39:4d: 5f:1e:a6:54:5a:b8:01:4d:55:a1:3b:38:73:cc:7f:5a: e8:d7:46:e0:35:c4:fe:ff:35:09:a6:e8:1e:88:4f:73: a0:16:14:e5:1b:11:8c:01:19:b1:24:cf:c3:fe:e4:a0: f0:96:7a:8a:ab:9d:2a:3b:5b:d6:be:0a:b2:bf:9a:be: 91:be:f8:77:26:0b:40:ca:54:b8:bc:93:2a:d0:fa:ac Fingerprint (SHA-256): 27:D7:CB:33:A1:26:96:04:D5:83:9D:B8:D0:EB:B9:A7:9E:89:14:8D:47:99:E5:31:F8:59:89:B9:71:5B:57:BC Fingerprint (SHA1): 5A:F3:60:A5:EC:EE:EB:F3:AC:AA:CA:06:07:6C:46:CB:7D:13:7C:D4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #395: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #396: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #397: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #398: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #399: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221581 (0x3744474d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:18:33 2022 Not After : Tue Sep 27 22:18:33 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:05:80:41:00:c8:3d:db:ff:13:6f:eb:f4:42:95:2d: 4e:44:2d:0a:ec:40:eb:53:db:01:1a:2b:74:2c:e2:94: 8f:f0:f8:0f:9d:41:f7:f8:5b:65:4d:69:fc:f7:ca:df: e2:2a:38:b9:82:07:0b:30:09:73:9a:e2:30:eb:a5:0a: 56:77:4c:81:c2:26:56:d3:3c:49:90:82:2c:9d:9a:d8: 31:00:c6:68:fd:cb:85:29:d6:ca:1e:7a:2c:8c:4c:92: 0a:49:8d:33:73:e6:d4:eb:06:1a:f1:c0:13:b5:0c:7f: 41:bd:20:e2:04:4f:a4:30:fe:21:87:d5:b1:c7:9b:ce: 7f:34:03:02:05:11:f3:2f:9f:ae:eb:21:08:38:94:06: 1b:7e:e0:a4:1c:ef:a1:ae:63:7c:4d:a8:a7:33:f0:f4: 70:27:f2:7b:36:51:04:64:22:74:ae:66:9c:6d:51:2c: d3:c9:d6:a3:aa:74:8d:f8:b5:5f:cf:6b:71:dd:d4:ec: 7e:61:89:81:84:89:4c:25:42:f2:0c:f4:83:b9:ab:b9: 81:9d:65:fd:21:11:62:f0:df:a2:b5:98:8f:24:6f:52: d0:07:69:66:c2:c8:b9:35:46:c1:ed:84:1b:9d:a2:51: 7e:e3:b7:70:5d:de:be:86:47:8e:1e:2a:c2:87:31:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c4:5c:0d:82:ca:46:97:61:49:58:7a:18:ab:1f:e2:9c: 7e:4f:39:7c:5a:c9:17:e2:6f:64:d8:72:c3:44:1f:04: 98:a6:2a:32:95:67:d8:8a:33:44:48:a9:bb:99:6b:53: f8:95:08:e1:d7:47:0c:4f:de:fc:97:33:97:89:82:e8: 97:11:e7:87:12:35:12:a4:e7:20:d3:8d:42:3f:d5:d8: d9:7a:23:d8:40:e6:87:3b:ee:f4:20:58:a7:39:04:d2: fd:8e:21:eb:96:60:fc:65:22:ec:63:43:f2:6b:f5:f0: f0:c7:0f:3e:75:53:c0:6f:b8:bb:89:e9:ba:d6:ce:b1: 22:76:2a:8c:dc:0f:a6:39:fc:29:0a:02:ac:05:2e:f5: f3:e5:61:9d:bd:82:39:4f:bd:ee:ed:d5:42:24:35:14: b5:5b:39:38:24:4e:08:92:46:0e:b0:49:1a:07:0e:e2: e4:94:4b:ab:ed:4f:38:47:33:09:1e:e9:a4:82:ac:09: 7f:88:b0:f9:a0:68:83:86:a0:ba:d9:bb:cd:0f:cc:24: 9d:49:dd:9a:59:c3:c8:39:4a:d9:fb:8b:7c:a9:9e:b7: 84:8f:99:90:f1:1c:7b:84:cf:66:fc:86:35:0e:74:94: 78:d1:4b:f0:88:be:a0:bc:fd:66:3f:e1:f4:c6:d7:79 Fingerprint (SHA-256): 4C:71:25:82:66:E0:EA:59:90:B7:EE:EE:AB:EE:BF:8A:29:B7:0F:E0:F8:B7:8F:84:80:A6:99:9C:8A:6C:37:CA Fingerprint (SHA1): BF:E7:3C:2E:A2:58:5C:4C:2B:A8:88:7D:1D:AB:88:AE:89:75:35:18 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #400: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #401: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221582 (0x3744474e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:18:35 2022 Not After : Mon Sep 27 22:18:35 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:c5:46:b0:52:0b:2b:f3:42:98:4c:2d:03:fa:31:1d: 5f:c3:6d:96:dc:b2:3c:98:b4:d5:bc:b8:1f:51:55:5b: 15:1e:05:6d:44:4a:22:94:14:74:4d:8c:33:aa:49:71: 88:ee:6d:a4:ea:5c:96:1e:00:f8:d1:61:dc:03:ba:41: 34:c9:db:8f:74:f5:8c:35:d1:dd:27:12:60:29:b9:06: 7d:a0:83:5e:67:44:aa:71:aa:67:65:48:c1:d6:ee:32: 56:b0:2e:67:a1:06:c8:cb:d9:28:85:3e:eb:d6:7e:94: 21:30:66:fd:a4:c1:22:46:67:26:70:36:81:40:38:07: a3:f1:aa:ba:8d:b2:71:3f:51:c4:68:36:f9:93:dd:4b: 02:4a:f5:35:20:ad:8e:46:d1:8b:9e:ba:d6:c6:43:fb: 47:8c:de:dd:5d:dd:ad:13:94:82:9f:26:5b:b1:bf:77: 55:f0:12:7c:3e:8d:66:de:d8:92:dc:26:48:6e:a1:3c: 09:fa:29:d9:44:41:1c:ac:0d:9f:00:85:d5:43:a1:4c: 8c:5d:06:d5:6c:34:6e:2f:0f:d9:d2:52:7b:78:af:15: a7:66:32:6d:bb:ec:a8:57:be:02:65:72:a7:47:52:87: 5e:3f:f3:60:9b:3d:c6:24:e5:16:37:97:94:8d:44:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:11:cd:7a:25:56:7f:63:6d:6f:fc:2d:b6:cb:d3:e3: 14:f9:5e:d4:0e:bc:7b:83:62:83:ff:07:b4:46:a2:a8: 71:7a:a7:04:e6:5d:f2:4d:f8:64:a0:8c:b5:0a:cf:ce: 06:c7:ba:42:3c:b6:7c:d0:9e:d3:12:04:b5:0d:d9:dd: 0c:53:40:22:e7:da:08:b7:45:69:4f:b8:7f:95:c3:a4: d8:30:28:78:ff:4a:7e:d2:b3:3e:5f:12:8d:46:fb:e2: 12:ef:c3:3f:a4:6d:f7:39:be:5a:ca:29:4e:43:cc:72: 7c:58:9b:c6:e6:39:ba:65:a8:a5:bc:c9:9e:51:88:d4: 52:95:d5:4c:a3:74:79:f2:6b:6a:51:9f:db:85:74:4f: ac:73:a0:6b:28:ed:ab:88:6d:34:60:2e:16:7c:ea:20: b1:a8:cc:6f:a0:bd:c5:6c:99:e3:ba:68:fa:77:17:b3: 50:59:84:07:cc:74:d4:02:e5:b0:dd:7e:aa:4f:29:32: e9:7d:3c:55:03:9f:b9:8e:96:0c:eb:3e:05:c5:56:02: 74:44:1f:7a:f3:c8:97:b9:25:e8:4f:2d:b9:54:3f:c1: 78:ad:e2:12:8c:c1:de:b6:af:1b:e8:54:90:6f:4e:a7: b1:93:e5:34:ba:cd:93:fd:0d:0c:31:ea:63:78:85:55 Fingerprint (SHA-256): 40:9E:71:B7:25:63:80:85:83:6D:81:C7:36:AD:AF:42:ED:4A:1F:32:94:98:04:58:AD:AB:7D:91:8E:50:98:8F Fingerprint (SHA1): 7C:07:B1:F1:A0:BF:77:CD:74:FD:4C:06:1C:BA:E4:C6:C9:0B:01:0E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #402: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #403: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221583 (0x3744474f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 22:18:37 2022 Not After : Mon Sep 27 22:18:37 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:5d:ba:2e:73:cd:05:94:34:65:f3:88:6a:3a:71:12: 0b:a5:10:91:15:44:61:12:5e:53:05:92:84:d4:80:8f: d2:f4:43:e3:7c:66:22:19:7c:75:5a:47:ec:2b:52:3c: 48:4c:f8:d3:20:a9:75:8b:80:c4:9e:0b:76:24:f3:d4: ed:bb:a2:61:20:7d:bc:82:8a:5e:b6:3d:73:0c:fa:6b: 9c:b1:02:34:a3:3e:23:09:0a:5d:e0:bd:77:46:9a:f1: e0:67:12:5f:86:06:c0:94:6a:14:b1:eb:0f:86:16:d2: 08:3b:38:d9:7c:39:02:39:1b:32:49:3f:28:5e:be:6a: 2a:c8:e5:ee:6f:52:97:d9:aa:67:c4:9e:e3:b6:d3:a3: 84:15:4c:8a:e9:0e:22:51:20:21:91:09:60:8d:60:12: cd:08:94:37:54:09:c4:28:40:f4:21:15:3f:1a:2d:e1: cd:e1:33:8b:9e:b7:e9:3c:6e:a7:33:d2:b9:d2:8f:6b: 0a:aa:5b:46:f4:9f:0e:43:d4:09:27:44:a8:1b:e0:5b: 9d:de:c9:b7:48:cb:7f:88:9b:e3:37:85:5a:6e:ca:92: d6:65:c6:cf:1e:db:76:5d:9d:8c:21:ca:02:cd:bf:d6: a0:3f:f8:bf:82:14:97:2b:b9:30:f6:b8:15:2e:d6:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:95:5a:d0:87:de:59:ec:86:e8:cd:f8:84:f6:0e:45: ff:50:79:c3:f9:8b:fa:4f:b5:0f:9b:24:7d:b6:85:a1: ac:84:9c:e1:bf:28:e6:4a:40:fc:ee:fa:48:8b:e1:ee: aa:16:af:ab:e5:46:42:9b:5c:b0:f5:1f:68:29:ba:3a: 78:bd:f1:28:25:a8:ab:9c:2a:fe:61:7a:0c:eb:9c:2d: 0d:96:d3:b4:8c:c4:ed:8d:88:10:73:1d:d1:d3:79:e0: de:9a:49:36:7c:86:7d:ea:2d:a3:19:b5:d4:d0:34:61: 7a:49:0b:10:7e:95:fd:6d:1a:54:aa:0f:be:34:58:96: 72:23:ce:6f:76:4b:3f:44:00:ae:46:bf:32:18:4a:11: c4:38:c4:1b:22:e5:0b:ee:e5:90:9d:af:3c:6d:40:b5: 9d:5b:f5:2e:db:71:e3:aa:45:40:52:79:9a:fa:39:4d: 5f:1e:a6:54:5a:b8:01:4d:55:a1:3b:38:73:cc:7f:5a: e8:d7:46:e0:35:c4:fe:ff:35:09:a6:e8:1e:88:4f:73: a0:16:14:e5:1b:11:8c:01:19:b1:24:cf:c3:fe:e4:a0: f0:96:7a:8a:ab:9d:2a:3b:5b:d6:be:0a:b2:bf:9a:be: 91:be:f8:77:26:0b:40:ca:54:b8:bc:93:2a:d0:fa:ac Fingerprint (SHA-256): 27:D7:CB:33:A1:26:96:04:D5:83:9D:B8:D0:EB:B9:A7:9E:89:14:8D:47:99:E5:31:F8:59:89:B9:71:5B:57:BC Fingerprint (SHA1): 5A:F3:60:A5:EC:EE:EB:F3:AC:AA:CA:06:07:6C:46:CB:7D:13:7C:D4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #404: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #405: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221581 (0x3744474d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:18:33 2022 Not After : Tue Sep 27 22:18:33 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:05:80:41:00:c8:3d:db:ff:13:6f:eb:f4:42:95:2d: 4e:44:2d:0a:ec:40:eb:53:db:01:1a:2b:74:2c:e2:94: 8f:f0:f8:0f:9d:41:f7:f8:5b:65:4d:69:fc:f7:ca:df: e2:2a:38:b9:82:07:0b:30:09:73:9a:e2:30:eb:a5:0a: 56:77:4c:81:c2:26:56:d3:3c:49:90:82:2c:9d:9a:d8: 31:00:c6:68:fd:cb:85:29:d6:ca:1e:7a:2c:8c:4c:92: 0a:49:8d:33:73:e6:d4:eb:06:1a:f1:c0:13:b5:0c:7f: 41:bd:20:e2:04:4f:a4:30:fe:21:87:d5:b1:c7:9b:ce: 7f:34:03:02:05:11:f3:2f:9f:ae:eb:21:08:38:94:06: 1b:7e:e0:a4:1c:ef:a1:ae:63:7c:4d:a8:a7:33:f0:f4: 70:27:f2:7b:36:51:04:64:22:74:ae:66:9c:6d:51:2c: d3:c9:d6:a3:aa:74:8d:f8:b5:5f:cf:6b:71:dd:d4:ec: 7e:61:89:81:84:89:4c:25:42:f2:0c:f4:83:b9:ab:b9: 81:9d:65:fd:21:11:62:f0:df:a2:b5:98:8f:24:6f:52: d0:07:69:66:c2:c8:b9:35:46:c1:ed:84:1b:9d:a2:51: 7e:e3:b7:70:5d:de:be:86:47:8e:1e:2a:c2:87:31:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c4:5c:0d:82:ca:46:97:61:49:58:7a:18:ab:1f:e2:9c: 7e:4f:39:7c:5a:c9:17:e2:6f:64:d8:72:c3:44:1f:04: 98:a6:2a:32:95:67:d8:8a:33:44:48:a9:bb:99:6b:53: f8:95:08:e1:d7:47:0c:4f:de:fc:97:33:97:89:82:e8: 97:11:e7:87:12:35:12:a4:e7:20:d3:8d:42:3f:d5:d8: d9:7a:23:d8:40:e6:87:3b:ee:f4:20:58:a7:39:04:d2: fd:8e:21:eb:96:60:fc:65:22:ec:63:43:f2:6b:f5:f0: f0:c7:0f:3e:75:53:c0:6f:b8:bb:89:e9:ba:d6:ce:b1: 22:76:2a:8c:dc:0f:a6:39:fc:29:0a:02:ac:05:2e:f5: f3:e5:61:9d:bd:82:39:4f:bd:ee:ed:d5:42:24:35:14: b5:5b:39:38:24:4e:08:92:46:0e:b0:49:1a:07:0e:e2: e4:94:4b:ab:ed:4f:38:47:33:09:1e:e9:a4:82:ac:09: 7f:88:b0:f9:a0:68:83:86:a0:ba:d9:bb:cd:0f:cc:24: 9d:49:dd:9a:59:c3:c8:39:4a:d9:fb:8b:7c:a9:9e:b7: 84:8f:99:90:f1:1c:7b:84:cf:66:fc:86:35:0e:74:94: 78:d1:4b:f0:88:be:a0:bc:fd:66:3f:e1:f4:c6:d7:79 Fingerprint (SHA-256): 4C:71:25:82:66:E0:EA:59:90:B7:EE:EE:AB:EE:BF:8A:29:B7:0F:E0:F8:B7:8F:84:80:A6:99:9C:8A:6C:37:CA Fingerprint (SHA1): BF:E7:3C:2E:A2:58:5C:4C:2B:A8:88:7D:1D:AB:88:AE:89:75:35:18 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #406: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221581 (0x3744474d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:18:33 2022 Not After : Tue Sep 27 22:18:33 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:05:80:41:00:c8:3d:db:ff:13:6f:eb:f4:42:95:2d: 4e:44:2d:0a:ec:40:eb:53:db:01:1a:2b:74:2c:e2:94: 8f:f0:f8:0f:9d:41:f7:f8:5b:65:4d:69:fc:f7:ca:df: e2:2a:38:b9:82:07:0b:30:09:73:9a:e2:30:eb:a5:0a: 56:77:4c:81:c2:26:56:d3:3c:49:90:82:2c:9d:9a:d8: 31:00:c6:68:fd:cb:85:29:d6:ca:1e:7a:2c:8c:4c:92: 0a:49:8d:33:73:e6:d4:eb:06:1a:f1:c0:13:b5:0c:7f: 41:bd:20:e2:04:4f:a4:30:fe:21:87:d5:b1:c7:9b:ce: 7f:34:03:02:05:11:f3:2f:9f:ae:eb:21:08:38:94:06: 1b:7e:e0:a4:1c:ef:a1:ae:63:7c:4d:a8:a7:33:f0:f4: 70:27:f2:7b:36:51:04:64:22:74:ae:66:9c:6d:51:2c: d3:c9:d6:a3:aa:74:8d:f8:b5:5f:cf:6b:71:dd:d4:ec: 7e:61:89:81:84:89:4c:25:42:f2:0c:f4:83:b9:ab:b9: 81:9d:65:fd:21:11:62:f0:df:a2:b5:98:8f:24:6f:52: d0:07:69:66:c2:c8:b9:35:46:c1:ed:84:1b:9d:a2:51: 7e:e3:b7:70:5d:de:be:86:47:8e:1e:2a:c2:87:31:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c4:5c:0d:82:ca:46:97:61:49:58:7a:18:ab:1f:e2:9c: 7e:4f:39:7c:5a:c9:17:e2:6f:64:d8:72:c3:44:1f:04: 98:a6:2a:32:95:67:d8:8a:33:44:48:a9:bb:99:6b:53: f8:95:08:e1:d7:47:0c:4f:de:fc:97:33:97:89:82:e8: 97:11:e7:87:12:35:12:a4:e7:20:d3:8d:42:3f:d5:d8: d9:7a:23:d8:40:e6:87:3b:ee:f4:20:58:a7:39:04:d2: fd:8e:21:eb:96:60:fc:65:22:ec:63:43:f2:6b:f5:f0: f0:c7:0f:3e:75:53:c0:6f:b8:bb:89:e9:ba:d6:ce:b1: 22:76:2a:8c:dc:0f:a6:39:fc:29:0a:02:ac:05:2e:f5: f3:e5:61:9d:bd:82:39:4f:bd:ee:ed:d5:42:24:35:14: b5:5b:39:38:24:4e:08:92:46:0e:b0:49:1a:07:0e:e2: e4:94:4b:ab:ed:4f:38:47:33:09:1e:e9:a4:82:ac:09: 7f:88:b0:f9:a0:68:83:86:a0:ba:d9:bb:cd:0f:cc:24: 9d:49:dd:9a:59:c3:c8:39:4a:d9:fb:8b:7c:a9:9e:b7: 84:8f:99:90:f1:1c:7b:84:cf:66:fc:86:35:0e:74:94: 78:d1:4b:f0:88:be:a0:bc:fd:66:3f:e1:f4:c6:d7:79 Fingerprint (SHA-256): 4C:71:25:82:66:E0:EA:59:90:B7:EE:EE:AB:EE:BF:8A:29:B7:0F:E0:F8:B7:8F:84:80:A6:99:9C:8A:6C:37:CA Fingerprint (SHA1): BF:E7:3C:2E:A2:58:5C:4C:2B:A8:88:7D:1D:AB:88:AE:89:75:35:18 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #407: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221582 (0x3744474e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:18:35 2022 Not After : Mon Sep 27 22:18:35 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:c5:46:b0:52:0b:2b:f3:42:98:4c:2d:03:fa:31:1d: 5f:c3:6d:96:dc:b2:3c:98:b4:d5:bc:b8:1f:51:55:5b: 15:1e:05:6d:44:4a:22:94:14:74:4d:8c:33:aa:49:71: 88:ee:6d:a4:ea:5c:96:1e:00:f8:d1:61:dc:03:ba:41: 34:c9:db:8f:74:f5:8c:35:d1:dd:27:12:60:29:b9:06: 7d:a0:83:5e:67:44:aa:71:aa:67:65:48:c1:d6:ee:32: 56:b0:2e:67:a1:06:c8:cb:d9:28:85:3e:eb:d6:7e:94: 21:30:66:fd:a4:c1:22:46:67:26:70:36:81:40:38:07: a3:f1:aa:ba:8d:b2:71:3f:51:c4:68:36:f9:93:dd:4b: 02:4a:f5:35:20:ad:8e:46:d1:8b:9e:ba:d6:c6:43:fb: 47:8c:de:dd:5d:dd:ad:13:94:82:9f:26:5b:b1:bf:77: 55:f0:12:7c:3e:8d:66:de:d8:92:dc:26:48:6e:a1:3c: 09:fa:29:d9:44:41:1c:ac:0d:9f:00:85:d5:43:a1:4c: 8c:5d:06:d5:6c:34:6e:2f:0f:d9:d2:52:7b:78:af:15: a7:66:32:6d:bb:ec:a8:57:be:02:65:72:a7:47:52:87: 5e:3f:f3:60:9b:3d:c6:24:e5:16:37:97:94:8d:44:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:11:cd:7a:25:56:7f:63:6d:6f:fc:2d:b6:cb:d3:e3: 14:f9:5e:d4:0e:bc:7b:83:62:83:ff:07:b4:46:a2:a8: 71:7a:a7:04:e6:5d:f2:4d:f8:64:a0:8c:b5:0a:cf:ce: 06:c7:ba:42:3c:b6:7c:d0:9e:d3:12:04:b5:0d:d9:dd: 0c:53:40:22:e7:da:08:b7:45:69:4f:b8:7f:95:c3:a4: d8:30:28:78:ff:4a:7e:d2:b3:3e:5f:12:8d:46:fb:e2: 12:ef:c3:3f:a4:6d:f7:39:be:5a:ca:29:4e:43:cc:72: 7c:58:9b:c6:e6:39:ba:65:a8:a5:bc:c9:9e:51:88:d4: 52:95:d5:4c:a3:74:79:f2:6b:6a:51:9f:db:85:74:4f: ac:73:a0:6b:28:ed:ab:88:6d:34:60:2e:16:7c:ea:20: b1:a8:cc:6f:a0:bd:c5:6c:99:e3:ba:68:fa:77:17:b3: 50:59:84:07:cc:74:d4:02:e5:b0:dd:7e:aa:4f:29:32: e9:7d:3c:55:03:9f:b9:8e:96:0c:eb:3e:05:c5:56:02: 74:44:1f:7a:f3:c8:97:b9:25:e8:4f:2d:b9:54:3f:c1: 78:ad:e2:12:8c:c1:de:b6:af:1b:e8:54:90:6f:4e:a7: b1:93:e5:34:ba:cd:93:fd:0d:0c:31:ea:63:78:85:55 Fingerprint (SHA-256): 40:9E:71:B7:25:63:80:85:83:6D:81:C7:36:AD:AF:42:ED:4A:1F:32:94:98:04:58:AD:AB:7D:91:8E:50:98:8F Fingerprint (SHA1): 7C:07:B1:F1:A0:BF:77:CD:74:FD:4C:06:1C:BA:E4:C6:C9:0B:01:0E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #408: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221582 (0x3744474e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:18:35 2022 Not After : Mon Sep 27 22:18:35 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:c5:46:b0:52:0b:2b:f3:42:98:4c:2d:03:fa:31:1d: 5f:c3:6d:96:dc:b2:3c:98:b4:d5:bc:b8:1f:51:55:5b: 15:1e:05:6d:44:4a:22:94:14:74:4d:8c:33:aa:49:71: 88:ee:6d:a4:ea:5c:96:1e:00:f8:d1:61:dc:03:ba:41: 34:c9:db:8f:74:f5:8c:35:d1:dd:27:12:60:29:b9:06: 7d:a0:83:5e:67:44:aa:71:aa:67:65:48:c1:d6:ee:32: 56:b0:2e:67:a1:06:c8:cb:d9:28:85:3e:eb:d6:7e:94: 21:30:66:fd:a4:c1:22:46:67:26:70:36:81:40:38:07: a3:f1:aa:ba:8d:b2:71:3f:51:c4:68:36:f9:93:dd:4b: 02:4a:f5:35:20:ad:8e:46:d1:8b:9e:ba:d6:c6:43:fb: 47:8c:de:dd:5d:dd:ad:13:94:82:9f:26:5b:b1:bf:77: 55:f0:12:7c:3e:8d:66:de:d8:92:dc:26:48:6e:a1:3c: 09:fa:29:d9:44:41:1c:ac:0d:9f:00:85:d5:43:a1:4c: 8c:5d:06:d5:6c:34:6e:2f:0f:d9:d2:52:7b:78:af:15: a7:66:32:6d:bb:ec:a8:57:be:02:65:72:a7:47:52:87: 5e:3f:f3:60:9b:3d:c6:24:e5:16:37:97:94:8d:44:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:11:cd:7a:25:56:7f:63:6d:6f:fc:2d:b6:cb:d3:e3: 14:f9:5e:d4:0e:bc:7b:83:62:83:ff:07:b4:46:a2:a8: 71:7a:a7:04:e6:5d:f2:4d:f8:64:a0:8c:b5:0a:cf:ce: 06:c7:ba:42:3c:b6:7c:d0:9e:d3:12:04:b5:0d:d9:dd: 0c:53:40:22:e7:da:08:b7:45:69:4f:b8:7f:95:c3:a4: d8:30:28:78:ff:4a:7e:d2:b3:3e:5f:12:8d:46:fb:e2: 12:ef:c3:3f:a4:6d:f7:39:be:5a:ca:29:4e:43:cc:72: 7c:58:9b:c6:e6:39:ba:65:a8:a5:bc:c9:9e:51:88:d4: 52:95:d5:4c:a3:74:79:f2:6b:6a:51:9f:db:85:74:4f: ac:73:a0:6b:28:ed:ab:88:6d:34:60:2e:16:7c:ea:20: b1:a8:cc:6f:a0:bd:c5:6c:99:e3:ba:68:fa:77:17:b3: 50:59:84:07:cc:74:d4:02:e5:b0:dd:7e:aa:4f:29:32: e9:7d:3c:55:03:9f:b9:8e:96:0c:eb:3e:05:c5:56:02: 74:44:1f:7a:f3:c8:97:b9:25:e8:4f:2d:b9:54:3f:c1: 78:ad:e2:12:8c:c1:de:b6:af:1b:e8:54:90:6f:4e:a7: b1:93:e5:34:ba:cd:93:fd:0d:0c:31:ea:63:78:85:55 Fingerprint (SHA-256): 40:9E:71:B7:25:63:80:85:83:6D:81:C7:36:AD:AF:42:ED:4A:1F:32:94:98:04:58:AD:AB:7D:91:8E:50:98:8F Fingerprint (SHA1): 7C:07:B1:F1:A0:BF:77:CD:74:FD:4C:06:1C:BA:E4:C6:C9:0B:01:0E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #409: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221583 (0x3744474f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 22:18:37 2022 Not After : Mon Sep 27 22:18:37 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:5d:ba:2e:73:cd:05:94:34:65:f3:88:6a:3a:71:12: 0b:a5:10:91:15:44:61:12:5e:53:05:92:84:d4:80:8f: d2:f4:43:e3:7c:66:22:19:7c:75:5a:47:ec:2b:52:3c: 48:4c:f8:d3:20:a9:75:8b:80:c4:9e:0b:76:24:f3:d4: ed:bb:a2:61:20:7d:bc:82:8a:5e:b6:3d:73:0c:fa:6b: 9c:b1:02:34:a3:3e:23:09:0a:5d:e0:bd:77:46:9a:f1: e0:67:12:5f:86:06:c0:94:6a:14:b1:eb:0f:86:16:d2: 08:3b:38:d9:7c:39:02:39:1b:32:49:3f:28:5e:be:6a: 2a:c8:e5:ee:6f:52:97:d9:aa:67:c4:9e:e3:b6:d3:a3: 84:15:4c:8a:e9:0e:22:51:20:21:91:09:60:8d:60:12: cd:08:94:37:54:09:c4:28:40:f4:21:15:3f:1a:2d:e1: cd:e1:33:8b:9e:b7:e9:3c:6e:a7:33:d2:b9:d2:8f:6b: 0a:aa:5b:46:f4:9f:0e:43:d4:09:27:44:a8:1b:e0:5b: 9d:de:c9:b7:48:cb:7f:88:9b:e3:37:85:5a:6e:ca:92: d6:65:c6:cf:1e:db:76:5d:9d:8c:21:ca:02:cd:bf:d6: a0:3f:f8:bf:82:14:97:2b:b9:30:f6:b8:15:2e:d6:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:95:5a:d0:87:de:59:ec:86:e8:cd:f8:84:f6:0e:45: ff:50:79:c3:f9:8b:fa:4f:b5:0f:9b:24:7d:b6:85:a1: ac:84:9c:e1:bf:28:e6:4a:40:fc:ee:fa:48:8b:e1:ee: aa:16:af:ab:e5:46:42:9b:5c:b0:f5:1f:68:29:ba:3a: 78:bd:f1:28:25:a8:ab:9c:2a:fe:61:7a:0c:eb:9c:2d: 0d:96:d3:b4:8c:c4:ed:8d:88:10:73:1d:d1:d3:79:e0: de:9a:49:36:7c:86:7d:ea:2d:a3:19:b5:d4:d0:34:61: 7a:49:0b:10:7e:95:fd:6d:1a:54:aa:0f:be:34:58:96: 72:23:ce:6f:76:4b:3f:44:00:ae:46:bf:32:18:4a:11: c4:38:c4:1b:22:e5:0b:ee:e5:90:9d:af:3c:6d:40:b5: 9d:5b:f5:2e:db:71:e3:aa:45:40:52:79:9a:fa:39:4d: 5f:1e:a6:54:5a:b8:01:4d:55:a1:3b:38:73:cc:7f:5a: e8:d7:46:e0:35:c4:fe:ff:35:09:a6:e8:1e:88:4f:73: a0:16:14:e5:1b:11:8c:01:19:b1:24:cf:c3:fe:e4:a0: f0:96:7a:8a:ab:9d:2a:3b:5b:d6:be:0a:b2:bf:9a:be: 91:be:f8:77:26:0b:40:ca:54:b8:bc:93:2a:d0:fa:ac Fingerprint (SHA-256): 27:D7:CB:33:A1:26:96:04:D5:83:9D:B8:D0:EB:B9:A7:9E:89:14:8D:47:99:E5:31:F8:59:89:B9:71:5B:57:BC Fingerprint (SHA1): 5A:F3:60:A5:EC:EE:EB:F3:AC:AA:CA:06:07:6C:46:CB:7D:13:7C:D4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #410: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221583 (0x3744474f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 22:18:37 2022 Not After : Mon Sep 27 22:18:37 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:5d:ba:2e:73:cd:05:94:34:65:f3:88:6a:3a:71:12: 0b:a5:10:91:15:44:61:12:5e:53:05:92:84:d4:80:8f: d2:f4:43:e3:7c:66:22:19:7c:75:5a:47:ec:2b:52:3c: 48:4c:f8:d3:20:a9:75:8b:80:c4:9e:0b:76:24:f3:d4: ed:bb:a2:61:20:7d:bc:82:8a:5e:b6:3d:73:0c:fa:6b: 9c:b1:02:34:a3:3e:23:09:0a:5d:e0:bd:77:46:9a:f1: e0:67:12:5f:86:06:c0:94:6a:14:b1:eb:0f:86:16:d2: 08:3b:38:d9:7c:39:02:39:1b:32:49:3f:28:5e:be:6a: 2a:c8:e5:ee:6f:52:97:d9:aa:67:c4:9e:e3:b6:d3:a3: 84:15:4c:8a:e9:0e:22:51:20:21:91:09:60:8d:60:12: cd:08:94:37:54:09:c4:28:40:f4:21:15:3f:1a:2d:e1: cd:e1:33:8b:9e:b7:e9:3c:6e:a7:33:d2:b9:d2:8f:6b: 0a:aa:5b:46:f4:9f:0e:43:d4:09:27:44:a8:1b:e0:5b: 9d:de:c9:b7:48:cb:7f:88:9b:e3:37:85:5a:6e:ca:92: d6:65:c6:cf:1e:db:76:5d:9d:8c:21:ca:02:cd:bf:d6: a0:3f:f8:bf:82:14:97:2b:b9:30:f6:b8:15:2e:d6:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:95:5a:d0:87:de:59:ec:86:e8:cd:f8:84:f6:0e:45: ff:50:79:c3:f9:8b:fa:4f:b5:0f:9b:24:7d:b6:85:a1: ac:84:9c:e1:bf:28:e6:4a:40:fc:ee:fa:48:8b:e1:ee: aa:16:af:ab:e5:46:42:9b:5c:b0:f5:1f:68:29:ba:3a: 78:bd:f1:28:25:a8:ab:9c:2a:fe:61:7a:0c:eb:9c:2d: 0d:96:d3:b4:8c:c4:ed:8d:88:10:73:1d:d1:d3:79:e0: de:9a:49:36:7c:86:7d:ea:2d:a3:19:b5:d4:d0:34:61: 7a:49:0b:10:7e:95:fd:6d:1a:54:aa:0f:be:34:58:96: 72:23:ce:6f:76:4b:3f:44:00:ae:46:bf:32:18:4a:11: c4:38:c4:1b:22:e5:0b:ee:e5:90:9d:af:3c:6d:40:b5: 9d:5b:f5:2e:db:71:e3:aa:45:40:52:79:9a:fa:39:4d: 5f:1e:a6:54:5a:b8:01:4d:55:a1:3b:38:73:cc:7f:5a: e8:d7:46:e0:35:c4:fe:ff:35:09:a6:e8:1e:88:4f:73: a0:16:14:e5:1b:11:8c:01:19:b1:24:cf:c3:fe:e4:a0: f0:96:7a:8a:ab:9d:2a:3b:5b:d6:be:0a:b2:bf:9a:be: 91:be:f8:77:26:0b:40:ca:54:b8:bc:93:2a:d0:fa:ac Fingerprint (SHA-256): 27:D7:CB:33:A1:26:96:04:D5:83:9D:B8:D0:EB:B9:A7:9E:89:14:8D:47:99:E5:31:F8:59:89:B9:71:5B:57:BC Fingerprint (SHA1): 5A:F3:60:A5:EC:EE:EB:F3:AC:AA:CA:06:07:6C:46:CB:7D:13:7C:D4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #411: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #412: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221586 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #413: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #414: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #415: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #416: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 927221587 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #417: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #418: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #419: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #420: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927221588 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #421: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #422: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #423: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #424: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 927221589 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #425: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #426: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #427: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #428: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 927221590 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #429: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #430: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #431: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #432: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 927221591 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #433: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #434: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #435: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #436: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 927221592 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #437: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #438: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #439: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #440: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #441: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #442: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #443: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221586 (0x37444752) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:18:49 2022 Not After : Tue Sep 27 22:18:49 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:9d:b4:72:df:8d:de:42:4e:ec:a1:45:fc:3d:da:0f: f1:fb:1d:8b:78:b8:9d:37:c6:4b:7d:5f:a3:74:ee:80: 9a:ae:8d:78:ea:4a:94:e6:34:e1:38:e1:50:4a:bf:b5: 15:69:65:8a:45:51:aa:79:87:03:96:7f:f8:07:9d:e9: 6a:d3:bc:20:9a:68:e5:78:33:68:33:52:e0:46:cd:57: d3:26:6c:11:f0:12:70:6d:85:d1:60:d1:eb:74:d6:d2: 02:ca:ca:18:da:41:f2:37:a4:23:cb:9c:65:61:e5:a7: 27:b8:33:7e:ec:7f:ed:e4:ec:40:4c:eb:c3:2a:ca:d0: dc:a8:4b:e7:d2:49:10:bd:6d:9f:de:cd:7b:95:44:14: a4:a4:2f:7f:f8:79:24:5d:48:58:83:c5:7d:55:30:12: 37:df:1a:ac:58:65:05:d4:4b:eb:e0:a5:0c:14:e1:15: 1a:c2:f6:29:42:18:4a:36:bc:4b:68:5d:92:9e:d4:51: 21:6d:1e:47:bd:7a:f8:d6:7c:0e:5f:46:72:06:9f:55: 61:59:97:3e:76:cf:31:8e:c0:df:3f:09:b1:64:51:46: cb:60:21:1e:79:b8:73:b0:cb:01:a8:24:d2:18:23:0d: c1:b4:80:2a:30:41:90:95:70:80:26:50:1d:c1:9f:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:cb:a9:66:7d:72:fc:c1:41:bd:19:39:c0:19:fb:a4: 48:a0:78:61:65:6c:5f:0c:93:d3:8c:44:56:e9:ea:5b: 92:8e:c4:01:41:5d:a1:46:db:02:47:5d:18:31:32:f9: e5:d3:41:12:25:53:e5:e4:f5:39:6c:7f:f6:4a:cc:2c: 7d:2d:a3:36:9d:6b:25:a4:d6:49:34:0a:8b:69:fe:fe: 75:5c:6c:55:4c:18:94:14:3e:5a:93:a5:f2:cc:45:ae: bb:20:53:33:ff:46:89:ba:ed:47:ab:80:c4:bc:ec:ed: 24:4c:62:da:12:a2:1c:53:86:43:37:ad:c9:cf:4f:b8: 22:fc:fc:10:ed:d0:00:59:91:f7:a6:89:82:a4:16:77: 17:60:9b:9c:36:fd:03:ef:3b:64:3a:a4:8a:ba:0d:29: fe:d1:37:5b:d5:ad:05:8b:0f:fa:93:75:54:2d:33:da: 10:37:1b:b1:14:78:3a:5e:65:69:16:ba:82:40:d9:58: 96:44:1e:a4:03:78:df:f6:e0:cd:85:45:b0:38:0d:b8: 74:dd:c1:93:48:3c:86:8d:f1:cb:a8:6a:e6:78:46:80: f8:71:55:aa:64:09:1c:30:fe:87:d9:8b:31:e0:9f:ac: 16:f5:86:eb:88:fe:0c:97:ea:18:47:70:41:b3:ff:f0 Fingerprint (SHA-256): 53:52:C0:8E:0E:59:2A:59:ED:00:61:62:6A:15:30:14:8E:65:1C:AB:D8:C3:D0:FD:2B:33:86:EC:3F:62:E5:4E Fingerprint (SHA1): 08:26:A8:93:41:8A:FB:6A:0E:AF:9E:67:7E:5F:09:F6:43:A7:68:B0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #444: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #445: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #446: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #447: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221586 (0x37444752) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:18:49 2022 Not After : Tue Sep 27 22:18:49 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:9d:b4:72:df:8d:de:42:4e:ec:a1:45:fc:3d:da:0f: f1:fb:1d:8b:78:b8:9d:37:c6:4b:7d:5f:a3:74:ee:80: 9a:ae:8d:78:ea:4a:94:e6:34:e1:38:e1:50:4a:bf:b5: 15:69:65:8a:45:51:aa:79:87:03:96:7f:f8:07:9d:e9: 6a:d3:bc:20:9a:68:e5:78:33:68:33:52:e0:46:cd:57: d3:26:6c:11:f0:12:70:6d:85:d1:60:d1:eb:74:d6:d2: 02:ca:ca:18:da:41:f2:37:a4:23:cb:9c:65:61:e5:a7: 27:b8:33:7e:ec:7f:ed:e4:ec:40:4c:eb:c3:2a:ca:d0: dc:a8:4b:e7:d2:49:10:bd:6d:9f:de:cd:7b:95:44:14: a4:a4:2f:7f:f8:79:24:5d:48:58:83:c5:7d:55:30:12: 37:df:1a:ac:58:65:05:d4:4b:eb:e0:a5:0c:14:e1:15: 1a:c2:f6:29:42:18:4a:36:bc:4b:68:5d:92:9e:d4:51: 21:6d:1e:47:bd:7a:f8:d6:7c:0e:5f:46:72:06:9f:55: 61:59:97:3e:76:cf:31:8e:c0:df:3f:09:b1:64:51:46: cb:60:21:1e:79:b8:73:b0:cb:01:a8:24:d2:18:23:0d: c1:b4:80:2a:30:41:90:95:70:80:26:50:1d:c1:9f:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:cb:a9:66:7d:72:fc:c1:41:bd:19:39:c0:19:fb:a4: 48:a0:78:61:65:6c:5f:0c:93:d3:8c:44:56:e9:ea:5b: 92:8e:c4:01:41:5d:a1:46:db:02:47:5d:18:31:32:f9: e5:d3:41:12:25:53:e5:e4:f5:39:6c:7f:f6:4a:cc:2c: 7d:2d:a3:36:9d:6b:25:a4:d6:49:34:0a:8b:69:fe:fe: 75:5c:6c:55:4c:18:94:14:3e:5a:93:a5:f2:cc:45:ae: bb:20:53:33:ff:46:89:ba:ed:47:ab:80:c4:bc:ec:ed: 24:4c:62:da:12:a2:1c:53:86:43:37:ad:c9:cf:4f:b8: 22:fc:fc:10:ed:d0:00:59:91:f7:a6:89:82:a4:16:77: 17:60:9b:9c:36:fd:03:ef:3b:64:3a:a4:8a:ba:0d:29: fe:d1:37:5b:d5:ad:05:8b:0f:fa:93:75:54:2d:33:da: 10:37:1b:b1:14:78:3a:5e:65:69:16:ba:82:40:d9:58: 96:44:1e:a4:03:78:df:f6:e0:cd:85:45:b0:38:0d:b8: 74:dd:c1:93:48:3c:86:8d:f1:cb:a8:6a:e6:78:46:80: f8:71:55:aa:64:09:1c:30:fe:87:d9:8b:31:e0:9f:ac: 16:f5:86:eb:88:fe:0c:97:ea:18:47:70:41:b3:ff:f0 Fingerprint (SHA-256): 53:52:C0:8E:0E:59:2A:59:ED:00:61:62:6A:15:30:14:8E:65:1C:AB:D8:C3:D0:FD:2B:33:86:EC:3F:62:E5:4E Fingerprint (SHA1): 08:26:A8:93:41:8A:FB:6A:0E:AF:9E:67:7E:5F:09:F6:43:A7:68:B0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #448: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #449: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #450: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221593 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #451: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #452: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #453: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #454: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 927221594 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #455: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #456: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #457: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #458: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 927221595 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #459: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #460: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #461: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #462: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 927221596 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #463: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #464: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #465: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #466: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 927221597 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #467: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #468: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #469: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #470: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 927221598 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #471: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #472: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #473: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #474: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 927221599 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #475: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #476: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #477: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #478: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 927221600 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #479: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #480: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #481: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #482: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 927221601 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #483: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #484: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #485: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #486: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 927221602 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #487: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #488: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #489: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #490: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 927221603 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #491: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #492: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #493: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #494: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 927221604 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #495: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #496: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #497: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #498: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 927221605 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #499: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #500: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #501: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #502: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 927221606 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #503: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #504: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #505: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #506: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 927221607 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #507: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #508: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #509: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #510: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 927221608 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #511: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #512: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #513: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #514: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 927221609 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #515: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #516: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #517: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #518: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 927221610 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #519: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #520: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #521: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #522: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 927221611 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #523: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #524: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #525: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #526: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 927221612 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #527: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #528: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #529: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #530: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 927221613 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #531: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #532: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #533: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #534: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 927221614 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #535: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #536: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #537: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #538: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 927221615 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #539: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #540: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #541: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #542: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 927221616 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #543: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #544: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #545: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #546: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 927221617 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #547: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #548: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #549: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #550: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 927221618 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #551: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #552: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #553: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #554: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 927221619 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #555: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #556: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #557: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #558: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 927221620 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #559: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #560: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #561: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #562: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 927221621 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #563: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #564: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #565: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #566: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 927221622 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #567: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #568: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #569: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221593 (0x37444759) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:19:04 2022 Not After : Tue Sep 27 22:19:04 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:6a:42:04:39:16:35:e9:86:ee:d5:e5:f9:96:ae:64: fe:0b:df:09:9a:58:1b:0d:c2:7a:17:56:4a:69:d7:cc: a4:aa:a8:f7:72:47:ed:64:96:b4:7a:7d:0a:4f:15:48: b4:0a:3c:20:4c:b2:53:1b:b6:a8:7e:7a:c4:b4:48:95: 98:f8:aa:79:a8:b6:c8:d6:2e:d2:5a:d3:71:2a:54:e4: a7:ef:60:05:ed:68:61:9a:68:2e:e3:71:ce:ff:26:72: b4:62:92:7d:b8:e8:16:c7:b7:b4:91:b1:3c:c6:7e:31: c9:03:57:fb:b3:8e:b0:d2:b7:71:47:8a:06:fc:01:87: b8:e7:06:88:52:e7:c6:a3:60:09:45:6f:93:18:4a:13: a7:e8:be:e4:97:6c:b7:1f:c9:23:c3:57:ed:e1:88:0b: 9e:e5:1c:73:2d:5f:5c:15:b0:da:05:3c:7e:e6:1d:53: b6:67:48:59:2e:e8:21:fc:20:6c:74:e2:94:4e:c9:2b: d0:9c:a4:46:2c:f8:d0:80:c5:8e:d2:de:8c:18:d9:f2: c9:92:a7:fe:ba:8d:c6:55:f0:a0:ab:a3:fd:f0:44:1e: 35:0c:91:25:35:50:ce:4f:68:82:dd:03:64:b7:d1:bc: ee:b4:91:e7:d5:6d:fd:4e:38:0e:9e:3e:28:05:cb:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:48:82:a1:5a:8b:1c:c7:fb:26:a0:49:41:4e:f0:6f: 0e:df:93:c0:e6:fd:5c:c8:0b:96:66:74:14:20:44:a4: d9:a6:b6:52:be:52:91:10:c0:11:0c:85:af:5b:8a:c5: 03:18:b1:41:60:e2:6c:6f:58:63:36:7b:4a:c2:72:43: 16:66:8a:76:2d:cb:56:43:79:89:c0:2c:98:3a:dc:21: ee:64:8b:54:fd:c5:17:0d:a0:2b:54:ea:0c:dd:f6:08: f4:65:bc:d1:e3:7a:b8:07:b7:47:e4:d5:35:19:29:18: 95:68:86:71:e7:7a:b1:97:6c:04:ef:27:cc:3d:e8:4f: 8a:90:e2:01:9d:c1:c3:25:20:99:40:47:20:f9:3c:17: 04:a1:9e:db:17:7c:12:db:a4:7a:97:2c:97:dd:44:ed: af:57:a4:5f:41:03:7c:8b:5d:78:ba:b7:64:44:a6:a3: 5c:4c:4a:1f:dc:23:1f:b0:9c:17:84:a4:1a:b0:d5:2b: 01:29:92:f6:9c:30:75:ce:cc:55:30:a0:a9:e7:a0:8f: 34:b5:5e:6b:29:c5:91:25:cb:95:bb:d2:54:f2:84:98: 73:42:df:35:04:24:ef:3e:86:39:f3:22:03:de:d7:37: c0:e6:98:69:ca:62:f4:fb:a2:6a:66:69:a1:5f:2e:42 Fingerprint (SHA-256): 3B:7F:BC:C0:26:04:98:86:E5:D3:2F:EF:DA:A3:9E:21:C1:31:2B:F1:F1:1C:3D:89:FE:F5:AD:99:4F:33:0C:A6 Fingerprint (SHA1): CB:89:27:E0:13:A1:C9:07:EB:2F:75:F0:8D:4A:BF:B5:11:B3:3B:1E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #570: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #571: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221593 (0x37444759) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:19:04 2022 Not After : Tue Sep 27 22:19:04 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:6a:42:04:39:16:35:e9:86:ee:d5:e5:f9:96:ae:64: fe:0b:df:09:9a:58:1b:0d:c2:7a:17:56:4a:69:d7:cc: a4:aa:a8:f7:72:47:ed:64:96:b4:7a:7d:0a:4f:15:48: b4:0a:3c:20:4c:b2:53:1b:b6:a8:7e:7a:c4:b4:48:95: 98:f8:aa:79:a8:b6:c8:d6:2e:d2:5a:d3:71:2a:54:e4: a7:ef:60:05:ed:68:61:9a:68:2e:e3:71:ce:ff:26:72: b4:62:92:7d:b8:e8:16:c7:b7:b4:91:b1:3c:c6:7e:31: c9:03:57:fb:b3:8e:b0:d2:b7:71:47:8a:06:fc:01:87: b8:e7:06:88:52:e7:c6:a3:60:09:45:6f:93:18:4a:13: a7:e8:be:e4:97:6c:b7:1f:c9:23:c3:57:ed:e1:88:0b: 9e:e5:1c:73:2d:5f:5c:15:b0:da:05:3c:7e:e6:1d:53: b6:67:48:59:2e:e8:21:fc:20:6c:74:e2:94:4e:c9:2b: d0:9c:a4:46:2c:f8:d0:80:c5:8e:d2:de:8c:18:d9:f2: c9:92:a7:fe:ba:8d:c6:55:f0:a0:ab:a3:fd:f0:44:1e: 35:0c:91:25:35:50:ce:4f:68:82:dd:03:64:b7:d1:bc: ee:b4:91:e7:d5:6d:fd:4e:38:0e:9e:3e:28:05:cb:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:48:82:a1:5a:8b:1c:c7:fb:26:a0:49:41:4e:f0:6f: 0e:df:93:c0:e6:fd:5c:c8:0b:96:66:74:14:20:44:a4: d9:a6:b6:52:be:52:91:10:c0:11:0c:85:af:5b:8a:c5: 03:18:b1:41:60:e2:6c:6f:58:63:36:7b:4a:c2:72:43: 16:66:8a:76:2d:cb:56:43:79:89:c0:2c:98:3a:dc:21: ee:64:8b:54:fd:c5:17:0d:a0:2b:54:ea:0c:dd:f6:08: f4:65:bc:d1:e3:7a:b8:07:b7:47:e4:d5:35:19:29:18: 95:68:86:71:e7:7a:b1:97:6c:04:ef:27:cc:3d:e8:4f: 8a:90:e2:01:9d:c1:c3:25:20:99:40:47:20:f9:3c:17: 04:a1:9e:db:17:7c:12:db:a4:7a:97:2c:97:dd:44:ed: af:57:a4:5f:41:03:7c:8b:5d:78:ba:b7:64:44:a6:a3: 5c:4c:4a:1f:dc:23:1f:b0:9c:17:84:a4:1a:b0:d5:2b: 01:29:92:f6:9c:30:75:ce:cc:55:30:a0:a9:e7:a0:8f: 34:b5:5e:6b:29:c5:91:25:cb:95:bb:d2:54:f2:84:98: 73:42:df:35:04:24:ef:3e:86:39:f3:22:03:de:d7:37: c0:e6:98:69:ca:62:f4:fb:a2:6a:66:69:a1:5f:2e:42 Fingerprint (SHA-256): 3B:7F:BC:C0:26:04:98:86:E5:D3:2F:EF:DA:A3:9E:21:C1:31:2B:F1:F1:1C:3D:89:FE:F5:AD:99:4F:33:0C:A6 Fingerprint (SHA1): CB:89:27:E0:13:A1:C9:07:EB:2F:75:F0:8D:4A:BF:B5:11:B3:3B:1E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #572: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #573: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #574: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #575: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221593 (0x37444759) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:19:04 2022 Not After : Tue Sep 27 22:19:04 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:6a:42:04:39:16:35:e9:86:ee:d5:e5:f9:96:ae:64: fe:0b:df:09:9a:58:1b:0d:c2:7a:17:56:4a:69:d7:cc: a4:aa:a8:f7:72:47:ed:64:96:b4:7a:7d:0a:4f:15:48: b4:0a:3c:20:4c:b2:53:1b:b6:a8:7e:7a:c4:b4:48:95: 98:f8:aa:79:a8:b6:c8:d6:2e:d2:5a:d3:71:2a:54:e4: a7:ef:60:05:ed:68:61:9a:68:2e:e3:71:ce:ff:26:72: b4:62:92:7d:b8:e8:16:c7:b7:b4:91:b1:3c:c6:7e:31: c9:03:57:fb:b3:8e:b0:d2:b7:71:47:8a:06:fc:01:87: b8:e7:06:88:52:e7:c6:a3:60:09:45:6f:93:18:4a:13: a7:e8:be:e4:97:6c:b7:1f:c9:23:c3:57:ed:e1:88:0b: 9e:e5:1c:73:2d:5f:5c:15:b0:da:05:3c:7e:e6:1d:53: b6:67:48:59:2e:e8:21:fc:20:6c:74:e2:94:4e:c9:2b: d0:9c:a4:46:2c:f8:d0:80:c5:8e:d2:de:8c:18:d9:f2: c9:92:a7:fe:ba:8d:c6:55:f0:a0:ab:a3:fd:f0:44:1e: 35:0c:91:25:35:50:ce:4f:68:82:dd:03:64:b7:d1:bc: ee:b4:91:e7:d5:6d:fd:4e:38:0e:9e:3e:28:05:cb:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:48:82:a1:5a:8b:1c:c7:fb:26:a0:49:41:4e:f0:6f: 0e:df:93:c0:e6:fd:5c:c8:0b:96:66:74:14:20:44:a4: d9:a6:b6:52:be:52:91:10:c0:11:0c:85:af:5b:8a:c5: 03:18:b1:41:60:e2:6c:6f:58:63:36:7b:4a:c2:72:43: 16:66:8a:76:2d:cb:56:43:79:89:c0:2c:98:3a:dc:21: ee:64:8b:54:fd:c5:17:0d:a0:2b:54:ea:0c:dd:f6:08: f4:65:bc:d1:e3:7a:b8:07:b7:47:e4:d5:35:19:29:18: 95:68:86:71:e7:7a:b1:97:6c:04:ef:27:cc:3d:e8:4f: 8a:90:e2:01:9d:c1:c3:25:20:99:40:47:20:f9:3c:17: 04:a1:9e:db:17:7c:12:db:a4:7a:97:2c:97:dd:44:ed: af:57:a4:5f:41:03:7c:8b:5d:78:ba:b7:64:44:a6:a3: 5c:4c:4a:1f:dc:23:1f:b0:9c:17:84:a4:1a:b0:d5:2b: 01:29:92:f6:9c:30:75:ce:cc:55:30:a0:a9:e7:a0:8f: 34:b5:5e:6b:29:c5:91:25:cb:95:bb:d2:54:f2:84:98: 73:42:df:35:04:24:ef:3e:86:39:f3:22:03:de:d7:37: c0:e6:98:69:ca:62:f4:fb:a2:6a:66:69:a1:5f:2e:42 Fingerprint (SHA-256): 3B:7F:BC:C0:26:04:98:86:E5:D3:2F:EF:DA:A3:9E:21:C1:31:2B:F1:F1:1C:3D:89:FE:F5:AD:99:4F:33:0C:A6 Fingerprint (SHA1): CB:89:27:E0:13:A1:C9:07:EB:2F:75:F0:8D:4A:BF:B5:11:B3:3B:1E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #576: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #577: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #578: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #579: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221593 (0x37444759) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:19:04 2022 Not After : Tue Sep 27 22:19:04 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:6a:42:04:39:16:35:e9:86:ee:d5:e5:f9:96:ae:64: fe:0b:df:09:9a:58:1b:0d:c2:7a:17:56:4a:69:d7:cc: a4:aa:a8:f7:72:47:ed:64:96:b4:7a:7d:0a:4f:15:48: b4:0a:3c:20:4c:b2:53:1b:b6:a8:7e:7a:c4:b4:48:95: 98:f8:aa:79:a8:b6:c8:d6:2e:d2:5a:d3:71:2a:54:e4: a7:ef:60:05:ed:68:61:9a:68:2e:e3:71:ce:ff:26:72: b4:62:92:7d:b8:e8:16:c7:b7:b4:91:b1:3c:c6:7e:31: c9:03:57:fb:b3:8e:b0:d2:b7:71:47:8a:06:fc:01:87: b8:e7:06:88:52:e7:c6:a3:60:09:45:6f:93:18:4a:13: a7:e8:be:e4:97:6c:b7:1f:c9:23:c3:57:ed:e1:88:0b: 9e:e5:1c:73:2d:5f:5c:15:b0:da:05:3c:7e:e6:1d:53: b6:67:48:59:2e:e8:21:fc:20:6c:74:e2:94:4e:c9:2b: d0:9c:a4:46:2c:f8:d0:80:c5:8e:d2:de:8c:18:d9:f2: c9:92:a7:fe:ba:8d:c6:55:f0:a0:ab:a3:fd:f0:44:1e: 35:0c:91:25:35:50:ce:4f:68:82:dd:03:64:b7:d1:bc: ee:b4:91:e7:d5:6d:fd:4e:38:0e:9e:3e:28:05:cb:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:48:82:a1:5a:8b:1c:c7:fb:26:a0:49:41:4e:f0:6f: 0e:df:93:c0:e6:fd:5c:c8:0b:96:66:74:14:20:44:a4: d9:a6:b6:52:be:52:91:10:c0:11:0c:85:af:5b:8a:c5: 03:18:b1:41:60:e2:6c:6f:58:63:36:7b:4a:c2:72:43: 16:66:8a:76:2d:cb:56:43:79:89:c0:2c:98:3a:dc:21: ee:64:8b:54:fd:c5:17:0d:a0:2b:54:ea:0c:dd:f6:08: f4:65:bc:d1:e3:7a:b8:07:b7:47:e4:d5:35:19:29:18: 95:68:86:71:e7:7a:b1:97:6c:04:ef:27:cc:3d:e8:4f: 8a:90:e2:01:9d:c1:c3:25:20:99:40:47:20:f9:3c:17: 04:a1:9e:db:17:7c:12:db:a4:7a:97:2c:97:dd:44:ed: af:57:a4:5f:41:03:7c:8b:5d:78:ba:b7:64:44:a6:a3: 5c:4c:4a:1f:dc:23:1f:b0:9c:17:84:a4:1a:b0:d5:2b: 01:29:92:f6:9c:30:75:ce:cc:55:30:a0:a9:e7:a0:8f: 34:b5:5e:6b:29:c5:91:25:cb:95:bb:d2:54:f2:84:98: 73:42:df:35:04:24:ef:3e:86:39:f3:22:03:de:d7:37: c0:e6:98:69:ca:62:f4:fb:a2:6a:66:69:a1:5f:2e:42 Fingerprint (SHA-256): 3B:7F:BC:C0:26:04:98:86:E5:D3:2F:EF:DA:A3:9E:21:C1:31:2B:F1:F1:1C:3D:89:FE:F5:AD:99:4F:33:0C:A6 Fingerprint (SHA1): CB:89:27:E0:13:A1:C9:07:EB:2F:75:F0:8D:4A:BF:B5:11:B3:3B:1E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #580: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221593 (0x37444759) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:19:04 2022 Not After : Tue Sep 27 22:19:04 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:6a:42:04:39:16:35:e9:86:ee:d5:e5:f9:96:ae:64: fe:0b:df:09:9a:58:1b:0d:c2:7a:17:56:4a:69:d7:cc: a4:aa:a8:f7:72:47:ed:64:96:b4:7a:7d:0a:4f:15:48: b4:0a:3c:20:4c:b2:53:1b:b6:a8:7e:7a:c4:b4:48:95: 98:f8:aa:79:a8:b6:c8:d6:2e:d2:5a:d3:71:2a:54:e4: a7:ef:60:05:ed:68:61:9a:68:2e:e3:71:ce:ff:26:72: b4:62:92:7d:b8:e8:16:c7:b7:b4:91:b1:3c:c6:7e:31: c9:03:57:fb:b3:8e:b0:d2:b7:71:47:8a:06:fc:01:87: b8:e7:06:88:52:e7:c6:a3:60:09:45:6f:93:18:4a:13: a7:e8:be:e4:97:6c:b7:1f:c9:23:c3:57:ed:e1:88:0b: 9e:e5:1c:73:2d:5f:5c:15:b0:da:05:3c:7e:e6:1d:53: b6:67:48:59:2e:e8:21:fc:20:6c:74:e2:94:4e:c9:2b: d0:9c:a4:46:2c:f8:d0:80:c5:8e:d2:de:8c:18:d9:f2: c9:92:a7:fe:ba:8d:c6:55:f0:a0:ab:a3:fd:f0:44:1e: 35:0c:91:25:35:50:ce:4f:68:82:dd:03:64:b7:d1:bc: ee:b4:91:e7:d5:6d:fd:4e:38:0e:9e:3e:28:05:cb:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:48:82:a1:5a:8b:1c:c7:fb:26:a0:49:41:4e:f0:6f: 0e:df:93:c0:e6:fd:5c:c8:0b:96:66:74:14:20:44:a4: d9:a6:b6:52:be:52:91:10:c0:11:0c:85:af:5b:8a:c5: 03:18:b1:41:60:e2:6c:6f:58:63:36:7b:4a:c2:72:43: 16:66:8a:76:2d:cb:56:43:79:89:c0:2c:98:3a:dc:21: ee:64:8b:54:fd:c5:17:0d:a0:2b:54:ea:0c:dd:f6:08: f4:65:bc:d1:e3:7a:b8:07:b7:47:e4:d5:35:19:29:18: 95:68:86:71:e7:7a:b1:97:6c:04:ef:27:cc:3d:e8:4f: 8a:90:e2:01:9d:c1:c3:25:20:99:40:47:20:f9:3c:17: 04:a1:9e:db:17:7c:12:db:a4:7a:97:2c:97:dd:44:ed: af:57:a4:5f:41:03:7c:8b:5d:78:ba:b7:64:44:a6:a3: 5c:4c:4a:1f:dc:23:1f:b0:9c:17:84:a4:1a:b0:d5:2b: 01:29:92:f6:9c:30:75:ce:cc:55:30:a0:a9:e7:a0:8f: 34:b5:5e:6b:29:c5:91:25:cb:95:bb:d2:54:f2:84:98: 73:42:df:35:04:24:ef:3e:86:39:f3:22:03:de:d7:37: c0:e6:98:69:ca:62:f4:fb:a2:6a:66:69:a1:5f:2e:42 Fingerprint (SHA-256): 3B:7F:BC:C0:26:04:98:86:E5:D3:2F:EF:DA:A3:9E:21:C1:31:2B:F1:F1:1C:3D:89:FE:F5:AD:99:4F:33:0C:A6 Fingerprint (SHA1): CB:89:27:E0:13:A1:C9:07:EB:2F:75:F0:8D:4A:BF:B5:11:B3:3B:1E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #581: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #582: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221593 (0x37444759) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:19:04 2022 Not After : Tue Sep 27 22:19:04 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:6a:42:04:39:16:35:e9:86:ee:d5:e5:f9:96:ae:64: fe:0b:df:09:9a:58:1b:0d:c2:7a:17:56:4a:69:d7:cc: a4:aa:a8:f7:72:47:ed:64:96:b4:7a:7d:0a:4f:15:48: b4:0a:3c:20:4c:b2:53:1b:b6:a8:7e:7a:c4:b4:48:95: 98:f8:aa:79:a8:b6:c8:d6:2e:d2:5a:d3:71:2a:54:e4: a7:ef:60:05:ed:68:61:9a:68:2e:e3:71:ce:ff:26:72: b4:62:92:7d:b8:e8:16:c7:b7:b4:91:b1:3c:c6:7e:31: c9:03:57:fb:b3:8e:b0:d2:b7:71:47:8a:06:fc:01:87: b8:e7:06:88:52:e7:c6:a3:60:09:45:6f:93:18:4a:13: a7:e8:be:e4:97:6c:b7:1f:c9:23:c3:57:ed:e1:88:0b: 9e:e5:1c:73:2d:5f:5c:15:b0:da:05:3c:7e:e6:1d:53: b6:67:48:59:2e:e8:21:fc:20:6c:74:e2:94:4e:c9:2b: d0:9c:a4:46:2c:f8:d0:80:c5:8e:d2:de:8c:18:d9:f2: c9:92:a7:fe:ba:8d:c6:55:f0:a0:ab:a3:fd:f0:44:1e: 35:0c:91:25:35:50:ce:4f:68:82:dd:03:64:b7:d1:bc: ee:b4:91:e7:d5:6d:fd:4e:38:0e:9e:3e:28:05:cb:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:48:82:a1:5a:8b:1c:c7:fb:26:a0:49:41:4e:f0:6f: 0e:df:93:c0:e6:fd:5c:c8:0b:96:66:74:14:20:44:a4: d9:a6:b6:52:be:52:91:10:c0:11:0c:85:af:5b:8a:c5: 03:18:b1:41:60:e2:6c:6f:58:63:36:7b:4a:c2:72:43: 16:66:8a:76:2d:cb:56:43:79:89:c0:2c:98:3a:dc:21: ee:64:8b:54:fd:c5:17:0d:a0:2b:54:ea:0c:dd:f6:08: f4:65:bc:d1:e3:7a:b8:07:b7:47:e4:d5:35:19:29:18: 95:68:86:71:e7:7a:b1:97:6c:04:ef:27:cc:3d:e8:4f: 8a:90:e2:01:9d:c1:c3:25:20:99:40:47:20:f9:3c:17: 04:a1:9e:db:17:7c:12:db:a4:7a:97:2c:97:dd:44:ed: af:57:a4:5f:41:03:7c:8b:5d:78:ba:b7:64:44:a6:a3: 5c:4c:4a:1f:dc:23:1f:b0:9c:17:84:a4:1a:b0:d5:2b: 01:29:92:f6:9c:30:75:ce:cc:55:30:a0:a9:e7:a0:8f: 34:b5:5e:6b:29:c5:91:25:cb:95:bb:d2:54:f2:84:98: 73:42:df:35:04:24:ef:3e:86:39:f3:22:03:de:d7:37: c0:e6:98:69:ca:62:f4:fb:a2:6a:66:69:a1:5f:2e:42 Fingerprint (SHA-256): 3B:7F:BC:C0:26:04:98:86:E5:D3:2F:EF:DA:A3:9E:21:C1:31:2B:F1:F1:1C:3D:89:FE:F5:AD:99:4F:33:0C:A6 Fingerprint (SHA1): CB:89:27:E0:13:A1:C9:07:EB:2F:75:F0:8D:4A:BF:B5:11:B3:3B:1E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #583: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #584: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #585: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #586: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221593 (0x37444759) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:19:04 2022 Not After : Tue Sep 27 22:19:04 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:6a:42:04:39:16:35:e9:86:ee:d5:e5:f9:96:ae:64: fe:0b:df:09:9a:58:1b:0d:c2:7a:17:56:4a:69:d7:cc: a4:aa:a8:f7:72:47:ed:64:96:b4:7a:7d:0a:4f:15:48: b4:0a:3c:20:4c:b2:53:1b:b6:a8:7e:7a:c4:b4:48:95: 98:f8:aa:79:a8:b6:c8:d6:2e:d2:5a:d3:71:2a:54:e4: a7:ef:60:05:ed:68:61:9a:68:2e:e3:71:ce:ff:26:72: b4:62:92:7d:b8:e8:16:c7:b7:b4:91:b1:3c:c6:7e:31: c9:03:57:fb:b3:8e:b0:d2:b7:71:47:8a:06:fc:01:87: b8:e7:06:88:52:e7:c6:a3:60:09:45:6f:93:18:4a:13: a7:e8:be:e4:97:6c:b7:1f:c9:23:c3:57:ed:e1:88:0b: 9e:e5:1c:73:2d:5f:5c:15:b0:da:05:3c:7e:e6:1d:53: b6:67:48:59:2e:e8:21:fc:20:6c:74:e2:94:4e:c9:2b: d0:9c:a4:46:2c:f8:d0:80:c5:8e:d2:de:8c:18:d9:f2: c9:92:a7:fe:ba:8d:c6:55:f0:a0:ab:a3:fd:f0:44:1e: 35:0c:91:25:35:50:ce:4f:68:82:dd:03:64:b7:d1:bc: ee:b4:91:e7:d5:6d:fd:4e:38:0e:9e:3e:28:05:cb:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:48:82:a1:5a:8b:1c:c7:fb:26:a0:49:41:4e:f0:6f: 0e:df:93:c0:e6:fd:5c:c8:0b:96:66:74:14:20:44:a4: d9:a6:b6:52:be:52:91:10:c0:11:0c:85:af:5b:8a:c5: 03:18:b1:41:60:e2:6c:6f:58:63:36:7b:4a:c2:72:43: 16:66:8a:76:2d:cb:56:43:79:89:c0:2c:98:3a:dc:21: ee:64:8b:54:fd:c5:17:0d:a0:2b:54:ea:0c:dd:f6:08: f4:65:bc:d1:e3:7a:b8:07:b7:47:e4:d5:35:19:29:18: 95:68:86:71:e7:7a:b1:97:6c:04:ef:27:cc:3d:e8:4f: 8a:90:e2:01:9d:c1:c3:25:20:99:40:47:20:f9:3c:17: 04:a1:9e:db:17:7c:12:db:a4:7a:97:2c:97:dd:44:ed: af:57:a4:5f:41:03:7c:8b:5d:78:ba:b7:64:44:a6:a3: 5c:4c:4a:1f:dc:23:1f:b0:9c:17:84:a4:1a:b0:d5:2b: 01:29:92:f6:9c:30:75:ce:cc:55:30:a0:a9:e7:a0:8f: 34:b5:5e:6b:29:c5:91:25:cb:95:bb:d2:54:f2:84:98: 73:42:df:35:04:24:ef:3e:86:39:f3:22:03:de:d7:37: c0:e6:98:69:ca:62:f4:fb:a2:6a:66:69:a1:5f:2e:42 Fingerprint (SHA-256): 3B:7F:BC:C0:26:04:98:86:E5:D3:2F:EF:DA:A3:9E:21:C1:31:2B:F1:F1:1C:3D:89:FE:F5:AD:99:4F:33:0C:A6 Fingerprint (SHA1): CB:89:27:E0:13:A1:C9:07:EB:2F:75:F0:8D:4A:BF:B5:11:B3:3B:1E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #587: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221593 (0x37444759) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:19:04 2022 Not After : Tue Sep 27 22:19:04 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:6a:42:04:39:16:35:e9:86:ee:d5:e5:f9:96:ae:64: fe:0b:df:09:9a:58:1b:0d:c2:7a:17:56:4a:69:d7:cc: a4:aa:a8:f7:72:47:ed:64:96:b4:7a:7d:0a:4f:15:48: b4:0a:3c:20:4c:b2:53:1b:b6:a8:7e:7a:c4:b4:48:95: 98:f8:aa:79:a8:b6:c8:d6:2e:d2:5a:d3:71:2a:54:e4: a7:ef:60:05:ed:68:61:9a:68:2e:e3:71:ce:ff:26:72: b4:62:92:7d:b8:e8:16:c7:b7:b4:91:b1:3c:c6:7e:31: c9:03:57:fb:b3:8e:b0:d2:b7:71:47:8a:06:fc:01:87: b8:e7:06:88:52:e7:c6:a3:60:09:45:6f:93:18:4a:13: a7:e8:be:e4:97:6c:b7:1f:c9:23:c3:57:ed:e1:88:0b: 9e:e5:1c:73:2d:5f:5c:15:b0:da:05:3c:7e:e6:1d:53: b6:67:48:59:2e:e8:21:fc:20:6c:74:e2:94:4e:c9:2b: d0:9c:a4:46:2c:f8:d0:80:c5:8e:d2:de:8c:18:d9:f2: c9:92:a7:fe:ba:8d:c6:55:f0:a0:ab:a3:fd:f0:44:1e: 35:0c:91:25:35:50:ce:4f:68:82:dd:03:64:b7:d1:bc: ee:b4:91:e7:d5:6d:fd:4e:38:0e:9e:3e:28:05:cb:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:48:82:a1:5a:8b:1c:c7:fb:26:a0:49:41:4e:f0:6f: 0e:df:93:c0:e6:fd:5c:c8:0b:96:66:74:14:20:44:a4: d9:a6:b6:52:be:52:91:10:c0:11:0c:85:af:5b:8a:c5: 03:18:b1:41:60:e2:6c:6f:58:63:36:7b:4a:c2:72:43: 16:66:8a:76:2d:cb:56:43:79:89:c0:2c:98:3a:dc:21: ee:64:8b:54:fd:c5:17:0d:a0:2b:54:ea:0c:dd:f6:08: f4:65:bc:d1:e3:7a:b8:07:b7:47:e4:d5:35:19:29:18: 95:68:86:71:e7:7a:b1:97:6c:04:ef:27:cc:3d:e8:4f: 8a:90:e2:01:9d:c1:c3:25:20:99:40:47:20:f9:3c:17: 04:a1:9e:db:17:7c:12:db:a4:7a:97:2c:97:dd:44:ed: af:57:a4:5f:41:03:7c:8b:5d:78:ba:b7:64:44:a6:a3: 5c:4c:4a:1f:dc:23:1f:b0:9c:17:84:a4:1a:b0:d5:2b: 01:29:92:f6:9c:30:75:ce:cc:55:30:a0:a9:e7:a0:8f: 34:b5:5e:6b:29:c5:91:25:cb:95:bb:d2:54:f2:84:98: 73:42:df:35:04:24:ef:3e:86:39:f3:22:03:de:d7:37: c0:e6:98:69:ca:62:f4:fb:a2:6a:66:69:a1:5f:2e:42 Fingerprint (SHA-256): 3B:7F:BC:C0:26:04:98:86:E5:D3:2F:EF:DA:A3:9E:21:C1:31:2B:F1:F1:1C:3D:89:FE:F5:AD:99:4F:33:0C:A6 Fingerprint (SHA1): CB:89:27:E0:13:A1:C9:07:EB:2F:75:F0:8D:4A:BF:B5:11:B3:3B:1E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #588: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221593 (0x37444759) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:19:04 2022 Not After : Tue Sep 27 22:19:04 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:6a:42:04:39:16:35:e9:86:ee:d5:e5:f9:96:ae:64: fe:0b:df:09:9a:58:1b:0d:c2:7a:17:56:4a:69:d7:cc: a4:aa:a8:f7:72:47:ed:64:96:b4:7a:7d:0a:4f:15:48: b4:0a:3c:20:4c:b2:53:1b:b6:a8:7e:7a:c4:b4:48:95: 98:f8:aa:79:a8:b6:c8:d6:2e:d2:5a:d3:71:2a:54:e4: a7:ef:60:05:ed:68:61:9a:68:2e:e3:71:ce:ff:26:72: b4:62:92:7d:b8:e8:16:c7:b7:b4:91:b1:3c:c6:7e:31: c9:03:57:fb:b3:8e:b0:d2:b7:71:47:8a:06:fc:01:87: b8:e7:06:88:52:e7:c6:a3:60:09:45:6f:93:18:4a:13: a7:e8:be:e4:97:6c:b7:1f:c9:23:c3:57:ed:e1:88:0b: 9e:e5:1c:73:2d:5f:5c:15:b0:da:05:3c:7e:e6:1d:53: b6:67:48:59:2e:e8:21:fc:20:6c:74:e2:94:4e:c9:2b: d0:9c:a4:46:2c:f8:d0:80:c5:8e:d2:de:8c:18:d9:f2: c9:92:a7:fe:ba:8d:c6:55:f0:a0:ab:a3:fd:f0:44:1e: 35:0c:91:25:35:50:ce:4f:68:82:dd:03:64:b7:d1:bc: ee:b4:91:e7:d5:6d:fd:4e:38:0e:9e:3e:28:05:cb:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:48:82:a1:5a:8b:1c:c7:fb:26:a0:49:41:4e:f0:6f: 0e:df:93:c0:e6:fd:5c:c8:0b:96:66:74:14:20:44:a4: d9:a6:b6:52:be:52:91:10:c0:11:0c:85:af:5b:8a:c5: 03:18:b1:41:60:e2:6c:6f:58:63:36:7b:4a:c2:72:43: 16:66:8a:76:2d:cb:56:43:79:89:c0:2c:98:3a:dc:21: ee:64:8b:54:fd:c5:17:0d:a0:2b:54:ea:0c:dd:f6:08: f4:65:bc:d1:e3:7a:b8:07:b7:47:e4:d5:35:19:29:18: 95:68:86:71:e7:7a:b1:97:6c:04:ef:27:cc:3d:e8:4f: 8a:90:e2:01:9d:c1:c3:25:20:99:40:47:20:f9:3c:17: 04:a1:9e:db:17:7c:12:db:a4:7a:97:2c:97:dd:44:ed: af:57:a4:5f:41:03:7c:8b:5d:78:ba:b7:64:44:a6:a3: 5c:4c:4a:1f:dc:23:1f:b0:9c:17:84:a4:1a:b0:d5:2b: 01:29:92:f6:9c:30:75:ce:cc:55:30:a0:a9:e7:a0:8f: 34:b5:5e:6b:29:c5:91:25:cb:95:bb:d2:54:f2:84:98: 73:42:df:35:04:24:ef:3e:86:39:f3:22:03:de:d7:37: c0:e6:98:69:ca:62:f4:fb:a2:6a:66:69:a1:5f:2e:42 Fingerprint (SHA-256): 3B:7F:BC:C0:26:04:98:86:E5:D3:2F:EF:DA:A3:9E:21:C1:31:2B:F1:F1:1C:3D:89:FE:F5:AD:99:4F:33:0C:A6 Fingerprint (SHA1): CB:89:27:E0:13:A1:C9:07:EB:2F:75:F0:8D:4A:BF:B5:11:B3:3B:1E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #589: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221593 (0x37444759) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:19:04 2022 Not After : Tue Sep 27 22:19:04 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:6a:42:04:39:16:35:e9:86:ee:d5:e5:f9:96:ae:64: fe:0b:df:09:9a:58:1b:0d:c2:7a:17:56:4a:69:d7:cc: a4:aa:a8:f7:72:47:ed:64:96:b4:7a:7d:0a:4f:15:48: b4:0a:3c:20:4c:b2:53:1b:b6:a8:7e:7a:c4:b4:48:95: 98:f8:aa:79:a8:b6:c8:d6:2e:d2:5a:d3:71:2a:54:e4: a7:ef:60:05:ed:68:61:9a:68:2e:e3:71:ce:ff:26:72: b4:62:92:7d:b8:e8:16:c7:b7:b4:91:b1:3c:c6:7e:31: c9:03:57:fb:b3:8e:b0:d2:b7:71:47:8a:06:fc:01:87: b8:e7:06:88:52:e7:c6:a3:60:09:45:6f:93:18:4a:13: a7:e8:be:e4:97:6c:b7:1f:c9:23:c3:57:ed:e1:88:0b: 9e:e5:1c:73:2d:5f:5c:15:b0:da:05:3c:7e:e6:1d:53: b6:67:48:59:2e:e8:21:fc:20:6c:74:e2:94:4e:c9:2b: d0:9c:a4:46:2c:f8:d0:80:c5:8e:d2:de:8c:18:d9:f2: c9:92:a7:fe:ba:8d:c6:55:f0:a0:ab:a3:fd:f0:44:1e: 35:0c:91:25:35:50:ce:4f:68:82:dd:03:64:b7:d1:bc: ee:b4:91:e7:d5:6d:fd:4e:38:0e:9e:3e:28:05:cb:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:48:82:a1:5a:8b:1c:c7:fb:26:a0:49:41:4e:f0:6f: 0e:df:93:c0:e6:fd:5c:c8:0b:96:66:74:14:20:44:a4: d9:a6:b6:52:be:52:91:10:c0:11:0c:85:af:5b:8a:c5: 03:18:b1:41:60:e2:6c:6f:58:63:36:7b:4a:c2:72:43: 16:66:8a:76:2d:cb:56:43:79:89:c0:2c:98:3a:dc:21: ee:64:8b:54:fd:c5:17:0d:a0:2b:54:ea:0c:dd:f6:08: f4:65:bc:d1:e3:7a:b8:07:b7:47:e4:d5:35:19:29:18: 95:68:86:71:e7:7a:b1:97:6c:04:ef:27:cc:3d:e8:4f: 8a:90:e2:01:9d:c1:c3:25:20:99:40:47:20:f9:3c:17: 04:a1:9e:db:17:7c:12:db:a4:7a:97:2c:97:dd:44:ed: af:57:a4:5f:41:03:7c:8b:5d:78:ba:b7:64:44:a6:a3: 5c:4c:4a:1f:dc:23:1f:b0:9c:17:84:a4:1a:b0:d5:2b: 01:29:92:f6:9c:30:75:ce:cc:55:30:a0:a9:e7:a0:8f: 34:b5:5e:6b:29:c5:91:25:cb:95:bb:d2:54:f2:84:98: 73:42:df:35:04:24:ef:3e:86:39:f3:22:03:de:d7:37: c0:e6:98:69:ca:62:f4:fb:a2:6a:66:69:a1:5f:2e:42 Fingerprint (SHA-256): 3B:7F:BC:C0:26:04:98:86:E5:D3:2F:EF:DA:A3:9E:21:C1:31:2B:F1:F1:1C:3D:89:FE:F5:AD:99:4F:33:0C:A6 Fingerprint (SHA1): CB:89:27:E0:13:A1:C9:07:EB:2F:75:F0:8D:4A:BF:B5:11:B3:3B:1E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #590: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221593 (0x37444759) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:19:04 2022 Not After : Tue Sep 27 22:19:04 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:6a:42:04:39:16:35:e9:86:ee:d5:e5:f9:96:ae:64: fe:0b:df:09:9a:58:1b:0d:c2:7a:17:56:4a:69:d7:cc: a4:aa:a8:f7:72:47:ed:64:96:b4:7a:7d:0a:4f:15:48: b4:0a:3c:20:4c:b2:53:1b:b6:a8:7e:7a:c4:b4:48:95: 98:f8:aa:79:a8:b6:c8:d6:2e:d2:5a:d3:71:2a:54:e4: a7:ef:60:05:ed:68:61:9a:68:2e:e3:71:ce:ff:26:72: b4:62:92:7d:b8:e8:16:c7:b7:b4:91:b1:3c:c6:7e:31: c9:03:57:fb:b3:8e:b0:d2:b7:71:47:8a:06:fc:01:87: b8:e7:06:88:52:e7:c6:a3:60:09:45:6f:93:18:4a:13: a7:e8:be:e4:97:6c:b7:1f:c9:23:c3:57:ed:e1:88:0b: 9e:e5:1c:73:2d:5f:5c:15:b0:da:05:3c:7e:e6:1d:53: b6:67:48:59:2e:e8:21:fc:20:6c:74:e2:94:4e:c9:2b: d0:9c:a4:46:2c:f8:d0:80:c5:8e:d2:de:8c:18:d9:f2: c9:92:a7:fe:ba:8d:c6:55:f0:a0:ab:a3:fd:f0:44:1e: 35:0c:91:25:35:50:ce:4f:68:82:dd:03:64:b7:d1:bc: ee:b4:91:e7:d5:6d:fd:4e:38:0e:9e:3e:28:05:cb:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:48:82:a1:5a:8b:1c:c7:fb:26:a0:49:41:4e:f0:6f: 0e:df:93:c0:e6:fd:5c:c8:0b:96:66:74:14:20:44:a4: d9:a6:b6:52:be:52:91:10:c0:11:0c:85:af:5b:8a:c5: 03:18:b1:41:60:e2:6c:6f:58:63:36:7b:4a:c2:72:43: 16:66:8a:76:2d:cb:56:43:79:89:c0:2c:98:3a:dc:21: ee:64:8b:54:fd:c5:17:0d:a0:2b:54:ea:0c:dd:f6:08: f4:65:bc:d1:e3:7a:b8:07:b7:47:e4:d5:35:19:29:18: 95:68:86:71:e7:7a:b1:97:6c:04:ef:27:cc:3d:e8:4f: 8a:90:e2:01:9d:c1:c3:25:20:99:40:47:20:f9:3c:17: 04:a1:9e:db:17:7c:12:db:a4:7a:97:2c:97:dd:44:ed: af:57:a4:5f:41:03:7c:8b:5d:78:ba:b7:64:44:a6:a3: 5c:4c:4a:1f:dc:23:1f:b0:9c:17:84:a4:1a:b0:d5:2b: 01:29:92:f6:9c:30:75:ce:cc:55:30:a0:a9:e7:a0:8f: 34:b5:5e:6b:29:c5:91:25:cb:95:bb:d2:54:f2:84:98: 73:42:df:35:04:24:ef:3e:86:39:f3:22:03:de:d7:37: c0:e6:98:69:ca:62:f4:fb:a2:6a:66:69:a1:5f:2e:42 Fingerprint (SHA-256): 3B:7F:BC:C0:26:04:98:86:E5:D3:2F:EF:DA:A3:9E:21:C1:31:2B:F1:F1:1C:3D:89:FE:F5:AD:99:4F:33:0C:A6 Fingerprint (SHA1): CB:89:27:E0:13:A1:C9:07:EB:2F:75:F0:8D:4A:BF:B5:11:B3:3B:1E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #591: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221593 (0x37444759) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:19:04 2022 Not After : Tue Sep 27 22:19:04 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:6a:42:04:39:16:35:e9:86:ee:d5:e5:f9:96:ae:64: fe:0b:df:09:9a:58:1b:0d:c2:7a:17:56:4a:69:d7:cc: a4:aa:a8:f7:72:47:ed:64:96:b4:7a:7d:0a:4f:15:48: b4:0a:3c:20:4c:b2:53:1b:b6:a8:7e:7a:c4:b4:48:95: 98:f8:aa:79:a8:b6:c8:d6:2e:d2:5a:d3:71:2a:54:e4: a7:ef:60:05:ed:68:61:9a:68:2e:e3:71:ce:ff:26:72: b4:62:92:7d:b8:e8:16:c7:b7:b4:91:b1:3c:c6:7e:31: c9:03:57:fb:b3:8e:b0:d2:b7:71:47:8a:06:fc:01:87: b8:e7:06:88:52:e7:c6:a3:60:09:45:6f:93:18:4a:13: a7:e8:be:e4:97:6c:b7:1f:c9:23:c3:57:ed:e1:88:0b: 9e:e5:1c:73:2d:5f:5c:15:b0:da:05:3c:7e:e6:1d:53: b6:67:48:59:2e:e8:21:fc:20:6c:74:e2:94:4e:c9:2b: d0:9c:a4:46:2c:f8:d0:80:c5:8e:d2:de:8c:18:d9:f2: c9:92:a7:fe:ba:8d:c6:55:f0:a0:ab:a3:fd:f0:44:1e: 35:0c:91:25:35:50:ce:4f:68:82:dd:03:64:b7:d1:bc: ee:b4:91:e7:d5:6d:fd:4e:38:0e:9e:3e:28:05:cb:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:48:82:a1:5a:8b:1c:c7:fb:26:a0:49:41:4e:f0:6f: 0e:df:93:c0:e6:fd:5c:c8:0b:96:66:74:14:20:44:a4: d9:a6:b6:52:be:52:91:10:c0:11:0c:85:af:5b:8a:c5: 03:18:b1:41:60:e2:6c:6f:58:63:36:7b:4a:c2:72:43: 16:66:8a:76:2d:cb:56:43:79:89:c0:2c:98:3a:dc:21: ee:64:8b:54:fd:c5:17:0d:a0:2b:54:ea:0c:dd:f6:08: f4:65:bc:d1:e3:7a:b8:07:b7:47:e4:d5:35:19:29:18: 95:68:86:71:e7:7a:b1:97:6c:04:ef:27:cc:3d:e8:4f: 8a:90:e2:01:9d:c1:c3:25:20:99:40:47:20:f9:3c:17: 04:a1:9e:db:17:7c:12:db:a4:7a:97:2c:97:dd:44:ed: af:57:a4:5f:41:03:7c:8b:5d:78:ba:b7:64:44:a6:a3: 5c:4c:4a:1f:dc:23:1f:b0:9c:17:84:a4:1a:b0:d5:2b: 01:29:92:f6:9c:30:75:ce:cc:55:30:a0:a9:e7:a0:8f: 34:b5:5e:6b:29:c5:91:25:cb:95:bb:d2:54:f2:84:98: 73:42:df:35:04:24:ef:3e:86:39:f3:22:03:de:d7:37: c0:e6:98:69:ca:62:f4:fb:a2:6a:66:69:a1:5f:2e:42 Fingerprint (SHA-256): 3B:7F:BC:C0:26:04:98:86:E5:D3:2F:EF:DA:A3:9E:21:C1:31:2B:F1:F1:1C:3D:89:FE:F5:AD:99:4F:33:0C:A6 Fingerprint (SHA1): CB:89:27:E0:13:A1:C9:07:EB:2F:75:F0:8D:4A:BF:B5:11:B3:3B:1E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #592: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #593: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #594: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221623 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #595: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #596: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #597: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #598: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 927221624 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #599: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #600: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #601: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #602: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 927221625 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #603: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #604: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #605: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #606: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 927221626 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #607: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #608: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #609: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #610: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 927221627 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #611: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #612: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #613: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #614: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 927221628 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #615: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #616: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #617: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #618: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 927221629 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #619: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #620: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #621: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221623 (0x37444777) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:20:05 2022 Not After : Tue Sep 27 22:20:05 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f3:28:67:6d:dc:0e:55:97:0c:ab:5a:bd:aa:c7:9f:4b: e8:b7:6c:f9:2d:31:af:e3:b1:ba:0f:b2:98:e1:82:a6: e5:c1:cc:ed:bd:74:47:a7:f7:46:f8:f9:b2:fe:83:18: 75:bd:f4:d2:20:ec:6d:46:2e:86:ab:ba:20:f1:55:46: 18:87:78:ae:39:b9:64:8d:ca:d4:da:ac:d3:e6:90:57: e9:61:be:97:17:f1:06:36:9a:d9:46:a3:cf:70:de:51: 3e:46:21:68:c7:24:c7:c8:82:4b:92:86:cc:6b:f9:d3: 6b:df:33:88:e9:17:78:f7:7d:0c:83:5e:75:bf:3b:fa: 13:ac:b0:45:95:67:f2:86:50:a0:1f:39:26:81:94:fa: 29:bf:00:bc:88:e5:c8:72:8f:bf:cf:30:ec:6e:87:97: a0:d3:e7:26:97:88:ed:09:3c:72:a3:0e:22:9f:8c:02: 85:0f:52:50:b4:7a:eb:5d:85:0d:b6:e0:f8:e7:a0:be: 7a:93:02:05:e9:c4:30:40:4f:64:30:89:2e:84:3f:52: 95:d8:8a:b1:e8:36:66:a0:4a:29:0f:51:77:a4:73:21: a8:ed:62:62:4c:39:84:8a:9a:7c:10:a7:f2:7f:5c:d3: b1:94:22:07:a0:a3:b9:a0:19:ce:d9:90:75:8a:f6:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:02:56:39:04:ac:24:a6:6a:e5:77:93:96:5a:c5:9d: c1:b2:3a:ba:73:1b:0b:7d:01:d9:d5:5d:b4:92:d8:45: 41:fe:ce:32:00:a6:ac:28:64:16:d8:20:36:66:39:ce: 8f:c5:85:42:7c:eb:bb:6f:f7:c3:14:85:0b:e0:30:73: ff:34:2a:c7:22:38:82:f0:1e:41:1c:b3:c7:c5:9e:8a: d1:0f:f4:37:79:4a:74:26:9e:9b:85:d2:85:44:e5:45: b0:b1:76:5a:4b:d2:25:50:f4:90:b7:5c:43:cf:3b:54: 95:fb:9d:80:34:9d:50:24:40:fd:06:22:52:af:8b:bb: 31:24:94:83:b1:af:02:17:86:fb:0e:4f:ed:75:77:88: f3:09:82:63:18:d5:a7:4c:4b:fd:c0:0f:cc:dc:f4:32: ca:a5:1f:2c:e3:b6:8e:00:53:b7:d8:df:df:8f:68:99: 25:89:2c:0c:52:57:f0:e7:5a:ef:5f:4a:7c:5b:22:77: 56:66:6f:48:9a:d5:48:67:75:53:ca:7a:93:30:e4:b4: 58:ee:80:9c:03:52:ca:f0:49:d4:96:ad:db:72:c2:91: a8:7b:67:96:77:5a:4a:2e:df:08:c5:c7:bd:83:41:c5: 04:98:ba:79:61:69:fc:f9:c0:ad:38:89:a7:ca:e9:92 Fingerprint (SHA-256): D0:A3:ED:E5:44:A8:31:AF:80:94:8A:A2:D8:3D:6B:B9:7C:61:39:AD:4E:64:06:12:0D:CB:CA:EC:F0:74:47:02 Fingerprint (SHA1): C3:EA:C2:FC:0B:6F:03:C0:3A:7A:C1:51:B8:C8:29:0F:92:14:44:B1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #622: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #623: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #624: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #625: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221623 (0x37444777) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:20:05 2022 Not After : Tue Sep 27 22:20:05 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f3:28:67:6d:dc:0e:55:97:0c:ab:5a:bd:aa:c7:9f:4b: e8:b7:6c:f9:2d:31:af:e3:b1:ba:0f:b2:98:e1:82:a6: e5:c1:cc:ed:bd:74:47:a7:f7:46:f8:f9:b2:fe:83:18: 75:bd:f4:d2:20:ec:6d:46:2e:86:ab:ba:20:f1:55:46: 18:87:78:ae:39:b9:64:8d:ca:d4:da:ac:d3:e6:90:57: e9:61:be:97:17:f1:06:36:9a:d9:46:a3:cf:70:de:51: 3e:46:21:68:c7:24:c7:c8:82:4b:92:86:cc:6b:f9:d3: 6b:df:33:88:e9:17:78:f7:7d:0c:83:5e:75:bf:3b:fa: 13:ac:b0:45:95:67:f2:86:50:a0:1f:39:26:81:94:fa: 29:bf:00:bc:88:e5:c8:72:8f:bf:cf:30:ec:6e:87:97: a0:d3:e7:26:97:88:ed:09:3c:72:a3:0e:22:9f:8c:02: 85:0f:52:50:b4:7a:eb:5d:85:0d:b6:e0:f8:e7:a0:be: 7a:93:02:05:e9:c4:30:40:4f:64:30:89:2e:84:3f:52: 95:d8:8a:b1:e8:36:66:a0:4a:29:0f:51:77:a4:73:21: a8:ed:62:62:4c:39:84:8a:9a:7c:10:a7:f2:7f:5c:d3: b1:94:22:07:a0:a3:b9:a0:19:ce:d9:90:75:8a:f6:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:02:56:39:04:ac:24:a6:6a:e5:77:93:96:5a:c5:9d: c1:b2:3a:ba:73:1b:0b:7d:01:d9:d5:5d:b4:92:d8:45: 41:fe:ce:32:00:a6:ac:28:64:16:d8:20:36:66:39:ce: 8f:c5:85:42:7c:eb:bb:6f:f7:c3:14:85:0b:e0:30:73: ff:34:2a:c7:22:38:82:f0:1e:41:1c:b3:c7:c5:9e:8a: d1:0f:f4:37:79:4a:74:26:9e:9b:85:d2:85:44:e5:45: b0:b1:76:5a:4b:d2:25:50:f4:90:b7:5c:43:cf:3b:54: 95:fb:9d:80:34:9d:50:24:40:fd:06:22:52:af:8b:bb: 31:24:94:83:b1:af:02:17:86:fb:0e:4f:ed:75:77:88: f3:09:82:63:18:d5:a7:4c:4b:fd:c0:0f:cc:dc:f4:32: ca:a5:1f:2c:e3:b6:8e:00:53:b7:d8:df:df:8f:68:99: 25:89:2c:0c:52:57:f0:e7:5a:ef:5f:4a:7c:5b:22:77: 56:66:6f:48:9a:d5:48:67:75:53:ca:7a:93:30:e4:b4: 58:ee:80:9c:03:52:ca:f0:49:d4:96:ad:db:72:c2:91: a8:7b:67:96:77:5a:4a:2e:df:08:c5:c7:bd:83:41:c5: 04:98:ba:79:61:69:fc:f9:c0:ad:38:89:a7:ca:e9:92 Fingerprint (SHA-256): D0:A3:ED:E5:44:A8:31:AF:80:94:8A:A2:D8:3D:6B:B9:7C:61:39:AD:4E:64:06:12:0D:CB:CA:EC:F0:74:47:02 Fingerprint (SHA1): C3:EA:C2:FC:0B:6F:03:C0:3A:7A:C1:51:B8:C8:29:0F:92:14:44:B1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #626: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #627: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #628: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #629: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221630 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #630: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #631: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #632: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #633: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927221631 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #634: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #635: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #636: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #637: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927221632 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #638: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #639: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #640: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #641: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 927221633 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #642: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #643: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #644: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #645: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #646: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #647: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221630 (0x3744477e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:20:19 2022 Not After : Tue Sep 27 22:20:19 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:19:dd:a8:c4:77:99:b1:6d:25:96:c8:d2:a6:c4:27: 8d:3b:e0:4c:c1:94:6e:44:3e:4a:21:86:13:e3:b4:ae: 61:4d:63:ad:23:77:63:4d:f2:93:18:28:bf:85:d7:c2: 1d:44:c2:a9:a4:09:26:a1:b8:0f:75:f9:03:75:ee:28: 75:af:7c:2f:f2:d1:f0:68:72:b6:03:5c:ef:f6:4a:9f: 9a:00:8e:3d:5a:86:06:33:03:53:5d:a6:89:19:77:82: ab:05:04:4d:7a:99:cd:77:88:fb:e9:33:73:dd:c4:3a: 2c:b0:e8:c5:ea:b9:15:19:c1:7d:04:1e:1e:17:30:d4: 99:a1:8d:bf:7a:de:4c:0a:2c:72:f6:0d:f7:92:d3:b7: a3:47:30:3b:2c:e7:4d:38:48:cc:b3:5a:55:8f:59:82: b8:69:b5:5d:c6:bd:ef:82:a9:4b:c5:3d:75:c7:32:4e: fe:a8:e7:c7:0d:3e:6e:03:dc:06:46:ae:d5:a8:1c:7e: 5c:ef:3b:81:7b:ec:4f:53:17:1c:50:85:2c:0e:dd:10: d2:e8:3d:eb:00:09:2e:df:da:9d:fe:dc:a4:19:e9:15: e7:97:af:7e:2e:f3:1e:c7:4d:2b:1a:fa:0a:65:6c:cb: 06:a5:40:db:eb:17:a1:18:57:13:80:38:d8:43:9d:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:88:1a:37:01:8e:16:0b:ff:63:35:bb:38:0f:32:48: 35:c9:e1:17:33:40:2e:b2:48:7e:5e:32:38:2e:cd:8f: 9a:88:b4:1e:58:1f:42:fa:d7:5b:9a:12:87:a9:4b:6b: 23:9b:20:3c:b1:72:dc:35:f7:23:45:b4:56:c2:bd:5e: ff:86:39:ff:2a:20:4b:d8:81:96:37:d5:bf:51:e4:68: 71:c3:69:10:2a:10:74:04:12:fc:e4:15:59:45:63:bd: 94:ff:ff:15:a0:55:f8:f7:85:b0:2d:d3:db:f8:f7:a0: a1:ba:cb:4f:f5:18:0d:a5:57:5f:de:0e:59:70:74:c3: 70:47:a3:a2:24:70:32:3a:7d:0b:60:4a:42:82:21:75: 0b:3e:12:66:58:ac:18:8f:05:01:a3:6d:a3:71:91:5e: 43:7a:43:3a:71:e4:33:a8:60:4b:96:39:9e:77:c0:d8: 5b:ee:f9:79:65:a9:8e:21:ed:d8:c8:bb:48:06:9d:44: ff:4e:bd:1f:94:73:e8:2b:46:dc:8b:f6:27:5d:b4:7e: 20:6d:a6:e1:7b:6e:91:1f:ef:d0:20:56:34:cc:18:96: 0a:80:64:0d:c8:a7:a4:87:5c:8d:4f:7e:26:5c:34:54: a9:5d:4a:df:2e:d3:72:d3:3c:55:2d:0c:d9:18:dc:7b Fingerprint (SHA-256): CB:19:3C:E3:BF:C4:6F:86:A6:B1:D8:BA:29:01:42:C6:B9:1D:E9:71:5E:6E:EB:04:A0:52:D9:6F:55:58:85:EA Fingerprint (SHA1): 7C:5F:62:36:04:E8:21:5F:5B:97:44:AC:91:4F:27:A0:57:46:62:D0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #648: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #649: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #650: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221631 (0x3744477f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:20:20 2022 Not After : Mon Sep 27 22:20:20 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:9f:31:7a:0d:01:8c:bb:26:20:53:ca:c5:82:f2:af: 55:11:12:4f:c9:68:3b:8f:99:ff:71:1c:fe:0e:a8:30: 59:a3:69:98:cb:80:d6:20:bb:d3:d5:c6:fc:4a:20:c5: d9:66:c0:4f:e5:c3:54:fe:c0:f9:ba:4a:5b:6c:d5:8d: 06:67:4d:6b:e9:2c:fa:d1:06:c6:63:3a:5e:4f:a2:e6: 93:1a:52:0d:60:5c:39:ab:e4:52:3f:42:f9:c4:22:81: fe:14:4d:de:65:1b:4e:93:6f:d4:a0:8a:e7:fc:6e:06: e0:08:31:05:96:ad:59:74:24:68:79:38:c6:d7:7b:cb: ab:6d:8c:84:f3:8c:e4:31:ce:82:a7:93:e4:14:4a:f2: 07:80:13:12:83:bc:19:7a:ff:f9:d3:61:f1:91:2b:ab: 10:d4:bf:08:c3:10:b8:a0:18:42:37:96:5c:27:2a:58: 2c:ec:a2:d2:cd:23:43:c3:ee:b9:f9:8c:d7:4f:37:38: 4d:e9:e2:d6:c2:ae:06:7c:cc:c7:64:80:56:8a:1b:f4: 1d:1d:a6:dd:a8:a6:d5:0e:aa:5e:9d:fe:de:8a:46:26: e6:85:46:0f:27:7e:0e:2c:87:37:ae:10:8d:01:19:a5: dd:b0:0d:00:8a:78:72:a8:63:8a:98:e9:35:64:38:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:32:78:6e:9b:2f:17:6c:a2:e5:4e:0e:2f:c1:39:ce: b1:98:30:24:3b:e1:72:d0:e5:34:ce:2e:17:db:e5:00: 2e:96:47:6d:d7:24:14:46:02:03:ff:0b:8f:a7:4f:f8: 85:8c:74:e3:e5:36:bf:24:30:3b:80:70:a4:fa:99:56: 28:43:96:01:d5:00:09:6b:68:1d:90:65:97:28:d3:c2: 6d:fe:89:70:49:f3:1e:81:9c:0b:11:e0:b7:2d:f9:29: cf:e7:f1:df:f9:d2:e8:a7:c2:81:0d:70:83:c9:f0:85: 29:7c:cc:09:cb:66:bc:75:59:75:f5:7a:97:e8:cc:ed: 75:75:fc:73:18:23:bc:68:f2:df:76:4d:dd:4b:a3:3a: 0e:81:cd:ce:2e:d4:1b:2e:29:42:e7:20:66:86:ff:cf: 03:fa:02:e6:5b:07:97:cb:f7:eb:99:1e:85:89:28:23: d4:8f:a0:8f:88:1a:d8:71:c3:de:74:95:80:e9:c3:e1: c6:b9:c6:d1:50:0e:57:86:fa:bc:be:34:f7:41:67:70: 12:f2:5d:34:14:fe:dc:2d:44:a7:94:83:02:33:f1:12: 9f:ec:ee:46:d6:1f:fc:8e:c5:f8:16:e0:21:a2:da:8b: e8:0e:62:ea:ca:18:49:11:ee:f2:9d:e5:a6:93:41:81 Fingerprint (SHA-256): 52:CC:97:9C:78:19:27:C4:1B:95:84:8B:19:EC:CD:64:29:3F:9A:C8:82:2D:0E:5B:83:09:45:9B:04:B3:1D:A6 Fingerprint (SHA1): 63:7C:A5:51:8B:CE:BA:6B:45:19:C7:92:E8:0E:96:72:50:87:B8:3B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #651: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #652: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221632 (0x37444780) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 22:20:22 2022 Not After : Mon Sep 27 22:20:22 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:da:e2:d2:b1:a5:9c:37:25:ad:0d:e1:cf:84:c5:1e: db:ff:17:52:0c:9c:bb:64:07:6b:ae:2d:9a:a5:f8:c9: 73:48:29:76:53:2a:aa:fc:63:d6:15:0b:73:9c:1d:a9: e8:c4:0a:6d:cf:dd:75:8b:42:5f:6e:60:1f:54:10:b4: 9f:0b:7f:82:51:3d:ed:56:37:a6:7c:b5:e5:d0:b8:de: 00:f7:66:25:a5:61:0e:9c:fb:9c:97:dc:69:75:d8:2a: 28:94:26:2b:c8:c1:12:c4:86:24:ac:e9:3a:fe:97:15: 9c:28:f7:41:c0:e1:28:70:b5:04:1e:e4:09:ac:7d:4b: 3a:1a:fd:ae:87:08:77:03:60:9a:ae:22:0a:06:cf:33: b9:20:6a:80:b7:2d:9f:9a:c7:a1:ce:eb:9c:58:58:64: 17:a8:9c:eb:a1:38:cf:67:14:15:18:3c:a6:a9:9b:dd: fd:7c:ea:03:21:58:76:1b:e3:2a:1b:35:b0:82:34:eb: 2e:ba:25:c7:d7:40:d1:59:54:b7:86:1e:7d:21:a4:26: ce:c9:a6:3d:6b:b5:a5:1a:80:25:53:42:e9:86:c6:71: 46:2a:0e:3d:91:76:0e:7b:a2:0d:2b:10:c1:83:49:a3: 61:a1:ab:f7:40:5b:66:1a:7f:33:cf:a4:0b:13:33:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:22:71:4c:33:52:51:25:9d:1a:20:df:e4:ec:d0:af: 84:57:09:52:f2:68:44:bd:bf:8d:a1:5a:52:6d:a4:19: 74:a8:f7:26:a4:9b:bc:5e:11:ce:b0:46:a1:42:48:87: 47:a6:77:98:13:d1:20:88:ff:be:d4:3c:f2:7d:09:f7: 7e:4a:83:b7:0d:8e:c6:ce:25:51:5b:ba:f7:92:05:cf: 24:55:58:06:7b:d6:7f:df:34:a5:55:1b:43:f5:24:fc: 5b:bb:18:e1:88:dd:3e:c9:fa:0a:8d:c5:99:b6:d8:c7: ff:03:0b:b7:57:d3:19:47:6c:5a:4f:54:a6:23:1a:ce: 01:8d:90:dc:d3:59:5f:f5:bd:d4:34:97:fe:8c:c5:96: b4:f5:e2:d8:1d:be:b4:46:42:5c:ed:3e:53:9f:1c:1d: 1e:0f:c2:69:dd:7a:30:2d:50:f5:50:22:4a:17:0d:d8: b2:a6:7d:a3:98:88:6f:54:75:53:21:46:ae:3d:04:70: a7:7f:54:b2:2a:5f:4d:9b:e4:36:67:7a:a6:29:c3:4e: 49:4d:af:59:bb:f0:c4:9d:d5:92:46:5f:d0:f6:7a:be: f6:37:00:bb:4e:20:e4:a5:e5:56:34:de:be:42:9f:ab: a9:24:6f:22:a8:4c:d0:4b:86:37:f7:06:9b:02:01:df Fingerprint (SHA-256): DE:A2:8F:F3:54:DE:71:3F:55:BF:62:5C:FB:A8:67:62:16:35:E8:F9:FA:4B:E8:11:9E:66:96:AE:D4:DA:55:FC Fingerprint (SHA1): FB:89:DB:A7:53:7E:4A:26:3C:35:D7:9D:DE:80:FE:99:F7:CB:83:BD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #653: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #654: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221634 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #655: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #656: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #657: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #658: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927221635 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #659: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #660: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #661: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #662: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927221636 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #663: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #664: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #665: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #666: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 927221637 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #667: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #668: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #669: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #670: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 927221638 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #671: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #672: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #673: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #674: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #675: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #676: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #677: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221634 (0x37444782) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:20:28 2022 Not After : Tue Sep 27 22:20:28 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:be:6c:18:d8:88:ed:47:4f:a7:d5:41:83:66:bf:06: cf:be:14:80:9e:54:96:9c:af:fd:12:f4:f7:e7:59:2f: ef:7b:77:0a:d3:c5:50:9c:ea:29:05:3e:49:7f:f4:04: fa:d2:61:f2:dd:38:61:4d:e1:cd:5f:31:c0:69:23:2e: fb:45:ca:c4:32:02:4b:46:4f:26:ef:9f:05:aa:5b:a3: 2c:2f:e4:2c:55:cc:7c:52:19:b9:3d:ae:a1:8b:8f:fb: 8a:74:6d:a1:08:41:8e:c4:5d:c1:ea:8b:b6:1b:7e:52: eb:c4:ea:5e:1b:7e:4a:61:5a:e1:64:82:a8:11:ca:2d: af:c1:d4:67:7c:00:1e:ae:93:32:3e:1e:cf:a6:5c:0a: 8a:1f:bd:51:c5:a4:b4:92:ba:37:45:9e:59:75:31:e0: 7c:61:3a:01:8d:ca:23:96:1f:6f:d9:1a:d1:49:4b:fe: c3:2e:98:20:dc:4c:40:6a:33:e1:fb:62:fa:de:18:37: 2b:a9:54:52:92:14:a5:13:be:79:c2:6b:54:1c:e3:28: e9:99:ab:39:81:fd:f7:2a:e7:11:93:f6:7d:bf:0b:30: 4c:0d:af:5a:41:ba:98:9a:1f:96:64:a5:61:5d:ae:9e: f1:92:7b:f7:0d:5f:d2:83:c4:2e:5b:21:44:fa:e3:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:33:4d:8b:e1:28:c8:fd:a0:71:b2:75:f0:cb:df:80: 92:ef:e2:70:fc:ac:f8:8b:96:18:05:94:13:6c:99:60: 9d:c0:cb:4a:42:1d:14:d1:56:6a:75:50:f4:ef:1c:eb: a6:66:d2:6e:4b:64:ed:c4:41:19:ca:08:33:db:76:6b: 01:aa:a6:1e:35:a1:38:10:c5:da:4a:b3:de:bb:8f:f2: 29:8d:0a:19:57:22:ad:17:0d:5e:7c:21:0e:e6:67:c6: 87:9e:66:bd:9e:25:17:2e:78:7d:93:ac:90:6e:4c:4c: dc:1e:f4:81:2c:09:11:77:ee:c1:64:46:77:ed:a0:ae: 69:7b:ba:5b:7d:e2:ed:17:89:f9:0f:c9:21:87:ad:5d: 5b:30:db:7f:99:1a:06:51:2a:61:c3:f8:ab:ae:be:21: dd:18:80:ad:c4:03:a9:91:ac:09:75:37:8d:a9:02:41: 60:b3:2b:22:89:8a:59:45:93:d5:87:03:76:0d:49:8e: a3:c1:2e:04:23:cd:66:f8:2b:d0:a0:41:22:5a:5d:ad: 77:b7:ec:ea:cf:35:de:2e:00:e3:f7:27:98:a6:f3:b8: f9:df:fc:4e:e9:a6:83:f7:d5:c3:21:a6:a1:a6:5d:fd: d5:7e:85:36:bd:6d:28:06:9a:dd:6e:b5:f7:e3:4a:37 Fingerprint (SHA-256): D4:6F:60:AE:00:B9:D8:F7:21:01:9C:64:37:41:CE:9C:68:08:75:08:96:55:13:A2:8A:62:BD:B4:A2:07:C1:22 Fingerprint (SHA1): C8:F0:95:3D:5E:89:05:BE:7B:66:12:80:D7:70:E9:86:0B:EE:16:FA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #678: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #679: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221635 (0x37444783) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:20:29 2022 Not After : Mon Sep 27 22:20:29 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:2f:09:4a:da:ef:60:14:12:f0:dc:e8:1f:25:34:ea: 06:7a:4e:8a:1b:6f:74:de:1b:ef:d3:fe:ce:80:a1:86: fb:07:be:4a:03:63:d3:be:b7:02:15:e3:92:fd:37:45: 9b:b2:d4:f0:e3:24:7f:38:b7:68:f6:c8:5c:35:a9:19: 3d:f1:94:89:99:4a:79:bb:f2:15:f6:57:2c:64:bc:16: 96:ed:38:0b:c9:62:c4:63:35:7a:93:23:6d:d5:38:70: b9:78:8f:63:af:27:d7:48:4c:82:1d:0a:7e:dd:29:96: 98:40:63:56:3b:bd:c5:e4:ee:5e:35:bb:9d:d0:79:67: df:3e:0a:ba:10:54:ee:40:a0:c6:48:a7:b3:04:ad:4e: be:dc:a0:b8:62:68:82:e1:99:01:af:32:f6:87:86:51: c4:34:61:9d:2c:63:74:19:be:63:74:aa:fc:ce:93:5a: fe:08:f8:23:a4:5a:98:ad:58:5f:d3:0e:72:39:c2:e3: 94:45:e7:0b:da:69:9c:f9:78:ef:0c:30:69:84:ba:b2: 2f:da:d1:c7:4d:c8:54:c1:dc:68:02:2d:7a:26:a4:80: e3:83:37:9c:d4:06:21:38:fb:27:c5:6f:0e:f9:cd:66: 8f:79:c1:76:d1:d9:f1:c9:94:c3:50:38:e7:79:f8:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:6a:59:8a:67:49:96:2f:cf:83:67:05:ff:c7:d4:1b: a7:18:0a:d2:c6:81:37:c5:8e:bd:44:59:f2:78:11:7e: 36:e0:93:fd:c4:ac:84:a4:04:24:4a:09:45:ef:c8:68: 33:a2:99:25:15:8c:7d:89:bc:f9:ce:65:9a:db:46:d0: df:b4:16:1b:87:a6:96:df:9b:82:b6:30:59:33:09:4b: 2a:52:be:a9:a5:45:02:9c:1d:83:b1:84:91:d2:2f:4f: ca:bf:99:20:53:c2:e1:5a:ac:0e:62:7e:12:b5:30:e2: e7:23:50:96:b3:3a:22:01:79:1c:bc:ca:a7:b5:fe:63: 49:36:90:a1:eb:8b:47:c7:70:4b:2d:81:b4:a7:65:b9: 3b:a3:2f:4a:89:e3:1c:48:85:95:c2:95:0c:67:0c:b2: cf:bf:9a:85:5c:6d:6e:c3:26:aa:f8:ed:aa:35:6c:a3: f2:fa:26:39:78:e6:7d:32:a6:8e:2a:2d:79:95:b1:1f: 25:3f:5c:ec:5b:05:59:78:98:e3:fd:cc:41:8a:32:24: 12:ea:96:1c:2f:c5:49:0e:a7:0f:a5:12:03:33:0e:ef: a4:b5:84:6e:8e:16:0f:75:eb:a1:64:79:2f:4e:eb:f0: 4d:62:fd:5a:68:eb:7d:97:eb:f9:66:2c:76:ce:55:bc Fingerprint (SHA-256): F7:29:7E:4D:FB:B2:F1:E0:3C:6D:C9:DA:15:59:3C:A4:8B:F0:1C:40:82:77:5A:98:2E:F0:6E:FE:C3:76:41:7A Fingerprint (SHA1): 69:E4:F7:E4:7C:72:AA:E5:0D:A0:03:45:A1:08:77:7F:1F:F0:B3:A3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #680: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #681: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #682: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221636 (0x37444784) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 22:20:30 2022 Not After : Mon Sep 27 22:20:30 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:5b:ab:3a:e4:90:b5:b0:e5:de:a1:20:80:25:dd:3e: c3:cd:11:1a:67:ca:16:33:0b:98:af:3f:03:c5:59:4b: b7:68:a8:1e:de:c1:45:ed:48:fc:e1:27:91:00:40:7d: c5:5d:a0:d3:05:30:5c:ff:7c:fd:8d:be:89:24:8b:5f: d4:e9:c8:70:d9:39:a9:19:d6:15:42:3d:94:dd:71:4b: c3:b8:65:f1:28:04:8d:23:74:26:f0:f7:a4:0a:28:38: 63:b6:ac:3f:6e:ca:f0:5e:7f:6c:62:24:08:1c:fd:1e: 11:db:3f:d2:2e:61:eb:e2:db:3d:c9:73:1e:86:78:fe: 35:ce:b6:a8:44:4f:35:3e:70:2d:42:94:2f:42:b3:48: aa:77:cf:5f:f6:e1:04:ee:65:0f:e7:1e:44:39:cf:79: d2:b0:87:73:41:3a:9e:e8:47:96:16:dc:80:86:c0:ae: 58:ff:fc:02:f2:7a:4a:ec:d4:ee:33:97:63:b0:c9:e6: 3c:51:6b:26:a9:29:1f:18:41:22:8d:11:86:f9:94:a1: 80:29:fa:3f:2a:a6:51:f0:dc:fb:e7:b8:bf:67:d7:c2: 09:88:b2:5a:ff:a3:a7:6d:c8:1f:4c:2c:13:c1:84:2d: 6d:2f:57:65:8d:3b:8d:b5:89:c4:ea:28:da:e7:03:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:99:77:e7:87:7b:10:26:75:58:2a:dc:4c:d1:fd:17: d3:8b:6b:cc:b7:02:73:43:6a:d4:df:06:bd:ce:f2:02: 98:26:2a:ef:f8:7a:00:af:ab:a2:0e:93:39:31:66:2d: c9:c4:0e:d1:41:4b:09:9e:f9:9b:c7:70:d3:1a:c1:fa: 8c:67:77:b5:b6:1e:b0:ef:85:b2:39:b6:87:00:b5:7a: e2:5e:61:43:40:68:e8:24:f6:ce:81:f0:33:67:6e:c5: b0:ed:eb:f2:e4:bf:dc:ed:68:06:0d:22:7e:59:4f:27: 86:fd:94:64:f6:9a:04:6c:a4:b2:85:bd:c5:8a:c1:36: 5b:01:a5:75:7a:bc:42:bf:e8:92:19:67:99:c4:a5:16: 87:d2:30:36:82:3f:47:0c:81:27:ab:c4:22:d2:40:1f: a4:a2:48:86:2b:b6:b5:54:1d:a0:ad:9f:a9:2f:ed:de: 9a:d2:b0:77:b7:e0:af:22:ff:eb:57:bc:58:ee:db:9c: 8c:25:e6:8f:ea:a9:ec:6e:d6:92:27:59:20:75:28:27: 98:93:88:98:9d:43:75:ce:1c:db:8d:68:d5:2b:6f:70: f7:f7:47:97:cc:74:a3:73:3c:3a:8b:cf:4a:d2:11:a8: 85:de:63:79:80:c8:ee:3b:0b:1b:a8:a9:6b:bb:5c:a0 Fingerprint (SHA-256): 99:DD:56:EE:BA:93:99:CD:81:E2:A4:6F:86:64:AC:AC:56:46:71:1E:F8:D6:C9:7B:7E:BD:06:4C:4B:8B:DE:F2 Fingerprint (SHA1): 75:94:5E:28:57:B7:86:E5:A1:05:A2:FD:A4:16:64:22:16:45:34:8E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #683: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #684: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221639 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #685: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #686: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #687: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #688: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927221640 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #689: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #690: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #691: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #692: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927221641 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA1Root-927221532.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #693: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #694: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #695: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #696: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 927221642 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #697: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #698: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #699: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221639 (0x37444787) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:20:38 2022 Not After : Tue Sep 27 22:20:38 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:b9:51:b0:18:d4:1e:12:f0:9c:bd:03:82:89:a9:e0: fb:df:66:b8:b7:25:ba:f5:56:00:54:99:c6:90:d5:7e: 54:e7:1f:ba:73:0b:11:03:07:df:3b:49:c5:1b:5d:78: 34:ee:2e:64:58:6a:c9:fa:82:ec:bb:1b:46:ef:6c:42: 63:7c:e0:ea:c6:59:c7:d1:ba:db:58:3c:4b:1c:87:4e: c6:9e:93:bf:d3:d2:4e:6d:76:18:9c:7b:dc:a6:a0:41: 17:5c:de:bc:36:74:59:2a:f8:c5:2d:87:52:6a:31:64: 6e:85:62:1d:16:54:be:23:0b:bc:ad:b6:5d:4f:e3:5f: 2b:1f:95:2a:48:24:e8:3a:c1:5c:67:a7:c4:bb:f7:9b: 48:db:de:0c:1d:29:26:09:60:a7:dd:e7:1b:8b:59:14: 3d:e4:f4:89:39:72:fd:3f:1d:e4:52:0a:21:ad:02:e9: a9:6b:aa:09:d2:b4:c1:00:2c:a7:64:d9:54:11:5b:12: 1c:26:a5:a6:38:6b:ed:6f:a2:ad:4c:67:2f:24:44:6b: 47:fd:bd:96:99:37:61:b2:71:69:d3:1b:5b:84:a7:70: 84:4e:90:53:ba:a8:be:3e:67:7e:fa:aa:f8:4b:39:fe: 26:88:11:fb:4d:90:7e:3e:c9:f2:2f:95:0a:d0:0c:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:7e:1b:10:f4:fa:93:11:95:88:97:70:19:7c:a7:dc: b8:ee:d9:c7:74:dc:d1:55:36:e4:55:bd:69:c0:e1:ab: 9e:82:0f:a2:10:64:a0:e3:57:21:95:a9:8b:ec:77:3d: f3:07:19:bb:81:ea:15:bf:12:08:2c:10:b9:1c:c3:2b: 90:5e:19:60:8d:5a:ad:d1:e6:3b:f8:76:d7:fb:3b:e0: 4e:53:83:e6:27:d8:36:f2:ef:95:c5:a6:30:f0:1f:a4: e8:e9:38:ab:f7:01:5e:82:be:5b:89:ee:5d:1f:40:ad: 53:23:60:9b:b2:00:ad:de:b5:14:58:38:0a:ae:56:1f: 83:8c:6a:9d:b7:ae:a1:54:14:2a:c7:7e:a9:ee:b9:8f: 41:92:40:1a:d7:c3:ad:24:14:70:01:ca:e8:b0:5c:9b: 4a:cf:e8:36:58:94:6e:6f:61:03:86:40:cc:84:22:33: 6a:b5:94:46:34:d6:6e:0a:3d:49:16:27:fc:4c:eb:87: ad:63:c3:6d:0c:7d:62:68:ca:73:cf:d1:f9:11:1a:ac: 16:2c:7a:2a:1b:9f:9f:7a:61:09:f8:1e:31:55:bd:90: 9a:47:63:70:01:56:fa:00:83:03:c2:8f:cc:cb:69:31: ae:4a:74:13:5a:8e:77:45:6f:e6:32:89:ff:c1:a3:c8 Fingerprint (SHA-256): AA:9F:38:59:58:EE:9C:04:C4:E7:F1:AA:D9:77:D9:DE:42:AB:53:54:B1:EA:C3:35:37:BA:98:D3:54:2E:83:15 Fingerprint (SHA1): DB:51:6C:56:7B:5C:EA:94:85:88:1F:FF:A8:C7:C3:D6:C0:09:4A:9F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #700: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #701: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221643 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #702: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #703: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #704: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221644 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #705: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #706: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #707: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #708: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 927221645 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #709: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #710: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 927221646 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #711: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #712: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #713: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #714: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #715: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 927221647 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-Bridge-927221533.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #716: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #717: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #718: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #719: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 927221648 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #720: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #721: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #722: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #723: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221644 (0x3744478c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 22:20:45 2022 Not After : Tue Sep 27 22:20:45 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:4b:78:17:e3:ee:b6:b1:16:4e:1a:71:fd:d7:4b:c8: 03:a3:ee:c3:cb:da:33:a2:82:1f:9d:bf:7a:c3:ad:71: d6:01:e3:ec:39:f1:cf:35:20:f2:36:13:81:7d:6e:1b: 6a:a4:40:9a:81:f7:93:2e:82:8b:bf:e7:6a:4c:a8:48: cf:77:a2:15:36:81:9c:db:72:23:0c:23:16:54:3e:02: 04:97:7f:06:60:19:ad:de:4c:f9:71:c2:96:79:a0:90: 4b:79:3b:1d:31:11:d6:c1:73:b8:7b:c6:af:dd:cb:59: cd:55:5c:3d:29:33:ae:b1:38:7e:12:ae:38:1b:5c:78: 57:25:6f:6b:40:28:2f:9f:72:88:e7:94:74:0a:44:5a: fc:42:e0:02:87:03:b6:eb:28:60:6c:0d:a1:0e:b5:fd: 4c:7a:24:37:36:92:cb:38:d9:9d:10:42:94:b3:cc:8d: e3:0d:55:e2:4a:1b:2e:26:8f:f0:7d:33:d7:34:10:46: b5:1e:35:54:c4:b8:bd:df:1e:e3:6c:4e:3d:3c:5e:77: b9:e3:0c:48:66:fa:35:63:51:c6:9a:ae:46:a2:94:44: 25:21:9a:36:57:3d:c8:df:87:80:8b:af:55:33:f7:74: b9:bd:89:ec:f6:ec:10:f4:d2:a0:ff:03:b4:8a:02:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:4c:06:92:8e:d3:9b:93:ab:0a:11:21:a7:52:92:f3: 7e:5e:98:d1:82:28:5d:d9:31:6f:a9:25:73:a0:7d:14: 7f:7e:97:5d:e3:55:23:05:e2:e8:c4:33:a9:e1:8c:63: ae:38:21:c2:d0:f0:d8:7f:65:ed:c9:9e:ba:53:1e:14: eb:21:79:85:5f:f6:84:90:44:db:c5:b6:67:ce:fe:9d: 5f:00:b9:92:80:3b:f9:f3:88:42:d5:b8:6e:7a:36:15: f0:37:e5:22:48:d6:77:5a:52:5d:a2:90:34:ed:20:00: 0f:11:1c:d5:1f:e4:95:f5:72:04:e6:a9:3b:96:3a:31: 68:8b:d3:b2:8c:93:ec:5a:a4:08:f9:65:a6:18:d3:45: 56:7a:de:fc:2d:8d:3e:3a:69:74:90:83:8e:47:f9:9d: 71:53:a5:65:bd:ce:10:92:54:c0:8e:b1:7d:7b:4a:79: ab:64:1e:2e:99:22:ad:60:e5:be:03:fa:77:87:dc:91: 51:95:f1:e4:7e:1c:da:9e:21:96:f3:48:ae:d1:cb:ab: f0:8e:62:c8:35:6a:2d:c6:9d:90:42:ba:c8:0b:10:e9: 6e:a6:44:9a:da:9a:93:51:67:10:70:0b:3c:36:92:e6: 19:e9:5a:e6:b4:2a:73:de:43:2b:88:5b:72:9f:4b:71 Fingerprint (SHA-256): 94:C7:C1:93:2D:1C:BF:4E:B9:A9:62:0E:2C:55:59:F6:0A:1C:7A:C5:DA:9D:48:6C:D9:78:B6:93:B0:FB:C8:B6 Fingerprint (SHA1): 5E:9C:33:1F:9A:9A:9D:69:97:9B:AD:53:F4:72:38:24:65:2D:52:B3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #724: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221644 (0x3744478c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 22:20:45 2022 Not After : Tue Sep 27 22:20:45 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:4b:78:17:e3:ee:b6:b1:16:4e:1a:71:fd:d7:4b:c8: 03:a3:ee:c3:cb:da:33:a2:82:1f:9d:bf:7a:c3:ad:71: d6:01:e3:ec:39:f1:cf:35:20:f2:36:13:81:7d:6e:1b: 6a:a4:40:9a:81:f7:93:2e:82:8b:bf:e7:6a:4c:a8:48: cf:77:a2:15:36:81:9c:db:72:23:0c:23:16:54:3e:02: 04:97:7f:06:60:19:ad:de:4c:f9:71:c2:96:79:a0:90: 4b:79:3b:1d:31:11:d6:c1:73:b8:7b:c6:af:dd:cb:59: cd:55:5c:3d:29:33:ae:b1:38:7e:12:ae:38:1b:5c:78: 57:25:6f:6b:40:28:2f:9f:72:88:e7:94:74:0a:44:5a: fc:42:e0:02:87:03:b6:eb:28:60:6c:0d:a1:0e:b5:fd: 4c:7a:24:37:36:92:cb:38:d9:9d:10:42:94:b3:cc:8d: e3:0d:55:e2:4a:1b:2e:26:8f:f0:7d:33:d7:34:10:46: b5:1e:35:54:c4:b8:bd:df:1e:e3:6c:4e:3d:3c:5e:77: b9:e3:0c:48:66:fa:35:63:51:c6:9a:ae:46:a2:94:44: 25:21:9a:36:57:3d:c8:df:87:80:8b:af:55:33:f7:74: b9:bd:89:ec:f6:ec:10:f4:d2:a0:ff:03:b4:8a:02:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:4c:06:92:8e:d3:9b:93:ab:0a:11:21:a7:52:92:f3: 7e:5e:98:d1:82:28:5d:d9:31:6f:a9:25:73:a0:7d:14: 7f:7e:97:5d:e3:55:23:05:e2:e8:c4:33:a9:e1:8c:63: ae:38:21:c2:d0:f0:d8:7f:65:ed:c9:9e:ba:53:1e:14: eb:21:79:85:5f:f6:84:90:44:db:c5:b6:67:ce:fe:9d: 5f:00:b9:92:80:3b:f9:f3:88:42:d5:b8:6e:7a:36:15: f0:37:e5:22:48:d6:77:5a:52:5d:a2:90:34:ed:20:00: 0f:11:1c:d5:1f:e4:95:f5:72:04:e6:a9:3b:96:3a:31: 68:8b:d3:b2:8c:93:ec:5a:a4:08:f9:65:a6:18:d3:45: 56:7a:de:fc:2d:8d:3e:3a:69:74:90:83:8e:47:f9:9d: 71:53:a5:65:bd:ce:10:92:54:c0:8e:b1:7d:7b:4a:79: ab:64:1e:2e:99:22:ad:60:e5:be:03:fa:77:87:dc:91: 51:95:f1:e4:7e:1c:da:9e:21:96:f3:48:ae:d1:cb:ab: f0:8e:62:c8:35:6a:2d:c6:9d:90:42:ba:c8:0b:10:e9: 6e:a6:44:9a:da:9a:93:51:67:10:70:0b:3c:36:92:e6: 19:e9:5a:e6:b4:2a:73:de:43:2b:88:5b:72:9f:4b:71 Fingerprint (SHA-256): 94:C7:C1:93:2D:1C:BF:4E:B9:A9:62:0E:2C:55:59:F6:0A:1C:7A:C5:DA:9D:48:6C:D9:78:B6:93:B0:FB:C8:B6 Fingerprint (SHA1): 5E:9C:33:1F:9A:9A:9D:69:97:9B:AD:53:F4:72:38:24:65:2D:52:B3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #725: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #726: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221649 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #727: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #728: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #729: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221650 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #730: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #731: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #732: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #733: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 927221651 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #734: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #735: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 927221652 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #736: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #737: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #738: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #739: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #740: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 927221653 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-Bridge-927221534.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #741: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #742: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #743: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #744: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 927221654 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #745: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #746: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #747: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #748: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 927221655 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-BridgeNavy-927221535.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #749: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #750: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #751: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #752: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 927221656 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #753: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #754: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #755: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #756: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221650 (0x37444792) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 22:20:55 2022 Not After : Tue Sep 27 22:20:55 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:4f:0d:09:74:21:a8:2d:96:46:d6:40:7b:7b:9e:84: 6b:d9:91:79:77:fd:08:a3:3d:13:a8:75:de:c9:51:80: 2c:b5:90:63:0d:1c:39:4c:d0:98:6f:df:7e:ff:c7:7b: ea:a2:dc:b0:2c:1d:a1:77:ac:af:61:4b:69:9b:13:38: 8a:bb:da:72:85:b9:b4:df:05:ed:fb:ae:cd:ca:d2:cb: 70:3a:14:c3:79:2b:d1:5e:40:15:3c:f3:a8:db:eb:7f: 82:15:d6:04:ff:6d:d4:f1:ba:14:f2:79:44:86:13:f0: cb:f1:20:80:2d:fa:82:aa:f5:7f:f7:d4:d6:0a:ac:cb: 7e:4c:e2:67:56:07:5f:f4:02:3b:b8:76:33:c3:dc:39: ed:d8:15:46:26:99:97:6e:77:ce:d0:47:bf:10:56:62: 82:38:12:b3:71:10:3c:ad:2f:38:f5:b0:83:13:ab:60: ca:63:17:3e:41:93:e5:12:84:57:0f:d6:15:7b:eb:2d: ec:50:bb:d8:a5:d9:a2:8f:55:a9:32:88:8c:a3:6a:77: b4:b3:db:39:fd:8c:48:17:f7:ac:ab:df:a4:d3:0f:4e: 5f:0b:cb:f7:17:e6:ba:8b:32:df:77:a1:e5:93:5d:24: 1b:8d:a3:30:87:06:bd:45:df:11:4d:ef:70:56:3a:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3c:2c:56:a5:98:01:a4:f2:2c:e8:9d:16:53:30:e5:d1: 41:6e:36:28:0a:6c:8e:82:e5:d1:b8:6b:72:ec:e8:5e: 53:7f:63:50:9c:a9:9a:20:58:41:a2:7b:7c:e6:94:d4: 36:fc:07:40:54:93:54:2f:c2:f4:ce:59:ef:2b:e5:d1: 5e:68:73:1c:12:d3:1e:fc:30:bf:06:5a:08:bc:bf:63: 5b:95:ea:ba:a9:77:25:7c:51:a8:7e:a6:6f:14:39:a7: 27:d2:3c:33:b5:72:21:53:4d:ac:d9:b5:3d:3f:38:6b: 2e:b5:ad:7c:37:e2:4a:a6:3b:da:75:10:d8:9d:31:e7: 9a:89:67:9d:4b:c7:47:92:54:ef:2d:1c:8f:13:55:0e: b8:5c:e6:32:1f:f6:23:95:82:cf:7d:20:db:87:5a:68: 84:28:90:05:1f:d6:34:7b:80:36:31:eb:c1:a2:ec:7e: 8c:be:da:a9:9e:b4:22:4e:fe:c3:af:dd:2d:28:1b:2b: cf:6e:97:f4:62:8e:4e:5d:98:a9:7a:8b:1d:c8:cb:41: 01:4e:c9:03:2d:d1:85:dc:90:da:03:06:6b:25:9a:47: 47:9b:af:f5:e9:45:af:0a:f2:8d:5c:0f:f8:92:83:4e: 45:04:02:00:47:37:77:e1:dd:bd:4c:ab:4e:8f:aa:b5 Fingerprint (SHA-256): 28:45:D6:68:44:EA:28:FD:A2:5C:D7:C0:E3:00:55:B0:A0:D2:4E:9F:28:96:B7:B5:08:85:9B:B4:33:72:B0:E5 Fingerprint (SHA1): 27:DD:A4:A4:56:03:D7:20:C0:CA:96:FB:8C:3B:41:A6:2D:87:93:2C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #757: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221650 (0x37444792) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 22:20:55 2022 Not After : Tue Sep 27 22:20:55 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:4f:0d:09:74:21:a8:2d:96:46:d6:40:7b:7b:9e:84: 6b:d9:91:79:77:fd:08:a3:3d:13:a8:75:de:c9:51:80: 2c:b5:90:63:0d:1c:39:4c:d0:98:6f:df:7e:ff:c7:7b: ea:a2:dc:b0:2c:1d:a1:77:ac:af:61:4b:69:9b:13:38: 8a:bb:da:72:85:b9:b4:df:05:ed:fb:ae:cd:ca:d2:cb: 70:3a:14:c3:79:2b:d1:5e:40:15:3c:f3:a8:db:eb:7f: 82:15:d6:04:ff:6d:d4:f1:ba:14:f2:79:44:86:13:f0: cb:f1:20:80:2d:fa:82:aa:f5:7f:f7:d4:d6:0a:ac:cb: 7e:4c:e2:67:56:07:5f:f4:02:3b:b8:76:33:c3:dc:39: ed:d8:15:46:26:99:97:6e:77:ce:d0:47:bf:10:56:62: 82:38:12:b3:71:10:3c:ad:2f:38:f5:b0:83:13:ab:60: ca:63:17:3e:41:93:e5:12:84:57:0f:d6:15:7b:eb:2d: ec:50:bb:d8:a5:d9:a2:8f:55:a9:32:88:8c:a3:6a:77: b4:b3:db:39:fd:8c:48:17:f7:ac:ab:df:a4:d3:0f:4e: 5f:0b:cb:f7:17:e6:ba:8b:32:df:77:a1:e5:93:5d:24: 1b:8d:a3:30:87:06:bd:45:df:11:4d:ef:70:56:3a:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3c:2c:56:a5:98:01:a4:f2:2c:e8:9d:16:53:30:e5:d1: 41:6e:36:28:0a:6c:8e:82:e5:d1:b8:6b:72:ec:e8:5e: 53:7f:63:50:9c:a9:9a:20:58:41:a2:7b:7c:e6:94:d4: 36:fc:07:40:54:93:54:2f:c2:f4:ce:59:ef:2b:e5:d1: 5e:68:73:1c:12:d3:1e:fc:30:bf:06:5a:08:bc:bf:63: 5b:95:ea:ba:a9:77:25:7c:51:a8:7e:a6:6f:14:39:a7: 27:d2:3c:33:b5:72:21:53:4d:ac:d9:b5:3d:3f:38:6b: 2e:b5:ad:7c:37:e2:4a:a6:3b:da:75:10:d8:9d:31:e7: 9a:89:67:9d:4b:c7:47:92:54:ef:2d:1c:8f:13:55:0e: b8:5c:e6:32:1f:f6:23:95:82:cf:7d:20:db:87:5a:68: 84:28:90:05:1f:d6:34:7b:80:36:31:eb:c1:a2:ec:7e: 8c:be:da:a9:9e:b4:22:4e:fe:c3:af:dd:2d:28:1b:2b: cf:6e:97:f4:62:8e:4e:5d:98:a9:7a:8b:1d:c8:cb:41: 01:4e:c9:03:2d:d1:85:dc:90:da:03:06:6b:25:9a:47: 47:9b:af:f5:e9:45:af:0a:f2:8d:5c:0f:f8:92:83:4e: 45:04:02:00:47:37:77:e1:dd:bd:4c:ab:4e:8f:aa:b5 Fingerprint (SHA-256): 28:45:D6:68:44:EA:28:FD:A2:5C:D7:C0:E3:00:55:B0:A0:D2:4E:9F:28:96:B7:B5:08:85:9B:B4:33:72:B0:E5 Fingerprint (SHA1): 27:DD:A4:A4:56:03:D7:20:C0:CA:96:FB:8C:3B:41:A6:2D:87:93:2C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #758: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #759: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221649 (0x37444791) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 22:20:54 2022 Not After : Tue Sep 27 22:20:54 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:b7:c8:4e:c1:c6:21:3e:c3:43:e4:25:a3:71:90:13: 1b:0a:c5:00:fc:bb:cd:07:0d:23:a0:68:2e:cc:18:fa: 74:8a:95:e0:c5:f5:f7:92:09:2a:eb:ad:85:fe:92:60: 9d:91:51:1a:78:97:f6:af:4b:db:af:e2:f7:23:2d:5b: a0:ad:43:c6:ae:cf:de:69:12:f4:ab:9a:4d:96:03:11: 95:ce:66:f5:d1:f2:77:d7:4f:cb:e4:1b:8d:6f:98:16: 56:84:7f:a0:60:28:20:da:c7:26:70:46:a8:b6:23:f6: 25:64:29:74:27:57:7b:7b:2d:8b:77:11:11:9c:25:9e: 5b:45:1b:fe:05:0b:21:39:e6:4d:f2:e8:7b:26:1a:9a: 5b:ec:b9:26:1a:ab:08:e4:68:95:2e:6b:7e:8a:62:a0: 5f:4a:7a:68:b2:7c:af:3d:d4:05:cd:38:b3:a6:20:aa: c3:2d:b9:e7:44:2f:28:0b:a0:ff:1d:27:d6:35:e5:dd: 99:be:84:ea:2d:e6:86:83:27:51:80:72:62:ad:74:c6: 6e:d6:fd:e1:57:50:97:8e:3b:33:41:1a:35:00:29:6f: c4:92:25:79:36:2e:87:44:1f:aa:53:2a:f5:24:d4:d9: b4:20:12:53:0d:b1:a3:ac:d4:09:f6:50:34:21:97:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:04:cf:12:92:cf:66:d8:15:e6:dd:ee:0a:a1:e8:db: db:ed:9e:cc:45:d4:12:65:42:c4:0e:9b:c4:a2:9e:4c: df:5e:bc:a8:ab:97:7a:72:a0:b0:42:bb:68:91:82:0e: 39:89:d7:10:94:70:f7:7a:2c:3d:5c:a2:9d:03:70:d2: fe:31:78:f7:80:d9:aa:8a:32:6b:53:83:bf:4a:26:04: 93:0b:e8:3a:29:2e:fd:a4:aa:bd:67:88:18:bb:6a:ea: 95:88:b1:85:c2:d4:fc:91:83:5c:85:c2:8b:9b:5b:3a: e5:29:dc:f8:9a:ef:d7:89:ca:e9:bf:a4:df:ba:54:0c: eb:7b:1a:d2:db:76:fd:ad:5b:bb:a2:0d:c0:e8:5a:f5: e2:33:8a:dc:d6:db:a2:7f:d4:9d:30:7f:d5:ff:f3:08: 86:ed:25:10:b8:b5:17:11:6c:40:a8:cb:a5:aa:9c:f0: 85:72:c8:cb:53:9f:81:c5:38:79:e1:74:21:91:79:c9: 9a:bf:c5:02:2d:a9:00:bc:14:c1:e6:71:69:e6:43:6c: 51:84:5f:01:49:cb:b5:2f:cf:b4:c5:fd:05:b7:32:b7: 9d:ec:d0:9c:bb:bb:bc:12:da:c4:ab:77:38:fd:e9:09: bd:0e:2c:eb:27:05:b2:21:4f:32:98:53:bc:7f:85:0a Fingerprint (SHA-256): D4:2F:EA:9D:DF:13:F0:FC:C0:94:2F:F8:77:C0:E1:7C:F7:11:4D:50:D4:C4:A6:CA:D7:AB:3F:65:30:94:AC:8A Fingerprint (SHA1): 8D:70:62:6F:AE:CD:09:EE:AE:5B:63:34:EF:67:65:7D:DC:CF:6C:1F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #760: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221650 (0x37444792) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 22:20:55 2022 Not After : Tue Sep 27 22:20:55 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:4f:0d:09:74:21:a8:2d:96:46:d6:40:7b:7b:9e:84: 6b:d9:91:79:77:fd:08:a3:3d:13:a8:75:de:c9:51:80: 2c:b5:90:63:0d:1c:39:4c:d0:98:6f:df:7e:ff:c7:7b: ea:a2:dc:b0:2c:1d:a1:77:ac:af:61:4b:69:9b:13:38: 8a:bb:da:72:85:b9:b4:df:05:ed:fb:ae:cd:ca:d2:cb: 70:3a:14:c3:79:2b:d1:5e:40:15:3c:f3:a8:db:eb:7f: 82:15:d6:04:ff:6d:d4:f1:ba:14:f2:79:44:86:13:f0: cb:f1:20:80:2d:fa:82:aa:f5:7f:f7:d4:d6:0a:ac:cb: 7e:4c:e2:67:56:07:5f:f4:02:3b:b8:76:33:c3:dc:39: ed:d8:15:46:26:99:97:6e:77:ce:d0:47:bf:10:56:62: 82:38:12:b3:71:10:3c:ad:2f:38:f5:b0:83:13:ab:60: ca:63:17:3e:41:93:e5:12:84:57:0f:d6:15:7b:eb:2d: ec:50:bb:d8:a5:d9:a2:8f:55:a9:32:88:8c:a3:6a:77: b4:b3:db:39:fd:8c:48:17:f7:ac:ab:df:a4:d3:0f:4e: 5f:0b:cb:f7:17:e6:ba:8b:32:df:77:a1:e5:93:5d:24: 1b:8d:a3:30:87:06:bd:45:df:11:4d:ef:70:56:3a:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3c:2c:56:a5:98:01:a4:f2:2c:e8:9d:16:53:30:e5:d1: 41:6e:36:28:0a:6c:8e:82:e5:d1:b8:6b:72:ec:e8:5e: 53:7f:63:50:9c:a9:9a:20:58:41:a2:7b:7c:e6:94:d4: 36:fc:07:40:54:93:54:2f:c2:f4:ce:59:ef:2b:e5:d1: 5e:68:73:1c:12:d3:1e:fc:30:bf:06:5a:08:bc:bf:63: 5b:95:ea:ba:a9:77:25:7c:51:a8:7e:a6:6f:14:39:a7: 27:d2:3c:33:b5:72:21:53:4d:ac:d9:b5:3d:3f:38:6b: 2e:b5:ad:7c:37:e2:4a:a6:3b:da:75:10:d8:9d:31:e7: 9a:89:67:9d:4b:c7:47:92:54:ef:2d:1c:8f:13:55:0e: b8:5c:e6:32:1f:f6:23:95:82:cf:7d:20:db:87:5a:68: 84:28:90:05:1f:d6:34:7b:80:36:31:eb:c1:a2:ec:7e: 8c:be:da:a9:9e:b4:22:4e:fe:c3:af:dd:2d:28:1b:2b: cf:6e:97:f4:62:8e:4e:5d:98:a9:7a:8b:1d:c8:cb:41: 01:4e:c9:03:2d:d1:85:dc:90:da:03:06:6b:25:9a:47: 47:9b:af:f5:e9:45:af:0a:f2:8d:5c:0f:f8:92:83:4e: 45:04:02:00:47:37:77:e1:dd:bd:4c:ab:4e:8f:aa:b5 Fingerprint (SHA-256): 28:45:D6:68:44:EA:28:FD:A2:5C:D7:C0:E3:00:55:B0:A0:D2:4E:9F:28:96:B7:B5:08:85:9B:B4:33:72:B0:E5 Fingerprint (SHA1): 27:DD:A4:A4:56:03:D7:20:C0:CA:96:FB:8C:3B:41:A6:2D:87:93:2C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #761: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221650 (0x37444792) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 22:20:55 2022 Not After : Tue Sep 27 22:20:55 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:4f:0d:09:74:21:a8:2d:96:46:d6:40:7b:7b:9e:84: 6b:d9:91:79:77:fd:08:a3:3d:13:a8:75:de:c9:51:80: 2c:b5:90:63:0d:1c:39:4c:d0:98:6f:df:7e:ff:c7:7b: ea:a2:dc:b0:2c:1d:a1:77:ac:af:61:4b:69:9b:13:38: 8a:bb:da:72:85:b9:b4:df:05:ed:fb:ae:cd:ca:d2:cb: 70:3a:14:c3:79:2b:d1:5e:40:15:3c:f3:a8:db:eb:7f: 82:15:d6:04:ff:6d:d4:f1:ba:14:f2:79:44:86:13:f0: cb:f1:20:80:2d:fa:82:aa:f5:7f:f7:d4:d6:0a:ac:cb: 7e:4c:e2:67:56:07:5f:f4:02:3b:b8:76:33:c3:dc:39: ed:d8:15:46:26:99:97:6e:77:ce:d0:47:bf:10:56:62: 82:38:12:b3:71:10:3c:ad:2f:38:f5:b0:83:13:ab:60: ca:63:17:3e:41:93:e5:12:84:57:0f:d6:15:7b:eb:2d: ec:50:bb:d8:a5:d9:a2:8f:55:a9:32:88:8c:a3:6a:77: b4:b3:db:39:fd:8c:48:17:f7:ac:ab:df:a4:d3:0f:4e: 5f:0b:cb:f7:17:e6:ba:8b:32:df:77:a1:e5:93:5d:24: 1b:8d:a3:30:87:06:bd:45:df:11:4d:ef:70:56:3a:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3c:2c:56:a5:98:01:a4:f2:2c:e8:9d:16:53:30:e5:d1: 41:6e:36:28:0a:6c:8e:82:e5:d1:b8:6b:72:ec:e8:5e: 53:7f:63:50:9c:a9:9a:20:58:41:a2:7b:7c:e6:94:d4: 36:fc:07:40:54:93:54:2f:c2:f4:ce:59:ef:2b:e5:d1: 5e:68:73:1c:12:d3:1e:fc:30:bf:06:5a:08:bc:bf:63: 5b:95:ea:ba:a9:77:25:7c:51:a8:7e:a6:6f:14:39:a7: 27:d2:3c:33:b5:72:21:53:4d:ac:d9:b5:3d:3f:38:6b: 2e:b5:ad:7c:37:e2:4a:a6:3b:da:75:10:d8:9d:31:e7: 9a:89:67:9d:4b:c7:47:92:54:ef:2d:1c:8f:13:55:0e: b8:5c:e6:32:1f:f6:23:95:82:cf:7d:20:db:87:5a:68: 84:28:90:05:1f:d6:34:7b:80:36:31:eb:c1:a2:ec:7e: 8c:be:da:a9:9e:b4:22:4e:fe:c3:af:dd:2d:28:1b:2b: cf:6e:97:f4:62:8e:4e:5d:98:a9:7a:8b:1d:c8:cb:41: 01:4e:c9:03:2d:d1:85:dc:90:da:03:06:6b:25:9a:47: 47:9b:af:f5:e9:45:af:0a:f2:8d:5c:0f:f8:92:83:4e: 45:04:02:00:47:37:77:e1:dd:bd:4c:ab:4e:8f:aa:b5 Fingerprint (SHA-256): 28:45:D6:68:44:EA:28:FD:A2:5C:D7:C0:E3:00:55:B0:A0:D2:4E:9F:28:96:B7:B5:08:85:9B:B4:33:72:B0:E5 Fingerprint (SHA1): 27:DD:A4:A4:56:03:D7:20:C0:CA:96:FB:8C:3B:41:A6:2D:87:93:2C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #762: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #763: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221657 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #764: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #765: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #766: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221658 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #767: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #768: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #769: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #770: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 927221659 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #771: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #772: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #773: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #774: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 927221660 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #775: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #776: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #777: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #778: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 927221661 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #779: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #780: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 927221662 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #781: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #782: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #783: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #784: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #785: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 927221663 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #786: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #787: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #788: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #789: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 927221664 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #790: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #791: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #792: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #793: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 927221665 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #794: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #795: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #796: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #797: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 927221666 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #798: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #799: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #800: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221657 (0x37444799) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 22:21:09 2022 Not After : Tue Sep 27 22:21:09 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f4:70:10:1f:44:fc:e5:a9:ee:0f:52:15:7c:8b:5f: 35:3f:d8:e6:d2:f8:44:b8:e7:2b:89:84:cf:9f:fa:45: c8:4d:ac:ce:fc:0d:f9:63:3c:1c:63:1a:4e:57:c5:8f: aa:29:3c:e8:db:74:87:0d:0d:87:4c:98:1d:5d:fd:b6: 30:43:32:1b:06:45:4c:94:2d:2c:72:70:71:0c:df:d6: 03:31:48:c9:b7:d3:63:76:de:5e:c1:ba:8c:c1:3c:0e: 4c:4d:e9:f9:45:45:3d:2e:74:e1:03:05:9b:f6:05:58: e2:0a:db:66:43:51:44:61:db:dd:a2:04:18:70:18:c8: aa:37:3a:a4:08:33:ac:3b:f0:63:5c:ea:d3:96:22:d5: 65:27:58:da:3e:9a:8b:f6:7b:c3:f9:ee:b5:a4:74:c7: 21:1b:8d:dd:83:2a:68:43:3e:ee:bc:37:88:b3:55:10: f1:c5:ae:01:76:6f:41:e0:c3:36:fe:7f:d9:0d:74:49: 43:4f:06:a6:29:34:78:7f:78:68:d0:16:50:6a:9c:4d: 28:c3:33:1c:97:00:3f:2d:d9:44:ae:13:08:82:2c:ee: e3:61:54:c5:6f:28:0a:70:74:16:2f:0d:2e:bb:31:0f: a5:b5:e4:5c:61:de:42:00:e1:89:21:08:f0:95:28:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:21:b6:9c:41:42:63:54:02:a7:45:65:6a:95:c5:b0: 0b:01:f2:01:84:10:c4:fb:41:eb:b9:94:97:ec:66:11: b8:69:3f:55:4a:e6:e7:a5:e6:31:50:99:7c:53:40:b3: 3c:19:01:b4:a3:54:b9:ed:4a:04:b9:3c:ab:0d:79:be: 54:88:d6:63:b3:14:02:a8:21:c6:26:45:74:7b:42:2a: 18:61:1e:bf:79:70:e2:6c:71:77:07:75:eb:13:b6:87: 2b:db:72:cd:87:32:35:7e:dd:fe:19:a5:47:47:50:cc: f0:e9:7b:42:e8:b3:ae:2b:e0:21:3d:31:6a:9b:7d:05: bf:db:d6:36:7b:c5:39:a5:6d:70:dc:f5:30:7f:5a:db: 19:35:65:bf:23:2f:a5:d2:ea:c0:1c:b7:f0:88:ce:b4: 58:91:bd:f1:ca:c8:34:04:67:31:5f:86:93:7c:0d:d0: 48:4e:d8:fe:0a:41:47:aa:aa:a7:3e:cd:46:4b:e2:39: 51:d2:43:f4:d2:6d:a9:35:00:70:e4:d3:e3:7e:d8:41: 57:d1:d3:13:9c:86:67:5c:81:da:06:ce:9f:5a:19:16: 3b:26:e2:de:a7:e2:77:16:c2:bd:eb:4e:66:fc:f4:5a: c8:d3:5d:b5:a1:11:15:11:30:01:40:85:ae:df:49:c9 Fingerprint (SHA-256): CA:9B:FC:0A:8C:7D:55:10:5C:77:4C:6E:6A:E7:7F:9F:C4:5E:F8:4C:63:3B:98:9E:A2:B3:65:E3:CC:5C:8E:5A Fingerprint (SHA1): F7:10:30:69:51:DB:A4:35:20:F8:A4:B9:B4:5A:65:53:9C:AA:41:57 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #801: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #802: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #803: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #804: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #805: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #806: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #807: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #808: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #809: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221658 (0x3744479a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 22:21:10 2022 Not After : Tue Sep 27 22:21:10 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:ef:03:a8:14:3f:e4:eb:94:a2:00:4d:a7:91:fa:26: a3:54:f4:c3:ab:e0:c7:28:13:da:f0:55:49:61:24:99: 7e:0b:c9:26:2f:5e:fe:f9:c0:a3:7f:82:02:ac:4f:d0: 7d:b9:e4:08:c0:55:ff:72:07:95:85:00:48:65:8a:3f: d9:0d:04:1b:bb:ae:24:b3:f2:14:65:99:a5:0f:ff:9d: 46:c0:d6:13:22:06:42:a8:ba:6f:9f:4e:d8:b1:39:4d: e9:da:28:13:88:7d:4d:fc:df:0d:89:3a:95:7f:68:e7: 57:78:e9:ac:a5:f9:a1:d4:36:b7:c2:95:ae:a0:2d:59: cb:fd:3b:83:34:42:a9:d2:98:6e:e4:e9:83:4c:c1:da: 68:9d:c9:a0:df:97:98:6e:d9:d1:6b:cf:7c:7a:e7:56: 39:75:40:2b:1d:f3:f5:da:bd:09:3b:f9:c8:ed:d7:42: 4b:55:93:0d:ec:2a:6d:a4:4d:23:a0:59:34:ce:dd:c0: 80:8a:62:6c:df:c9:fa:68:99:ac:23:09:a5:9b:44:d8: 1a:16:0c:b9:19:58:5d:3d:c0:77:df:28:a8:2f:b4:50: 95:d6:53:8b:0d:0b:53:13:d5:fd:5e:27:87:ff:7f:0d: 5e:cc:10:2e:91:e7:23:c9:fb:e6:b4:c6:36:c9:fa:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:dd:e1:2e:6d:f7:d0:d2:12:a3:f8:1d:7b:aa:97:1a: 72:b4:2d:f6:c1:96:26:ce:aa:8c:2a:21:7e:87:9b:28: 00:ee:76:42:82:d4:bb:30:17:0f:66:37:dd:c2:0c:f3: 39:78:c6:14:24:e4:8b:94:63:ba:7c:ea:0c:e8:8b:fa: 49:59:a2:6f:4d:97:33:d6:89:25:50:4b:cc:49:7f:45: 7a:ad:d0:8d:4a:85:4d:39:fa:1e:e4:af:79:5f:2c:af: a9:0a:60:a4:91:51:b6:24:66:58:24:ab:a5:29:0c:eb: 9c:50:af:5b:e7:34:5b:37:82:d6:47:c0:e3:24:26:99: 11:82:cf:37:e2:f6:ac:03:91:34:e5:32:f9:f0:34:7f: 98:cf:dd:3e:f0:c3:b6:f4:7e:4b:c3:c1:51:70:6b:3a: ac:53:20:a1:d1:90:2f:1b:08:71:ba:1e:63:10:fd:e3: 5c:c0:53:31:86:58:16:2f:3b:ee:18:36:26:02:db:49: bb:96:1b:4b:b5:a5:8d:5f:14:d3:a0:21:96:41:70:b9: 5c:61:23:d2:7a:be:1a:f2:fe:ea:1e:4b:38:d3:4f:ec: 38:73:a0:4d:87:d9:c3:28:d6:87:c3:5b:82:65:ac:1a: 23:f1:28:ef:0d:e3:0a:fa:d5:cf:5b:45:51:b4:82:46 Fingerprint (SHA-256): D6:04:47:0F:E1:E5:B3:10:44:1E:DD:BB:D1:AD:6F:6E:A5:0C:65:E7:35:8F:33:48:D9:79:EB:54:51:07:CB:CF Fingerprint (SHA1): FB:70:9F:1D:B6:F2:7F:0E:50:0A:1C:64:CD:A2:A2:D4:12:C9:B4:6F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #810: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #811: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #812: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #813: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #814: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #815: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #816: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #817: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #818: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #819: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #820: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #821: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #822: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #823: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #824: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #825: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #826: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #827: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #828: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221667 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #829: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #830: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #831: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #832: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927221668 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #833: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #834: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #835: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #836: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 927221669 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #837: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #838: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #839: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #840: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 927221670 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #841: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #842: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #843: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #844: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 927221671 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #845: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #846: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #847: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #848: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 927221672 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #849: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #850: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #851: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #852: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 927221673 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #853: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #854: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #855: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #856: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 927221674 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #857: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #858: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #859: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #860: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 927221675 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #861: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #862: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #863: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221667 (0x374447a3) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:21:31 2022 Not After : Tue Sep 27 22:21:31 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 8b:1a:29:44:b9:8d:32:ba:6f:24:99:fb:dd:6a:96:73: c5:e8:3d:18:40:0b:d4:54:fb:8b:09:55:7a:bb:66:9f: 32:87:65:f3:73:63:ce:72:42:a7:e0:89:3b:c6:d3:02: 3f:f3:11:bb:3f:6e:46:57:87:aa:4c:ea:84:98:84:0a: f8:9e:96:10:f5:fc:3b:88:16:2d:9c:e1:46:3e:95:81: ac:82:b6:09:3d:84:ef:c2:28:e4:12:32:2e:1f:48:7a: 12:65:c2:c9:7b:75:29:4e:29:7d:a7:7e:6d:54:7b:1b: cc:27:be:e4:65:32:df:9c:df:31:ed:26:2d:ee:c8:4b: 39:77:32:c4:a1:fc:c4:90:ad:4c:c0:23:0b:b8:6e:4d: 58:2a:a3:fc:d3:a7:50:45:e9:24:87:ef:5b:38:75:19: ba:45:75:b3:f5:cd:33:19:4d:90:46:ad:dd:18:c7:fa: de:d2:59:b3:20:2f:59:45:d8:1d:72:52:1e:9f:81:4d: 92:33:ed:65:64:b2:9f:b1:7c:03:05:a7:42:69:be:ef: a2:62:ea:0d:1a:e0:8c:a7:fa:aa:75:de:ae:ba:c8:ad: a6:5b:76:60:3b:2a:ba:6f:5a:98:30:1b:04:c5:ea:22: 21:b2:11:f2:3c:e5:88:13:f6:8f:94:20:22:a2:ae:3a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:1b:89:35:20:86:27:77:b8:a0:c0:82:4f: 7f:94:c6:ff:d6:80:c4:3e:0e:be:62:ce:dc:e9:23:62: 02:1c:02:5d:ac:40:41:65:dd:1d:af:74:83:1a:e5:68: 94:c4:18:6e:4b:4c:a2:36:ec:13:56:af:22:7d Fingerprint (SHA-256): AD:3A:17:29:FF:53:CC:FE:84:1C:2E:62:94:3C:1C:C5:23:51:66:2B:C4:C5:D4:B4:79:11:B1:C8:09:AD:28:08 Fingerprint (SHA1): 87:8E:44:93:57:B1:B6:C2:0D:D8:4A:D4:C2:63:70:A7:9D:DC:D8:7A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #864: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221667 (0x374447a3) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:21:31 2022 Not After : Tue Sep 27 22:21:31 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 8b:1a:29:44:b9:8d:32:ba:6f:24:99:fb:dd:6a:96:73: c5:e8:3d:18:40:0b:d4:54:fb:8b:09:55:7a:bb:66:9f: 32:87:65:f3:73:63:ce:72:42:a7:e0:89:3b:c6:d3:02: 3f:f3:11:bb:3f:6e:46:57:87:aa:4c:ea:84:98:84:0a: f8:9e:96:10:f5:fc:3b:88:16:2d:9c:e1:46:3e:95:81: ac:82:b6:09:3d:84:ef:c2:28:e4:12:32:2e:1f:48:7a: 12:65:c2:c9:7b:75:29:4e:29:7d:a7:7e:6d:54:7b:1b: cc:27:be:e4:65:32:df:9c:df:31:ed:26:2d:ee:c8:4b: 39:77:32:c4:a1:fc:c4:90:ad:4c:c0:23:0b:b8:6e:4d: 58:2a:a3:fc:d3:a7:50:45:e9:24:87:ef:5b:38:75:19: ba:45:75:b3:f5:cd:33:19:4d:90:46:ad:dd:18:c7:fa: de:d2:59:b3:20:2f:59:45:d8:1d:72:52:1e:9f:81:4d: 92:33:ed:65:64:b2:9f:b1:7c:03:05:a7:42:69:be:ef: a2:62:ea:0d:1a:e0:8c:a7:fa:aa:75:de:ae:ba:c8:ad: a6:5b:76:60:3b:2a:ba:6f:5a:98:30:1b:04:c5:ea:22: 21:b2:11:f2:3c:e5:88:13:f6:8f:94:20:22:a2:ae:3a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:1b:89:35:20:86:27:77:b8:a0:c0:82:4f: 7f:94:c6:ff:d6:80:c4:3e:0e:be:62:ce:dc:e9:23:62: 02:1c:02:5d:ac:40:41:65:dd:1d:af:74:83:1a:e5:68: 94:c4:18:6e:4b:4c:a2:36:ec:13:56:af:22:7d Fingerprint (SHA-256): AD:3A:17:29:FF:53:CC:FE:84:1C:2E:62:94:3C:1C:C5:23:51:66:2B:C4:C5:D4:B4:79:11:B1:C8:09:AD:28:08 Fingerprint (SHA1): 87:8E:44:93:57:B1:B6:C2:0D:D8:4A:D4:C2:63:70:A7:9D:DC:D8:7A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #865: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221667 (0x374447a3) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:21:31 2022 Not After : Tue Sep 27 22:21:31 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 8b:1a:29:44:b9:8d:32:ba:6f:24:99:fb:dd:6a:96:73: c5:e8:3d:18:40:0b:d4:54:fb:8b:09:55:7a:bb:66:9f: 32:87:65:f3:73:63:ce:72:42:a7:e0:89:3b:c6:d3:02: 3f:f3:11:bb:3f:6e:46:57:87:aa:4c:ea:84:98:84:0a: f8:9e:96:10:f5:fc:3b:88:16:2d:9c:e1:46:3e:95:81: ac:82:b6:09:3d:84:ef:c2:28:e4:12:32:2e:1f:48:7a: 12:65:c2:c9:7b:75:29:4e:29:7d:a7:7e:6d:54:7b:1b: cc:27:be:e4:65:32:df:9c:df:31:ed:26:2d:ee:c8:4b: 39:77:32:c4:a1:fc:c4:90:ad:4c:c0:23:0b:b8:6e:4d: 58:2a:a3:fc:d3:a7:50:45:e9:24:87:ef:5b:38:75:19: ba:45:75:b3:f5:cd:33:19:4d:90:46:ad:dd:18:c7:fa: de:d2:59:b3:20:2f:59:45:d8:1d:72:52:1e:9f:81:4d: 92:33:ed:65:64:b2:9f:b1:7c:03:05:a7:42:69:be:ef: a2:62:ea:0d:1a:e0:8c:a7:fa:aa:75:de:ae:ba:c8:ad: a6:5b:76:60:3b:2a:ba:6f:5a:98:30:1b:04:c5:ea:22: 21:b2:11:f2:3c:e5:88:13:f6:8f:94:20:22:a2:ae:3a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:1b:89:35:20:86:27:77:b8:a0:c0:82:4f: 7f:94:c6:ff:d6:80:c4:3e:0e:be:62:ce:dc:e9:23:62: 02:1c:02:5d:ac:40:41:65:dd:1d:af:74:83:1a:e5:68: 94:c4:18:6e:4b:4c:a2:36:ec:13:56:af:22:7d Fingerprint (SHA-256): AD:3A:17:29:FF:53:CC:FE:84:1C:2E:62:94:3C:1C:C5:23:51:66:2B:C4:C5:D4:B4:79:11:B1:C8:09:AD:28:08 Fingerprint (SHA1): 87:8E:44:93:57:B1:B6:C2:0D:D8:4A:D4:C2:63:70:A7:9D:DC:D8:7A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #866: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221667 (0x374447a3) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:21:31 2022 Not After : Tue Sep 27 22:21:31 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 8b:1a:29:44:b9:8d:32:ba:6f:24:99:fb:dd:6a:96:73: c5:e8:3d:18:40:0b:d4:54:fb:8b:09:55:7a:bb:66:9f: 32:87:65:f3:73:63:ce:72:42:a7:e0:89:3b:c6:d3:02: 3f:f3:11:bb:3f:6e:46:57:87:aa:4c:ea:84:98:84:0a: f8:9e:96:10:f5:fc:3b:88:16:2d:9c:e1:46:3e:95:81: ac:82:b6:09:3d:84:ef:c2:28:e4:12:32:2e:1f:48:7a: 12:65:c2:c9:7b:75:29:4e:29:7d:a7:7e:6d:54:7b:1b: cc:27:be:e4:65:32:df:9c:df:31:ed:26:2d:ee:c8:4b: 39:77:32:c4:a1:fc:c4:90:ad:4c:c0:23:0b:b8:6e:4d: 58:2a:a3:fc:d3:a7:50:45:e9:24:87:ef:5b:38:75:19: ba:45:75:b3:f5:cd:33:19:4d:90:46:ad:dd:18:c7:fa: de:d2:59:b3:20:2f:59:45:d8:1d:72:52:1e:9f:81:4d: 92:33:ed:65:64:b2:9f:b1:7c:03:05:a7:42:69:be:ef: a2:62:ea:0d:1a:e0:8c:a7:fa:aa:75:de:ae:ba:c8:ad: a6:5b:76:60:3b:2a:ba:6f:5a:98:30:1b:04:c5:ea:22: 21:b2:11:f2:3c:e5:88:13:f6:8f:94:20:22:a2:ae:3a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:1b:89:35:20:86:27:77:b8:a0:c0:82:4f: 7f:94:c6:ff:d6:80:c4:3e:0e:be:62:ce:dc:e9:23:62: 02:1c:02:5d:ac:40:41:65:dd:1d:af:74:83:1a:e5:68: 94:c4:18:6e:4b:4c:a2:36:ec:13:56:af:22:7d Fingerprint (SHA-256): AD:3A:17:29:FF:53:CC:FE:84:1C:2E:62:94:3C:1C:C5:23:51:66:2B:C4:C5:D4:B4:79:11:B1:C8:09:AD:28:08 Fingerprint (SHA1): 87:8E:44:93:57:B1:B6:C2:0D:D8:4A:D4:C2:63:70:A7:9D:DC:D8:7A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #867: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #868: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #869: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #870: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #871: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #872: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #873: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #874: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #875: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #876: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #877: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #878: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #879: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #880: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #881: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #882: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #883: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #884: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #885: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #886: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #887: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #888: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #889: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #890: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #891: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #892: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #893: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #894: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20220927222158Z nextupdate=20230927222158Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Tue Sep 27 22:21:58 2022 Next Update: Wed Sep 27 22:21:58 2023 CRL Extensions: chains.sh: #895: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220927222158Z nextupdate=20230927222158Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Sep 27 22:21:58 2022 Next Update: Wed Sep 27 22:21:58 2023 CRL Extensions: chains.sh: #896: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20220927222158Z nextupdate=20230927222158Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Tue Sep 27 22:21:58 2022 Next Update: Wed Sep 27 22:21:58 2023 CRL Extensions: chains.sh: #897: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20220927222159Z nextupdate=20230927222159Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Tue Sep 27 22:21:59 2022 Next Update: Wed Sep 27 22:21:59 2023 CRL Extensions: chains.sh: #898: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20220927222200Z addcert 14 20220927222200Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Tue Sep 27 22:22:00 2022 Next Update: Wed Sep 27 22:21:58 2023 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Tue Sep 27 22:22:00 2022 CRL Extensions: chains.sh: #899: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220927222201Z addcert 15 20220927222201Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Sep 27 22:22:01 2022 Next Update: Wed Sep 27 22:21:58 2023 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Tue Sep 27 22:22:01 2022 CRL Extensions: chains.sh: #900: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #901: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #902: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #903: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #904: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #905: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #906: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #907: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #908: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #909: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:21:45 2022 Not After : Tue Sep 27 22:21:45 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:96:62:ba:89:99:82:6b:4a:f1:53:83:5b:bc:37:98: ae:24:9b:86:91:e1:33:02:56:7d:17:5b:99:25:72:c9: f2:60:a3:6e:14:c5:b5:f1:8a:1c:2f:d6:df:26:74:26: da:af:12:1a:a4:59:25:66:be:1f:ec:6e:33:ef:e6:7b: e2:03:e0:27:b9:1f:9b:36:5e:7d:8a:12:2c:dc:a0:04: 76:45:b8:24:7b:9e:0f:94:59:d8:25:2f:99:60:cf:ba: b5:c4:11:b2:af:bc:5a:df:fb:f5:cf:2f:42:94:45:d1: cd:90:c8:39:79:76:71:fc:d8:0d:c5:05:37:25:b0:d9: fa:92:6d:1b:ac:08:e9:94:25:6a:5c:fa:b9:a4:1e:94: b9:bf:4c:be:3f:d7:91:50:d4:e2:0b:dc:58:8b:56:62: 30:00:c8:7c:31:d2:8c:c0:f4:ed:2d:a4:e2:00:af:2a: 37:ab:dd:b9:25:e5:87:6a:b5:a8:14:c2:ca:87:74:c0: dd:10:51:c5:77:0d:eb:d1:bb:5c:a3:fd:6c:3f:cd:13: 30:a7:e5:0c:e2:53:c5:c9:e8:b1:79:09:3b:bc:35:4c: 08:88:af:3f:ce:aa:8d:0d:08:22:aa:b0:82:9b:c8:b6: 5d:61:05:d9:2a:93:62:98:f4:f7:e2:18:37:2c:88:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:e1:64:05:0e:2d:04:ac:d4:59:78:c0:e5:1d:aa:e0: 63:31:18:dc:52:83:b7:6a:da:e1:38:b6:e8:99:3d:e4: 99:7f:70:bb:3d:25:bf:19:2a:87:c7:07:c8:3b:8c:40: cc:e2:93:33:1c:95:a3:1b:76:9b:cb:54:91:29:e2:79: dc:54:4c:78:e0:15:4c:9b:d7:4f:27:d4:f9:4e:44:3f: 2c:d5:90:fe:b3:b9:60:a2:d8:8d:3e:9a:b6:88:46:47: a3:7b:17:7c:f6:1b:03:4a:13:79:01:34:6c:c2:d6:35: f3:36:eb:63:8a:7f:81:36:2d:c2:c6:bb:cd:a4:76:13: 79:e4:a3:fe:6e:51:3d:35:ee:42:af:df:36:ad:83:f7: fe:7e:6a:0c:ec:89:59:c0:fe:f4:7c:3e:0f:18:e1:66: 68:1d:2f:2e:0a:a1:48:32:57:94:e4:c3:35:f3:ba:88: 9d:22:ee:30:ad:e4:81:81:d8:56:4f:f4:f1:83:3d:8f: 95:e0:aa:ca:c8:41:e5:39:11:d0:67:68:3f:72:8b:00: 8f:64:a2:c8:0e:ae:14:47:a9:b8:ee:1d:56:32:b2:a7: d9:2a:46:25:70:4b:b4:a0:63:47:fb:56:85:ac:1f:43: 29:9d:da:5d:c5:8c:1f:41:35:23:fd:2c:1a:6c:95:f8 Fingerprint (SHA-256): 49:FF:E2:E2:2A:42:56:68:67:83:E6:74:14:B9:D6:9E:A7:27:1D:90:25:27:98:58:B0:E4:89:86:ED:C2:84:6B Fingerprint (SHA1): 1D:89:16:18:79:56:9E:9B:05:17:C3:B7:CD:FD:AD:C6:ED:1C:20:E8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #910: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #911: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:21:45 2022 Not After : Tue Sep 27 22:21:45 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:96:62:ba:89:99:82:6b:4a:f1:53:83:5b:bc:37:98: ae:24:9b:86:91:e1:33:02:56:7d:17:5b:99:25:72:c9: f2:60:a3:6e:14:c5:b5:f1:8a:1c:2f:d6:df:26:74:26: da:af:12:1a:a4:59:25:66:be:1f:ec:6e:33:ef:e6:7b: e2:03:e0:27:b9:1f:9b:36:5e:7d:8a:12:2c:dc:a0:04: 76:45:b8:24:7b:9e:0f:94:59:d8:25:2f:99:60:cf:ba: b5:c4:11:b2:af:bc:5a:df:fb:f5:cf:2f:42:94:45:d1: cd:90:c8:39:79:76:71:fc:d8:0d:c5:05:37:25:b0:d9: fa:92:6d:1b:ac:08:e9:94:25:6a:5c:fa:b9:a4:1e:94: b9:bf:4c:be:3f:d7:91:50:d4:e2:0b:dc:58:8b:56:62: 30:00:c8:7c:31:d2:8c:c0:f4:ed:2d:a4:e2:00:af:2a: 37:ab:dd:b9:25:e5:87:6a:b5:a8:14:c2:ca:87:74:c0: dd:10:51:c5:77:0d:eb:d1:bb:5c:a3:fd:6c:3f:cd:13: 30:a7:e5:0c:e2:53:c5:c9:e8:b1:79:09:3b:bc:35:4c: 08:88:af:3f:ce:aa:8d:0d:08:22:aa:b0:82:9b:c8:b6: 5d:61:05:d9:2a:93:62:98:f4:f7:e2:18:37:2c:88:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:e1:64:05:0e:2d:04:ac:d4:59:78:c0:e5:1d:aa:e0: 63:31:18:dc:52:83:b7:6a:da:e1:38:b6:e8:99:3d:e4: 99:7f:70:bb:3d:25:bf:19:2a:87:c7:07:c8:3b:8c:40: cc:e2:93:33:1c:95:a3:1b:76:9b:cb:54:91:29:e2:79: dc:54:4c:78:e0:15:4c:9b:d7:4f:27:d4:f9:4e:44:3f: 2c:d5:90:fe:b3:b9:60:a2:d8:8d:3e:9a:b6:88:46:47: a3:7b:17:7c:f6:1b:03:4a:13:79:01:34:6c:c2:d6:35: f3:36:eb:63:8a:7f:81:36:2d:c2:c6:bb:cd:a4:76:13: 79:e4:a3:fe:6e:51:3d:35:ee:42:af:df:36:ad:83:f7: fe:7e:6a:0c:ec:89:59:c0:fe:f4:7c:3e:0f:18:e1:66: 68:1d:2f:2e:0a:a1:48:32:57:94:e4:c3:35:f3:ba:88: 9d:22:ee:30:ad:e4:81:81:d8:56:4f:f4:f1:83:3d:8f: 95:e0:aa:ca:c8:41:e5:39:11:d0:67:68:3f:72:8b:00: 8f:64:a2:c8:0e:ae:14:47:a9:b8:ee:1d:56:32:b2:a7: d9:2a:46:25:70:4b:b4:a0:63:47:fb:56:85:ac:1f:43: 29:9d:da:5d:c5:8c:1f:41:35:23:fd:2c:1a:6c:95:f8 Fingerprint (SHA-256): 49:FF:E2:E2:2A:42:56:68:67:83:E6:74:14:B9:D6:9E:A7:27:1D:90:25:27:98:58:B0:E4:89:86:ED:C2:84:6B Fingerprint (SHA1): 1D:89:16:18:79:56:9E:9B:05:17:C3:B7:CD:FD:AD:C6:ED:1C:20:E8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #912: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #913: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #914: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221676 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #915: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #916: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #917: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #918: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 927221677 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #919: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #920: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #921: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-927221552.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #922: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-927221536.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #923: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #924: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #925: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-927221552.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #926: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 927221678 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #927: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #928: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #929: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-927221552.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #930: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-927221537.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #931: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #932: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #933: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #934: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 927221679 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #935: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #936: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #937: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-927221552.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #938: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-927221538.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #939: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #940: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #941: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-927221552.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #942: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-927221539.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #943: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #944: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20220927222217Z nextupdate=20230927222218Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Tue Sep 27 22:22:17 2022 Next Update: Wed Sep 27 22:22:18 2023 CRL Extensions: chains.sh: #945: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220927222218Z nextupdate=20230927222218Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Sep 27 22:22:18 2022 Next Update: Wed Sep 27 22:22:18 2023 CRL Extensions: chains.sh: #946: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20220927222218Z nextupdate=20230927222218Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Tue Sep 27 22:22:18 2022 Next Update: Wed Sep 27 22:22:18 2023 CRL Extensions: chains.sh: #947: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20220927222218Z nextupdate=20230927222218Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Tue Sep 27 22:22:18 2022 Next Update: Wed Sep 27 22:22:18 2023 CRL Extensions: chains.sh: #948: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220927222219Z addcert 20 20220927222219Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Sep 27 22:22:19 2022 Next Update: Wed Sep 27 22:22:18 2023 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Tue Sep 27 22:22:19 2022 CRL Extensions: chains.sh: #949: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220927222220Z addcert 40 20220927222220Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Sep 27 22:22:20 2022 Next Update: Wed Sep 27 22:22:18 2023 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Tue Sep 27 22:22:19 2022 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Tue Sep 27 22:22:20 2022 CRL Extensions: chains.sh: #950: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #951: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #952: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #953: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221676 (0x374447ac) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:22:05 2022 Not After : Tue Sep 27 22:22:05 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:61:07:e3:fc:6e:71:92:75:df:bc:5d:b2:5c:21:2d: c2:fe:68:ac:ed:b8:52:74:e2:fb:6f:50:10:f5:f7:9e: d4:5f:45:c7:3c:8f:ed:fb:29:29:eb:a2:55:89:b0:f7: 27:6a:0f:0d:75:27:d9:de:b5:de:18:94:27:4e:f0:76: bb:23:4f:24:51:ab:0a:51:9d:8c:47:cf:b3:68:85:15: 65:dc:b2:88:68:bb:ec:56:a2:a7:b3:12:e4:dd:4a:11: 9f:1a:45:d9:01:b9:c2:90:a8:cf:31:3d:2f:3a:dc:5b: 65:24:cc:62:69:25:46:53:33:92:3f:c7:f6:54:15:20: 92:f4:73:8a:b8:bf:84:a2:fe:94:db:05:a5:23:84:74: a7:0f:7d:2d:f9:5b:54:0c:4c:41:8f:35:0b:da:e5:e4: d5:12:55:42:4f:69:13:49:ff:30:7d:96:ee:1d:b5:9f: 72:4f:53:7d:bb:f0:fa:57:e9:97:b8:30:c0:c7:4b:84: bd:da:bf:d2:ca:9c:66:e4:13:3c:ef:14:51:64:00:59: b2:8b:bb:dc:4f:c8:35:2e:03:2d:d1:85:83:65:5c:22: c4:46:00:e9:07:9f:a1:41:63:e8:85:7f:24:10:e4:2a: 2c:d1:4b:2c:26:e4:ca:88:b1:df:b0:4e:fe:a9:c9:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:5e:23:17:90:84:59:f5:ef:41:5d:d6:ae:84:a9:e4: bb:51:e5:99:55:ee:d0:d6:49:ad:6c:c3:da:36:1f:47: 1d:5f:ca:39:a2:ab:7e:c9:3d:5d:62:75:16:b1:08:17: 9a:e4:4a:ea:f5:f4:8f:bf:af:c8:8d:f9:db:c7:f4:4e: 21:ca:04:fe:17:76:e0:6a:49:32:eb:b1:b2:b9:10:78: 5b:85:3c:ff:99:2d:55:17:ee:44:11:4d:97:e1:ee:b5: c8:81:e4:b3:23:50:54:26:57:41:65:f7:8a:aa:6a:2b: ce:af:ee:af:ab:11:6c:af:5d:f8:0f:40:d4:f3:84:47: 3b:e8:1e:78:77:21:74:25:6e:52:19:d6:f4:36:3a:6a: 53:ca:b2:49:81:78:c4:50:31:6f:57:b2:2b:8f:fa:ca: 7b:a6:55:07:57:cc:79:00:9c:bd:93:69:1a:55:ea:7f: 56:8e:aa:2d:2b:05:a4:ba:68:11:21:fb:29:9a:d8:c6: 9a:b3:88:7b:04:9d:56:5e:90:24:f3:77:c7:2d:64:4c: fc:63:6a:d6:1d:f0:dd:aa:45:55:20:66:3e:3e:e4:4c: 77:5c:71:b2:a1:6a:8f:96:de:79:37:2a:22:a7:4d:20: 0b:3e:74:fa:b5:de:10:0c:69:d8:34:c6:35:82:07:88 Fingerprint (SHA-256): 42:69:7D:13:27:DC:A3:D3:D9:8B:9B:3F:3E:F1:45:B3:15:1F:39:95:BB:B0:F0:6F:4F:C3:79:6E:7A:6B:50:A5 Fingerprint (SHA1): 15:DE:3A:20:B9:F1:64:C5:22:D2:52:0D:8B:83:4A:A8:EF:BA:20:F4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #954: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #955: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221676 (0x374447ac) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:22:05 2022 Not After : Tue Sep 27 22:22:05 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:61:07:e3:fc:6e:71:92:75:df:bc:5d:b2:5c:21:2d: c2:fe:68:ac:ed:b8:52:74:e2:fb:6f:50:10:f5:f7:9e: d4:5f:45:c7:3c:8f:ed:fb:29:29:eb:a2:55:89:b0:f7: 27:6a:0f:0d:75:27:d9:de:b5:de:18:94:27:4e:f0:76: bb:23:4f:24:51:ab:0a:51:9d:8c:47:cf:b3:68:85:15: 65:dc:b2:88:68:bb:ec:56:a2:a7:b3:12:e4:dd:4a:11: 9f:1a:45:d9:01:b9:c2:90:a8:cf:31:3d:2f:3a:dc:5b: 65:24:cc:62:69:25:46:53:33:92:3f:c7:f6:54:15:20: 92:f4:73:8a:b8:bf:84:a2:fe:94:db:05:a5:23:84:74: a7:0f:7d:2d:f9:5b:54:0c:4c:41:8f:35:0b:da:e5:e4: d5:12:55:42:4f:69:13:49:ff:30:7d:96:ee:1d:b5:9f: 72:4f:53:7d:bb:f0:fa:57:e9:97:b8:30:c0:c7:4b:84: bd:da:bf:d2:ca:9c:66:e4:13:3c:ef:14:51:64:00:59: b2:8b:bb:dc:4f:c8:35:2e:03:2d:d1:85:83:65:5c:22: c4:46:00:e9:07:9f:a1:41:63:e8:85:7f:24:10:e4:2a: 2c:d1:4b:2c:26:e4:ca:88:b1:df:b0:4e:fe:a9:c9:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:5e:23:17:90:84:59:f5:ef:41:5d:d6:ae:84:a9:e4: bb:51:e5:99:55:ee:d0:d6:49:ad:6c:c3:da:36:1f:47: 1d:5f:ca:39:a2:ab:7e:c9:3d:5d:62:75:16:b1:08:17: 9a:e4:4a:ea:f5:f4:8f:bf:af:c8:8d:f9:db:c7:f4:4e: 21:ca:04:fe:17:76:e0:6a:49:32:eb:b1:b2:b9:10:78: 5b:85:3c:ff:99:2d:55:17:ee:44:11:4d:97:e1:ee:b5: c8:81:e4:b3:23:50:54:26:57:41:65:f7:8a:aa:6a:2b: ce:af:ee:af:ab:11:6c:af:5d:f8:0f:40:d4:f3:84:47: 3b:e8:1e:78:77:21:74:25:6e:52:19:d6:f4:36:3a:6a: 53:ca:b2:49:81:78:c4:50:31:6f:57:b2:2b:8f:fa:ca: 7b:a6:55:07:57:cc:79:00:9c:bd:93:69:1a:55:ea:7f: 56:8e:aa:2d:2b:05:a4:ba:68:11:21:fb:29:9a:d8:c6: 9a:b3:88:7b:04:9d:56:5e:90:24:f3:77:c7:2d:64:4c: fc:63:6a:d6:1d:f0:dd:aa:45:55:20:66:3e:3e:e4:4c: 77:5c:71:b2:a1:6a:8f:96:de:79:37:2a:22:a7:4d:20: 0b:3e:74:fa:b5:de:10:0c:69:d8:34:c6:35:82:07:88 Fingerprint (SHA-256): 42:69:7D:13:27:DC:A3:D3:D9:8B:9B:3F:3E:F1:45:B3:15:1F:39:95:BB:B0:F0:6F:4F:C3:79:6E:7A:6B:50:A5 Fingerprint (SHA1): 15:DE:3A:20:B9:F1:64:C5:22:D2:52:0D:8B:83:4A:A8:EF:BA:20:F4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #956: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #957: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #958: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221680 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #959: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #960: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #961: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #962: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 927221681 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #963: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #964: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #965: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #966: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927221682 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #967: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #968: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #969: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #970: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 927221683 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #971: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #972: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #973: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221684 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #974: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #975: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #976: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #977: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 927221685 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #978: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #979: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #980: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #981: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 927221686 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #982: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #983: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #984: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #985: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #986: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221680 (0x374447b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:22:23 2022 Not After : Tue Sep 27 22:22:23 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:3c:71:2e:9e:55:c9:d2:32:82:c4:56:7c:d5:12:1b: dd:3c:65:8b:e9:23:2e:77:02:a4:34:42:06:cd:67:db: f6:f8:9c:35:27:cb:ff:59:4f:10:fe:eb:c0:00:e2:2d: 2c:f9:3d:ef:3c:6c:5e:a0:64:4c:aa:b2:8c:13:8c:e1: fb:ae:02:82:e6:41:14:00:48:ad:d2:cf:a9:5e:71:16: 87:01:fc:a7:65:b3:75:2b:00:90:10:2e:7d:f6:1b:66: e6:e8:d7:1f:db:28:f5:d2:51:87:1f:87:3d:4a:43:78: 9d:2d:90:b3:ec:a5:3c:1d:ab:f0:83:3a:c4:95:ef:86: e3:6b:63:dd:e2:a6:c9:99:33:60:a9:58:2d:36:5f:53: d7:c5:df:15:75:de:c2:9c:07:05:d9:44:50:3c:5f:a4: b7:04:97:05:11:c2:32:b6:69:0f:28:21:0f:90:41:fe: 89:d6:d6:25:82:ad:64:8f:ce:b3:fd:53:bd:d4:96:c4: cc:d0:23:b7:c4:bc:9c:73:89:6f:ff:d8:62:3a:b7:2a: ca:26:55:d1:c4:cc:f7:5c:43:c6:f2:21:e7:3c:79:eb: 55:51:48:97:da:0e:fe:aa:80:b5:ea:db:3b:d0:c6:08: 09:b1:39:96:00:64:06:3a:bb:0e:18:d2:2d:3a:6c:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:14:5a:28:63:aa:64:b9:54:94:30:b0:43:0b:c4:64: d3:8a:be:a8:1e:6e:ff:cc:ae:94:b8:1c:d3:eb:e2:e3: b6:e6:d7:cd:0d:02:6b:4a:6d:45:a9:49:5e:cb:39:ec: e0:dd:22:0b:c9:9a:03:e9:39:db:fa:f0:e5:58:4f:e9: a5:24:ad:2f:a4:f0:f6:47:d7:86:5c:c7:e0:c6:f4:aa: 78:47:d0:03:a9:f0:f1:81:82:4d:48:9f:ff:c7:4d:c5: a7:b0:b6:61:67:79:c4:6c:21:5b:d3:03:43:b2:a5:1f: c2:e4:f9:19:0f:38:77:91:6e:e4:ed:91:88:6c:2c:98: 7d:a6:18:83:f1:22:9f:d6:06:48:b3:d1:09:c3:e6:15: 30:d7:ba:d0:3f:aa:20:11:2e:c1:19:af:9d:22:6a:94: b9:1d:cc:f8:64:ab:f1:8a:bf:17:30:77:2e:a4:1e:e2: 9f:08:4b:1d:a4:55:e6:32:65:e8:fb:09:eb:f2:e0:e0: f0:b4:86:31:91:28:b1:8f:9c:35:ca:f7:ca:ae:c0:46: dd:8c:22:fe:b5:12:68:13:f0:71:f6:ea:e2:4f:88:7b: f2:88:dd:41:f9:e9:e3:f6:03:20:a5:6e:a5:90:b4:39: 2c:d4:a6:b4:31:86:25:5d:6f:df:7f:92:21:04:4d:24 Fingerprint (SHA-256): D7:B6:B0:57:BA:19:FD:47:6D:CA:58:EE:32:E8:D4:1D:31:C4:1E:2F:F8:44:51:8E:BF:CE:F0:EE:43:12:90:C3 Fingerprint (SHA1): 6E:ED:CB:1E:E1:1D:2D:57:EE:2E:E5:0A:8E:11:49:C3:28:F9:2C:7D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #987: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221682 (0x374447b2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 22:22:27 2022 Not After : Mon Sep 27 22:22:27 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:65:ff:ed:f4:54:f9:c2:c5:9f:c0:91:63:89:1f:f5: b9:17:49:00:81:39:5e:b9:6a:ed:fd:3f:45:b0:e8:a0: 79:e1:b8:98:dc:8a:c9:77:bc:ea:1c:89:d4:1e:56:c7: d2:04:43:d2:90:1c:01:74:4f:fc:b2:59:f9:04:af:4a: da:0e:4c:28:98:1c:8f:60:b8:58:fc:cf:91:1e:68:2a: 87:e5:4d:e4:c8:ef:d5:47:37:ab:68:be:df:d3:57:b7: eb:c7:13:7f:44:52:3f:7e:7a:a6:93:67:86:9e:73:0f: fc:9e:ad:d0:94:33:6c:8a:54:c0:6d:5f:04:50:c6:91: 55:37:2d:5f:33:a1:a4:32:f6:b8:71:6a:1a:9a:61:4d: b9:58:50:18:06:74:0b:fb:79:3f:d4:22:ed:71:7b:b5: 20:c0:6c:83:9c:a9:df:06:65:60:06:4e:1f:df:df:cc: 33:07:0f:18:59:e7:bf:a9:9e:92:e7:91:d3:8b:8b:9a: d4:76:fc:02:a8:34:9c:44:86:94:92:93:75:3c:4d:eb: 52:13:21:4c:11:fd:be:bc:16:ca:15:f4:ce:fa:36:1a: 42:6b:be:27:a9:77:bf:af:93:a1:93:e1:71:b2:26:d3: 27:ea:60:3d:87:de:27:ac:54:7b:3b:99:e7:a5:28:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:34:24:89:89:76:75:f2:fd:29:6c:03:7d:d6:c5:4f: 0e:8e:a7:c1:78:0d:cf:25:11:88:20:03:81:95:d4:b2: b1:70:33:5c:f8:3f:7d:ed:d2:2b:05:b1:e4:01:83:6e: 72:87:58:92:50:f0:e3:5c:47:8d:bb:80:72:b0:e8:84: 96:83:c9:cb:09:53:27:8d:62:de:b5:2f:e6:4f:7c:d7: 94:74:64:56:c7:05:03:91:b7:4f:f7:54:b8:cd:6f:5b: 60:17:12:21:57:91:36:af:30:60:e5:2a:6f:a9:e2:f1: 97:9c:34:db:64:44:68:28:10:23:d6:3c:b3:eb:a4:7f: 5f:0e:87:3d:a7:4e:10:9d:30:d9:d3:3c:c2:de:0f:ad: d1:ed:9e:35:d9:c2:95:b6:cb:df:6f:a2:af:2f:84:5b: d9:a4:10:37:e7:f0:31:9f:62:b6:f4:41:7a:09:73:53: 83:45:7a:fd:40:7d:f1:40:3e:30:f0:14:e2:30:ed:55: 70:4f:fe:d3:6a:82:79:2d:22:38:a1:e2:8f:ba:74:41: 58:eb:58:4c:4f:c1:cb:fc:bd:c3:e9:70:2e:e9:14:8f: 4f:e1:45:78:0f:ef:66:63:20:4a:c2:e2:ba:99:b1:38: ef:58:fa:34:21:1f:9e:7a:83:75:af:f7:a2:d5:d6:5d Fingerprint (SHA-256): 53:DB:ED:D9:3F:5E:D3:2F:1F:2F:05:D9:7C:ED:4D:61:C2:77:17:12:04:9F:E0:57:F7:71:3B:86:45:31:C8:0A Fingerprint (SHA1): 40:06:3D:D5:59:19:B4:28:D6:58:40:25:82:18:AA:99:0E:68:C2:F8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #988: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221680 (0x374447b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:22:23 2022 Not After : Tue Sep 27 22:22:23 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:3c:71:2e:9e:55:c9:d2:32:82:c4:56:7c:d5:12:1b: dd:3c:65:8b:e9:23:2e:77:02:a4:34:42:06:cd:67:db: f6:f8:9c:35:27:cb:ff:59:4f:10:fe:eb:c0:00:e2:2d: 2c:f9:3d:ef:3c:6c:5e:a0:64:4c:aa:b2:8c:13:8c:e1: fb:ae:02:82:e6:41:14:00:48:ad:d2:cf:a9:5e:71:16: 87:01:fc:a7:65:b3:75:2b:00:90:10:2e:7d:f6:1b:66: e6:e8:d7:1f:db:28:f5:d2:51:87:1f:87:3d:4a:43:78: 9d:2d:90:b3:ec:a5:3c:1d:ab:f0:83:3a:c4:95:ef:86: e3:6b:63:dd:e2:a6:c9:99:33:60:a9:58:2d:36:5f:53: d7:c5:df:15:75:de:c2:9c:07:05:d9:44:50:3c:5f:a4: b7:04:97:05:11:c2:32:b6:69:0f:28:21:0f:90:41:fe: 89:d6:d6:25:82:ad:64:8f:ce:b3:fd:53:bd:d4:96:c4: cc:d0:23:b7:c4:bc:9c:73:89:6f:ff:d8:62:3a:b7:2a: ca:26:55:d1:c4:cc:f7:5c:43:c6:f2:21:e7:3c:79:eb: 55:51:48:97:da:0e:fe:aa:80:b5:ea:db:3b:d0:c6:08: 09:b1:39:96:00:64:06:3a:bb:0e:18:d2:2d:3a:6c:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:14:5a:28:63:aa:64:b9:54:94:30:b0:43:0b:c4:64: d3:8a:be:a8:1e:6e:ff:cc:ae:94:b8:1c:d3:eb:e2:e3: b6:e6:d7:cd:0d:02:6b:4a:6d:45:a9:49:5e:cb:39:ec: e0:dd:22:0b:c9:9a:03:e9:39:db:fa:f0:e5:58:4f:e9: a5:24:ad:2f:a4:f0:f6:47:d7:86:5c:c7:e0:c6:f4:aa: 78:47:d0:03:a9:f0:f1:81:82:4d:48:9f:ff:c7:4d:c5: a7:b0:b6:61:67:79:c4:6c:21:5b:d3:03:43:b2:a5:1f: c2:e4:f9:19:0f:38:77:91:6e:e4:ed:91:88:6c:2c:98: 7d:a6:18:83:f1:22:9f:d6:06:48:b3:d1:09:c3:e6:15: 30:d7:ba:d0:3f:aa:20:11:2e:c1:19:af:9d:22:6a:94: b9:1d:cc:f8:64:ab:f1:8a:bf:17:30:77:2e:a4:1e:e2: 9f:08:4b:1d:a4:55:e6:32:65:e8:fb:09:eb:f2:e0:e0: f0:b4:86:31:91:28:b1:8f:9c:35:ca:f7:ca:ae:c0:46: dd:8c:22:fe:b5:12:68:13:f0:71:f6:ea:e2:4f:88:7b: f2:88:dd:41:f9:e9:e3:f6:03:20:a5:6e:a5:90:b4:39: 2c:d4:a6:b4:31:86:25:5d:6f:df:7f:92:21:04:4d:24 Fingerprint (SHA-256): D7:B6:B0:57:BA:19:FD:47:6D:CA:58:EE:32:E8:D4:1D:31:C4:1E:2F:F8:44:51:8E:BF:CE:F0:EE:43:12:90:C3 Fingerprint (SHA1): 6E:ED:CB:1E:E1:1D:2D:57:EE:2E:E5:0A:8E:11:49:C3:28:F9:2C:7D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #989: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #990: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221680 (0x374447b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:22:23 2022 Not After : Tue Sep 27 22:22:23 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:3c:71:2e:9e:55:c9:d2:32:82:c4:56:7c:d5:12:1b: dd:3c:65:8b:e9:23:2e:77:02:a4:34:42:06:cd:67:db: f6:f8:9c:35:27:cb:ff:59:4f:10:fe:eb:c0:00:e2:2d: 2c:f9:3d:ef:3c:6c:5e:a0:64:4c:aa:b2:8c:13:8c:e1: fb:ae:02:82:e6:41:14:00:48:ad:d2:cf:a9:5e:71:16: 87:01:fc:a7:65:b3:75:2b:00:90:10:2e:7d:f6:1b:66: e6:e8:d7:1f:db:28:f5:d2:51:87:1f:87:3d:4a:43:78: 9d:2d:90:b3:ec:a5:3c:1d:ab:f0:83:3a:c4:95:ef:86: e3:6b:63:dd:e2:a6:c9:99:33:60:a9:58:2d:36:5f:53: d7:c5:df:15:75:de:c2:9c:07:05:d9:44:50:3c:5f:a4: b7:04:97:05:11:c2:32:b6:69:0f:28:21:0f:90:41:fe: 89:d6:d6:25:82:ad:64:8f:ce:b3:fd:53:bd:d4:96:c4: cc:d0:23:b7:c4:bc:9c:73:89:6f:ff:d8:62:3a:b7:2a: ca:26:55:d1:c4:cc:f7:5c:43:c6:f2:21:e7:3c:79:eb: 55:51:48:97:da:0e:fe:aa:80:b5:ea:db:3b:d0:c6:08: 09:b1:39:96:00:64:06:3a:bb:0e:18:d2:2d:3a:6c:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:14:5a:28:63:aa:64:b9:54:94:30:b0:43:0b:c4:64: d3:8a:be:a8:1e:6e:ff:cc:ae:94:b8:1c:d3:eb:e2:e3: b6:e6:d7:cd:0d:02:6b:4a:6d:45:a9:49:5e:cb:39:ec: e0:dd:22:0b:c9:9a:03:e9:39:db:fa:f0:e5:58:4f:e9: a5:24:ad:2f:a4:f0:f6:47:d7:86:5c:c7:e0:c6:f4:aa: 78:47:d0:03:a9:f0:f1:81:82:4d:48:9f:ff:c7:4d:c5: a7:b0:b6:61:67:79:c4:6c:21:5b:d3:03:43:b2:a5:1f: c2:e4:f9:19:0f:38:77:91:6e:e4:ed:91:88:6c:2c:98: 7d:a6:18:83:f1:22:9f:d6:06:48:b3:d1:09:c3:e6:15: 30:d7:ba:d0:3f:aa:20:11:2e:c1:19:af:9d:22:6a:94: b9:1d:cc:f8:64:ab:f1:8a:bf:17:30:77:2e:a4:1e:e2: 9f:08:4b:1d:a4:55:e6:32:65:e8:fb:09:eb:f2:e0:e0: f0:b4:86:31:91:28:b1:8f:9c:35:ca:f7:ca:ae:c0:46: dd:8c:22:fe:b5:12:68:13:f0:71:f6:ea:e2:4f:88:7b: f2:88:dd:41:f9:e9:e3:f6:03:20:a5:6e:a5:90:b4:39: 2c:d4:a6:b4:31:86:25:5d:6f:df:7f:92:21:04:4d:24 Fingerprint (SHA-256): D7:B6:B0:57:BA:19:FD:47:6D:CA:58:EE:32:E8:D4:1D:31:C4:1E:2F:F8:44:51:8E:BF:CE:F0:EE:43:12:90:C3 Fingerprint (SHA1): 6E:ED:CB:1E:E1:1D:2D:57:EE:2E:E5:0A:8E:11:49:C3:28:F9:2C:7D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #991: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221682 (0x374447b2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 22:22:27 2022 Not After : Mon Sep 27 22:22:27 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:65:ff:ed:f4:54:f9:c2:c5:9f:c0:91:63:89:1f:f5: b9:17:49:00:81:39:5e:b9:6a:ed:fd:3f:45:b0:e8:a0: 79:e1:b8:98:dc:8a:c9:77:bc:ea:1c:89:d4:1e:56:c7: d2:04:43:d2:90:1c:01:74:4f:fc:b2:59:f9:04:af:4a: da:0e:4c:28:98:1c:8f:60:b8:58:fc:cf:91:1e:68:2a: 87:e5:4d:e4:c8:ef:d5:47:37:ab:68:be:df:d3:57:b7: eb:c7:13:7f:44:52:3f:7e:7a:a6:93:67:86:9e:73:0f: fc:9e:ad:d0:94:33:6c:8a:54:c0:6d:5f:04:50:c6:91: 55:37:2d:5f:33:a1:a4:32:f6:b8:71:6a:1a:9a:61:4d: b9:58:50:18:06:74:0b:fb:79:3f:d4:22:ed:71:7b:b5: 20:c0:6c:83:9c:a9:df:06:65:60:06:4e:1f:df:df:cc: 33:07:0f:18:59:e7:bf:a9:9e:92:e7:91:d3:8b:8b:9a: d4:76:fc:02:a8:34:9c:44:86:94:92:93:75:3c:4d:eb: 52:13:21:4c:11:fd:be:bc:16:ca:15:f4:ce:fa:36:1a: 42:6b:be:27:a9:77:bf:af:93:a1:93:e1:71:b2:26:d3: 27:ea:60:3d:87:de:27:ac:54:7b:3b:99:e7:a5:28:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:34:24:89:89:76:75:f2:fd:29:6c:03:7d:d6:c5:4f: 0e:8e:a7:c1:78:0d:cf:25:11:88:20:03:81:95:d4:b2: b1:70:33:5c:f8:3f:7d:ed:d2:2b:05:b1:e4:01:83:6e: 72:87:58:92:50:f0:e3:5c:47:8d:bb:80:72:b0:e8:84: 96:83:c9:cb:09:53:27:8d:62:de:b5:2f:e6:4f:7c:d7: 94:74:64:56:c7:05:03:91:b7:4f:f7:54:b8:cd:6f:5b: 60:17:12:21:57:91:36:af:30:60:e5:2a:6f:a9:e2:f1: 97:9c:34:db:64:44:68:28:10:23:d6:3c:b3:eb:a4:7f: 5f:0e:87:3d:a7:4e:10:9d:30:d9:d3:3c:c2:de:0f:ad: d1:ed:9e:35:d9:c2:95:b6:cb:df:6f:a2:af:2f:84:5b: d9:a4:10:37:e7:f0:31:9f:62:b6:f4:41:7a:09:73:53: 83:45:7a:fd:40:7d:f1:40:3e:30:f0:14:e2:30:ed:55: 70:4f:fe:d3:6a:82:79:2d:22:38:a1:e2:8f:ba:74:41: 58:eb:58:4c:4f:c1:cb:fc:bd:c3:e9:70:2e:e9:14:8f: 4f:e1:45:78:0f:ef:66:63:20:4a:c2:e2:ba:99:b1:38: ef:58:fa:34:21:1f:9e:7a:83:75:af:f7:a2:d5:d6:5d Fingerprint (SHA-256): 53:DB:ED:D9:3F:5E:D3:2F:1F:2F:05:D9:7C:ED:4D:61:C2:77:17:12:04:9F:E0:57:F7:71:3B:86:45:31:C8:0A Fingerprint (SHA1): 40:06:3D:D5:59:19:B4:28:D6:58:40:25:82:18:AA:99:0E:68:C2:F8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #992: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #993: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #994: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #995: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221680 (0x374447b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:22:23 2022 Not After : Tue Sep 27 22:22:23 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:3c:71:2e:9e:55:c9:d2:32:82:c4:56:7c:d5:12:1b: dd:3c:65:8b:e9:23:2e:77:02:a4:34:42:06:cd:67:db: f6:f8:9c:35:27:cb:ff:59:4f:10:fe:eb:c0:00:e2:2d: 2c:f9:3d:ef:3c:6c:5e:a0:64:4c:aa:b2:8c:13:8c:e1: fb:ae:02:82:e6:41:14:00:48:ad:d2:cf:a9:5e:71:16: 87:01:fc:a7:65:b3:75:2b:00:90:10:2e:7d:f6:1b:66: e6:e8:d7:1f:db:28:f5:d2:51:87:1f:87:3d:4a:43:78: 9d:2d:90:b3:ec:a5:3c:1d:ab:f0:83:3a:c4:95:ef:86: e3:6b:63:dd:e2:a6:c9:99:33:60:a9:58:2d:36:5f:53: d7:c5:df:15:75:de:c2:9c:07:05:d9:44:50:3c:5f:a4: b7:04:97:05:11:c2:32:b6:69:0f:28:21:0f:90:41:fe: 89:d6:d6:25:82:ad:64:8f:ce:b3:fd:53:bd:d4:96:c4: cc:d0:23:b7:c4:bc:9c:73:89:6f:ff:d8:62:3a:b7:2a: ca:26:55:d1:c4:cc:f7:5c:43:c6:f2:21:e7:3c:79:eb: 55:51:48:97:da:0e:fe:aa:80:b5:ea:db:3b:d0:c6:08: 09:b1:39:96:00:64:06:3a:bb:0e:18:d2:2d:3a:6c:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:14:5a:28:63:aa:64:b9:54:94:30:b0:43:0b:c4:64: d3:8a:be:a8:1e:6e:ff:cc:ae:94:b8:1c:d3:eb:e2:e3: b6:e6:d7:cd:0d:02:6b:4a:6d:45:a9:49:5e:cb:39:ec: e0:dd:22:0b:c9:9a:03:e9:39:db:fa:f0:e5:58:4f:e9: a5:24:ad:2f:a4:f0:f6:47:d7:86:5c:c7:e0:c6:f4:aa: 78:47:d0:03:a9:f0:f1:81:82:4d:48:9f:ff:c7:4d:c5: a7:b0:b6:61:67:79:c4:6c:21:5b:d3:03:43:b2:a5:1f: c2:e4:f9:19:0f:38:77:91:6e:e4:ed:91:88:6c:2c:98: 7d:a6:18:83:f1:22:9f:d6:06:48:b3:d1:09:c3:e6:15: 30:d7:ba:d0:3f:aa:20:11:2e:c1:19:af:9d:22:6a:94: b9:1d:cc:f8:64:ab:f1:8a:bf:17:30:77:2e:a4:1e:e2: 9f:08:4b:1d:a4:55:e6:32:65:e8:fb:09:eb:f2:e0:e0: f0:b4:86:31:91:28:b1:8f:9c:35:ca:f7:ca:ae:c0:46: dd:8c:22:fe:b5:12:68:13:f0:71:f6:ea:e2:4f:88:7b: f2:88:dd:41:f9:e9:e3:f6:03:20:a5:6e:a5:90:b4:39: 2c:d4:a6:b4:31:86:25:5d:6f:df:7f:92:21:04:4d:24 Fingerprint (SHA-256): D7:B6:B0:57:BA:19:FD:47:6D:CA:58:EE:32:E8:D4:1D:31:C4:1E:2F:F8:44:51:8E:BF:CE:F0:EE:43:12:90:C3 Fingerprint (SHA1): 6E:ED:CB:1E:E1:1D:2D:57:EE:2E:E5:0A:8E:11:49:C3:28:F9:2C:7D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #996: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221684 (0x374447b4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Tue Sep 27 22:22:30 2022 Not After : Tue Sep 27 22:22:30 2072 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:88:57:24:99:df:d2:79:43:51:65:a5:46:7b:b0:99: d2:2d:9b:b9:66:be:a6:f8:c4:73:c4:7a:cc:41:29:98: e8:fe:8d:49:07:c4:ad:b9:5a:26:fa:47:3b:bd:89:11: 8b:6e:b6:87:27:8e:3b:06:b9:38:4d:e2:98:65:17:07: ea:26:6c:8c:34:a3:38:67:a7:5b:c3:76:ab:dc:a7:4a: 34:52:fa:c8:25:49:50:5a:0f:f6:f9:09:7a:f0:0e:73: a3:9e:3b:21:5e:22:ac:47:63:86:4e:bb:cd:26:60:a0: bb:d4:da:10:b7:a1:e2:70:47:7a:30:29:68:77:84:a9: ca:23:73:74:8c:18:40:06:01:3a:32:8d:91:c2:50:74: 4c:ce:01:50:7f:eb:9e:94:76:2d:97:0a:87:ad:8e:ad: e6:57:67:30:57:5c:7b:a0:39:3b:94:23:09:58:08:30: 79:ce:91:6d:5a:8f:19:6d:21:18:d0:8c:46:0c:ce:d3: 9b:76:69:26:3c:17:52:34:75:3f:49:0d:59:84:57:83: 18:3d:48:40:f9:5a:4a:14:3c:53:4e:e3:2a:b0:48:2e: 4e:ad:89:02:f4:25:14:17:13:29:20:f4:de:bd:00:14: 90:66:12:c6:6b:1b:2e:e3:2f:df:67:da:e6:c2:a0:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:d4:c3:a7:2c:bc:e8:87:b3:fd:61:15:7e:e2:73:b3: aa:c7:cd:5a:2f:df:63:92:71:bb:79:db:ac:d5:95:f5: e2:20:61:58:65:c6:5b:a3:6e:bb:6e:dd:ed:af:54:83: 99:ac:d3:7d:2e:69:2c:db:10:12:3e:d0:dd:be:0f:6c: d1:c8:53:75:07:eb:b5:95:fe:4a:8f:b7:04:06:56:eb: bf:52:c0:db:66:d9:04:26:66:ee:78:c6:d4:4f:fe:a2: 6d:ed:db:3c:7d:5c:79:52:1c:19:99:39:cc:a4:69:2f: 70:3a:2e:21:dd:3c:fb:78:04:43:b3:dc:27:ca:38:8e: f5:53:89:13:6e:49:f0:26:1e:c1:e0:4f:ec:98:f8:0d: 98:47:80:e3:13:a4:0c:78:32:33:2d:61:f3:28:d8:d9: de:30:93:7c:12:3e:c5:58:ea:25:fb:83:ac:57:b4:50: df:93:14:a1:40:b8:a8:ee:46:40:b3:2a:d0:0a:9b:db: 58:ee:44:00:60:a2:f0:ae:76:48:b7:06:35:19:33:4a: 7d:b4:24:23:8d:7d:04:12:8e:ef:1a:84:43:77:98:56: 03:3b:5b:36:31:42:1b:8d:f3:4c:de:3d:49:4e:22:ac: 2f:04:c4:cb:a2:06:23:df:36:63:23:67:23:59:00:6f Fingerprint (SHA-256): 14:D0:63:79:96:49:D3:67:FA:63:1C:40:DE:EB:41:99:CF:A9:CF:DE:61:EF:2C:F0:1E:76:20:0F:87:29:6E:7C Fingerprint (SHA1): 00:8A:1A:5C:DD:25:4B:03:6E:12:11:DE:A4:A7:58:80:C0:7C:81:12 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #997: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221680 (0x374447b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:22:23 2022 Not After : Tue Sep 27 22:22:23 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:3c:71:2e:9e:55:c9:d2:32:82:c4:56:7c:d5:12:1b: dd:3c:65:8b:e9:23:2e:77:02:a4:34:42:06:cd:67:db: f6:f8:9c:35:27:cb:ff:59:4f:10:fe:eb:c0:00:e2:2d: 2c:f9:3d:ef:3c:6c:5e:a0:64:4c:aa:b2:8c:13:8c:e1: fb:ae:02:82:e6:41:14:00:48:ad:d2:cf:a9:5e:71:16: 87:01:fc:a7:65:b3:75:2b:00:90:10:2e:7d:f6:1b:66: e6:e8:d7:1f:db:28:f5:d2:51:87:1f:87:3d:4a:43:78: 9d:2d:90:b3:ec:a5:3c:1d:ab:f0:83:3a:c4:95:ef:86: e3:6b:63:dd:e2:a6:c9:99:33:60:a9:58:2d:36:5f:53: d7:c5:df:15:75:de:c2:9c:07:05:d9:44:50:3c:5f:a4: b7:04:97:05:11:c2:32:b6:69:0f:28:21:0f:90:41:fe: 89:d6:d6:25:82:ad:64:8f:ce:b3:fd:53:bd:d4:96:c4: cc:d0:23:b7:c4:bc:9c:73:89:6f:ff:d8:62:3a:b7:2a: ca:26:55:d1:c4:cc:f7:5c:43:c6:f2:21:e7:3c:79:eb: 55:51:48:97:da:0e:fe:aa:80:b5:ea:db:3b:d0:c6:08: 09:b1:39:96:00:64:06:3a:bb:0e:18:d2:2d:3a:6c:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:14:5a:28:63:aa:64:b9:54:94:30:b0:43:0b:c4:64: d3:8a:be:a8:1e:6e:ff:cc:ae:94:b8:1c:d3:eb:e2:e3: b6:e6:d7:cd:0d:02:6b:4a:6d:45:a9:49:5e:cb:39:ec: e0:dd:22:0b:c9:9a:03:e9:39:db:fa:f0:e5:58:4f:e9: a5:24:ad:2f:a4:f0:f6:47:d7:86:5c:c7:e0:c6:f4:aa: 78:47:d0:03:a9:f0:f1:81:82:4d:48:9f:ff:c7:4d:c5: a7:b0:b6:61:67:79:c4:6c:21:5b:d3:03:43:b2:a5:1f: c2:e4:f9:19:0f:38:77:91:6e:e4:ed:91:88:6c:2c:98: 7d:a6:18:83:f1:22:9f:d6:06:48:b3:d1:09:c3:e6:15: 30:d7:ba:d0:3f:aa:20:11:2e:c1:19:af:9d:22:6a:94: b9:1d:cc:f8:64:ab:f1:8a:bf:17:30:77:2e:a4:1e:e2: 9f:08:4b:1d:a4:55:e6:32:65:e8:fb:09:eb:f2:e0:e0: f0:b4:86:31:91:28:b1:8f:9c:35:ca:f7:ca:ae:c0:46: dd:8c:22:fe:b5:12:68:13:f0:71:f6:ea:e2:4f:88:7b: f2:88:dd:41:f9:e9:e3:f6:03:20:a5:6e:a5:90:b4:39: 2c:d4:a6:b4:31:86:25:5d:6f:df:7f:92:21:04:4d:24 Fingerprint (SHA-256): D7:B6:B0:57:BA:19:FD:47:6D:CA:58:EE:32:E8:D4:1D:31:C4:1E:2F:F8:44:51:8E:BF:CE:F0:EE:43:12:90:C3 Fingerprint (SHA1): 6E:ED:CB:1E:E1:1D:2D:57:EE:2E:E5:0A:8E:11:49:C3:28:F9:2C:7D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #998: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #999: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1000: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1001: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1002: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1003: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221685 (0x374447b5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Tue Sep 27 22:22:32 2022 Not After : Mon Sep 27 22:22:32 2027 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fc:81:0c:94:81:6a:53:5c:4d:ae:a1:d7:b8:67:40:05: ff:bd:58:a0:f4:a3:d0:3d:2a:1f:fc:ff:07:2e:45:54: 64:7d:ae:cb:5f:f7:70:d9:7c:23:27:44:05:7b:fc:b4: 38:b1:96:7e:0c:9f:af:83:c4:08:9d:2e:dc:78:38:6f: ad:4f:1b:4c:94:96:8d:e5:23:5f:29:44:cf:27:49:a4: ef:4a:90:3f:cb:b4:b0:66:24:46:6e:55:a9:35:07:92: 6d:b4:31:1e:3d:4c:21:04:19:d3:a6:b6:bd:06:b2:ef: ad:2e:91:bc:7e:70:b3:4e:e7:54:61:77:44:9f:93:79: ad:d4:5a:b9:eb:20:12:56:39:f7:40:d0:e2:c5:69:d9: d0:0e:3a:e5:61:5e:e8:a0:ea:b5:31:51:ea:13:6d:a4: ca:b6:6b:9c:3b:89:d5:80:4b:57:af:da:80:5d:95:2c: c9:ff:40:8d:37:dc:4f:d4:ef:d8:b8:8b:89:eb:c5:9a: 1f:20:11:8b:49:ae:1d:ec:08:8f:db:e1:33:c6:ce:fb: 06:6a:be:fb:1e:56:8d:b9:85:ed:3a:e8:ae:f3:e9:32: 4f:5d:2d:2f:25:dd:0e:72:79:38:09:87:fc:34:87:6f: 3e:0d:ec:d7:64:df:88:cb:36:25:10:41:b8:2b:8f:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ce:fc:dc:f7:02:c8:85:89:a7:e4:32:5b:53:c2:16:a5: d8:dc:81:d1:0c:ad:ce:c4:23:aa:54:04:8a:b2:0d:9d: 1b:aa:4c:6c:f2:5f:d6:36:a9:c1:ad:57:92:2f:8c:d9: cd:56:e2:2e:df:78:52:00:e5:f0:63:40:e6:66:59:34: 0e:53:c5:5e:d3:ea:d5:1d:63:c5:43:1d:59:74:8b:3c: 5e:8b:ed:42:00:8e:4c:c4:fb:e0:3b:66:53:bb:fb:d2: 46:18:3a:4a:f9:46:58:a2:e3:a7:d3:44:97:cc:61:0f: b6:f6:26:37:3d:f5:49:69:07:6d:c0:0e:ee:9b:43:e0: 77:1a:ac:bc:7d:98:f3:17:fc:c7:0c:93:5b:3a:09:59: 50:18:e6:b9:17:da:fd:c7:62:ed:96:25:1c:1c:cc:79: 00:db:d4:2c:5c:9c:64:0e:33:03:f8:c8:08:7b:f8:4b: f7:c9:72:bf:fa:85:ac:74:04:27:fd:a5:26:dc:c0:09: 7f:78:47:23:8a:3a:53:b0:b1:df:95:12:70:9a:70:83: 7a:34:14:de:41:9f:dd:26:a5:c1:e3:13:c2:6d:ed:47: 1f:5c:a2:46:fd:7d:77:70:33:2d:8e:5a:4e:1b:cb:92: 61:eb:12:45:b3:51:df:83:c7:f0:f8:76:9f:e7:90:e9 Fingerprint (SHA-256): 9B:7B:4B:BD:ED:93:C4:70:91:02:D4:2C:96:E3:61:D0:E8:AA:6E:06:4D:16:EC:7D:0A:03:65:54:3E:F8:8E:D8 Fingerprint (SHA1): 9A:41:66:16:CD:20:70:8D:EF:2B:23:27:28:6C:1E:5B:2E:10:8C:1C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1004: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1005: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1006: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1007: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1008: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1009: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1010: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1011: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1012: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1013: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1014: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1015: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1016: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1017: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1018: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1019: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1020: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1021: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1022: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1023: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1024: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1025: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1026: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1027: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1028: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1029: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 37016 at Tue Sep 27 22:22:46 UTC 2022 kill -USR1 37016 httpserv: normal termination httpserv -b -p 9233 2>/dev/null; httpserv with PID 37016 killed at Tue Sep 27 22:22:46 UTC 2022 httpserv starting at Tue Sep 27 22:22:46 UTC 2022 httpserv -D -p 9233 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/aiahttp/http_pid.3122 & trying to connect to httpserv at Tue Sep 27 22:22:46 UTC 2022 tstclnt -4 -p 9233 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9233 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 511 >/dev/null 2>/dev/null httpserv with PID 511 found at Tue Sep 27 22:22:46 UTC 2022 httpserv with PID 511 started at Tue Sep 27 22:22:46 UTC 2022 chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 vfychain -d trustanchorsDB -pp -vv -u 12 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1030: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1031: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221687 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1032: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1033: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1034: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221688 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1035: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1036: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1037: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1038: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 927221689 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1039: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1040: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 927221690 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1041: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1042: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1043: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1044: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1045: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 927221691 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1046: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1047: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1048: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #1049: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #1050: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221688 (0x374447b8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 22:22:49 2022 Not After : Tue Sep 27 22:22:49 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:e5:df:f7:fc:d3:17:be:94:fb:d8:9e:ec:fe:38:e8: 06:4c:99:cb:9c:72:6d:95:c2:52:69:c1:4c:a6:77:cf: 50:14:87:79:08:84:49:22:b9:cd:85:4f:50:a3:39:97: 70:0c:39:ca:45:7c:e3:52:0d:18:98:59:98:97:e0:8c: c2:72:1b:03:ae:20:ae:f4:0a:fc:0b:83:46:6a:71:bd: 25:16:4b:75:0e:60:b9:b7:79:53:fc:3e:c4:22:36:a9: e9:eb:23:c2:75:05:88:7f:42:70:9f:61:2a:26:dc:01: a2:c1:e1:61:bf:c5:5d:d6:4f:a2:2a:52:21:19:24:92: e7:a4:e0:d6:0f:a7:74:43:6a:f6:48:cc:37:56:c8:df: ed:5a:a8:3b:71:ca:ac:73:0d:1a:3a:86:10:93:18:8a: 61:d9:46:be:61:a5:58:3a:0d:ee:cb:63:db:af:71:2c: 18:7f:75:08:ad:bf:93:8f:e1:44:69:b1:11:32:a3:3d: 09:89:59:dc:d9:a0:1b:38:04:0a:04:7d:13:c4:08:db: 42:db:73:ed:15:b5:e3:99:0a:ee:b1:0b:e2:97:14:ea: ea:6d:34:93:b2:d2:e3:9f:95:8b:56:08:6f:a9:86:80: 21:69:90:ef:8b:3b:8c:49:ae:97:18:28:e7:92:54:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:cc:bc:47:85:bb:26:aa:30:4a:56:15:c3:9e:3f:10: e5:0d:b3:86:5a:af:b6:f0:31:8c:20:36:42:04:3a:10: fa:a7:e4:58:7e:b4:e6:a7:93:66:43:d9:98:50:2c:4d: be:90:f3:e3:58:35:bc:70:f5:30:0a:09:47:99:82:01: 5f:58:21:be:58:cb:85:30:c3:0e:ca:ef:ef:79:26:e4: 27:35:a4:de:13:25:7f:27:bf:e2:c7:2d:bf:59:0d:3d: cf:e5:12:73:fd:d2:15:8d:d6:94:f3:d3:d5:be:ac:35: bf:24:bf:3f:8d:96:9c:27:16:9f:32:15:bf:ac:4a:2f: e4:bd:ff:05:93:6e:09:9e:e9:90:29:37:71:bf:f0:07: de:0a:a4:62:c2:d6:84:79:ca:2a:ba:94:e5:bd:a0:f6: 1e:d6:18:7b:2a:7f:5d:8d:d5:0e:6d:2c:bf:f1:f0:1f: 83:9f:9d:22:b6:9f:dd:d4:03:37:d7:d1:f9:01:eb:98: 8f:38:b8:71:e0:42:11:78:a8:f2:49:cd:f6:f9:c0:86: ee:dd:0c:19:cd:22:10:6e:34:b2:4a:35:13:7a:4b:c6: 45:70:9d:0e:87:91:55:a7:83:b6:7c:0c:e8:62:c5:ed: c2:38:b1:78:b3:3e:a3:18:9d:cb:dd:15:7b:64:fb:ee Fingerprint (SHA-256): DD:94:CC:9A:19:3F:31:39:68:4C:AA:B2:A9:EF:2D:3C:10:32:75:A1:5A:69:51:ED:5F:0F:99:91:D6:A0:3B:92 Fingerprint (SHA1): 75:E9:1B:F0:3F:73:32:B7:2E:9E:68:BC:BF:1F:0E:3B:81:54:AC:8D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1051: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221687 (0x374447b7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 22:22:47 2022 Not After : Tue Sep 27 22:22:47 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:c6:b9:f8:df:5b:95:95:7a:f3:05:87:ac:3b:d9:af: f4:d7:71:7b:4f:41:7b:a5:8d:17:5a:61:41:7d:15:cf: 7b:f5:8a:5e:d6:84:16:23:d3:91:ee:3b:0d:38:5d:fd: a4:79:ed:35:3d:ca:60:45:d8:c2:61:8e:cd:88:24:04: 24:1a:aa:7e:f6:9f:77:42:4b:f4:78:de:69:aa:92:82: 62:10:17:24:7e:1c:e5:01:b1:46:55:fc:d3:a7:c5:19: 31:ae:97:6a:ab:f7:aa:46:73:23:d2:95:15:2f:04:31: f6:36:ce:d0:1e:d3:c7:bd:31:07:85:78:4d:2d:54:ba: 10:66:64:c7:9f:5e:52:52:4c:7b:f6:43:bd:f1:af:01: 7a:8a:64:7c:f3:30:18:5b:1f:71:82:3a:90:11:0d:f1: 65:91:96:a6:f8:17:f7:71:10:11:bc:8d:73:fa:c3:dc: 83:ab:4f:10:a4:9a:75:2f:c6:22:bb:6a:f4:f2:22:60: 05:f0:a3:8f:b2:4d:83:82:f3:8f:dc:6a:95:ca:a6:af: 3a:c4:fe:11:2b:a9:72:bd:99:81:ec:64:a6:98:0e:42: 6b:d6:c3:c1:ce:ed:69:48:34:dc:a8:80:e2:c2:17:10: 12:a7:95:4c:5e:c8:05:31:8a:16:9d:83:7f:c4:b4:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 12:6c:74:e4:54:dc:11:a4:1a:59:1f:54:9e:92:cc:d3: 16:34:00:c3:f9:3c:11:69:a9:80:c5:5f:b8:b6:a0:e4: f7:01:45:e5:69:d2:fe:56:bb:2f:c8:1e:5b:3e:30:39: 8e:67:1d:d6:64:07:a0:0a:60:b8:75:38:4c:41:b4:1f: 00:dc:f3:8a:0e:6f:b4:13:2c:6d:30:0c:9a:82:45:eb: ad:bc:6e:94:77:dc:de:a7:86:09:62:66:45:e3:bb:d3: a0:bc:cd:15:de:cb:00:1e:04:6c:c4:cc:08:0c:8a:9f: 7d:f1:93:48:11:08:63:d1:d1:cb:65:b7:de:7a:a1:19: b5:67:1b:37:9d:00:a7:c9:3b:68:57:41:e7:fd:63:b9: 9b:cc:50:99:de:a2:75:91:b2:8c:63:eb:f9:27:ba:84: 1d:20:53:03:4f:e8:91:ad:a5:9b:4c:4b:ed:a3:90:3c: ef:d4:77:b7:9c:f3:87:c8:5c:3e:e6:04:9e:97:da:3a: ac:92:6a:af:dd:9e:9e:1f:53:3a:e9:65:21:cb:a6:c6: 54:49:f2:53:ca:51:cb:1e:6a:62:8d:98:fe:41:f7:db: 33:af:37:d5:eb:9e:95:e4:e1:07:ea:04:99:d3:7a:d9: fa:fc:80:82:15:08:25:92:d7:c0:fe:c3:2c:a2:07:71 Fingerprint (SHA-256): B3:9C:EA:B4:07:86:74:A8:6E:D4:7D:0A:29:BD:FB:7A:CE:44:9A:CE:13:77:4F:13:47:1F:F9:27:11:AB:75:94 Fingerprint (SHA1): 4B:66:13:C9:4A:71:A2:67:C7:6D:C7:11:81:D4:91:D4:75:F8:21:BC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1052: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1053: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #1054: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #1055: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221687 (0x374447b7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 22:22:47 2022 Not After : Tue Sep 27 22:22:47 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:c6:b9:f8:df:5b:95:95:7a:f3:05:87:ac:3b:d9:af: f4:d7:71:7b:4f:41:7b:a5:8d:17:5a:61:41:7d:15:cf: 7b:f5:8a:5e:d6:84:16:23:d3:91:ee:3b:0d:38:5d:fd: a4:79:ed:35:3d:ca:60:45:d8:c2:61:8e:cd:88:24:04: 24:1a:aa:7e:f6:9f:77:42:4b:f4:78:de:69:aa:92:82: 62:10:17:24:7e:1c:e5:01:b1:46:55:fc:d3:a7:c5:19: 31:ae:97:6a:ab:f7:aa:46:73:23:d2:95:15:2f:04:31: f6:36:ce:d0:1e:d3:c7:bd:31:07:85:78:4d:2d:54:ba: 10:66:64:c7:9f:5e:52:52:4c:7b:f6:43:bd:f1:af:01: 7a:8a:64:7c:f3:30:18:5b:1f:71:82:3a:90:11:0d:f1: 65:91:96:a6:f8:17:f7:71:10:11:bc:8d:73:fa:c3:dc: 83:ab:4f:10:a4:9a:75:2f:c6:22:bb:6a:f4:f2:22:60: 05:f0:a3:8f:b2:4d:83:82:f3:8f:dc:6a:95:ca:a6:af: 3a:c4:fe:11:2b:a9:72:bd:99:81:ec:64:a6:98:0e:42: 6b:d6:c3:c1:ce:ed:69:48:34:dc:a8:80:e2:c2:17:10: 12:a7:95:4c:5e:c8:05:31:8a:16:9d:83:7f:c4:b4:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 12:6c:74:e4:54:dc:11:a4:1a:59:1f:54:9e:92:cc:d3: 16:34:00:c3:f9:3c:11:69:a9:80:c5:5f:b8:b6:a0:e4: f7:01:45:e5:69:d2:fe:56:bb:2f:c8:1e:5b:3e:30:39: 8e:67:1d:d6:64:07:a0:0a:60:b8:75:38:4c:41:b4:1f: 00:dc:f3:8a:0e:6f:b4:13:2c:6d:30:0c:9a:82:45:eb: ad:bc:6e:94:77:dc:de:a7:86:09:62:66:45:e3:bb:d3: a0:bc:cd:15:de:cb:00:1e:04:6c:c4:cc:08:0c:8a:9f: 7d:f1:93:48:11:08:63:d1:d1:cb:65:b7:de:7a:a1:19: b5:67:1b:37:9d:00:a7:c9:3b:68:57:41:e7:fd:63:b9: 9b:cc:50:99:de:a2:75:91:b2:8c:63:eb:f9:27:ba:84: 1d:20:53:03:4f:e8:91:ad:a5:9b:4c:4b:ed:a3:90:3c: ef:d4:77:b7:9c:f3:87:c8:5c:3e:e6:04:9e:97:da:3a: ac:92:6a:af:dd:9e:9e:1f:53:3a:e9:65:21:cb:a6:c6: 54:49:f2:53:ca:51:cb:1e:6a:62:8d:98:fe:41:f7:db: 33:af:37:d5:eb:9e:95:e4:e1:07:ea:04:99:d3:7a:d9: fa:fc:80:82:15:08:25:92:d7:c0:fe:c3:2c:a2:07:71 Fingerprint (SHA-256): B3:9C:EA:B4:07:86:74:A8:6E:D4:7D:0A:29:BD:FB:7A:CE:44:9A:CE:13:77:4F:13:47:1F:F9:27:11:AB:75:94 Fingerprint (SHA1): 4B:66:13:C9:4A:71:A2:67:C7:6D:C7:11:81:D4:91:D4:75:F8:21:BC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1056: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221688 (0x374447b8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 22:22:49 2022 Not After : Tue Sep 27 22:22:49 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:e5:df:f7:fc:d3:17:be:94:fb:d8:9e:ec:fe:38:e8: 06:4c:99:cb:9c:72:6d:95:c2:52:69:c1:4c:a6:77:cf: 50:14:87:79:08:84:49:22:b9:cd:85:4f:50:a3:39:97: 70:0c:39:ca:45:7c:e3:52:0d:18:98:59:98:97:e0:8c: c2:72:1b:03:ae:20:ae:f4:0a:fc:0b:83:46:6a:71:bd: 25:16:4b:75:0e:60:b9:b7:79:53:fc:3e:c4:22:36:a9: e9:eb:23:c2:75:05:88:7f:42:70:9f:61:2a:26:dc:01: a2:c1:e1:61:bf:c5:5d:d6:4f:a2:2a:52:21:19:24:92: e7:a4:e0:d6:0f:a7:74:43:6a:f6:48:cc:37:56:c8:df: ed:5a:a8:3b:71:ca:ac:73:0d:1a:3a:86:10:93:18:8a: 61:d9:46:be:61:a5:58:3a:0d:ee:cb:63:db:af:71:2c: 18:7f:75:08:ad:bf:93:8f:e1:44:69:b1:11:32:a3:3d: 09:89:59:dc:d9:a0:1b:38:04:0a:04:7d:13:c4:08:db: 42:db:73:ed:15:b5:e3:99:0a:ee:b1:0b:e2:97:14:ea: ea:6d:34:93:b2:d2:e3:9f:95:8b:56:08:6f:a9:86:80: 21:69:90:ef:8b:3b:8c:49:ae:97:18:28:e7:92:54:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:cc:bc:47:85:bb:26:aa:30:4a:56:15:c3:9e:3f:10: e5:0d:b3:86:5a:af:b6:f0:31:8c:20:36:42:04:3a:10: fa:a7:e4:58:7e:b4:e6:a7:93:66:43:d9:98:50:2c:4d: be:90:f3:e3:58:35:bc:70:f5:30:0a:09:47:99:82:01: 5f:58:21:be:58:cb:85:30:c3:0e:ca:ef:ef:79:26:e4: 27:35:a4:de:13:25:7f:27:bf:e2:c7:2d:bf:59:0d:3d: cf:e5:12:73:fd:d2:15:8d:d6:94:f3:d3:d5:be:ac:35: bf:24:bf:3f:8d:96:9c:27:16:9f:32:15:bf:ac:4a:2f: e4:bd:ff:05:93:6e:09:9e:e9:90:29:37:71:bf:f0:07: de:0a:a4:62:c2:d6:84:79:ca:2a:ba:94:e5:bd:a0:f6: 1e:d6:18:7b:2a:7f:5d:8d:d5:0e:6d:2c:bf:f1:f0:1f: 83:9f:9d:22:b6:9f:dd:d4:03:37:d7:d1:f9:01:eb:98: 8f:38:b8:71:e0:42:11:78:a8:f2:49:cd:f6:f9:c0:86: ee:dd:0c:19:cd:22:10:6e:34:b2:4a:35:13:7a:4b:c6: 45:70:9d:0e:87:91:55:a7:83:b6:7c:0c:e8:62:c5:ed: c2:38:b1:78:b3:3e:a3:18:9d:cb:dd:15:7b:64:fb:ee Fingerprint (SHA-256): DD:94:CC:9A:19:3F:31:39:68:4C:AA:B2:A9:EF:2D:3C:10:32:75:A1:5A:69:51:ED:5F:0F:99:91:D6:A0:3B:92 Fingerprint (SHA1): 75:E9:1B:F0:3F:73:32:B7:2E:9E:68:BC:BF:1F:0E:3B:81:54:AC:8D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1057: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #1058: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #1059: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1060: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1061: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1062: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221688 (0x374447b8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 22:22:49 2022 Not After : Tue Sep 27 22:22:49 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:e5:df:f7:fc:d3:17:be:94:fb:d8:9e:ec:fe:38:e8: 06:4c:99:cb:9c:72:6d:95:c2:52:69:c1:4c:a6:77:cf: 50:14:87:79:08:84:49:22:b9:cd:85:4f:50:a3:39:97: 70:0c:39:ca:45:7c:e3:52:0d:18:98:59:98:97:e0:8c: c2:72:1b:03:ae:20:ae:f4:0a:fc:0b:83:46:6a:71:bd: 25:16:4b:75:0e:60:b9:b7:79:53:fc:3e:c4:22:36:a9: e9:eb:23:c2:75:05:88:7f:42:70:9f:61:2a:26:dc:01: a2:c1:e1:61:bf:c5:5d:d6:4f:a2:2a:52:21:19:24:92: e7:a4:e0:d6:0f:a7:74:43:6a:f6:48:cc:37:56:c8:df: ed:5a:a8:3b:71:ca:ac:73:0d:1a:3a:86:10:93:18:8a: 61:d9:46:be:61:a5:58:3a:0d:ee:cb:63:db:af:71:2c: 18:7f:75:08:ad:bf:93:8f:e1:44:69:b1:11:32:a3:3d: 09:89:59:dc:d9:a0:1b:38:04:0a:04:7d:13:c4:08:db: 42:db:73:ed:15:b5:e3:99:0a:ee:b1:0b:e2:97:14:ea: ea:6d:34:93:b2:d2:e3:9f:95:8b:56:08:6f:a9:86:80: 21:69:90:ef:8b:3b:8c:49:ae:97:18:28:e7:92:54:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:cc:bc:47:85:bb:26:aa:30:4a:56:15:c3:9e:3f:10: e5:0d:b3:86:5a:af:b6:f0:31:8c:20:36:42:04:3a:10: fa:a7:e4:58:7e:b4:e6:a7:93:66:43:d9:98:50:2c:4d: be:90:f3:e3:58:35:bc:70:f5:30:0a:09:47:99:82:01: 5f:58:21:be:58:cb:85:30:c3:0e:ca:ef:ef:79:26:e4: 27:35:a4:de:13:25:7f:27:bf:e2:c7:2d:bf:59:0d:3d: cf:e5:12:73:fd:d2:15:8d:d6:94:f3:d3:d5:be:ac:35: bf:24:bf:3f:8d:96:9c:27:16:9f:32:15:bf:ac:4a:2f: e4:bd:ff:05:93:6e:09:9e:e9:90:29:37:71:bf:f0:07: de:0a:a4:62:c2:d6:84:79:ca:2a:ba:94:e5:bd:a0:f6: 1e:d6:18:7b:2a:7f:5d:8d:d5:0e:6d:2c:bf:f1:f0:1f: 83:9f:9d:22:b6:9f:dd:d4:03:37:d7:d1:f9:01:eb:98: 8f:38:b8:71:e0:42:11:78:a8:f2:49:cd:f6:f9:c0:86: ee:dd:0c:19:cd:22:10:6e:34:b2:4a:35:13:7a:4b:c6: 45:70:9d:0e:87:91:55:a7:83:b6:7c:0c:e8:62:c5:ed: c2:38:b1:78:b3:3e:a3:18:9d:cb:dd:15:7b:64:fb:ee Fingerprint (SHA-256): DD:94:CC:9A:19:3F:31:39:68:4C:AA:B2:A9:EF:2D:3C:10:32:75:A1:5A:69:51:ED:5F:0F:99:91:D6:A0:3B:92 Fingerprint (SHA1): 75:E9:1B:F0:3F:73:32:B7:2E:9E:68:BC:BF:1F:0E:3B:81:54:AC:8D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1063: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221688 (0x374447b8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 22:22:49 2022 Not After : Tue Sep 27 22:22:49 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:e5:df:f7:fc:d3:17:be:94:fb:d8:9e:ec:fe:38:e8: 06:4c:99:cb:9c:72:6d:95:c2:52:69:c1:4c:a6:77:cf: 50:14:87:79:08:84:49:22:b9:cd:85:4f:50:a3:39:97: 70:0c:39:ca:45:7c:e3:52:0d:18:98:59:98:97:e0:8c: c2:72:1b:03:ae:20:ae:f4:0a:fc:0b:83:46:6a:71:bd: 25:16:4b:75:0e:60:b9:b7:79:53:fc:3e:c4:22:36:a9: e9:eb:23:c2:75:05:88:7f:42:70:9f:61:2a:26:dc:01: a2:c1:e1:61:bf:c5:5d:d6:4f:a2:2a:52:21:19:24:92: e7:a4:e0:d6:0f:a7:74:43:6a:f6:48:cc:37:56:c8:df: ed:5a:a8:3b:71:ca:ac:73:0d:1a:3a:86:10:93:18:8a: 61:d9:46:be:61:a5:58:3a:0d:ee:cb:63:db:af:71:2c: 18:7f:75:08:ad:bf:93:8f:e1:44:69:b1:11:32:a3:3d: 09:89:59:dc:d9:a0:1b:38:04:0a:04:7d:13:c4:08:db: 42:db:73:ed:15:b5:e3:99:0a:ee:b1:0b:e2:97:14:ea: ea:6d:34:93:b2:d2:e3:9f:95:8b:56:08:6f:a9:86:80: 21:69:90:ef:8b:3b:8c:49:ae:97:18:28:e7:92:54:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:cc:bc:47:85:bb:26:aa:30:4a:56:15:c3:9e:3f:10: e5:0d:b3:86:5a:af:b6:f0:31:8c:20:36:42:04:3a:10: fa:a7:e4:58:7e:b4:e6:a7:93:66:43:d9:98:50:2c:4d: be:90:f3:e3:58:35:bc:70:f5:30:0a:09:47:99:82:01: 5f:58:21:be:58:cb:85:30:c3:0e:ca:ef:ef:79:26:e4: 27:35:a4:de:13:25:7f:27:bf:e2:c7:2d:bf:59:0d:3d: cf:e5:12:73:fd:d2:15:8d:d6:94:f3:d3:d5:be:ac:35: bf:24:bf:3f:8d:96:9c:27:16:9f:32:15:bf:ac:4a:2f: e4:bd:ff:05:93:6e:09:9e:e9:90:29:37:71:bf:f0:07: de:0a:a4:62:c2:d6:84:79:ca:2a:ba:94:e5:bd:a0:f6: 1e:d6:18:7b:2a:7f:5d:8d:d5:0e:6d:2c:bf:f1:f0:1f: 83:9f:9d:22:b6:9f:dd:d4:03:37:d7:d1:f9:01:eb:98: 8f:38:b8:71:e0:42:11:78:a8:f2:49:cd:f6:f9:c0:86: ee:dd:0c:19:cd:22:10:6e:34:b2:4a:35:13:7a:4b:c6: 45:70:9d:0e:87:91:55:a7:83:b6:7c:0c:e8:62:c5:ed: c2:38:b1:78:b3:3e:a3:18:9d:cb:dd:15:7b:64:fb:ee Fingerprint (SHA-256): DD:94:CC:9A:19:3F:31:39:68:4C:AA:B2:A9:EF:2D:3C:10:32:75:A1:5A:69:51:ED:5F:0F:99:91:D6:A0:3B:92 Fingerprint (SHA1): 75:E9:1B:F0:3F:73:32:B7:2E:9E:68:BC:BF:1F:0E:3B:81:54:AC:8D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1064: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #1065: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #1066: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1067: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1068: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1069: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221687 (0x374447b7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 22:22:47 2022 Not After : Tue Sep 27 22:22:47 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:c6:b9:f8:df:5b:95:95:7a:f3:05:87:ac:3b:d9:af: f4:d7:71:7b:4f:41:7b:a5:8d:17:5a:61:41:7d:15:cf: 7b:f5:8a:5e:d6:84:16:23:d3:91:ee:3b:0d:38:5d:fd: a4:79:ed:35:3d:ca:60:45:d8:c2:61:8e:cd:88:24:04: 24:1a:aa:7e:f6:9f:77:42:4b:f4:78:de:69:aa:92:82: 62:10:17:24:7e:1c:e5:01:b1:46:55:fc:d3:a7:c5:19: 31:ae:97:6a:ab:f7:aa:46:73:23:d2:95:15:2f:04:31: f6:36:ce:d0:1e:d3:c7:bd:31:07:85:78:4d:2d:54:ba: 10:66:64:c7:9f:5e:52:52:4c:7b:f6:43:bd:f1:af:01: 7a:8a:64:7c:f3:30:18:5b:1f:71:82:3a:90:11:0d:f1: 65:91:96:a6:f8:17:f7:71:10:11:bc:8d:73:fa:c3:dc: 83:ab:4f:10:a4:9a:75:2f:c6:22:bb:6a:f4:f2:22:60: 05:f0:a3:8f:b2:4d:83:82:f3:8f:dc:6a:95:ca:a6:af: 3a:c4:fe:11:2b:a9:72:bd:99:81:ec:64:a6:98:0e:42: 6b:d6:c3:c1:ce:ed:69:48:34:dc:a8:80:e2:c2:17:10: 12:a7:95:4c:5e:c8:05:31:8a:16:9d:83:7f:c4:b4:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 12:6c:74:e4:54:dc:11:a4:1a:59:1f:54:9e:92:cc:d3: 16:34:00:c3:f9:3c:11:69:a9:80:c5:5f:b8:b6:a0:e4: f7:01:45:e5:69:d2:fe:56:bb:2f:c8:1e:5b:3e:30:39: 8e:67:1d:d6:64:07:a0:0a:60:b8:75:38:4c:41:b4:1f: 00:dc:f3:8a:0e:6f:b4:13:2c:6d:30:0c:9a:82:45:eb: ad:bc:6e:94:77:dc:de:a7:86:09:62:66:45:e3:bb:d3: a0:bc:cd:15:de:cb:00:1e:04:6c:c4:cc:08:0c:8a:9f: 7d:f1:93:48:11:08:63:d1:d1:cb:65:b7:de:7a:a1:19: b5:67:1b:37:9d:00:a7:c9:3b:68:57:41:e7:fd:63:b9: 9b:cc:50:99:de:a2:75:91:b2:8c:63:eb:f9:27:ba:84: 1d:20:53:03:4f:e8:91:ad:a5:9b:4c:4b:ed:a3:90:3c: ef:d4:77:b7:9c:f3:87:c8:5c:3e:e6:04:9e:97:da:3a: ac:92:6a:af:dd:9e:9e:1f:53:3a:e9:65:21:cb:a6:c6: 54:49:f2:53:ca:51:cb:1e:6a:62:8d:98:fe:41:f7:db: 33:af:37:d5:eb:9e:95:e4:e1:07:ea:04:99:d3:7a:d9: fa:fc:80:82:15:08:25:92:d7:c0:fe:c3:2c:a2:07:71 Fingerprint (SHA-256): B3:9C:EA:B4:07:86:74:A8:6E:D4:7D:0A:29:BD:FB:7A:CE:44:9A:CE:13:77:4F:13:47:1F:F9:27:11:AB:75:94 Fingerprint (SHA1): 4B:66:13:C9:4A:71:A2:67:C7:6D:C7:11:81:D4:91:D4:75:F8:21:BC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1070: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221687 (0x374447b7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 22:22:47 2022 Not After : Tue Sep 27 22:22:47 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:c6:b9:f8:df:5b:95:95:7a:f3:05:87:ac:3b:d9:af: f4:d7:71:7b:4f:41:7b:a5:8d:17:5a:61:41:7d:15:cf: 7b:f5:8a:5e:d6:84:16:23:d3:91:ee:3b:0d:38:5d:fd: a4:79:ed:35:3d:ca:60:45:d8:c2:61:8e:cd:88:24:04: 24:1a:aa:7e:f6:9f:77:42:4b:f4:78:de:69:aa:92:82: 62:10:17:24:7e:1c:e5:01:b1:46:55:fc:d3:a7:c5:19: 31:ae:97:6a:ab:f7:aa:46:73:23:d2:95:15:2f:04:31: f6:36:ce:d0:1e:d3:c7:bd:31:07:85:78:4d:2d:54:ba: 10:66:64:c7:9f:5e:52:52:4c:7b:f6:43:bd:f1:af:01: 7a:8a:64:7c:f3:30:18:5b:1f:71:82:3a:90:11:0d:f1: 65:91:96:a6:f8:17:f7:71:10:11:bc:8d:73:fa:c3:dc: 83:ab:4f:10:a4:9a:75:2f:c6:22:bb:6a:f4:f2:22:60: 05:f0:a3:8f:b2:4d:83:82:f3:8f:dc:6a:95:ca:a6:af: 3a:c4:fe:11:2b:a9:72:bd:99:81:ec:64:a6:98:0e:42: 6b:d6:c3:c1:ce:ed:69:48:34:dc:a8:80:e2:c2:17:10: 12:a7:95:4c:5e:c8:05:31:8a:16:9d:83:7f:c4:b4:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 12:6c:74:e4:54:dc:11:a4:1a:59:1f:54:9e:92:cc:d3: 16:34:00:c3:f9:3c:11:69:a9:80:c5:5f:b8:b6:a0:e4: f7:01:45:e5:69:d2:fe:56:bb:2f:c8:1e:5b:3e:30:39: 8e:67:1d:d6:64:07:a0:0a:60:b8:75:38:4c:41:b4:1f: 00:dc:f3:8a:0e:6f:b4:13:2c:6d:30:0c:9a:82:45:eb: ad:bc:6e:94:77:dc:de:a7:86:09:62:66:45:e3:bb:d3: a0:bc:cd:15:de:cb:00:1e:04:6c:c4:cc:08:0c:8a:9f: 7d:f1:93:48:11:08:63:d1:d1:cb:65:b7:de:7a:a1:19: b5:67:1b:37:9d:00:a7:c9:3b:68:57:41:e7:fd:63:b9: 9b:cc:50:99:de:a2:75:91:b2:8c:63:eb:f9:27:ba:84: 1d:20:53:03:4f:e8:91:ad:a5:9b:4c:4b:ed:a3:90:3c: ef:d4:77:b7:9c:f3:87:c8:5c:3e:e6:04:9e:97:da:3a: ac:92:6a:af:dd:9e:9e:1f:53:3a:e9:65:21:cb:a6:c6: 54:49:f2:53:ca:51:cb:1e:6a:62:8d:98:fe:41:f7:db: 33:af:37:d5:eb:9e:95:e4:e1:07:ea:04:99:d3:7a:d9: fa:fc:80:82:15:08:25:92:d7:c0:fe:c3:2c:a2:07:71 Fingerprint (SHA-256): B3:9C:EA:B4:07:86:74:A8:6E:D4:7D:0A:29:BD:FB:7A:CE:44:9A:CE:13:77:4F:13:47:1F:F9:27:11:AB:75:94 Fingerprint (SHA1): 4B:66:13:C9:4A:71:A2:67:C7:6D:C7:11:81:D4:91:D4:75:F8:21:BC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1071: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #1072: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221692 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1073: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #1074: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #1075: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221693 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1076: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #1077: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #1078: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221694 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1079: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #1080: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #1081: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221695 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1082: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #1083: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #1084: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221696 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1085: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #1086: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #1087: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221697 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1088: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #1089: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #1090: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221698 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1091: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #1092: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #1093: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221699 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1094: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #1095: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #1096: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221700 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1097: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #1098: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #1099: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1100: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 927221701 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1101: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1102: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 927221702 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1103: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1104: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 927221703 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1105: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1106: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #1107: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #1108: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1109: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 927221704 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1110: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1111: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 927221705 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1112: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1113: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 927221706 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1114: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1115: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #1116: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #1117: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1118: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 927221707 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1119: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1120: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 927221708 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1121: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1122: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 927221709 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1123: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1124: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #1125: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #1126: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1127: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 927221710 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1128: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1129: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 927221711 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1130: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1131: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 927221712 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1132: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1133: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #1134: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1135: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1136: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 927221713 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1137: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1138: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1139: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1140: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 927221714 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1141: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1142: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221692 (0x374447bc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Tue Sep 27 22:23:01 2022 Not After : Tue Sep 27 22:23:01 2072 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:09:24:72:2f:17:1b:f3:4f:ba:26:c1:59:d8:ac:ab: 10:d3:84:b7:e8:f8:21:e9:ff:76:52:0c:ab:9f:f5:89: 29:db:65:fc:6e:f6:b3:c8:0b:67:6a:08:5c:a2:e7:ac: 5f:ee:f5:48:de:40:ab:c7:38:3c:22:76:70:40:73:51: 06:5c:f0:1b:8a:93:91:02:3f:1b:b4:e4:3c:e4:74:34: d3:f9:df:6f:88:97:91:b6:81:27:2e:43:07:4a:12:ad: 38:32:2e:7e:3e:e7:af:82:80:b4:fd:4d:65:05:ad:fe: c5:df:13:06:7a:9f:f5:44:35:38:33:46:23:4c:67:34: e7:c4:57:23:1f:47:d1:12:64:ed:19:da:16:a6:78:22: 3a:c2:21:87:ab:e6:ae:cf:d5:6f:f5:84:6e:dc:a0:69: dc:b8:01:6a:a3:9d:bc:32:ac:2e:8d:0e:a3:ac:7b:3e: 0c:02:e8:02:82:a9:6a:fb:92:f0:f0:c6:40:9e:91:30: 11:d8:c8:a3:16:fb:71:ec:8c:78:da:9d:7d:70:90:94: 8f:00:ed:46:74:cb:b3:27:2e:b6:3b:b0:5e:84:2f:6f: 1a:45:2d:dc:48:12:b4:30:90:40:a1:74:ae:2e:08:e8: b9:d2:9b:30:ca:56:04:4a:14:73:95:49:e6:dd:7f:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:5c:eb:67:d1:1f:87:e1:2d:a1:a7:c9:54:02:5f:4a: 6a:e8:fc:5e:48:3a:1c:7f:d5:a9:58:53:9d:41:47:78: e5:95:98:f7:f8:80:ac:c0:e8:0e:a9:3a:0a:c9:2b:6e: d6:82:37:b8:35:4b:b1:d9:43:ca:0b:44:82:5d:38:dd: 54:0e:6f:ad:4f:88:b3:6e:85:1d:0d:42:03:69:22:30: 47:95:39:d2:9d:7b:8d:5f:28:2c:26:69:59:de:bd:35: 65:1a:aa:0a:dd:00:d0:7e:e8:2e:69:6a:6f:6f:ec:c0: 9a:94:3f:6b:39:b9:9d:e4:5b:32:02:f5:a8:5b:e7:cf: 02:56:27:0c:39:e2:06:3c:7d:17:a5:b8:0f:33:82:ea: b7:04:69:85:ef:a6:d3:fc:3b:8d:a0:7c:f1:d5:7a:00: 7a:83:5c:c8:5f:10:f4:5f:01:65:0d:b9:bf:bc:f6:e6: 3c:f7:9d:62:7f:fe:db:77:9f:d0:b9:62:d9:4d:c9:c2: 63:2e:8d:c7:a4:f9:96:e7:d2:99:5d:5b:93:11:f7:44: cb:98:c3:1b:9c:e1:31:52:7e:f9:64:95:55:30:69:9a: 0c:8a:9b:2a:c2:23:4d:b6:d0:e5:52:e0:18:de:c8:6f: 18:68:02:3e:52:cc:fc:92:9b:ca:a2:89:52:21:42:0f Fingerprint (SHA-256): 58:78:72:53:7F:EC:83:A9:C0:F3:9A:12:18:42:95:CA:10:B9:81:96:8A:7A:97:54:81:A7:25:DA:37:BF:ED:9D Fingerprint (SHA1): 46:35:90:8B:5F:79:DC:C6:88:1B:4F:A2:78:FD:BA:08:86:02:CB:A2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1143: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221693 (0x374447bd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Tue Sep 27 22:23:02 2022 Not After : Tue Sep 27 22:23:02 2072 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:65:ef:45:6a:df:e6:4a:4d:f1:d2:dd:e3:5e:f8:f7: 96:30:84:e9:c5:e7:6a:33:2f:91:8f:4e:39:ab:a5:2d: f6:1f:ea:71:09:1e:6b:55:fe:fc:f4:37:9c:b6:6d:77: 2a:4b:5c:fc:93:6c:2d:8d:6a:af:c2:8a:23:79:e5:e4: cb:85:91:15:2b:8e:4e:25:ae:47:8b:2b:4f:19:c1:31: 41:f6:8c:20:96:02:e3:53:00:a1:a0:9f:6d:5e:18:80: 5b:7d:92:9b:13:98:d0:0d:d2:58:d2:b5:7a:53:a7:ba: 97:f4:7f:41:6b:17:6b:2a:43:20:a7:1f:26:fc:a3:29: 1d:f1:58:5a:9f:ea:89:d5:b0:97:d5:9c:ca:06:2f:96: 5d:ba:f3:ab:78:8e:fb:7d:c6:d2:d8:ed:f7:03:e5:b6: 2c:ca:e5:d4:7e:4b:73:35:eb:35:0a:3e:ad:b7:60:81: 01:32:f3:99:3b:76:72:78:c0:ae:b4:78:64:1a:00:06: 21:2a:11:60:16:7b:b8:89:57:8b:61:cf:6e:93:34:ab: 24:07:d5:6a:2e:e1:9e:ba:7c:2d:aa:b7:51:9a:75:07: 06:10:1a:f4:c4:ca:34:bc:0f:12:95:df:2a:e0:60:62: 50:3f:90:4a:4e:fe:39:3d:bb:fa:5d:8e:a2:bf:e1:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:ee:ab:56:c3:a9:15:0a:56:50:f8:71:a4:02:9b:ae: f2:c4:09:ea:ec:a0:9e:d3:52:4c:95:7c:73:13:c2:b8: 65:90:88:34:fc:1f:66:6c:f7:04:0d:82:c4:e1:30:72: 64:3a:7d:ee:ed:cf:e0:0c:95:54:1e:a9:3d:3a:77:37: 44:e5:0e:6e:08:7e:9f:d7:fc:65:43:e1:b9:55:62:cd: e6:d5:ca:e4:0d:4a:f0:a1:ac:fc:12:7c:d2:fe:e9:a5: 5e:c0:87:44:15:e5:5d:4c:62:60:d6:49:d7:56:b5:48: 5c:06:5a:4c:e3:36:54:31:90:83:fc:6c:ea:68:0b:22: 97:19:9c:75:a6:65:a0:0f:e8:40:8c:89:f5:7e:07:72: 5b:e4:ea:81:64:35:2e:46:bd:ce:37:2e:db:ed:b4:e4: 51:50:69:25:36:e3:ba:6b:c8:29:42:19:a2:b3:e9:52: 15:57:90:74:ca:f2:3b:3f:26:e0:52:95:cb:fa:f1:a0: 1c:2f:0c:ba:12:db:f0:1e:c5:7b:41:85:9a:40:99:d0: 03:42:10:c0:70:38:2f:43:59:95:0d:4a:83:25:f1:d3: 8e:52:78:80:b7:45:67:9f:c6:19:51:68:ce:5d:12:cb: fc:f9:5c:e3:92:10:66:b2:17:b9:ee:a0:45:cd:fd:df Fingerprint (SHA-256): 5C:DF:5E:04:D7:9B:28:7D:F7:30:49:2F:BC:A0:4A:24:DF:50:40:D7:C5:92:E9:7B:B1:B0:C0:34:9F:71:02:B5 Fingerprint (SHA1): 03:EF:D0:30:5D:7B:05:38:42:CA:44:4F:C2:70:32:AC:7F:AC:8F:D8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1144: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221694 (0x374447be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Tue Sep 27 22:23:03 2022 Not After : Tue Sep 27 22:23:03 2072 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:97:00:a9:a7:56:20:c2:8b:a2:48:1d:17:7a:8f:19: 7b:e7:ce:76:b8:cb:0e:19:8c:67:68:e5:3e:e0:d7:e3: 56:5e:8c:e0:3d:13:36:a6:eb:37:81:65:b0:1e:99:6b: 93:94:c6:7a:c0:6d:c3:7f:dd:46:24:f7:a8:94:20:d7: a6:a6:1e:7c:d2:0b:72:39:ea:7b:03:d8:d5:0f:b7:62: 4e:3f:ae:83:7f:7e:45:79:ed:b5:81:08:5b:5a:e4:22: 8c:bd:0d:54:dd:11:bb:c4:a3:e2:0e:f8:2c:4b:08:79: ea:1a:34:88:a0:f6:b2:9d:24:86:50:8d:d5:46:45:8f: af:53:6f:b7:60:61:0a:6a:6b:36:55:74:9a:3c:f0:af: 89:3f:2d:10:d4:fc:3a:88:7c:2c:19:77:9b:6e:f8:e8: 70:c4:c8:60:80:33:26:0d:2d:6c:13:56:cd:48:ba:9e: 12:49:72:35:90:c4:f3:14:31:3e:67:59:43:c3:22:1d: 79:d4:35:a3:d7:b8:70:b7:e2:2c:e7:b8:19:c2:75:1b: 26:1e:52:ee:fc:e8:f4:6b:ba:af:b4:05:69:a0:4e:92: 6d:30:53:22:84:95:64:b1:87:5f:31:a8:29:c4:49:93: af:8e:b7:88:bb:b9:44:64:01:97:7d:56:84:19:1a:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:b6:3e:f1:58:b9:1d:27:1d:bf:2f:85:9c:6f:7e:15: 32:4c:dd:69:5e:3a:b6:af:5e:23:09:1b:f7:06:77:03: 63:32:89:e6:48:85:16:5e:0e:bc:d8:f6:4c:83:01:d8: fd:7e:1c:11:71:9b:19:f1:d8:e0:d6:df:4d:95:41:76: da:19:e7:ac:c7:5c:8c:df:68:25:84:33:ca:b6:c2:2e: ea:b8:26:8c:27:7d:28:87:fd:60:13:04:b5:31:9e:85: d9:f3:d2:58:4e:98:15:7d:a8:60:3b:f4:35:cd:53:85: 1b:7f:c8:5f:22:2e:4a:e4:8d:ba:11:5e:dc:2d:f8:99: 5a:14:92:73:de:95:f0:dd:7c:11:07:36:40:5b:c4:b9: 22:fb:b7:02:40:13:73:b0:86:5e:c4:50:a4:61:d8:0c: 42:c3:5a:6c:c8:a3:a2:0a:65:34:bb:96:d9:e9:f6:c5: 0c:ce:33:48:55:88:73:0f:98:4a:9d:b6:5f:95:5e:1e: ab:17:05:d1:c9:e6:e3:0e:25:bd:60:d7:c1:c3:84:c7: 8b:70:4a:0b:e9:da:88:e3:0d:a7:20:39:0e:99:42:84: 16:2a:2c:30:4f:ec:19:a6:9d:e3:b5:a5:e6:09:df:f4: b3:9f:a8:ff:bb:f5:a5:25:46:7f:e7:34:64:fc:42:b1 Fingerprint (SHA-256): 13:94:67:51:FD:5B:AB:FE:FD:EE:17:77:BF:A8:B4:86:BB:DA:D3:3E:A7:3B:09:E6:EE:B7:09:4F:99:F8:13:5F Fingerprint (SHA1): F1:FB:37:10:05:34:FB:6F:3F:6A:51:1E:C1:89:84:86:C9:0C:3C:AA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1145: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221695 (0x374447bf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Tue Sep 27 22:23:04 2022 Not After : Tue Sep 27 22:23:04 2072 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:2f:51:4a:eb:5d:f4:45:73:c7:78:1e:56:62:42:fe: 10:8d:36:c3:98:6f:f6:2d:54:ff:b4:09:53:7e:54:30: 9d:b6:e1:30:1b:73:58:fa:ab:7d:5c:fd:be:1e:62:f3: f9:b8:4b:ab:d3:8f:27:21:30:32:79:cf:04:40:53:4b: 6c:76:97:3d:e9:00:8d:9d:32:81:d6:34:08:51:e5:c0: ee:97:01:81:95:30:d5:ef:09:9a:8b:08:e7:80:36:f6: 70:47:38:fa:14:78:77:0a:51:46:49:f2:02:77:93:dd: a9:b5:da:34:7b:8f:2b:ba:d6:60:0e:b3:ac:0b:f6:df: 6e:30:0e:e6:a3:50:64:e1:2b:d0:32:38:09:fc:93:72: af:e5:f6:9d:83:97:0e:c6:b0:d7:69:71:b6:4a:0a:e4: 1f:6b:8a:48:76:3a:55:b4:00:f4:a3:62:d6:52:9c:4e: 15:2f:9b:42:a1:aa:61:e6:51:3d:cf:85:cf:3b:bd:57: 01:ba:e6:b2:8d:da:73:29:1f:e2:d2:bf:4f:2b:af:87: 90:57:fc:ce:96:44:6b:81:9d:15:73:89:ea:2c:08:f2: e9:b9:50:b8:89:97:c9:6e:fc:13:95:53:7f:a7:62:cd: 6f:4b:4f:04:b8:83:0a:95:b3:42:45:42:50:ec:16:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:56:c1:22:03:36:60:bb:8e:5a:4c:ea:6e:61:31:2f: 5c:d5:97:b5:f2:ee:78:ca:88:f6:b1:ca:fd:40:11:93: 95:34:09:2c:b0:9e:91:44:59:97:ae:d0:6e:b0:c7:e9: 22:1b:6e:12:f1:91:5b:2b:69:d2:d0:cd:e3:e2:50:ac: 04:64:6d:fa:35:2d:38:9b:e8:b4:72:17:13:c8:dc:bd: d3:7e:7e:1a:09:f6:ae:94:52:7d:4e:64:8d:c6:a5:27: 1d:00:60:e8:8b:b9:fa:f2:76:ad:d2:28:66:1e:73:18: db:b7:2a:2b:0a:83:d8:a4:e4:21:64:9c:ad:b3:92:55: df:db:b5:c3:7d:5d:8f:bf:aa:f0:6b:96:4c:b2:a4:cc: 4c:db:c7:04:9c:e3:86:c3:ce:80:ed:0f:6a:7e:00:15: e0:d1:ea:ac:d4:35:c5:b4:79:6c:d8:cd:39:ab:37:df: 37:64:71:94:93:01:a7:58:ed:2e:b7:3b:fd:d2:ae:5a: 97:cf:ca:b9:9d:d9:a3:96:c7:b4:bc:08:54:dd:66:b7: 66:e7:e4:f6:24:a0:c8:0c:41:03:b1:ee:53:3f:e9:46: e8:16:9a:e4:44:ec:4d:fa:e2:ab:fd:09:44:35:c6:2d: 44:60:63:71:aa:9e:91:50:7f:05:3e:20:80:4b:c0:e2 Fingerprint (SHA-256): 37:36:8C:FD:DA:45:27:CA:C6:21:E3:27:38:D2:E9:E9:20:4A:51:8C:11:93:83:6E:CC:A2:32:70:EE:9E:B7:73 Fingerprint (SHA1): D6:0F:FD:18:30:36:26:54:D3:14:BD:35:37:62:20:1A:3F:CB:73:73 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1146: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221696 (0x374447c0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Tue Sep 27 22:23:06 2022 Not After : Tue Sep 27 22:23:06 2072 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:50:2b:da:a9:91:c6:1b:77:21:4a:95:9f:e6:6f:a7: 2b:35:a6:04:6f:36:bc:84:b3:13:ab:79:a4:48:f9:f8: d5:bc:6b:15:95:cd:c4:9d:73:5d:e6:fa:1d:77:ad:76: b2:21:a9:d6:4b:d6:76:b5:13:5d:fe:ba:3e:67:08:c3: 85:b7:f2:ed:05:f3:82:01:84:55:50:0d:6d:71:34:a2: 67:45:a8:75:4c:cc:9e:33:52:0b:c2:33:85:b8:54:b9: 16:19:02:49:66:40:a1:af:fd:50:4b:15:64:d2:e7:a1: 71:cf:2a:6f:31:9f:f6:1a:e1:cf:e1:6b:98:95:d4:e2: 61:d4:7f:3a:ec:88:9f:22:91:59:b4:48:3f:74:37:de: 75:b8:c4:5a:54:ea:dc:86:f0:57:b4:22:bb:b6:08:88: a7:b8:23:45:6a:1c:4d:fe:fb:b9:c9:71:f0:83:98:a4: 9b:71:14:9f:6e:5a:bb:fb:48:c3:16:b0:5e:4f:8f:af: 16:ea:dd:5a:58:dc:09:92:4d:ca:6b:3d:84:d3:bf:8b: 64:27:f7:bc:08:2e:ee:58:45:a8:0e:12:3a:66:64:c4: 87:a4:32:00:29:23:eb:9a:c0:06:37:f5:67:52:cc:b1: 8a:4f:85:6c:7b:35:78:c4:52:83:ee:91:e6:40:ec:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:5c:81:ff:d9:3d:56:ae:3f:f9:42:a1:55:c4:21:b9: 8f:13:be:06:e6:87:89:fb:76:bd:9e:0f:86:e5:5b:fa: e4:b3:01:87:ca:0a:00:9c:b3:fc:d7:3c:9e:d6:53:b9: 4c:f1:01:6b:7c:ca:da:58:26:63:80:a9:d2:24:7b:fe: 5e:f2:eb:b2:5e:e3:5a:59:fa:9a:59:7a:2b:71:6a:25: cc:68:e8:24:a3:af:5b:00:d2:76:33:45:c2:67:70:61: 33:0f:11:b9:7a:33:ad:f6:26:f5:c1:4c:18:65:09:2c: 00:77:5f:d5:b5:d4:95:65:68:7f:9e:cb:3d:bd:77:4c: 9e:50:31:42:83:4e:ea:74:60:23:35:f3:29:e4:6d:7f: 09:78:60:2f:8a:96:f3:fa:27:84:c0:32:98:14:31:0a: 83:68:cc:6c:02:70:51:95:00:ff:d3:70:87:0f:e8:86: df:b8:88:e1:18:6b:19:aa:68:9f:37:55:0a:7d:20:04: d9:2c:34:18:c7:5e:c3:bf:43:f6:89:0c:88:f0:21:fb: e1:51:3b:79:4e:46:40:59:b6:ea:7a:d6:7a:1d:a8:a1: 54:c7:c8:26:cd:7f:c4:b5:7c:b2:18:4a:e7:1c:4e:fc: b5:4a:e6:c5:0e:80:0f:56:1e:2d:fc:eb:1a:4d:37:c9 Fingerprint (SHA-256): 0B:DB:B4:60:48:60:32:3B:B7:53:62:33:E4:0E:04:EC:C5:E2:8D:78:38:8E:E7:C3:78:FE:46:0E:50:33:C6:A9 Fingerprint (SHA1): 14:1F:D8:7A:30:F2:D9:F4:34:7C:20:3C:2E:0C:3B:D7:77:E6:03:BA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1147: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221697 (0x374447c1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Tue Sep 27 22:23:08 2022 Not After : Tue Sep 27 22:23:08 2072 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:53:0d:fd:c1:ca:3b:6a:78:b9:a4:aa:50:73:23:90: 25:d7:79:21:8a:b8:76:7c:c3:da:39:42:9f:57:d0:6e: 96:fa:4c:38:c5:4b:48:57:1b:10:83:4b:16:a5:57:d7: 16:00:56:82:3c:2f:e3:35:05:a1:f2:1a:52:fb:a7:3c: f9:14:8e:97:cf:8e:3b:56:a1:64:8e:87:bb:dd:f2:dd: 43:52:05:32:86:5b:ba:02:d9:4c:7a:2d:ed:b6:76:26: 63:e8:43:4f:47:13:50:29:28:92:ce:91:da:36:9f:53: c2:13:6c:04:d7:5c:59:37:11:73:45:d4:af:ac:00:88: 60:fd:d0:97:e0:96:8d:79:71:47:81:76:cf:79:40:d0: 0a:cb:38:9b:33:8e:5a:46:f3:78:ec:80:f4:f3:65:bb: 70:10:fb:b1:86:2d:08:53:fc:c9:56:fa:cd:37:8c:29: fd:45:90:31:4a:bf:70:fe:5d:0e:c2:c8:4b:f9:6a:69: ff:a9:05:c7:d4:0f:8a:5d:ed:a0:43:8d:0d:6f:75:19: 54:6d:f8:41:aa:0d:2a:df:bc:3c:50:bd:40:e6:20:bf: 7f:9f:49:62:7f:3f:c7:fc:8f:a5:76:8f:0a:5f:d9:00: 41:12:4a:2f:d2:3e:1d:1c:c3:9c:96:2d:94:db:dd:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:5c:b7:15:c5:ef:a8:4f:73:a0:38:b8:f5:9f:a2:3a: e1:28:8d:a9:ba:9d:96:f8:70:08:7a:54:23:39:1d:e6: e6:46:ff:bf:64:aa:79:4d:87:38:ec:f6:d6:96:dc:c1: 4b:0b:99:33:c5:b4:98:8c:c1:50:7d:68:45:e5:cc:99: df:79:8e:f0:59:d4:82:8f:bb:65:c4:58:cc:0a:c1:23: ac:ee:59:83:06:60:ed:f3:60:46:a8:af:3a:32:42:39: 0c:ce:f9:c6:9d:3b:d1:60:18:b1:ca:49:75:ea:a2:3f: 1b:2e:2b:4a:08:dc:39:db:46:ea:ba:83:35:68:e2:bb: f6:63:20:07:74:12:8f:9b:07:95:fb:28:43:16:cc:4f: 50:22:0f:09:89:1c:4e:d1:46:73:5e:04:51:9c:c9:64: 16:92:15:5a:19:39:3b:b6:06:02:45:33:98:c0:57:c1: 32:26:7b:b1:5a:19:76:d2:03:26:aa:2c:57:44:38:99: 51:33:55:b9:b4:e4:2e:5e:c8:4c:3c:78:c7:a0:b9:cf: 6c:d6:1d:ee:c5:49:ce:f7:10:d2:15:62:61:5a:ea:cb: 3f:c0:f1:01:45:ca:39:93:70:84:d6:d4:d5:14:1a:b9: e7:e7:92:80:b4:90:a1:40:a9:45:df:53:e3:62:e3:4c Fingerprint (SHA-256): 25:84:6D:44:58:93:3A:75:E6:14:73:B4:19:A0:26:D6:12:DD:BC:A6:DB:8A:66:5F:92:9B:85:52:B6:01:0C:79 Fingerprint (SHA1): 7A:3F:E8:1F:7F:69:46:B0:E8:4D:21:4A:3E:E5:9C:7A:AF:07:CB:EF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1148: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221698 (0x374447c2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Tue Sep 27 22:23:09 2022 Not After : Tue Sep 27 22:23:09 2072 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:86:9f:b0:ea:c0:60:de:ce:82:ea:36:4b:a5:94:ea: 0d:6a:d6:80:76:6b:3f:63:0f:8e:15:ae:67:b2:cf:f6: 05:f6:97:cf:2c:4c:25:af:c3:4c:ba:1c:6d:34:ef:21: d2:90:bf:06:56:5b:63:1f:14:d2:5e:af:29:e6:74:3a: b8:9f:f8:e9:7d:b4:60:6b:a2:27:8f:56:92:2c:1d:ec: 5e:8a:a8:2e:57:49:ee:34:24:a1:61:e2:4a:e3:f4:5b: 71:be:8c:8f:4e:07:b6:7b:00:0a:71:ff:dd:4d:ab:b6: 39:26:a7:e8:1b:89:b4:42:aa:4e:f5:dd:e6:71:98:79: 85:ea:30:e9:21:45:3e:13:ae:a0:4a:93:36:b8:65:aa: d4:6a:a1:b9:63:e5:8e:2f:b0:ae:97:ab:d3:36:0a:de: ce:ed:6e:f8:34:5f:a1:ad:90:4a:17:53:70:c7:85:be: ad:da:2e:f4:56:4b:7a:d6:d2:14:c2:39:d0:b1:e5:8e: da:81:a0:a0:0e:38:92:f7:48:d1:35:ca:04:4c:ba:47: 33:f6:89:41:36:ca:9e:56:85:54:9e:d7:6f:4c:40:de: 97:cc:ae:d5:77:96:2e:fa:73:1f:1d:ba:d1:43:7a:f7: bc:db:fa:c4:da:16:25:a2:6b:db:a7:da:da:e8:bf:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9b:6a:85:9f:88:d4:ff:e4:d4:28:f0:e0:88:c0:c4:5e: c5:80:1a:be:b2:d1:76:32:1e:8d:fa:3b:33:6b:3a:6c: ea:f0:fa:1e:6b:ff:ad:bd:74:1e:ac:0d:f0:10:eb:0a: 11:fb:89:6a:41:c1:79:70:7a:55:ee:bf:85:63:ce:c0: f1:22:14:94:e8:34:bc:b3:be:50:1e:6f:a6:d1:9f:da: 8f:8a:4e:db:6f:bb:18:23:2c:9d:46:10:49:84:37:67: 58:be:cf:03:9e:b1:3c:01:f3:08:9b:65:2c:b8:56:db: ec:7d:33:6d:88:16:71:f7:b9:85:fa:0e:cf:d9:c9:13: c0:64:af:10:71:58:83:ab:2b:63:3c:2b:93:53:2a:ea: bf:5e:a3:75:fb:dc:cb:86:8b:25:5f:1e:27:4c:7c:fe: a2:aa:34:f4:53:c8:95:b1:6d:05:ea:ee:d3:d9:d4:0d: af:2f:9d:66:ca:b7:6e:7a:1a:84:a6:37:c0:c7:47:ee: a1:68:d4:77:bb:66:55:cd:0b:28:75:0c:9d:5b:f1:1c: b8:4b:da:5c:1c:6a:e0:64:f2:df:0f:05:a8:cc:2a:39: c5:02:bf:27:ae:3d:c3:84:44:c8:59:93:5a:97:40:db: f3:f0:dc:5b:14:5d:d0:63:04:96:16:f7:35:6a:81:96 Fingerprint (SHA-256): E2:3B:C7:72:0C:40:C1:06:6D:47:86:CA:F8:29:8C:15:39:8F:8B:45:FF:00:A0:06:A1:62:10:30:FA:38:7A:65 Fingerprint (SHA1): C6:3D:DC:2E:1B:FA:59:B9:FC:E4:2C:61:A7:A8:E8:06:D7:4F:42:91 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1149: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221699 (0x374447c3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Tue Sep 27 22:23:10 2022 Not After : Tue Sep 27 22:23:10 2072 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:c7:69:ce:6a:3c:35:03:b0:52:8c:be:1d:44:1c:c9: ee:b7:74:43:0e:57:25:d5:73:1c:3f:20:3f:a0:8f:bb: ee:bc:6c:40:d5:73:01:c0:72:15:1d:e3:3e:88:83:ae: 73:b6:cc:d9:a7:cd:2e:a7:49:5f:cd:34:6f:57:4b:c0: 59:2b:8b:3f:2b:82:a1:17:99:c4:f0:bf:fb:ce:20:32: 66:c0:7d:50:fc:4b:3b:7c:3f:23:6f:ee:f5:23:2c:cd: e2:99:6f:6c:95:f8:de:e3:52:94:5e:1c:97:6a:6e:da: ee:42:08:f5:8a:a6:d5:a2:15:d0:1d:07:cd:8c:be:bc: 9c:34:cb:25:27:63:94:05:51:2c:5c:dc:0d:9f:17:4d: f2:5f:27:8e:e3:6d:41:6b:a0:94:e9:95:a1:ee:15:1b: 45:a9:d1:0e:65:83:6f:ae:79:54:22:71:4c:fd:3d:5d: 7e:ba:6c:21:6f:f4:df:65:0c:e7:3b:ee:c7:e9:11:f5: 1d:27:a1:fc:e1:46:24:5a:c6:67:b4:f6:bc:27:7e:b6: f8:4b:c0:81:2f:97:bd:5f:00:ee:1f:ee:4b:2d:01:12: 72:93:44:98:b7:eb:03:d4:e1:88:2c:38:47:90:a5:8d: 45:03:51:7d:ba:d8:b0:91:58:ec:e4:b3:9f:c5:83:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:06:e1:d8:51:2e:1f:de:c6:ac:48:03:6c:17:0d:e8: de:2b:13:c2:e4:a7:1b:7c:b2:3b:2e:90:34:1a:99:a3: 6d:7f:09:5d:74:59:c8:60:9d:31:b1:70:0c:a6:6a:dd: 1a:0f:f5:55:eb:39:9b:74:34:bf:e2:9e:04:e5:6b:e1: cd:b1:d2:20:f4:de:8a:d3:9e:42:26:f3:43:b0:ca:09: 47:e2:a3:2b:a1:e0:12:0f:ce:a2:3a:9c:e3:81:5c:80: 73:43:cb:67:e1:9d:68:44:37:03:fe:0c:80:3b:02:f0: eb:a1:85:c7:b3:2f:bc:fd:03:7e:f5:3e:27:07:84:68: 64:26:af:57:fa:38:a9:3d:26:61:38:0a:4b:78:47:73: 95:50:8c:b5:91:fc:07:83:e8:c8:d2:18:55:5f:0d:73: 8f:0e:f1:72:2e:20:f2:6a:a3:a2:17:f2:71:d4:48:c4: 35:02:58:57:23:bc:61:12:32:a5:30:c9:13:b2:20:f7: 65:81:7a:4d:36:05:d4:10:67:0b:0d:6b:4d:c2:a8:44: 3d:0b:dc:37:ff:d7:ae:29:6d:3a:ab:5f:8f:8e:5b:a5: f7:d1:9f:a4:d0:cc:1d:09:ee:34:b5:05:b0:91:a4:1a: 7b:f1:86:8f:86:41:70:cc:46:57:b4:3d:b2:72:a4:4d Fingerprint (SHA-256): 1E:2A:98:3F:6E:3A:85:B8:64:E3:8D:18:82:58:F7:FA:5B:E3:34:6C:9B:14:37:19:10:0E:DE:85:FF:7F:13:5C Fingerprint (SHA1): 67:0D:C3:A3:03:56:E4:CD:49:DF:3B:00:BF:79:36:11:E6:D1:49:DD Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1150: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221700 (0x374447c4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Tue Sep 27 22:23:11 2022 Not After : Tue Sep 27 22:23:11 2072 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:f9:b7:72:eb:d2:53:c4:07:ae:b9:8e:f7:58:b0:4a: 41:5c:a2:47:11:47:b5:77:ac:ed:72:0d:87:98:e7:3d: 7f:35:79:bc:2d:9a:34:9d:e4:41:79:e7:53:fa:10:fe: f9:18:5e:19:42:3e:e1:b9:fd:93:0a:42:4a:5d:b5:40: f3:4e:21:60:eb:99:91:b5:1c:c4:8e:ee:ec:f9:26:93: 54:fb:9a:66:66:18:ba:40:54:01:01:9c:8b:39:a7:45: 6f:63:48:71:ff:ad:62:d1:5b:04:85:ce:b2:01:40:63: 4b:82:02:67:df:f1:be:f5:64:3c:32:52:58:45:7e:3b: 73:ac:85:f7:e8:05:43:73:a0:36:a5:4a:62:24:6f:a7: a1:bd:82:b0:51:40:0b:6c:dc:84:e1:f5:d4:98:1f:50: 7a:71:b1:4e:4a:e5:ac:7d:fa:e3:b2:fc:8a:15:a4:25: 4d:bb:18:8c:fe:ff:e8:60:da:bb:8c:66:98:fd:4d:5a: 8d:55:ec:87:36:dc:f1:f5:ae:c2:06:4e:ad:d8:41:3f: 8c:07:22:69:93:57:2a:9b:b6:ec:d4:bc:d2:56:82:a5: 62:50:4e:57:09:bb:cc:e4:d7:7e:63:2a:48:3d:01:30: 7b:6b:64:b8:88:5c:50:b5:70:8c:9f:97:66:d1:e2:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:68:06:a1:29:bd:71:72:90:94:57:33:6c:ae:83:4e: 0e:d7:a0:c6:c5:55:37:60:09:d7:93:08:1a:8e:41:e8: 06:6b:34:50:de:60:d5:07:fc:02:c2:b2:a8:7f:4a:57: fa:25:b1:6c:de:1a:62:35:5d:24:13:81:eb:fb:f6:e0: 6f:96:22:f3:84:1a:08:0f:af:d4:d2:31:81:00:77:4e: c8:e1:e2:61:8d:ba:24:e4:ed:20:21:e7:fe:10:12:12: ce:de:df:93:67:87:3c:7e:94:5b:75:b2:46:97:39:c4: 21:1b:8d:33:dd:1a:a8:31:38:b4:4d:1c:77:fd:92:be: 4c:54:1f:61:50:69:75:b9:e5:96:0d:7e:e2:bc:00:05: 10:47:73:4c:ee:10:cc:3a:bf:53:c9:74:cc:97:90:11: 5e:6d:bc:7e:41:0e:f8:69:32:29:41:78:6d:9e:5a:51: bb:3f:48:6c:26:bf:c2:7c:35:68:16:dc:7d:3d:73:6f: eb:1b:24:9b:33:ed:69:44:16:2c:35:43:83:78:a0:2c: 2a:34:68:ec:a8:b7:ff:26:8f:21:17:ec:61:48:ab:ee: e7:fe:ef:ec:46:f1:8b:65:06:a4:9e:6d:4c:07:23:b8: a1:86:e0:50:43:a4:a2:bd:e7:38:c9:7c:a9:17:1b:33 Fingerprint (SHA-256): 45:5A:E4:10:9A:0D:55:36:FA:3F:78:4C:02:95:06:FD:B4:92:EB:53:23:0B:70:D8:F8:A5:63:9B:7D:B5:40:E9 Fingerprint (SHA1): 74:53:AE:31:3A:96:46:E9:DE:25:2F:A4:CF:E8:4D:30:E0:66:12:F6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1151: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1152: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221715 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1153: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1154: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1155: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1156: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927221716 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1157: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1158: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1159: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1160: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927221717 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1161: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1162: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1163: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1164: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 927221718 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1165: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1166: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1167: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221715 (0x374447d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:23:32 2022 Not After : Tue Sep 27 22:23:32 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:89:9e:5e:c7:c7:a3:83:9b:7a:90:06:64:c2:91:71: 9b:d0:ae:8e:38:8b:db:d7:07:03:c3:69:73:37:a0:0d: b2:8e:7e:25:7a:f5:17:1e:7d:f1:3d:1b:d4:37:e9:9c: 23:4f:1d:e5:e6:07:5d:a1:50:05:aa:0f:2d:10:d7:11: 50:8d:08:59:d4:2a:3d:40:53:6d:81:72:b0:49:e9:ff: 21:63:7e:06:f3:86:9d:5e:b6:aa:79:2a:6d:b6:13:c9: e5:d1:6d:c9:c8:de:fa:4a:25:08:73:d6:42:cb:ea:8f: 76:e5:92:26:e0:83:98:fd:13:76:e2:23:40:f4:6b:4c: 34:1b:78:a4:6f:fe:0e:73:bb:ab:27:9a:79:35:13:b5: 61:b5:2c:2e:76:16:eb:b6:a9:11:8d:1c:0d:ef:56:53: 82:67:c2:9c:31:c2:d0:03:8d:bb:9a:d7:66:1a:f4:5f: c8:23:5e:89:54:0f:c1:39:dd:76:6a:41:5d:06:1f:e0: 70:6d:90:29:72:72:90:70:90:05:e1:41:5a:4d:b9:ef: a9:81:15:bf:17:f8:61:4d:7a:69:dd:54:a4:2c:c5:bf: 1a:44:0d:a3:ed:55:39:41:22:8e:b0:78:2f:7d:b1:95: 24:a8:63:90:80:ab:27:b7:c4:b6:64:3a:d5:33:e4:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:b2:09:96:1a:03:08:36:ec:b4:17:7e:30:05:07:b0: be:4a:79:ff:ea:06:c3:12:cd:c2:82:4f:f6:33:44:95: c8:fb:34:3b:3c:dc:76:d2:d3:4c:2d:43:b3:cf:fc:2e: 8f:7a:20:6b:b4:38:9f:44:c2:70:36:43:c5:db:85:8f: 8f:8f:e3:26:f9:fd:d7:b9:96:92:7c:15:48:cd:48:78: 47:02:47:95:13:6f:2c:aa:a4:8a:58:62:68:ff:4f:1b: d5:ef:f5:d6:5b:97:df:88:34:96:f4:e0:e7:18:b3:c3: ae:bd:90:54:1b:fa:75:bb:ac:9b:6d:36:dd:b4:ee:6a: d1:bd:9a:e9:6c:38:f3:c3:f2:53:51:32:c6:b9:c3:c3: 8c:7c:eb:b3:7d:ee:45:ea:36:f0:81:09:73:c3:3d:a0: f3:92:b5:3c:80:46:6b:ef:03:23:4b:67:ea:d2:62:a4: 99:e7:b0:ee:76:c4:65:1d:07:67:50:37:d9:a6:c4:0d: 39:97:f0:c9:25:aa:08:86:ea:69:6a:a3:9a:97:4e:ef: fd:c3:52:ef:46:f9:74:87:8e:e8:26:b8:24:b5:4d:c6: f2:a6:e2:98:78:ad:d6:25:f3:3a:19:34:a9:ce:70:5f: 78:2c:2f:ac:49:7a:16:2d:cb:0a:1a:dc:a7:33:31:03 Fingerprint (SHA-256): 83:DB:8E:D9:B2:28:12:03:61:14:37:3E:CE:A4:E1:A7:23:2F:0E:75:57:DF:62:DC:6F:AD:26:03:95:58:3A:5D Fingerprint (SHA1): 75:13:54:A2:88:16:BA:31:24:6E:9F:1A:3F:70:19:57:A6:7D:97:FC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1168: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1169: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221716 (0x374447d4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:23:34 2022 Not After : Mon Sep 27 22:23:34 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:63:04:ed:9c:b4:cd:d1:56:5e:85:d7:de:f3:6c:81: e3:b3:ca:c1:c5:1a:58:d6:c6:0d:5f:8d:18:02:2f:45: 08:81:62:27:06:4d:3a:90:aa:33:11:b6:63:75:6d:67: 4b:d6:de:66:87:87:5e:a8:1b:12:25:7f:af:1e:f0:ae: 75:04:b2:e5:3b:ff:4b:4a:83:ac:00:c7:9e:74:af:82: 1f:7c:c1:a6:54:c4:26:b5:46:39:be:7a:f5:81:88:04: 04:64:e0:24:3b:31:da:cc:0e:63:49:d8:b5:4a:79:60: 40:b6:c0:62:9e:8a:60:e8:c9:77:74:08:18:d6:4b:63: 84:be:44:97:67:0a:56:ba:d1:e2:fe:f0:7a:fc:58:42: ec:2c:de:cb:41:5c:3e:d6:95:f1:00:06:26:e2:6c:b5: 80:71:21:ed:13:58:55:8b:86:dd:8d:9a:7f:44:10:56: 8c:a5:8e:82:ae:09:d8:61:3a:3a:d0:84:2d:7a:97:41: ae:19:fb:7a:fd:f1:9a:a8:a9:12:a9:df:c5:b8:fb:99: e5:60:b1:fa:b1:49:95:18:04:a8:a9:b7:af:06:3d:68: 65:96:ff:33:ff:5e:6a:e1:6e:6b:21:67:53:27:81:36: 5a:e4:98:8c:d2:54:20:de:0a:40:11:ce:08:c0:f4:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 02:41:f8:e5:e4:d8:c9:b4:f3:ff:07:23:d9:37:30:a7: ed:0a:30:18:04:83:41:2b:41:35:19:dd:5b:ed:9c:76: 12:5e:14:9b:9e:82:6a:c1:fe:19:4f:d0:99:e6:54:6a: 40:46:27:b7:30:8e:85:af:50:2a:ad:f2:49:ff:ea:da: 27:a0:66:54:e8:d1:39:05:01:0d:89:ff:1f:20:bc:7b: 8d:b9:d7:c9:70:6f:22:0b:27:1e:4e:cb:c2:12:46:fb: 43:10:92:0c:29:7f:7b:7e:30:d0:6d:a9:d3:8a:4b:7b: a3:fc:74:c4:44:c8:c0:67:4b:4b:7f:7c:26:53:fb:b0: 3e:c0:e6:76:b3:51:b8:e3:5e:c3:a2:97:39:2c:5b:b3: 37:cb:60:0f:c6:8c:70:20:83:67:38:01:4e:cf:20:1c: 6a:e9:e8:e3:98:bb:c9:b5:ba:67:8e:43:38:75:e2:e8: 9b:d9:12:c9:3d:96:b7:d5:69:66:88:e8:7e:dd:ff:f1: 73:b4:41:9b:60:d5:20:bc:c2:fe:5c:07:34:92:dd:cf: 48:cb:a4:a0:86:66:6b:19:0c:84:bc:76:2d:12:ea:cd: 04:cf:25:0a:76:5e:67:90:45:82:27:9f:24:be:db:7f: 06:2b:db:8b:12:ac:fa:4e:49:af:3e:83:59:76:41:db Fingerprint (SHA-256): C7:2C:0D:AE:B3:00:FA:D8:24:55:55:B2:54:FB:7F:3D:7D:73:72:22:30:E9:38:BF:A8:3E:5F:B9:35:88:F2:CA Fingerprint (SHA1): 48:F4:B4:E7:44:CD:18:C9:1A:61:46:67:97:21:FC:2E:50:43:16:47 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1170: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1171: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221717 (0x374447d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 22:23:35 2022 Not After : Mon Sep 27 22:23:35 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:e4:9b:27:e4:24:ec:25:e5:2b:e2:58:ef:9d:7a:f0: 44:da:e8:e2:b4:e0:72:14:9f:38:e2:e8:de:31:99:75: c1:53:a3:75:21:94:04:7f:c5:f7:74:f8:1e:bb:2a:52: 45:e7:db:cc:50:d0:39:75:5f:e5:f7:f1:e0:ae:b8:80: 39:79:69:5a:d7:54:1e:25:ff:9e:c2:19:1a:52:5e:90: e6:ba:61:f2:10:f0:af:f8:cb:f9:4d:e4:cd:ff:3d:8f: 78:1c:23:0e:8b:e7:1d:81:1a:4d:e1:12:6d:81:e7:25: 55:8c:cf:1e:0b:9d:af:d5:40:d7:8b:f1:a4:f4:d6:b1: 3a:61:41:d0:87:c9:55:b1:39:65:d4:a0:63:35:c4:6a: 73:25:19:22:86:1e:fe:43:74:65:95:ab:4a:c3:21:b1: f1:d8:c2:37:bd:56:3c:46:ce:e7:70:ff:ff:bd:f3:74: fd:c6:15:82:af:48:a5:1f:60:7f:37:fd:35:72:ca:c4: 3d:9c:25:43:41:92:43:e8:fa:8e:f2:48:89:e6:75:f7: 54:46:fc:a1:b9:ed:c1:70:bf:09:cc:3e:b4:d1:91:63: 82:41:47:48:c3:e2:87:72:85:41:9e:b1:7e:91:41:62: b4:83:1d:50:f0:d7:43:84:68:5b:5c:ae:38:50:c8:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 02:ed:9a:4d:43:30:a6:c0:8f:6d:b3:f5:a9:47:38:e8: f5:44:4b:b8:16:ae:46:92:ed:00:48:a4:2d:9c:5a:a8: e4:41:3b:20:c3:f3:bd:85:b3:44:77:36:65:6a:72:6a: 93:c2:ca:5d:4c:4f:43:e7:fc:25:44:97:3f:7f:29:a0: 2b:62:c0:b9:32:d3:98:c0:17:3b:5e:20:cb:da:c6:93: e3:9e:77:ab:02:af:b8:1e:f3:55:5d:7b:52:9c:f0:82: 22:52:31:8d:0d:a2:19:1a:da:31:51:e0:22:26:7f:31: 84:02:c1:d8:ec:d3:66:8a:0e:d3:63:c2:e8:23:44:71: e3:06:a3:d0:75:5d:c8:00:8c:6a:f3:15:0d:4c:64:ea: 2b:6b:a2:86:b8:0e:4a:72:79:47:5d:01:ae:4d:29:24: a2:c3:7b:ff:41:05:df:31:71:20:bc:b2:b3:cb:ae:33: 4c:85:2f:e0:3c:22:c4:c6:f0:3c:e8:1f:a3:cf:06:af: 58:65:88:5d:cd:63:6a:60:38:8d:3d:22:44:85:bd:af: 40:9d:67:54:9a:69:0f:a5:16:52:e9:ac:4b:a2:09:01: 54:43:f3:3d:ec:62:17:ba:c4:23:b6:02:90:ef:97:74: e1:9a:77:45:5f:be:8d:41:49:7d:05:a7:c3:1f:18:72 Fingerprint (SHA-256): B5:EF:AE:D9:8C:5C:CA:32:03:D2:04:A3:18:C6:A7:5B:2C:60:9A:F1:61:07:EB:85:2D:0D:88:54:82:D0:7E:0B Fingerprint (SHA1): C0:66:8A:06:3B:18:DD:ED:4C:2E:D8:A0:6D:BF:C5:14:74:73:AA:3A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1172: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1173: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1174: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1175: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1176: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221715 (0x374447d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:23:32 2022 Not After : Tue Sep 27 22:23:32 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:89:9e:5e:c7:c7:a3:83:9b:7a:90:06:64:c2:91:71: 9b:d0:ae:8e:38:8b:db:d7:07:03:c3:69:73:37:a0:0d: b2:8e:7e:25:7a:f5:17:1e:7d:f1:3d:1b:d4:37:e9:9c: 23:4f:1d:e5:e6:07:5d:a1:50:05:aa:0f:2d:10:d7:11: 50:8d:08:59:d4:2a:3d:40:53:6d:81:72:b0:49:e9:ff: 21:63:7e:06:f3:86:9d:5e:b6:aa:79:2a:6d:b6:13:c9: e5:d1:6d:c9:c8:de:fa:4a:25:08:73:d6:42:cb:ea:8f: 76:e5:92:26:e0:83:98:fd:13:76:e2:23:40:f4:6b:4c: 34:1b:78:a4:6f:fe:0e:73:bb:ab:27:9a:79:35:13:b5: 61:b5:2c:2e:76:16:eb:b6:a9:11:8d:1c:0d:ef:56:53: 82:67:c2:9c:31:c2:d0:03:8d:bb:9a:d7:66:1a:f4:5f: c8:23:5e:89:54:0f:c1:39:dd:76:6a:41:5d:06:1f:e0: 70:6d:90:29:72:72:90:70:90:05:e1:41:5a:4d:b9:ef: a9:81:15:bf:17:f8:61:4d:7a:69:dd:54:a4:2c:c5:bf: 1a:44:0d:a3:ed:55:39:41:22:8e:b0:78:2f:7d:b1:95: 24:a8:63:90:80:ab:27:b7:c4:b6:64:3a:d5:33:e4:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:b2:09:96:1a:03:08:36:ec:b4:17:7e:30:05:07:b0: be:4a:79:ff:ea:06:c3:12:cd:c2:82:4f:f6:33:44:95: c8:fb:34:3b:3c:dc:76:d2:d3:4c:2d:43:b3:cf:fc:2e: 8f:7a:20:6b:b4:38:9f:44:c2:70:36:43:c5:db:85:8f: 8f:8f:e3:26:f9:fd:d7:b9:96:92:7c:15:48:cd:48:78: 47:02:47:95:13:6f:2c:aa:a4:8a:58:62:68:ff:4f:1b: d5:ef:f5:d6:5b:97:df:88:34:96:f4:e0:e7:18:b3:c3: ae:bd:90:54:1b:fa:75:bb:ac:9b:6d:36:dd:b4:ee:6a: d1:bd:9a:e9:6c:38:f3:c3:f2:53:51:32:c6:b9:c3:c3: 8c:7c:eb:b3:7d:ee:45:ea:36:f0:81:09:73:c3:3d:a0: f3:92:b5:3c:80:46:6b:ef:03:23:4b:67:ea:d2:62:a4: 99:e7:b0:ee:76:c4:65:1d:07:67:50:37:d9:a6:c4:0d: 39:97:f0:c9:25:aa:08:86:ea:69:6a:a3:9a:97:4e:ef: fd:c3:52:ef:46:f9:74:87:8e:e8:26:b8:24:b5:4d:c6: f2:a6:e2:98:78:ad:d6:25:f3:3a:19:34:a9:ce:70:5f: 78:2c:2f:ac:49:7a:16:2d:cb:0a:1a:dc:a7:33:31:03 Fingerprint (SHA-256): 83:DB:8E:D9:B2:28:12:03:61:14:37:3E:CE:A4:E1:A7:23:2F:0E:75:57:DF:62:DC:6F:AD:26:03:95:58:3A:5D Fingerprint (SHA1): 75:13:54:A2:88:16:BA:31:24:6E:9F:1A:3F:70:19:57:A6:7D:97:FC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1177: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1178: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221716 (0x374447d4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:23:34 2022 Not After : Mon Sep 27 22:23:34 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:63:04:ed:9c:b4:cd:d1:56:5e:85:d7:de:f3:6c:81: e3:b3:ca:c1:c5:1a:58:d6:c6:0d:5f:8d:18:02:2f:45: 08:81:62:27:06:4d:3a:90:aa:33:11:b6:63:75:6d:67: 4b:d6:de:66:87:87:5e:a8:1b:12:25:7f:af:1e:f0:ae: 75:04:b2:e5:3b:ff:4b:4a:83:ac:00:c7:9e:74:af:82: 1f:7c:c1:a6:54:c4:26:b5:46:39:be:7a:f5:81:88:04: 04:64:e0:24:3b:31:da:cc:0e:63:49:d8:b5:4a:79:60: 40:b6:c0:62:9e:8a:60:e8:c9:77:74:08:18:d6:4b:63: 84:be:44:97:67:0a:56:ba:d1:e2:fe:f0:7a:fc:58:42: ec:2c:de:cb:41:5c:3e:d6:95:f1:00:06:26:e2:6c:b5: 80:71:21:ed:13:58:55:8b:86:dd:8d:9a:7f:44:10:56: 8c:a5:8e:82:ae:09:d8:61:3a:3a:d0:84:2d:7a:97:41: ae:19:fb:7a:fd:f1:9a:a8:a9:12:a9:df:c5:b8:fb:99: e5:60:b1:fa:b1:49:95:18:04:a8:a9:b7:af:06:3d:68: 65:96:ff:33:ff:5e:6a:e1:6e:6b:21:67:53:27:81:36: 5a:e4:98:8c:d2:54:20:de:0a:40:11:ce:08:c0:f4:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 02:41:f8:e5:e4:d8:c9:b4:f3:ff:07:23:d9:37:30:a7: ed:0a:30:18:04:83:41:2b:41:35:19:dd:5b:ed:9c:76: 12:5e:14:9b:9e:82:6a:c1:fe:19:4f:d0:99:e6:54:6a: 40:46:27:b7:30:8e:85:af:50:2a:ad:f2:49:ff:ea:da: 27:a0:66:54:e8:d1:39:05:01:0d:89:ff:1f:20:bc:7b: 8d:b9:d7:c9:70:6f:22:0b:27:1e:4e:cb:c2:12:46:fb: 43:10:92:0c:29:7f:7b:7e:30:d0:6d:a9:d3:8a:4b:7b: a3:fc:74:c4:44:c8:c0:67:4b:4b:7f:7c:26:53:fb:b0: 3e:c0:e6:76:b3:51:b8:e3:5e:c3:a2:97:39:2c:5b:b3: 37:cb:60:0f:c6:8c:70:20:83:67:38:01:4e:cf:20:1c: 6a:e9:e8:e3:98:bb:c9:b5:ba:67:8e:43:38:75:e2:e8: 9b:d9:12:c9:3d:96:b7:d5:69:66:88:e8:7e:dd:ff:f1: 73:b4:41:9b:60:d5:20:bc:c2:fe:5c:07:34:92:dd:cf: 48:cb:a4:a0:86:66:6b:19:0c:84:bc:76:2d:12:ea:cd: 04:cf:25:0a:76:5e:67:90:45:82:27:9f:24:be:db:7f: 06:2b:db:8b:12:ac:fa:4e:49:af:3e:83:59:76:41:db Fingerprint (SHA-256): C7:2C:0D:AE:B3:00:FA:D8:24:55:55:B2:54:FB:7F:3D:7D:73:72:22:30:E9:38:BF:A8:3E:5F:B9:35:88:F2:CA Fingerprint (SHA1): 48:F4:B4:E7:44:CD:18:C9:1A:61:46:67:97:21:FC:2E:50:43:16:47 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1179: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1180: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221717 (0x374447d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 22:23:35 2022 Not After : Mon Sep 27 22:23:35 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:e4:9b:27:e4:24:ec:25:e5:2b:e2:58:ef:9d:7a:f0: 44:da:e8:e2:b4:e0:72:14:9f:38:e2:e8:de:31:99:75: c1:53:a3:75:21:94:04:7f:c5:f7:74:f8:1e:bb:2a:52: 45:e7:db:cc:50:d0:39:75:5f:e5:f7:f1:e0:ae:b8:80: 39:79:69:5a:d7:54:1e:25:ff:9e:c2:19:1a:52:5e:90: e6:ba:61:f2:10:f0:af:f8:cb:f9:4d:e4:cd:ff:3d:8f: 78:1c:23:0e:8b:e7:1d:81:1a:4d:e1:12:6d:81:e7:25: 55:8c:cf:1e:0b:9d:af:d5:40:d7:8b:f1:a4:f4:d6:b1: 3a:61:41:d0:87:c9:55:b1:39:65:d4:a0:63:35:c4:6a: 73:25:19:22:86:1e:fe:43:74:65:95:ab:4a:c3:21:b1: f1:d8:c2:37:bd:56:3c:46:ce:e7:70:ff:ff:bd:f3:74: fd:c6:15:82:af:48:a5:1f:60:7f:37:fd:35:72:ca:c4: 3d:9c:25:43:41:92:43:e8:fa:8e:f2:48:89:e6:75:f7: 54:46:fc:a1:b9:ed:c1:70:bf:09:cc:3e:b4:d1:91:63: 82:41:47:48:c3:e2:87:72:85:41:9e:b1:7e:91:41:62: b4:83:1d:50:f0:d7:43:84:68:5b:5c:ae:38:50:c8:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 02:ed:9a:4d:43:30:a6:c0:8f:6d:b3:f5:a9:47:38:e8: f5:44:4b:b8:16:ae:46:92:ed:00:48:a4:2d:9c:5a:a8: e4:41:3b:20:c3:f3:bd:85:b3:44:77:36:65:6a:72:6a: 93:c2:ca:5d:4c:4f:43:e7:fc:25:44:97:3f:7f:29:a0: 2b:62:c0:b9:32:d3:98:c0:17:3b:5e:20:cb:da:c6:93: e3:9e:77:ab:02:af:b8:1e:f3:55:5d:7b:52:9c:f0:82: 22:52:31:8d:0d:a2:19:1a:da:31:51:e0:22:26:7f:31: 84:02:c1:d8:ec:d3:66:8a:0e:d3:63:c2:e8:23:44:71: e3:06:a3:d0:75:5d:c8:00:8c:6a:f3:15:0d:4c:64:ea: 2b:6b:a2:86:b8:0e:4a:72:79:47:5d:01:ae:4d:29:24: a2:c3:7b:ff:41:05:df:31:71:20:bc:b2:b3:cb:ae:33: 4c:85:2f:e0:3c:22:c4:c6:f0:3c:e8:1f:a3:cf:06:af: 58:65:88:5d:cd:63:6a:60:38:8d:3d:22:44:85:bd:af: 40:9d:67:54:9a:69:0f:a5:16:52:e9:ac:4b:a2:09:01: 54:43:f3:3d:ec:62:17:ba:c4:23:b6:02:90:ef:97:74: e1:9a:77:45:5f:be:8d:41:49:7d:05:a7:c3:1f:18:72 Fingerprint (SHA-256): B5:EF:AE:D9:8C:5C:CA:32:03:D2:04:A3:18:C6:A7:5B:2C:60:9A:F1:61:07:EB:85:2D:0D:88:54:82:D0:7E:0B Fingerprint (SHA1): C0:66:8A:06:3B:18:DD:ED:4C:2E:D8:A0:6D:BF:C5:14:74:73:AA:3A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1181: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1182: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1183: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221719 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1184: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1185: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1186: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1187: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927221720 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1188: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1189: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1190: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1191: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927221721 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1192: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1193: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1194: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1195: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 927221722 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1196: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1197: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1198: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1199: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 927221723 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1200: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1201: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1202: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221719 (0x374447d7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:23:42 2022 Not After : Tue Sep 27 22:23:42 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:58:a9:65:72:6f:3d:38:24:c2:99:b4:11:2d:38:6d: a9:58:8e:cb:7a:89:69:9b:40:4e:93:f6:8f:ce:20:ad: b9:80:be:06:a7:a1:c7:f5:dd:54:71:70:ca:0d:8b:ec: c7:1d:fd:2d:b2:35:6b:45:89:3e:71:97:41:63:85:e6: 05:78:4e:ff:a9:7f:9c:46:4a:c6:d0:be:de:30:ee:77: 6e:72:fb:eb:25:e6:da:3b:4a:18:50:c0:67:73:31:3e: c9:7e:10:e9:ed:9c:5e:f0:82:a6:93:e6:68:bb:4e:c0: cd:b7:5a:90:3d:a4:f9:d3:86:72:0e:ec:a9:c3:d4:de: 36:a2:96:51:48:ef:b1:35:83:21:8d:5e:88:a2:39:60: 80:30:62:cc:40:4a:c7:73:1d:0e:55:d0:e8:ee:68:d7: 12:a4:42:ee:28:79:be:66:1a:e5:b8:d4:fd:37:b6:78: 9a:21:7e:de:fb:9a:44:d6:03:b9:6d:65:28:71:d1:bf: 07:fe:00:8a:ed:9a:91:e8:29:4c:6e:98:9f:44:de:10: c7:32:30:05:61:2c:e1:2f:16:a2:2a:cd:ed:cb:fb:b7: 82:ba:d6:67:dd:80:1b:d8:5e:d8:06:df:3c:3b:03:53: 11:a1:cb:26:87:00:f8:cd:5c:5c:ef:c8:e9:e4:91:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:1a:f0:e1:f0:c5:ef:31:f7:b9:f7:bd:16:0d:3b:ab: 3e:ed:77:18:70:cc:f1:3b:5e:e0:27:8c:1e:78:5a:34: 39:2b:e7:39:e9:cd:cb:f9:15:c1:27:f4:3f:b1:aa:9f: b3:28:c6:de:2c:b8:dd:36:98:db:59:50:27:7d:e1:a9: a5:66:2d:9d:49:8f:2d:1b:47:7c:e0:ba:96:1b:2d:1d: 7a:f2:f5:ea:ee:1d:11:a1:49:2b:44:06:de:d0:f1:7f: a1:30:ef:da:76:c2:0b:1f:6b:a6:f7:02:03:13:a9:c9: 5e:1b:c1:37:77:15:06:dc:c1:2b:32:c8:c3:24:2e:35: 70:92:74:95:9f:f1:08:69:72:73:a8:7d:24:18:bd:67: 0c:f8:ec:c7:92:89:a6:89:78:65:a1:68:aa:31:5a:3c: 80:51:11:9a:bf:8f:2d:6e:6f:40:d3:f4:e8:ab:16:7f: af:e3:91:37:84:98:d8:97:e6:2a:a0:8e:62:44:59:7a: 9f:ce:ad:8d:d8:18:d7:10:d7:12:fd:60:b2:bb:c2:18: 9c:57:22:79:10:62:72:87:9e:6d:62:8f:3a:61:e3:8e: 62:0b:eb:c9:34:9a:c1:a7:f6:e6:e8:fc:d0:32:92:6e: 78:71:c4:2a:0c:41:4a:1d:fe:4e:bb:55:8a:2b:0c:e5 Fingerprint (SHA-256): 3C:C2:8B:89:E3:A0:15:1E:E8:28:A8:11:01:13:44:83:C0:34:F3:21:77:5E:7D:EA:CD:70:FF:30:AF:F2:61:B3 Fingerprint (SHA1): 5D:B5:19:88:CF:93:32:7C:F3:88:9C:B0:50:CC:7D:3A:DD:80:43:9A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1203: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1204: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221720 (0x374447d8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:23:44 2022 Not After : Mon Sep 27 22:23:44 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:69:c4:bb:06:b4:90:96:c7:fb:e5:2e:3b:b4:69:b1: b9:0f:f3:e5:1f:5f:2f:7d:34:2e:9e:80:6e:00:88:d6: 53:59:5f:69:09:5b:a1:8f:05:d6:2f:ad:f4:e0:39:13: 86:a5:2c:5e:ed:05:fd:ec:2c:2f:80:5c:86:10:e4:ec: 2d:d6:02:91:1f:28:54:94:85:87:b0:b9:4e:2f:63:4c: 71:ef:bd:2e:ec:d2:45:89:62:dc:5d:dc:7f:2d:7d:85: a8:28:02:be:8d:68:7b:86:a8:1c:8a:85:3a:bc:f5:41: d9:36:f7:e3:87:65:9d:89:28:21:30:fd:d1:08:13:dc: 07:cf:19:ef:fc:39:d6:18:8a:63:72:c1:f0:f8:15:d6: c5:8b:5d:4e:35:82:0d:6d:5b:a1:90:f9:e1:15:00:c4: 6c:b1:f1:cf:2b:76:fe:51:f7:a7:8f:54:d1:d5:a7:d0: da:aa:74:6e:37:fe:7c:63:93:90:7b:be:ce:c1:cd:c2: f1:e4:6b:6a:a4:b9:f4:29:0c:02:24:07:73:4d:52:0d: 78:3b:20:82:dd:03:aa:3c:fe:d0:94:e5:00:64:5d:f1: cd:98:fe:ca:25:29:66:53:7b:13:06:58:9c:20:77:63: f8:65:a2:fd:eb:3b:6a:f3:3a:d4:29:24:63:95:44:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e4:14:ae:15:f6:46:cc:a4:41:c3:99:60:a3:1a:c0:a1: e1:41:af:8d:e3:17:c4:56:84:3b:1f:f4:f4:d0:3c:c0: 94:cc:37:dc:48:f5:68:57:37:f9:c3:dd:16:12:b9:8a: c2:22:6f:db:cc:5c:fe:31:a6:c2:85:c5:2c:a7:60:78: 9a:43:6d:a9:b1:23:02:65:9e:0d:fc:38:f7:95:e9:43: 02:51:6c:6f:d5:a5:2f:44:2e:90:27:e0:10:69:47:dc: df:23:98:02:e1:53:b7:26:01:2d:25:6c:2f:18:80:b9: ae:10:64:9a:7e:c9:18:02:2b:ca:6e:2d:69:d8:ca:7d: 26:43:68:5f:70:54:21:a7:f1:7a:2d:45:3a:3b:c6:ab: af:0c:bb:ea:2b:5c:0e:d1:14:87:82:1f:ca:78:73:8b: 20:2b:df:3d:cf:48:21:d7:52:76:49:a7:60:c6:b1:f4: 78:50:27:cc:9f:34:f9:4a:4e:93:cb:35:fe:ef:08:da: 4f:1e:75:e7:ab:77:f1:3d:9e:ff:09:9d:8b:85:ee:fc: ac:09:16:95:1b:39:54:8e:2f:16:8f:95:86:40:e2:c9: 55:c8:a1:e3:1c:f0:d8:7f:17:16:66:92:aa:9e:1e:3c: 4a:d0:b9:1d:25:99:d3:eb:e2:a1:9c:8e:cc:95:26:b3 Fingerprint (SHA-256): 54:D5:D8:B2:1A:5C:C2:E3:09:D1:1C:88:06:22:6A:84:62:72:14:19:09:22:6E:43:75:08:95:AC:0D:28:7B:62 Fingerprint (SHA1): 0B:85:2C:BF:2B:3A:5F:89:B6:66:90:1C:BD:1C:B2:B1:36:AD:0A:73 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1205: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1206: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221721 (0x374447d9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 22:23:46 2022 Not After : Mon Sep 27 22:23:46 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:c7:52:bb:17:e3:88:9d:2c:23:05:8f:ee:5b:d2:ec: 9e:56:1d:c1:e4:7b:99:c2:56:04:8d:fb:bd:f3:f1:e6: ca:8c:a0:9d:f9:9a:e9:0a:d4:57:ee:84:e6:56:de:73: 96:1f:09:99:f3:35:f7:cd:ac:a1:e0:a3:72:04:79:78: c4:04:32:9b:2d:54:60:0f:68:83:5b:f7:fd:87:e3:de: 56:1f:aa:1b:e3:3d:bd:ff:ce:48:cb:50:5f:d7:09:d6: 27:47:b9:3d:d6:78:22:86:1e:50:d4:ea:87:1b:42:ac: e0:7f:26:08:d4:c5:76:95:7b:88:fb:6d:a6:b8:aa:25: 0a:f3:b0:c8:be:89:d0:d6:ce:71:ca:8e:fd:d8:5f:41: 55:42:a0:01:3d:4e:7a:9d:33:55:27:4a:e2:1a:7e:0c: 1e:7b:c1:5d:13:44:08:dd:8a:8c:a0:ca:93:8f:e9:4d: 5f:75:2b:fb:72:a2:a1:73:e4:c7:fb:60:d7:f5:98:f8: bc:e9:c2:92:44:2d:89:38:d2:78:a3:00:6a:a1:1b:ad: 37:10:98:04:1b:11:49:d4:f4:01:e4:cf:a2:c0:85:7e: 69:26:0f:f0:3e:21:a1:ad:92:c8:15:3c:5c:06:36:b6: 6a:74:a2:74:53:22:51:d6:89:df:45:3d:ec:71:ed:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8a:9a:b4:83:3c:cd:95:4a:5c:1e:34:b4:84:0a:98:d2: 5a:62:93:59:da:75:51:16:b4:b8:58:1b:e8:b8:ac:2f: 75:be:df:46:34:e0:26:ff:e7:07:71:d2:eb:a9:83:5a: e7:c3:8c:39:3f:fc:d2:66:cc:4b:ec:08:08:d3:00:8a: bc:f9:c2:7e:b5:d7:dc:2d:ef:4d:de:d6:7c:f9:81:08: dc:df:3d:97:62:3e:af:02:f0:1f:32:47:15:7b:6f:55: 45:2a:ee:b7:a9:16:ea:bd:f7:05:dc:4a:42:19:35:8a: 7b:4e:77:b0:63:39:6e:f4:71:b6:28:ef:b5:4b:33:4e: 51:88:c6:96:65:ca:b9:44:35:84:f4:22:cf:52:52:22: b4:39:43:b8:5f:84:43:dd:5e:cd:10:f4:64:8e:99:15: 57:27:df:36:93:50:55:80:b4:b8:30:52:5e:b7:3e:8e: 20:0a:d7:2f:8f:6a:bf:af:47:8a:cf:ea:32:09:d5:0d: fa:10:f4:e3:8f:b2:62:a7:9f:1d:15:69:3f:0a:f7:7e: f5:a3:3b:b9:fd:f2:94:02:68:59:bd:b8:8d:a3:3a:d0: 89:ca:a9:d3:3c:ed:3e:61:d2:9a:75:c3:73:61:2a:24: 60:fb:8f:b7:ba:4c:c5:5d:0a:c9:42:1c:60:a5:ac:fd Fingerprint (SHA-256): 0B:73:1F:AE:89:13:1F:E7:57:E5:86:D3:19:A1:94:0A:83:6E:EB:03:F6:9D:EE:4B:BD:03:6C:17:B0:25:1F:D0 Fingerprint (SHA1): 2B:E2:01:51:1F:DE:5B:6B:A4:08:CF:A5:7C:1D:9D:93:F5:22:33:AC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1207: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1208: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1209: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1210: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1211: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221719 (0x374447d7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:23:42 2022 Not After : Tue Sep 27 22:23:42 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:58:a9:65:72:6f:3d:38:24:c2:99:b4:11:2d:38:6d: a9:58:8e:cb:7a:89:69:9b:40:4e:93:f6:8f:ce:20:ad: b9:80:be:06:a7:a1:c7:f5:dd:54:71:70:ca:0d:8b:ec: c7:1d:fd:2d:b2:35:6b:45:89:3e:71:97:41:63:85:e6: 05:78:4e:ff:a9:7f:9c:46:4a:c6:d0:be:de:30:ee:77: 6e:72:fb:eb:25:e6:da:3b:4a:18:50:c0:67:73:31:3e: c9:7e:10:e9:ed:9c:5e:f0:82:a6:93:e6:68:bb:4e:c0: cd:b7:5a:90:3d:a4:f9:d3:86:72:0e:ec:a9:c3:d4:de: 36:a2:96:51:48:ef:b1:35:83:21:8d:5e:88:a2:39:60: 80:30:62:cc:40:4a:c7:73:1d:0e:55:d0:e8:ee:68:d7: 12:a4:42:ee:28:79:be:66:1a:e5:b8:d4:fd:37:b6:78: 9a:21:7e:de:fb:9a:44:d6:03:b9:6d:65:28:71:d1:bf: 07:fe:00:8a:ed:9a:91:e8:29:4c:6e:98:9f:44:de:10: c7:32:30:05:61:2c:e1:2f:16:a2:2a:cd:ed:cb:fb:b7: 82:ba:d6:67:dd:80:1b:d8:5e:d8:06:df:3c:3b:03:53: 11:a1:cb:26:87:00:f8:cd:5c:5c:ef:c8:e9:e4:91:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:1a:f0:e1:f0:c5:ef:31:f7:b9:f7:bd:16:0d:3b:ab: 3e:ed:77:18:70:cc:f1:3b:5e:e0:27:8c:1e:78:5a:34: 39:2b:e7:39:e9:cd:cb:f9:15:c1:27:f4:3f:b1:aa:9f: b3:28:c6:de:2c:b8:dd:36:98:db:59:50:27:7d:e1:a9: a5:66:2d:9d:49:8f:2d:1b:47:7c:e0:ba:96:1b:2d:1d: 7a:f2:f5:ea:ee:1d:11:a1:49:2b:44:06:de:d0:f1:7f: a1:30:ef:da:76:c2:0b:1f:6b:a6:f7:02:03:13:a9:c9: 5e:1b:c1:37:77:15:06:dc:c1:2b:32:c8:c3:24:2e:35: 70:92:74:95:9f:f1:08:69:72:73:a8:7d:24:18:bd:67: 0c:f8:ec:c7:92:89:a6:89:78:65:a1:68:aa:31:5a:3c: 80:51:11:9a:bf:8f:2d:6e:6f:40:d3:f4:e8:ab:16:7f: af:e3:91:37:84:98:d8:97:e6:2a:a0:8e:62:44:59:7a: 9f:ce:ad:8d:d8:18:d7:10:d7:12:fd:60:b2:bb:c2:18: 9c:57:22:79:10:62:72:87:9e:6d:62:8f:3a:61:e3:8e: 62:0b:eb:c9:34:9a:c1:a7:f6:e6:e8:fc:d0:32:92:6e: 78:71:c4:2a:0c:41:4a:1d:fe:4e:bb:55:8a:2b:0c:e5 Fingerprint (SHA-256): 3C:C2:8B:89:E3:A0:15:1E:E8:28:A8:11:01:13:44:83:C0:34:F3:21:77:5E:7D:EA:CD:70:FF:30:AF:F2:61:B3 Fingerprint (SHA1): 5D:B5:19:88:CF:93:32:7C:F3:88:9C:B0:50:CC:7D:3A:DD:80:43:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1212: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1213: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221720 (0x374447d8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:23:44 2022 Not After : Mon Sep 27 22:23:44 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:69:c4:bb:06:b4:90:96:c7:fb:e5:2e:3b:b4:69:b1: b9:0f:f3:e5:1f:5f:2f:7d:34:2e:9e:80:6e:00:88:d6: 53:59:5f:69:09:5b:a1:8f:05:d6:2f:ad:f4:e0:39:13: 86:a5:2c:5e:ed:05:fd:ec:2c:2f:80:5c:86:10:e4:ec: 2d:d6:02:91:1f:28:54:94:85:87:b0:b9:4e:2f:63:4c: 71:ef:bd:2e:ec:d2:45:89:62:dc:5d:dc:7f:2d:7d:85: a8:28:02:be:8d:68:7b:86:a8:1c:8a:85:3a:bc:f5:41: d9:36:f7:e3:87:65:9d:89:28:21:30:fd:d1:08:13:dc: 07:cf:19:ef:fc:39:d6:18:8a:63:72:c1:f0:f8:15:d6: c5:8b:5d:4e:35:82:0d:6d:5b:a1:90:f9:e1:15:00:c4: 6c:b1:f1:cf:2b:76:fe:51:f7:a7:8f:54:d1:d5:a7:d0: da:aa:74:6e:37:fe:7c:63:93:90:7b:be:ce:c1:cd:c2: f1:e4:6b:6a:a4:b9:f4:29:0c:02:24:07:73:4d:52:0d: 78:3b:20:82:dd:03:aa:3c:fe:d0:94:e5:00:64:5d:f1: cd:98:fe:ca:25:29:66:53:7b:13:06:58:9c:20:77:63: f8:65:a2:fd:eb:3b:6a:f3:3a:d4:29:24:63:95:44:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e4:14:ae:15:f6:46:cc:a4:41:c3:99:60:a3:1a:c0:a1: e1:41:af:8d:e3:17:c4:56:84:3b:1f:f4:f4:d0:3c:c0: 94:cc:37:dc:48:f5:68:57:37:f9:c3:dd:16:12:b9:8a: c2:22:6f:db:cc:5c:fe:31:a6:c2:85:c5:2c:a7:60:78: 9a:43:6d:a9:b1:23:02:65:9e:0d:fc:38:f7:95:e9:43: 02:51:6c:6f:d5:a5:2f:44:2e:90:27:e0:10:69:47:dc: df:23:98:02:e1:53:b7:26:01:2d:25:6c:2f:18:80:b9: ae:10:64:9a:7e:c9:18:02:2b:ca:6e:2d:69:d8:ca:7d: 26:43:68:5f:70:54:21:a7:f1:7a:2d:45:3a:3b:c6:ab: af:0c:bb:ea:2b:5c:0e:d1:14:87:82:1f:ca:78:73:8b: 20:2b:df:3d:cf:48:21:d7:52:76:49:a7:60:c6:b1:f4: 78:50:27:cc:9f:34:f9:4a:4e:93:cb:35:fe:ef:08:da: 4f:1e:75:e7:ab:77:f1:3d:9e:ff:09:9d:8b:85:ee:fc: ac:09:16:95:1b:39:54:8e:2f:16:8f:95:86:40:e2:c9: 55:c8:a1:e3:1c:f0:d8:7f:17:16:66:92:aa:9e:1e:3c: 4a:d0:b9:1d:25:99:d3:eb:e2:a1:9c:8e:cc:95:26:b3 Fingerprint (SHA-256): 54:D5:D8:B2:1A:5C:C2:E3:09:D1:1C:88:06:22:6A:84:62:72:14:19:09:22:6E:43:75:08:95:AC:0D:28:7B:62 Fingerprint (SHA1): 0B:85:2C:BF:2B:3A:5F:89:B6:66:90:1C:BD:1C:B2:B1:36:AD:0A:73 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1214: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1215: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221721 (0x374447d9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 22:23:46 2022 Not After : Mon Sep 27 22:23:46 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:c7:52:bb:17:e3:88:9d:2c:23:05:8f:ee:5b:d2:ec: 9e:56:1d:c1:e4:7b:99:c2:56:04:8d:fb:bd:f3:f1:e6: ca:8c:a0:9d:f9:9a:e9:0a:d4:57:ee:84:e6:56:de:73: 96:1f:09:99:f3:35:f7:cd:ac:a1:e0:a3:72:04:79:78: c4:04:32:9b:2d:54:60:0f:68:83:5b:f7:fd:87:e3:de: 56:1f:aa:1b:e3:3d:bd:ff:ce:48:cb:50:5f:d7:09:d6: 27:47:b9:3d:d6:78:22:86:1e:50:d4:ea:87:1b:42:ac: e0:7f:26:08:d4:c5:76:95:7b:88:fb:6d:a6:b8:aa:25: 0a:f3:b0:c8:be:89:d0:d6:ce:71:ca:8e:fd:d8:5f:41: 55:42:a0:01:3d:4e:7a:9d:33:55:27:4a:e2:1a:7e:0c: 1e:7b:c1:5d:13:44:08:dd:8a:8c:a0:ca:93:8f:e9:4d: 5f:75:2b:fb:72:a2:a1:73:e4:c7:fb:60:d7:f5:98:f8: bc:e9:c2:92:44:2d:89:38:d2:78:a3:00:6a:a1:1b:ad: 37:10:98:04:1b:11:49:d4:f4:01:e4:cf:a2:c0:85:7e: 69:26:0f:f0:3e:21:a1:ad:92:c8:15:3c:5c:06:36:b6: 6a:74:a2:74:53:22:51:d6:89:df:45:3d:ec:71:ed:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8a:9a:b4:83:3c:cd:95:4a:5c:1e:34:b4:84:0a:98:d2: 5a:62:93:59:da:75:51:16:b4:b8:58:1b:e8:b8:ac:2f: 75:be:df:46:34:e0:26:ff:e7:07:71:d2:eb:a9:83:5a: e7:c3:8c:39:3f:fc:d2:66:cc:4b:ec:08:08:d3:00:8a: bc:f9:c2:7e:b5:d7:dc:2d:ef:4d:de:d6:7c:f9:81:08: dc:df:3d:97:62:3e:af:02:f0:1f:32:47:15:7b:6f:55: 45:2a:ee:b7:a9:16:ea:bd:f7:05:dc:4a:42:19:35:8a: 7b:4e:77:b0:63:39:6e:f4:71:b6:28:ef:b5:4b:33:4e: 51:88:c6:96:65:ca:b9:44:35:84:f4:22:cf:52:52:22: b4:39:43:b8:5f:84:43:dd:5e:cd:10:f4:64:8e:99:15: 57:27:df:36:93:50:55:80:b4:b8:30:52:5e:b7:3e:8e: 20:0a:d7:2f:8f:6a:bf:af:47:8a:cf:ea:32:09:d5:0d: fa:10:f4:e3:8f:b2:62:a7:9f:1d:15:69:3f:0a:f7:7e: f5:a3:3b:b9:fd:f2:94:02:68:59:bd:b8:8d:a3:3a:d0: 89:ca:a9:d3:3c:ed:3e:61:d2:9a:75:c3:73:61:2a:24: 60:fb:8f:b7:ba:4c:c5:5d:0a:c9:42:1c:60:a5:ac:fd Fingerprint (SHA-256): 0B:73:1F:AE:89:13:1F:E7:57:E5:86:D3:19:A1:94:0A:83:6E:EB:03:F6:9D:EE:4B:BD:03:6C:17:B0:25:1F:D0 Fingerprint (SHA1): 2B:E2:01:51:1F:DE:5B:6B:A4:08:CF:A5:7C:1D:9D:93:F5:22:33:AC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1216: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1217: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221719 (0x374447d7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:23:42 2022 Not After : Tue Sep 27 22:23:42 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:58:a9:65:72:6f:3d:38:24:c2:99:b4:11:2d:38:6d: a9:58:8e:cb:7a:89:69:9b:40:4e:93:f6:8f:ce:20:ad: b9:80:be:06:a7:a1:c7:f5:dd:54:71:70:ca:0d:8b:ec: c7:1d:fd:2d:b2:35:6b:45:89:3e:71:97:41:63:85:e6: 05:78:4e:ff:a9:7f:9c:46:4a:c6:d0:be:de:30:ee:77: 6e:72:fb:eb:25:e6:da:3b:4a:18:50:c0:67:73:31:3e: c9:7e:10:e9:ed:9c:5e:f0:82:a6:93:e6:68:bb:4e:c0: cd:b7:5a:90:3d:a4:f9:d3:86:72:0e:ec:a9:c3:d4:de: 36:a2:96:51:48:ef:b1:35:83:21:8d:5e:88:a2:39:60: 80:30:62:cc:40:4a:c7:73:1d:0e:55:d0:e8:ee:68:d7: 12:a4:42:ee:28:79:be:66:1a:e5:b8:d4:fd:37:b6:78: 9a:21:7e:de:fb:9a:44:d6:03:b9:6d:65:28:71:d1:bf: 07:fe:00:8a:ed:9a:91:e8:29:4c:6e:98:9f:44:de:10: c7:32:30:05:61:2c:e1:2f:16:a2:2a:cd:ed:cb:fb:b7: 82:ba:d6:67:dd:80:1b:d8:5e:d8:06:df:3c:3b:03:53: 11:a1:cb:26:87:00:f8:cd:5c:5c:ef:c8:e9:e4:91:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:1a:f0:e1:f0:c5:ef:31:f7:b9:f7:bd:16:0d:3b:ab: 3e:ed:77:18:70:cc:f1:3b:5e:e0:27:8c:1e:78:5a:34: 39:2b:e7:39:e9:cd:cb:f9:15:c1:27:f4:3f:b1:aa:9f: b3:28:c6:de:2c:b8:dd:36:98:db:59:50:27:7d:e1:a9: a5:66:2d:9d:49:8f:2d:1b:47:7c:e0:ba:96:1b:2d:1d: 7a:f2:f5:ea:ee:1d:11:a1:49:2b:44:06:de:d0:f1:7f: a1:30:ef:da:76:c2:0b:1f:6b:a6:f7:02:03:13:a9:c9: 5e:1b:c1:37:77:15:06:dc:c1:2b:32:c8:c3:24:2e:35: 70:92:74:95:9f:f1:08:69:72:73:a8:7d:24:18:bd:67: 0c:f8:ec:c7:92:89:a6:89:78:65:a1:68:aa:31:5a:3c: 80:51:11:9a:bf:8f:2d:6e:6f:40:d3:f4:e8:ab:16:7f: af:e3:91:37:84:98:d8:97:e6:2a:a0:8e:62:44:59:7a: 9f:ce:ad:8d:d8:18:d7:10:d7:12:fd:60:b2:bb:c2:18: 9c:57:22:79:10:62:72:87:9e:6d:62:8f:3a:61:e3:8e: 62:0b:eb:c9:34:9a:c1:a7:f6:e6:e8:fc:d0:32:92:6e: 78:71:c4:2a:0c:41:4a:1d:fe:4e:bb:55:8a:2b:0c:e5 Fingerprint (SHA-256): 3C:C2:8B:89:E3:A0:15:1E:E8:28:A8:11:01:13:44:83:C0:34:F3:21:77:5E:7D:EA:CD:70:FF:30:AF:F2:61:B3 Fingerprint (SHA1): 5D:B5:19:88:CF:93:32:7C:F3:88:9C:B0:50:CC:7D:3A:DD:80:43:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1218: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221719 (0x374447d7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:23:42 2022 Not After : Tue Sep 27 22:23:42 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:58:a9:65:72:6f:3d:38:24:c2:99:b4:11:2d:38:6d: a9:58:8e:cb:7a:89:69:9b:40:4e:93:f6:8f:ce:20:ad: b9:80:be:06:a7:a1:c7:f5:dd:54:71:70:ca:0d:8b:ec: c7:1d:fd:2d:b2:35:6b:45:89:3e:71:97:41:63:85:e6: 05:78:4e:ff:a9:7f:9c:46:4a:c6:d0:be:de:30:ee:77: 6e:72:fb:eb:25:e6:da:3b:4a:18:50:c0:67:73:31:3e: c9:7e:10:e9:ed:9c:5e:f0:82:a6:93:e6:68:bb:4e:c0: cd:b7:5a:90:3d:a4:f9:d3:86:72:0e:ec:a9:c3:d4:de: 36:a2:96:51:48:ef:b1:35:83:21:8d:5e:88:a2:39:60: 80:30:62:cc:40:4a:c7:73:1d:0e:55:d0:e8:ee:68:d7: 12:a4:42:ee:28:79:be:66:1a:e5:b8:d4:fd:37:b6:78: 9a:21:7e:de:fb:9a:44:d6:03:b9:6d:65:28:71:d1:bf: 07:fe:00:8a:ed:9a:91:e8:29:4c:6e:98:9f:44:de:10: c7:32:30:05:61:2c:e1:2f:16:a2:2a:cd:ed:cb:fb:b7: 82:ba:d6:67:dd:80:1b:d8:5e:d8:06:df:3c:3b:03:53: 11:a1:cb:26:87:00:f8:cd:5c:5c:ef:c8:e9:e4:91:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:1a:f0:e1:f0:c5:ef:31:f7:b9:f7:bd:16:0d:3b:ab: 3e:ed:77:18:70:cc:f1:3b:5e:e0:27:8c:1e:78:5a:34: 39:2b:e7:39:e9:cd:cb:f9:15:c1:27:f4:3f:b1:aa:9f: b3:28:c6:de:2c:b8:dd:36:98:db:59:50:27:7d:e1:a9: a5:66:2d:9d:49:8f:2d:1b:47:7c:e0:ba:96:1b:2d:1d: 7a:f2:f5:ea:ee:1d:11:a1:49:2b:44:06:de:d0:f1:7f: a1:30:ef:da:76:c2:0b:1f:6b:a6:f7:02:03:13:a9:c9: 5e:1b:c1:37:77:15:06:dc:c1:2b:32:c8:c3:24:2e:35: 70:92:74:95:9f:f1:08:69:72:73:a8:7d:24:18:bd:67: 0c:f8:ec:c7:92:89:a6:89:78:65:a1:68:aa:31:5a:3c: 80:51:11:9a:bf:8f:2d:6e:6f:40:d3:f4:e8:ab:16:7f: af:e3:91:37:84:98:d8:97:e6:2a:a0:8e:62:44:59:7a: 9f:ce:ad:8d:d8:18:d7:10:d7:12:fd:60:b2:bb:c2:18: 9c:57:22:79:10:62:72:87:9e:6d:62:8f:3a:61:e3:8e: 62:0b:eb:c9:34:9a:c1:a7:f6:e6:e8:fc:d0:32:92:6e: 78:71:c4:2a:0c:41:4a:1d:fe:4e:bb:55:8a:2b:0c:e5 Fingerprint (SHA-256): 3C:C2:8B:89:E3:A0:15:1E:E8:28:A8:11:01:13:44:83:C0:34:F3:21:77:5E:7D:EA:CD:70:FF:30:AF:F2:61:B3 Fingerprint (SHA1): 5D:B5:19:88:CF:93:32:7C:F3:88:9C:B0:50:CC:7D:3A:DD:80:43:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1219: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221720 (0x374447d8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:23:44 2022 Not After : Mon Sep 27 22:23:44 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:69:c4:bb:06:b4:90:96:c7:fb:e5:2e:3b:b4:69:b1: b9:0f:f3:e5:1f:5f:2f:7d:34:2e:9e:80:6e:00:88:d6: 53:59:5f:69:09:5b:a1:8f:05:d6:2f:ad:f4:e0:39:13: 86:a5:2c:5e:ed:05:fd:ec:2c:2f:80:5c:86:10:e4:ec: 2d:d6:02:91:1f:28:54:94:85:87:b0:b9:4e:2f:63:4c: 71:ef:bd:2e:ec:d2:45:89:62:dc:5d:dc:7f:2d:7d:85: a8:28:02:be:8d:68:7b:86:a8:1c:8a:85:3a:bc:f5:41: d9:36:f7:e3:87:65:9d:89:28:21:30:fd:d1:08:13:dc: 07:cf:19:ef:fc:39:d6:18:8a:63:72:c1:f0:f8:15:d6: c5:8b:5d:4e:35:82:0d:6d:5b:a1:90:f9:e1:15:00:c4: 6c:b1:f1:cf:2b:76:fe:51:f7:a7:8f:54:d1:d5:a7:d0: da:aa:74:6e:37:fe:7c:63:93:90:7b:be:ce:c1:cd:c2: f1:e4:6b:6a:a4:b9:f4:29:0c:02:24:07:73:4d:52:0d: 78:3b:20:82:dd:03:aa:3c:fe:d0:94:e5:00:64:5d:f1: cd:98:fe:ca:25:29:66:53:7b:13:06:58:9c:20:77:63: f8:65:a2:fd:eb:3b:6a:f3:3a:d4:29:24:63:95:44:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e4:14:ae:15:f6:46:cc:a4:41:c3:99:60:a3:1a:c0:a1: e1:41:af:8d:e3:17:c4:56:84:3b:1f:f4:f4:d0:3c:c0: 94:cc:37:dc:48:f5:68:57:37:f9:c3:dd:16:12:b9:8a: c2:22:6f:db:cc:5c:fe:31:a6:c2:85:c5:2c:a7:60:78: 9a:43:6d:a9:b1:23:02:65:9e:0d:fc:38:f7:95:e9:43: 02:51:6c:6f:d5:a5:2f:44:2e:90:27:e0:10:69:47:dc: df:23:98:02:e1:53:b7:26:01:2d:25:6c:2f:18:80:b9: ae:10:64:9a:7e:c9:18:02:2b:ca:6e:2d:69:d8:ca:7d: 26:43:68:5f:70:54:21:a7:f1:7a:2d:45:3a:3b:c6:ab: af:0c:bb:ea:2b:5c:0e:d1:14:87:82:1f:ca:78:73:8b: 20:2b:df:3d:cf:48:21:d7:52:76:49:a7:60:c6:b1:f4: 78:50:27:cc:9f:34:f9:4a:4e:93:cb:35:fe:ef:08:da: 4f:1e:75:e7:ab:77:f1:3d:9e:ff:09:9d:8b:85:ee:fc: ac:09:16:95:1b:39:54:8e:2f:16:8f:95:86:40:e2:c9: 55:c8:a1:e3:1c:f0:d8:7f:17:16:66:92:aa:9e:1e:3c: 4a:d0:b9:1d:25:99:d3:eb:e2:a1:9c:8e:cc:95:26:b3 Fingerprint (SHA-256): 54:D5:D8:B2:1A:5C:C2:E3:09:D1:1C:88:06:22:6A:84:62:72:14:19:09:22:6E:43:75:08:95:AC:0D:28:7B:62 Fingerprint (SHA1): 0B:85:2C:BF:2B:3A:5F:89:B6:66:90:1C:BD:1C:B2:B1:36:AD:0A:73 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1220: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221720 (0x374447d8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:23:44 2022 Not After : Mon Sep 27 22:23:44 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:69:c4:bb:06:b4:90:96:c7:fb:e5:2e:3b:b4:69:b1: b9:0f:f3:e5:1f:5f:2f:7d:34:2e:9e:80:6e:00:88:d6: 53:59:5f:69:09:5b:a1:8f:05:d6:2f:ad:f4:e0:39:13: 86:a5:2c:5e:ed:05:fd:ec:2c:2f:80:5c:86:10:e4:ec: 2d:d6:02:91:1f:28:54:94:85:87:b0:b9:4e:2f:63:4c: 71:ef:bd:2e:ec:d2:45:89:62:dc:5d:dc:7f:2d:7d:85: a8:28:02:be:8d:68:7b:86:a8:1c:8a:85:3a:bc:f5:41: d9:36:f7:e3:87:65:9d:89:28:21:30:fd:d1:08:13:dc: 07:cf:19:ef:fc:39:d6:18:8a:63:72:c1:f0:f8:15:d6: c5:8b:5d:4e:35:82:0d:6d:5b:a1:90:f9:e1:15:00:c4: 6c:b1:f1:cf:2b:76:fe:51:f7:a7:8f:54:d1:d5:a7:d0: da:aa:74:6e:37:fe:7c:63:93:90:7b:be:ce:c1:cd:c2: f1:e4:6b:6a:a4:b9:f4:29:0c:02:24:07:73:4d:52:0d: 78:3b:20:82:dd:03:aa:3c:fe:d0:94:e5:00:64:5d:f1: cd:98:fe:ca:25:29:66:53:7b:13:06:58:9c:20:77:63: f8:65:a2:fd:eb:3b:6a:f3:3a:d4:29:24:63:95:44:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e4:14:ae:15:f6:46:cc:a4:41:c3:99:60:a3:1a:c0:a1: e1:41:af:8d:e3:17:c4:56:84:3b:1f:f4:f4:d0:3c:c0: 94:cc:37:dc:48:f5:68:57:37:f9:c3:dd:16:12:b9:8a: c2:22:6f:db:cc:5c:fe:31:a6:c2:85:c5:2c:a7:60:78: 9a:43:6d:a9:b1:23:02:65:9e:0d:fc:38:f7:95:e9:43: 02:51:6c:6f:d5:a5:2f:44:2e:90:27:e0:10:69:47:dc: df:23:98:02:e1:53:b7:26:01:2d:25:6c:2f:18:80:b9: ae:10:64:9a:7e:c9:18:02:2b:ca:6e:2d:69:d8:ca:7d: 26:43:68:5f:70:54:21:a7:f1:7a:2d:45:3a:3b:c6:ab: af:0c:bb:ea:2b:5c:0e:d1:14:87:82:1f:ca:78:73:8b: 20:2b:df:3d:cf:48:21:d7:52:76:49:a7:60:c6:b1:f4: 78:50:27:cc:9f:34:f9:4a:4e:93:cb:35:fe:ef:08:da: 4f:1e:75:e7:ab:77:f1:3d:9e:ff:09:9d:8b:85:ee:fc: ac:09:16:95:1b:39:54:8e:2f:16:8f:95:86:40:e2:c9: 55:c8:a1:e3:1c:f0:d8:7f:17:16:66:92:aa:9e:1e:3c: 4a:d0:b9:1d:25:99:d3:eb:e2:a1:9c:8e:cc:95:26:b3 Fingerprint (SHA-256): 54:D5:D8:B2:1A:5C:C2:E3:09:D1:1C:88:06:22:6A:84:62:72:14:19:09:22:6E:43:75:08:95:AC:0D:28:7B:62 Fingerprint (SHA1): 0B:85:2C:BF:2B:3A:5F:89:B6:66:90:1C:BD:1C:B2:B1:36:AD:0A:73 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1221: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221721 (0x374447d9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 22:23:46 2022 Not After : Mon Sep 27 22:23:46 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:c7:52:bb:17:e3:88:9d:2c:23:05:8f:ee:5b:d2:ec: 9e:56:1d:c1:e4:7b:99:c2:56:04:8d:fb:bd:f3:f1:e6: ca:8c:a0:9d:f9:9a:e9:0a:d4:57:ee:84:e6:56:de:73: 96:1f:09:99:f3:35:f7:cd:ac:a1:e0:a3:72:04:79:78: c4:04:32:9b:2d:54:60:0f:68:83:5b:f7:fd:87:e3:de: 56:1f:aa:1b:e3:3d:bd:ff:ce:48:cb:50:5f:d7:09:d6: 27:47:b9:3d:d6:78:22:86:1e:50:d4:ea:87:1b:42:ac: e0:7f:26:08:d4:c5:76:95:7b:88:fb:6d:a6:b8:aa:25: 0a:f3:b0:c8:be:89:d0:d6:ce:71:ca:8e:fd:d8:5f:41: 55:42:a0:01:3d:4e:7a:9d:33:55:27:4a:e2:1a:7e:0c: 1e:7b:c1:5d:13:44:08:dd:8a:8c:a0:ca:93:8f:e9:4d: 5f:75:2b:fb:72:a2:a1:73:e4:c7:fb:60:d7:f5:98:f8: bc:e9:c2:92:44:2d:89:38:d2:78:a3:00:6a:a1:1b:ad: 37:10:98:04:1b:11:49:d4:f4:01:e4:cf:a2:c0:85:7e: 69:26:0f:f0:3e:21:a1:ad:92:c8:15:3c:5c:06:36:b6: 6a:74:a2:74:53:22:51:d6:89:df:45:3d:ec:71:ed:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8a:9a:b4:83:3c:cd:95:4a:5c:1e:34:b4:84:0a:98:d2: 5a:62:93:59:da:75:51:16:b4:b8:58:1b:e8:b8:ac:2f: 75:be:df:46:34:e0:26:ff:e7:07:71:d2:eb:a9:83:5a: e7:c3:8c:39:3f:fc:d2:66:cc:4b:ec:08:08:d3:00:8a: bc:f9:c2:7e:b5:d7:dc:2d:ef:4d:de:d6:7c:f9:81:08: dc:df:3d:97:62:3e:af:02:f0:1f:32:47:15:7b:6f:55: 45:2a:ee:b7:a9:16:ea:bd:f7:05:dc:4a:42:19:35:8a: 7b:4e:77:b0:63:39:6e:f4:71:b6:28:ef:b5:4b:33:4e: 51:88:c6:96:65:ca:b9:44:35:84:f4:22:cf:52:52:22: b4:39:43:b8:5f:84:43:dd:5e:cd:10:f4:64:8e:99:15: 57:27:df:36:93:50:55:80:b4:b8:30:52:5e:b7:3e:8e: 20:0a:d7:2f:8f:6a:bf:af:47:8a:cf:ea:32:09:d5:0d: fa:10:f4:e3:8f:b2:62:a7:9f:1d:15:69:3f:0a:f7:7e: f5:a3:3b:b9:fd:f2:94:02:68:59:bd:b8:8d:a3:3a:d0: 89:ca:a9:d3:3c:ed:3e:61:d2:9a:75:c3:73:61:2a:24: 60:fb:8f:b7:ba:4c:c5:5d:0a:c9:42:1c:60:a5:ac:fd Fingerprint (SHA-256): 0B:73:1F:AE:89:13:1F:E7:57:E5:86:D3:19:A1:94:0A:83:6E:EB:03:F6:9D:EE:4B:BD:03:6C:17:B0:25:1F:D0 Fingerprint (SHA1): 2B:E2:01:51:1F:DE:5B:6B:A4:08:CF:A5:7C:1D:9D:93:F5:22:33:AC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1222: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221721 (0x374447d9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 22:23:46 2022 Not After : Mon Sep 27 22:23:46 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:c7:52:bb:17:e3:88:9d:2c:23:05:8f:ee:5b:d2:ec: 9e:56:1d:c1:e4:7b:99:c2:56:04:8d:fb:bd:f3:f1:e6: ca:8c:a0:9d:f9:9a:e9:0a:d4:57:ee:84:e6:56:de:73: 96:1f:09:99:f3:35:f7:cd:ac:a1:e0:a3:72:04:79:78: c4:04:32:9b:2d:54:60:0f:68:83:5b:f7:fd:87:e3:de: 56:1f:aa:1b:e3:3d:bd:ff:ce:48:cb:50:5f:d7:09:d6: 27:47:b9:3d:d6:78:22:86:1e:50:d4:ea:87:1b:42:ac: e0:7f:26:08:d4:c5:76:95:7b:88:fb:6d:a6:b8:aa:25: 0a:f3:b0:c8:be:89:d0:d6:ce:71:ca:8e:fd:d8:5f:41: 55:42:a0:01:3d:4e:7a:9d:33:55:27:4a:e2:1a:7e:0c: 1e:7b:c1:5d:13:44:08:dd:8a:8c:a0:ca:93:8f:e9:4d: 5f:75:2b:fb:72:a2:a1:73:e4:c7:fb:60:d7:f5:98:f8: bc:e9:c2:92:44:2d:89:38:d2:78:a3:00:6a:a1:1b:ad: 37:10:98:04:1b:11:49:d4:f4:01:e4:cf:a2:c0:85:7e: 69:26:0f:f0:3e:21:a1:ad:92:c8:15:3c:5c:06:36:b6: 6a:74:a2:74:53:22:51:d6:89:df:45:3d:ec:71:ed:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8a:9a:b4:83:3c:cd:95:4a:5c:1e:34:b4:84:0a:98:d2: 5a:62:93:59:da:75:51:16:b4:b8:58:1b:e8:b8:ac:2f: 75:be:df:46:34:e0:26:ff:e7:07:71:d2:eb:a9:83:5a: e7:c3:8c:39:3f:fc:d2:66:cc:4b:ec:08:08:d3:00:8a: bc:f9:c2:7e:b5:d7:dc:2d:ef:4d:de:d6:7c:f9:81:08: dc:df:3d:97:62:3e:af:02:f0:1f:32:47:15:7b:6f:55: 45:2a:ee:b7:a9:16:ea:bd:f7:05:dc:4a:42:19:35:8a: 7b:4e:77:b0:63:39:6e:f4:71:b6:28:ef:b5:4b:33:4e: 51:88:c6:96:65:ca:b9:44:35:84:f4:22:cf:52:52:22: b4:39:43:b8:5f:84:43:dd:5e:cd:10:f4:64:8e:99:15: 57:27:df:36:93:50:55:80:b4:b8:30:52:5e:b7:3e:8e: 20:0a:d7:2f:8f:6a:bf:af:47:8a:cf:ea:32:09:d5:0d: fa:10:f4:e3:8f:b2:62:a7:9f:1d:15:69:3f:0a:f7:7e: f5:a3:3b:b9:fd:f2:94:02:68:59:bd:b8:8d:a3:3a:d0: 89:ca:a9:d3:3c:ed:3e:61:d2:9a:75:c3:73:61:2a:24: 60:fb:8f:b7:ba:4c:c5:5d:0a:c9:42:1c:60:a5:ac:fd Fingerprint (SHA-256): 0B:73:1F:AE:89:13:1F:E7:57:E5:86:D3:19:A1:94:0A:83:6E:EB:03:F6:9D:EE:4B:BD:03:6C:17:B0:25:1F:D0 Fingerprint (SHA1): 2B:E2:01:51:1F:DE:5B:6B:A4:08:CF:A5:7C:1D:9D:93:F5:22:33:AC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1223: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1224: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221724 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1225: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1226: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1227: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1228: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 927221725 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1229: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1230: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1231: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1232: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927221726 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1233: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1234: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1235: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1236: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 927221727 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1237: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1238: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1239: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1240: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 927221728 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1241: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1242: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1243: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1244: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 927221729 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1245: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1246: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #1247: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1248: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 927221730 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1249: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1250: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1251: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #1252: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #1253: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1254: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #1255: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221724 (0x374447dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:23:56 2022 Not After : Tue Sep 27 22:23:56 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:4d:cd:1c:aa:1e:3e:e6:9f:29:55:28:8d:42:c2:77: ef:07:79:c2:34:fe:e1:04:b1:9e:72:35:ea:53:3d:15: 24:32:f8:7c:a0:e6:55:4b:76:c3:07:de:53:b2:27:d0: 2d:f2:ba:e7:9d:23:e7:c7:cf:76:8f:7f:87:c9:1d:2f: 9f:6d:45:9a:33:c1:99:16:9c:fc:f1:cc:0d:ef:2d:46: 31:3d:20:44:80:d9:60:5c:4f:54:e9:54:7e:66:1a:42: 48:e3:f3:d4:8a:ee:f7:b9:09:79:7a:e9:d7:8d:fd:6c: 3a:71:ba:4a:53:94:55:ed:af:35:53:7b:e5:89:a5:33: 58:7b:9a:62:44:94:b7:39:fd:87:4e:3a:ea:b1:61:93: da:f7:2d:a3:15:7e:15:40:ae:88:d2:c7:71:8e:5b:87: 47:7c:24:f6:77:cc:14:d4:8e:bf:22:69:41:80:75:a0: 62:b6:e2:e9:e0:31:8c:11:61:db:12:67:55:fb:30:07: ee:62:95:b6:b4:16:44:f1:5a:46:72:54:07:78:5b:15: 18:90:fd:f0:5e:f3:90:64:92:01:c2:fb:7c:93:e3:53: 05:13:cc:a3:23:4c:99:ce:bb:37:ce:49:7a:8c:ab:6b: bc:34:88:a1:43:72:8c:68:13:be:a2:48:87:28:22:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:ab:48:f4:3a:86:58:b1:9c:f4:30:26:e6:a8:70:10: 84:c6:fb:02:4e:30:e6:b6:c7:67:a9:8a:98:18:19:89: bd:7e:73:25:61:fd:5c:d1:6e:05:24:93:f7:3d:0a:09: 15:b4:2d:09:de:c0:4a:4d:61:8a:21:1e:84:fd:87:6f: 73:df:59:f3:af:29:21:44:10:2a:58:87:59:41:88:80: 98:77:39:e6:93:a8:10:f0:b5:47:41:cf:f1:e2:59:06: 5b:91:f6:c6:18:6d:21:ec:17:25:37:8c:db:8d:80:af: cd:9c:e0:60:76:76:1f:b4:2d:48:e3:1e:0d:84:98:27: 3a:78:79:4d:9a:ad:97:2b:41:7f:ad:6f:6c:cc:29:3d: 66:a0:43:6f:26:7d:64:ae:9c:8e:02:90:3d:e7:51:3e: 1e:9f:b4:6c:37:a6:de:a6:6a:f3:1e:07:80:32:6e:f0: 0d:d3:25:ad:fd:13:ef:c1:8e:75:87:6a:ea:3f:9d:5d: 47:9c:8c:fa:e4:dc:cb:ae:35:02:7b:63:eb:4d:64:31: 5b:e3:2a:50:c5:37:47:8f:c4:d7:d4:f5:5a:f5:f8:e4: 55:01:ca:9a:1e:2d:27:4b:ec:7f:3b:06:55:b8:79:67: d0:de:8e:ac:35:e5:a1:c5:80:35:c1:27:e0:90:fc:77 Fingerprint (SHA-256): AF:44:0B:67:1D:A8:4D:B3:7E:FA:D9:63:01:81:88:F6:BB:73:3A:D2:EB:80:01:45:16:6C:C1:93:B2:8A:16:7D Fingerprint (SHA1): 77:7A:ED:2F:83:E6:D6:D7:A4:37:B2:FD:3F:56:B9:A5:41:22:9F:06 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1256: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1257: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1258: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1259: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221724 (0x374447dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:23:56 2022 Not After : Tue Sep 27 22:23:56 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:4d:cd:1c:aa:1e:3e:e6:9f:29:55:28:8d:42:c2:77: ef:07:79:c2:34:fe:e1:04:b1:9e:72:35:ea:53:3d:15: 24:32:f8:7c:a0:e6:55:4b:76:c3:07:de:53:b2:27:d0: 2d:f2:ba:e7:9d:23:e7:c7:cf:76:8f:7f:87:c9:1d:2f: 9f:6d:45:9a:33:c1:99:16:9c:fc:f1:cc:0d:ef:2d:46: 31:3d:20:44:80:d9:60:5c:4f:54:e9:54:7e:66:1a:42: 48:e3:f3:d4:8a:ee:f7:b9:09:79:7a:e9:d7:8d:fd:6c: 3a:71:ba:4a:53:94:55:ed:af:35:53:7b:e5:89:a5:33: 58:7b:9a:62:44:94:b7:39:fd:87:4e:3a:ea:b1:61:93: da:f7:2d:a3:15:7e:15:40:ae:88:d2:c7:71:8e:5b:87: 47:7c:24:f6:77:cc:14:d4:8e:bf:22:69:41:80:75:a0: 62:b6:e2:e9:e0:31:8c:11:61:db:12:67:55:fb:30:07: ee:62:95:b6:b4:16:44:f1:5a:46:72:54:07:78:5b:15: 18:90:fd:f0:5e:f3:90:64:92:01:c2:fb:7c:93:e3:53: 05:13:cc:a3:23:4c:99:ce:bb:37:ce:49:7a:8c:ab:6b: bc:34:88:a1:43:72:8c:68:13:be:a2:48:87:28:22:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:ab:48:f4:3a:86:58:b1:9c:f4:30:26:e6:a8:70:10: 84:c6:fb:02:4e:30:e6:b6:c7:67:a9:8a:98:18:19:89: bd:7e:73:25:61:fd:5c:d1:6e:05:24:93:f7:3d:0a:09: 15:b4:2d:09:de:c0:4a:4d:61:8a:21:1e:84:fd:87:6f: 73:df:59:f3:af:29:21:44:10:2a:58:87:59:41:88:80: 98:77:39:e6:93:a8:10:f0:b5:47:41:cf:f1:e2:59:06: 5b:91:f6:c6:18:6d:21:ec:17:25:37:8c:db:8d:80:af: cd:9c:e0:60:76:76:1f:b4:2d:48:e3:1e:0d:84:98:27: 3a:78:79:4d:9a:ad:97:2b:41:7f:ad:6f:6c:cc:29:3d: 66:a0:43:6f:26:7d:64:ae:9c:8e:02:90:3d:e7:51:3e: 1e:9f:b4:6c:37:a6:de:a6:6a:f3:1e:07:80:32:6e:f0: 0d:d3:25:ad:fd:13:ef:c1:8e:75:87:6a:ea:3f:9d:5d: 47:9c:8c:fa:e4:dc:cb:ae:35:02:7b:63:eb:4d:64:31: 5b:e3:2a:50:c5:37:47:8f:c4:d7:d4:f5:5a:f5:f8:e4: 55:01:ca:9a:1e:2d:27:4b:ec:7f:3b:06:55:b8:79:67: d0:de:8e:ac:35:e5:a1:c5:80:35:c1:27:e0:90:fc:77 Fingerprint (SHA-256): AF:44:0B:67:1D:A8:4D:B3:7E:FA:D9:63:01:81:88:F6:BB:73:3A:D2:EB:80:01:45:16:6C:C1:93:B2:8A:16:7D Fingerprint (SHA1): 77:7A:ED:2F:83:E6:D6:D7:A4:37:B2:FD:3F:56:B9:A5:41:22:9F:06 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1260: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1261: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1262: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221731 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1263: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1264: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1265: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1266: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 927221732 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1267: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1268: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #1269: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1270: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 927221733 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1271: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1272: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #1273: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1274: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 927221734 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1275: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1276: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1277: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1278: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 927221735 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1279: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1280: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #1281: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1282: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 927221736 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1283: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1284: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #1285: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1286: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 927221737 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1287: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1288: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1289: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1290: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 927221738 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1291: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1292: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #1293: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1294: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 927221739 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1295: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1296: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #1297: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1298: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 927221740 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1299: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1300: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1301: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1302: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 927221741 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1303: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1304: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #1305: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1306: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 927221742 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1307: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1308: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #1309: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1310: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 927221743 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1311: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1312: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1313: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1314: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 927221744 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1315: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1316: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #1317: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1318: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 927221745 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1319: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1320: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #1321: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1322: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 927221746 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1323: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1324: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #1325: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1326: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 927221747 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1327: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1328: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #1329: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1330: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 927221748 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1331: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1332: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #1333: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1334: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 927221749 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1335: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1336: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #1337: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1338: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 927221750 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1339: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1340: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #1341: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1342: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 927221751 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1343: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1344: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #1345: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1346: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 927221752 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1347: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1348: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #1349: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1350: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 927221753 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1351: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1352: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #1353: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1354: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 927221754 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1355: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1356: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #1357: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1358: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 927221755 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1359: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1360: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #1361: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1362: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 927221756 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1363: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1364: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #1365: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1366: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 927221757 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1367: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1368: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #1369: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1370: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 927221758 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1371: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1372: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #1373: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1374: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 927221759 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1375: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1376: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #1377: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1378: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 927221760 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1379: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1380: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1381: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221731 (0x374447e3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:24:09 2022 Not After : Tue Sep 27 22:24:09 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:62:00:79:d2:49:df:d2:2b:ed:b5:ed:8d:67:a0:0d: ca:44:fe:0f:d3:dc:da:58:e8:6a:22:05:50:9f:b8:31: b1:07:86:00:1b:dd:b1:1d:0d:97:2c:3e:fd:3a:dd:41: d8:e0:90:3f:3a:7a:67:d3:77:8c:f5:cf:de:bf:e5:4c: 76:dd:69:2c:ae:8e:31:3a:99:be:da:6e:78:0e:b6:71: e3:3a:76:d4:68:86:9f:86:f5:0e:7e:5c:d1:b5:27:14: 95:8e:97:59:7c:ad:a1:aa:cd:d7:07:f8:6b:58:86:9d: 11:f5:09:83:bb:66:7c:ea:4d:52:55:98:3a:70:1b:9a: 6d:7e:4d:a9:b9:3c:81:d6:33:3c:ad:4b:c7:01:66:d7: 59:6a:01:af:df:30:6a:27:6a:bd:51:da:4d:a3:5a:21: 9e:0e:9f:0f:22:c3:05:ce:f9:06:e4:dd:d3:ff:d6:47: ec:84:3b:b9:b3:94:f9:d0:67:43:ea:65:14:9a:ff:9b: 65:1b:04:7d:42:8c:d8:2a:89:79:95:79:f4:cf:be:85: a5:9f:ef:5a:39:06:15:06:b7:bc:04:e9:6e:0a:da:b4: 87:d6:e7:81:f6:3f:bf:23:35:e4:d1:37:9f:7d:49:c9: 69:7e:fa:8e:fe:63:28:db:9f:53:98:f7:44:a6:60:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:eb:16:c3:33:04:67:48:a0:b9:7a:15:ec:b2:c2:c4: 19:8a:c9:0a:c5:c5:e7:59:f1:1b:ab:21:d9:a0:b4:88: 16:c7:fc:a6:d4:5b:49:05:60:5d:de:88:ee:5c:cf:57: 46:b7:8b:0a:ff:3c:0e:6c:2d:81:d0:25:b5:88:0f:4e: cd:f6:e5:96:aa:66:43:18:47:a0:58:ed:a9:4c:d2:5d: 4f:2a:9b:60:17:5f:b2:31:91:e9:d2:51:bf:bb:c8:31: 78:cd:c1:a3:c7:15:92:ce:55:60:72:13:01:df:5e:65: 99:90:f5:81:9a:96:a3:22:40:d1:84:ef:c5:fa:39:85: 15:59:4c:e4:b3:f9:f7:33:17:c3:20:63:6e:d1:96:aa: 4e:f2:48:29:c2:c6:7e:52:66:e5:01:ac:63:40:b7:9c: 39:95:6c:d0:81:28:48:1a:e1:bd:c1:e3:f3:c2:58:8b: d5:8c:ef:0f:45:29:37:17:80:ab:18:00:6e:2c:46:2b: 75:3f:ab:36:00:19:f3:43:33:e8:aa:f9:3a:34:b9:52: 62:0c:ee:5a:36:8b:a7:93:6a:a5:9a:dc:65:ec:cc:d5: 9f:6d:ed:6d:7a:0e:60:72:b0:91:2a:3b:38:86:e6:12: 59:da:a6:94:53:80:52:0a:cb:c8:02:46:55:8f:f3:3d Fingerprint (SHA-256): 68:11:7D:00:7A:14:D8:1F:F8:A4:04:A8:8A:E2:A1:82:50:B7:B5:77:87:89:2F:AA:72:FC:C7:9C:9E:1A:62:C9 Fingerprint (SHA1): 43:BD:B4:93:45:AA:B0:90:7E:22:36:7C:E4:68:78:CB:CA:EE:86:95 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1382: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1383: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221731 (0x374447e3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:24:09 2022 Not After : Tue Sep 27 22:24:09 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:62:00:79:d2:49:df:d2:2b:ed:b5:ed:8d:67:a0:0d: ca:44:fe:0f:d3:dc:da:58:e8:6a:22:05:50:9f:b8:31: b1:07:86:00:1b:dd:b1:1d:0d:97:2c:3e:fd:3a:dd:41: d8:e0:90:3f:3a:7a:67:d3:77:8c:f5:cf:de:bf:e5:4c: 76:dd:69:2c:ae:8e:31:3a:99:be:da:6e:78:0e:b6:71: e3:3a:76:d4:68:86:9f:86:f5:0e:7e:5c:d1:b5:27:14: 95:8e:97:59:7c:ad:a1:aa:cd:d7:07:f8:6b:58:86:9d: 11:f5:09:83:bb:66:7c:ea:4d:52:55:98:3a:70:1b:9a: 6d:7e:4d:a9:b9:3c:81:d6:33:3c:ad:4b:c7:01:66:d7: 59:6a:01:af:df:30:6a:27:6a:bd:51:da:4d:a3:5a:21: 9e:0e:9f:0f:22:c3:05:ce:f9:06:e4:dd:d3:ff:d6:47: ec:84:3b:b9:b3:94:f9:d0:67:43:ea:65:14:9a:ff:9b: 65:1b:04:7d:42:8c:d8:2a:89:79:95:79:f4:cf:be:85: a5:9f:ef:5a:39:06:15:06:b7:bc:04:e9:6e:0a:da:b4: 87:d6:e7:81:f6:3f:bf:23:35:e4:d1:37:9f:7d:49:c9: 69:7e:fa:8e:fe:63:28:db:9f:53:98:f7:44:a6:60:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:eb:16:c3:33:04:67:48:a0:b9:7a:15:ec:b2:c2:c4: 19:8a:c9:0a:c5:c5:e7:59:f1:1b:ab:21:d9:a0:b4:88: 16:c7:fc:a6:d4:5b:49:05:60:5d:de:88:ee:5c:cf:57: 46:b7:8b:0a:ff:3c:0e:6c:2d:81:d0:25:b5:88:0f:4e: cd:f6:e5:96:aa:66:43:18:47:a0:58:ed:a9:4c:d2:5d: 4f:2a:9b:60:17:5f:b2:31:91:e9:d2:51:bf:bb:c8:31: 78:cd:c1:a3:c7:15:92:ce:55:60:72:13:01:df:5e:65: 99:90:f5:81:9a:96:a3:22:40:d1:84:ef:c5:fa:39:85: 15:59:4c:e4:b3:f9:f7:33:17:c3:20:63:6e:d1:96:aa: 4e:f2:48:29:c2:c6:7e:52:66:e5:01:ac:63:40:b7:9c: 39:95:6c:d0:81:28:48:1a:e1:bd:c1:e3:f3:c2:58:8b: d5:8c:ef:0f:45:29:37:17:80:ab:18:00:6e:2c:46:2b: 75:3f:ab:36:00:19:f3:43:33:e8:aa:f9:3a:34:b9:52: 62:0c:ee:5a:36:8b:a7:93:6a:a5:9a:dc:65:ec:cc:d5: 9f:6d:ed:6d:7a:0e:60:72:b0:91:2a:3b:38:86:e6:12: 59:da:a6:94:53:80:52:0a:cb:c8:02:46:55:8f:f3:3d Fingerprint (SHA-256): 68:11:7D:00:7A:14:D8:1F:F8:A4:04:A8:8A:E2:A1:82:50:B7:B5:77:87:89:2F:AA:72:FC:C7:9C:9E:1A:62:C9 Fingerprint (SHA1): 43:BD:B4:93:45:AA:B0:90:7E:22:36:7C:E4:68:78:CB:CA:EE:86:95 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1384: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1385: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1386: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1387: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221731 (0x374447e3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:24:09 2022 Not After : Tue Sep 27 22:24:09 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:62:00:79:d2:49:df:d2:2b:ed:b5:ed:8d:67:a0:0d: ca:44:fe:0f:d3:dc:da:58:e8:6a:22:05:50:9f:b8:31: b1:07:86:00:1b:dd:b1:1d:0d:97:2c:3e:fd:3a:dd:41: d8:e0:90:3f:3a:7a:67:d3:77:8c:f5:cf:de:bf:e5:4c: 76:dd:69:2c:ae:8e:31:3a:99:be:da:6e:78:0e:b6:71: e3:3a:76:d4:68:86:9f:86:f5:0e:7e:5c:d1:b5:27:14: 95:8e:97:59:7c:ad:a1:aa:cd:d7:07:f8:6b:58:86:9d: 11:f5:09:83:bb:66:7c:ea:4d:52:55:98:3a:70:1b:9a: 6d:7e:4d:a9:b9:3c:81:d6:33:3c:ad:4b:c7:01:66:d7: 59:6a:01:af:df:30:6a:27:6a:bd:51:da:4d:a3:5a:21: 9e:0e:9f:0f:22:c3:05:ce:f9:06:e4:dd:d3:ff:d6:47: ec:84:3b:b9:b3:94:f9:d0:67:43:ea:65:14:9a:ff:9b: 65:1b:04:7d:42:8c:d8:2a:89:79:95:79:f4:cf:be:85: a5:9f:ef:5a:39:06:15:06:b7:bc:04:e9:6e:0a:da:b4: 87:d6:e7:81:f6:3f:bf:23:35:e4:d1:37:9f:7d:49:c9: 69:7e:fa:8e:fe:63:28:db:9f:53:98:f7:44:a6:60:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:eb:16:c3:33:04:67:48:a0:b9:7a:15:ec:b2:c2:c4: 19:8a:c9:0a:c5:c5:e7:59:f1:1b:ab:21:d9:a0:b4:88: 16:c7:fc:a6:d4:5b:49:05:60:5d:de:88:ee:5c:cf:57: 46:b7:8b:0a:ff:3c:0e:6c:2d:81:d0:25:b5:88:0f:4e: cd:f6:e5:96:aa:66:43:18:47:a0:58:ed:a9:4c:d2:5d: 4f:2a:9b:60:17:5f:b2:31:91:e9:d2:51:bf:bb:c8:31: 78:cd:c1:a3:c7:15:92:ce:55:60:72:13:01:df:5e:65: 99:90:f5:81:9a:96:a3:22:40:d1:84:ef:c5:fa:39:85: 15:59:4c:e4:b3:f9:f7:33:17:c3:20:63:6e:d1:96:aa: 4e:f2:48:29:c2:c6:7e:52:66:e5:01:ac:63:40:b7:9c: 39:95:6c:d0:81:28:48:1a:e1:bd:c1:e3:f3:c2:58:8b: d5:8c:ef:0f:45:29:37:17:80:ab:18:00:6e:2c:46:2b: 75:3f:ab:36:00:19:f3:43:33:e8:aa:f9:3a:34:b9:52: 62:0c:ee:5a:36:8b:a7:93:6a:a5:9a:dc:65:ec:cc:d5: 9f:6d:ed:6d:7a:0e:60:72:b0:91:2a:3b:38:86:e6:12: 59:da:a6:94:53:80:52:0a:cb:c8:02:46:55:8f:f3:3d Fingerprint (SHA-256): 68:11:7D:00:7A:14:D8:1F:F8:A4:04:A8:8A:E2:A1:82:50:B7:B5:77:87:89:2F:AA:72:FC:C7:9C:9E:1A:62:C9 Fingerprint (SHA1): 43:BD:B4:93:45:AA:B0:90:7E:22:36:7C:E4:68:78:CB:CA:EE:86:95 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1388: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1389: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1390: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1391: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221731 (0x374447e3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:24:09 2022 Not After : Tue Sep 27 22:24:09 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:62:00:79:d2:49:df:d2:2b:ed:b5:ed:8d:67:a0:0d: ca:44:fe:0f:d3:dc:da:58:e8:6a:22:05:50:9f:b8:31: b1:07:86:00:1b:dd:b1:1d:0d:97:2c:3e:fd:3a:dd:41: d8:e0:90:3f:3a:7a:67:d3:77:8c:f5:cf:de:bf:e5:4c: 76:dd:69:2c:ae:8e:31:3a:99:be:da:6e:78:0e:b6:71: e3:3a:76:d4:68:86:9f:86:f5:0e:7e:5c:d1:b5:27:14: 95:8e:97:59:7c:ad:a1:aa:cd:d7:07:f8:6b:58:86:9d: 11:f5:09:83:bb:66:7c:ea:4d:52:55:98:3a:70:1b:9a: 6d:7e:4d:a9:b9:3c:81:d6:33:3c:ad:4b:c7:01:66:d7: 59:6a:01:af:df:30:6a:27:6a:bd:51:da:4d:a3:5a:21: 9e:0e:9f:0f:22:c3:05:ce:f9:06:e4:dd:d3:ff:d6:47: ec:84:3b:b9:b3:94:f9:d0:67:43:ea:65:14:9a:ff:9b: 65:1b:04:7d:42:8c:d8:2a:89:79:95:79:f4:cf:be:85: a5:9f:ef:5a:39:06:15:06:b7:bc:04:e9:6e:0a:da:b4: 87:d6:e7:81:f6:3f:bf:23:35:e4:d1:37:9f:7d:49:c9: 69:7e:fa:8e:fe:63:28:db:9f:53:98:f7:44:a6:60:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:eb:16:c3:33:04:67:48:a0:b9:7a:15:ec:b2:c2:c4: 19:8a:c9:0a:c5:c5:e7:59:f1:1b:ab:21:d9:a0:b4:88: 16:c7:fc:a6:d4:5b:49:05:60:5d:de:88:ee:5c:cf:57: 46:b7:8b:0a:ff:3c:0e:6c:2d:81:d0:25:b5:88:0f:4e: cd:f6:e5:96:aa:66:43:18:47:a0:58:ed:a9:4c:d2:5d: 4f:2a:9b:60:17:5f:b2:31:91:e9:d2:51:bf:bb:c8:31: 78:cd:c1:a3:c7:15:92:ce:55:60:72:13:01:df:5e:65: 99:90:f5:81:9a:96:a3:22:40:d1:84:ef:c5:fa:39:85: 15:59:4c:e4:b3:f9:f7:33:17:c3:20:63:6e:d1:96:aa: 4e:f2:48:29:c2:c6:7e:52:66:e5:01:ac:63:40:b7:9c: 39:95:6c:d0:81:28:48:1a:e1:bd:c1:e3:f3:c2:58:8b: d5:8c:ef:0f:45:29:37:17:80:ab:18:00:6e:2c:46:2b: 75:3f:ab:36:00:19:f3:43:33:e8:aa:f9:3a:34:b9:52: 62:0c:ee:5a:36:8b:a7:93:6a:a5:9a:dc:65:ec:cc:d5: 9f:6d:ed:6d:7a:0e:60:72:b0:91:2a:3b:38:86:e6:12: 59:da:a6:94:53:80:52:0a:cb:c8:02:46:55:8f:f3:3d Fingerprint (SHA-256): 68:11:7D:00:7A:14:D8:1F:F8:A4:04:A8:8A:E2:A1:82:50:B7:B5:77:87:89:2F:AA:72:FC:C7:9C:9E:1A:62:C9 Fingerprint (SHA1): 43:BD:B4:93:45:AA:B0:90:7E:22:36:7C:E4:68:78:CB:CA:EE:86:95 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1392: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221731 (0x374447e3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:24:09 2022 Not After : Tue Sep 27 22:24:09 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:62:00:79:d2:49:df:d2:2b:ed:b5:ed:8d:67:a0:0d: ca:44:fe:0f:d3:dc:da:58:e8:6a:22:05:50:9f:b8:31: b1:07:86:00:1b:dd:b1:1d:0d:97:2c:3e:fd:3a:dd:41: d8:e0:90:3f:3a:7a:67:d3:77:8c:f5:cf:de:bf:e5:4c: 76:dd:69:2c:ae:8e:31:3a:99:be:da:6e:78:0e:b6:71: e3:3a:76:d4:68:86:9f:86:f5:0e:7e:5c:d1:b5:27:14: 95:8e:97:59:7c:ad:a1:aa:cd:d7:07:f8:6b:58:86:9d: 11:f5:09:83:bb:66:7c:ea:4d:52:55:98:3a:70:1b:9a: 6d:7e:4d:a9:b9:3c:81:d6:33:3c:ad:4b:c7:01:66:d7: 59:6a:01:af:df:30:6a:27:6a:bd:51:da:4d:a3:5a:21: 9e:0e:9f:0f:22:c3:05:ce:f9:06:e4:dd:d3:ff:d6:47: ec:84:3b:b9:b3:94:f9:d0:67:43:ea:65:14:9a:ff:9b: 65:1b:04:7d:42:8c:d8:2a:89:79:95:79:f4:cf:be:85: a5:9f:ef:5a:39:06:15:06:b7:bc:04:e9:6e:0a:da:b4: 87:d6:e7:81:f6:3f:bf:23:35:e4:d1:37:9f:7d:49:c9: 69:7e:fa:8e:fe:63:28:db:9f:53:98:f7:44:a6:60:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:eb:16:c3:33:04:67:48:a0:b9:7a:15:ec:b2:c2:c4: 19:8a:c9:0a:c5:c5:e7:59:f1:1b:ab:21:d9:a0:b4:88: 16:c7:fc:a6:d4:5b:49:05:60:5d:de:88:ee:5c:cf:57: 46:b7:8b:0a:ff:3c:0e:6c:2d:81:d0:25:b5:88:0f:4e: cd:f6:e5:96:aa:66:43:18:47:a0:58:ed:a9:4c:d2:5d: 4f:2a:9b:60:17:5f:b2:31:91:e9:d2:51:bf:bb:c8:31: 78:cd:c1:a3:c7:15:92:ce:55:60:72:13:01:df:5e:65: 99:90:f5:81:9a:96:a3:22:40:d1:84:ef:c5:fa:39:85: 15:59:4c:e4:b3:f9:f7:33:17:c3:20:63:6e:d1:96:aa: 4e:f2:48:29:c2:c6:7e:52:66:e5:01:ac:63:40:b7:9c: 39:95:6c:d0:81:28:48:1a:e1:bd:c1:e3:f3:c2:58:8b: d5:8c:ef:0f:45:29:37:17:80:ab:18:00:6e:2c:46:2b: 75:3f:ab:36:00:19:f3:43:33:e8:aa:f9:3a:34:b9:52: 62:0c:ee:5a:36:8b:a7:93:6a:a5:9a:dc:65:ec:cc:d5: 9f:6d:ed:6d:7a:0e:60:72:b0:91:2a:3b:38:86:e6:12: 59:da:a6:94:53:80:52:0a:cb:c8:02:46:55:8f:f3:3d Fingerprint (SHA-256): 68:11:7D:00:7A:14:D8:1F:F8:A4:04:A8:8A:E2:A1:82:50:B7:B5:77:87:89:2F:AA:72:FC:C7:9C:9E:1A:62:C9 Fingerprint (SHA1): 43:BD:B4:93:45:AA:B0:90:7E:22:36:7C:E4:68:78:CB:CA:EE:86:95 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1393: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1394: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221731 (0x374447e3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:24:09 2022 Not After : Tue Sep 27 22:24:09 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:62:00:79:d2:49:df:d2:2b:ed:b5:ed:8d:67:a0:0d: ca:44:fe:0f:d3:dc:da:58:e8:6a:22:05:50:9f:b8:31: b1:07:86:00:1b:dd:b1:1d:0d:97:2c:3e:fd:3a:dd:41: d8:e0:90:3f:3a:7a:67:d3:77:8c:f5:cf:de:bf:e5:4c: 76:dd:69:2c:ae:8e:31:3a:99:be:da:6e:78:0e:b6:71: e3:3a:76:d4:68:86:9f:86:f5:0e:7e:5c:d1:b5:27:14: 95:8e:97:59:7c:ad:a1:aa:cd:d7:07:f8:6b:58:86:9d: 11:f5:09:83:bb:66:7c:ea:4d:52:55:98:3a:70:1b:9a: 6d:7e:4d:a9:b9:3c:81:d6:33:3c:ad:4b:c7:01:66:d7: 59:6a:01:af:df:30:6a:27:6a:bd:51:da:4d:a3:5a:21: 9e:0e:9f:0f:22:c3:05:ce:f9:06:e4:dd:d3:ff:d6:47: ec:84:3b:b9:b3:94:f9:d0:67:43:ea:65:14:9a:ff:9b: 65:1b:04:7d:42:8c:d8:2a:89:79:95:79:f4:cf:be:85: a5:9f:ef:5a:39:06:15:06:b7:bc:04:e9:6e:0a:da:b4: 87:d6:e7:81:f6:3f:bf:23:35:e4:d1:37:9f:7d:49:c9: 69:7e:fa:8e:fe:63:28:db:9f:53:98:f7:44:a6:60:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:eb:16:c3:33:04:67:48:a0:b9:7a:15:ec:b2:c2:c4: 19:8a:c9:0a:c5:c5:e7:59:f1:1b:ab:21:d9:a0:b4:88: 16:c7:fc:a6:d4:5b:49:05:60:5d:de:88:ee:5c:cf:57: 46:b7:8b:0a:ff:3c:0e:6c:2d:81:d0:25:b5:88:0f:4e: cd:f6:e5:96:aa:66:43:18:47:a0:58:ed:a9:4c:d2:5d: 4f:2a:9b:60:17:5f:b2:31:91:e9:d2:51:bf:bb:c8:31: 78:cd:c1:a3:c7:15:92:ce:55:60:72:13:01:df:5e:65: 99:90:f5:81:9a:96:a3:22:40:d1:84:ef:c5:fa:39:85: 15:59:4c:e4:b3:f9:f7:33:17:c3:20:63:6e:d1:96:aa: 4e:f2:48:29:c2:c6:7e:52:66:e5:01:ac:63:40:b7:9c: 39:95:6c:d0:81:28:48:1a:e1:bd:c1:e3:f3:c2:58:8b: d5:8c:ef:0f:45:29:37:17:80:ab:18:00:6e:2c:46:2b: 75:3f:ab:36:00:19:f3:43:33:e8:aa:f9:3a:34:b9:52: 62:0c:ee:5a:36:8b:a7:93:6a:a5:9a:dc:65:ec:cc:d5: 9f:6d:ed:6d:7a:0e:60:72:b0:91:2a:3b:38:86:e6:12: 59:da:a6:94:53:80:52:0a:cb:c8:02:46:55:8f:f3:3d Fingerprint (SHA-256): 68:11:7D:00:7A:14:D8:1F:F8:A4:04:A8:8A:E2:A1:82:50:B7:B5:77:87:89:2F:AA:72:FC:C7:9C:9E:1A:62:C9 Fingerprint (SHA1): 43:BD:B4:93:45:AA:B0:90:7E:22:36:7C:E4:68:78:CB:CA:EE:86:95 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1395: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1396: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1397: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1398: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221731 (0x374447e3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:24:09 2022 Not After : Tue Sep 27 22:24:09 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:62:00:79:d2:49:df:d2:2b:ed:b5:ed:8d:67:a0:0d: ca:44:fe:0f:d3:dc:da:58:e8:6a:22:05:50:9f:b8:31: b1:07:86:00:1b:dd:b1:1d:0d:97:2c:3e:fd:3a:dd:41: d8:e0:90:3f:3a:7a:67:d3:77:8c:f5:cf:de:bf:e5:4c: 76:dd:69:2c:ae:8e:31:3a:99:be:da:6e:78:0e:b6:71: e3:3a:76:d4:68:86:9f:86:f5:0e:7e:5c:d1:b5:27:14: 95:8e:97:59:7c:ad:a1:aa:cd:d7:07:f8:6b:58:86:9d: 11:f5:09:83:bb:66:7c:ea:4d:52:55:98:3a:70:1b:9a: 6d:7e:4d:a9:b9:3c:81:d6:33:3c:ad:4b:c7:01:66:d7: 59:6a:01:af:df:30:6a:27:6a:bd:51:da:4d:a3:5a:21: 9e:0e:9f:0f:22:c3:05:ce:f9:06:e4:dd:d3:ff:d6:47: ec:84:3b:b9:b3:94:f9:d0:67:43:ea:65:14:9a:ff:9b: 65:1b:04:7d:42:8c:d8:2a:89:79:95:79:f4:cf:be:85: a5:9f:ef:5a:39:06:15:06:b7:bc:04:e9:6e:0a:da:b4: 87:d6:e7:81:f6:3f:bf:23:35:e4:d1:37:9f:7d:49:c9: 69:7e:fa:8e:fe:63:28:db:9f:53:98:f7:44:a6:60:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:eb:16:c3:33:04:67:48:a0:b9:7a:15:ec:b2:c2:c4: 19:8a:c9:0a:c5:c5:e7:59:f1:1b:ab:21:d9:a0:b4:88: 16:c7:fc:a6:d4:5b:49:05:60:5d:de:88:ee:5c:cf:57: 46:b7:8b:0a:ff:3c:0e:6c:2d:81:d0:25:b5:88:0f:4e: cd:f6:e5:96:aa:66:43:18:47:a0:58:ed:a9:4c:d2:5d: 4f:2a:9b:60:17:5f:b2:31:91:e9:d2:51:bf:bb:c8:31: 78:cd:c1:a3:c7:15:92:ce:55:60:72:13:01:df:5e:65: 99:90:f5:81:9a:96:a3:22:40:d1:84:ef:c5:fa:39:85: 15:59:4c:e4:b3:f9:f7:33:17:c3:20:63:6e:d1:96:aa: 4e:f2:48:29:c2:c6:7e:52:66:e5:01:ac:63:40:b7:9c: 39:95:6c:d0:81:28:48:1a:e1:bd:c1:e3:f3:c2:58:8b: d5:8c:ef:0f:45:29:37:17:80:ab:18:00:6e:2c:46:2b: 75:3f:ab:36:00:19:f3:43:33:e8:aa:f9:3a:34:b9:52: 62:0c:ee:5a:36:8b:a7:93:6a:a5:9a:dc:65:ec:cc:d5: 9f:6d:ed:6d:7a:0e:60:72:b0:91:2a:3b:38:86:e6:12: 59:da:a6:94:53:80:52:0a:cb:c8:02:46:55:8f:f3:3d Fingerprint (SHA-256): 68:11:7D:00:7A:14:D8:1F:F8:A4:04:A8:8A:E2:A1:82:50:B7:B5:77:87:89:2F:AA:72:FC:C7:9C:9E:1A:62:C9 Fingerprint (SHA1): 43:BD:B4:93:45:AA:B0:90:7E:22:36:7C:E4:68:78:CB:CA:EE:86:95 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1399: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221731 (0x374447e3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:24:09 2022 Not After : Tue Sep 27 22:24:09 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:62:00:79:d2:49:df:d2:2b:ed:b5:ed:8d:67:a0:0d: ca:44:fe:0f:d3:dc:da:58:e8:6a:22:05:50:9f:b8:31: b1:07:86:00:1b:dd:b1:1d:0d:97:2c:3e:fd:3a:dd:41: d8:e0:90:3f:3a:7a:67:d3:77:8c:f5:cf:de:bf:e5:4c: 76:dd:69:2c:ae:8e:31:3a:99:be:da:6e:78:0e:b6:71: e3:3a:76:d4:68:86:9f:86:f5:0e:7e:5c:d1:b5:27:14: 95:8e:97:59:7c:ad:a1:aa:cd:d7:07:f8:6b:58:86:9d: 11:f5:09:83:bb:66:7c:ea:4d:52:55:98:3a:70:1b:9a: 6d:7e:4d:a9:b9:3c:81:d6:33:3c:ad:4b:c7:01:66:d7: 59:6a:01:af:df:30:6a:27:6a:bd:51:da:4d:a3:5a:21: 9e:0e:9f:0f:22:c3:05:ce:f9:06:e4:dd:d3:ff:d6:47: ec:84:3b:b9:b3:94:f9:d0:67:43:ea:65:14:9a:ff:9b: 65:1b:04:7d:42:8c:d8:2a:89:79:95:79:f4:cf:be:85: a5:9f:ef:5a:39:06:15:06:b7:bc:04:e9:6e:0a:da:b4: 87:d6:e7:81:f6:3f:bf:23:35:e4:d1:37:9f:7d:49:c9: 69:7e:fa:8e:fe:63:28:db:9f:53:98:f7:44:a6:60:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:eb:16:c3:33:04:67:48:a0:b9:7a:15:ec:b2:c2:c4: 19:8a:c9:0a:c5:c5:e7:59:f1:1b:ab:21:d9:a0:b4:88: 16:c7:fc:a6:d4:5b:49:05:60:5d:de:88:ee:5c:cf:57: 46:b7:8b:0a:ff:3c:0e:6c:2d:81:d0:25:b5:88:0f:4e: cd:f6:e5:96:aa:66:43:18:47:a0:58:ed:a9:4c:d2:5d: 4f:2a:9b:60:17:5f:b2:31:91:e9:d2:51:bf:bb:c8:31: 78:cd:c1:a3:c7:15:92:ce:55:60:72:13:01:df:5e:65: 99:90:f5:81:9a:96:a3:22:40:d1:84:ef:c5:fa:39:85: 15:59:4c:e4:b3:f9:f7:33:17:c3:20:63:6e:d1:96:aa: 4e:f2:48:29:c2:c6:7e:52:66:e5:01:ac:63:40:b7:9c: 39:95:6c:d0:81:28:48:1a:e1:bd:c1:e3:f3:c2:58:8b: d5:8c:ef:0f:45:29:37:17:80:ab:18:00:6e:2c:46:2b: 75:3f:ab:36:00:19:f3:43:33:e8:aa:f9:3a:34:b9:52: 62:0c:ee:5a:36:8b:a7:93:6a:a5:9a:dc:65:ec:cc:d5: 9f:6d:ed:6d:7a:0e:60:72:b0:91:2a:3b:38:86:e6:12: 59:da:a6:94:53:80:52:0a:cb:c8:02:46:55:8f:f3:3d Fingerprint (SHA-256): 68:11:7D:00:7A:14:D8:1F:F8:A4:04:A8:8A:E2:A1:82:50:B7:B5:77:87:89:2F:AA:72:FC:C7:9C:9E:1A:62:C9 Fingerprint (SHA1): 43:BD:B4:93:45:AA:B0:90:7E:22:36:7C:E4:68:78:CB:CA:EE:86:95 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1400: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221731 (0x374447e3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:24:09 2022 Not After : Tue Sep 27 22:24:09 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:62:00:79:d2:49:df:d2:2b:ed:b5:ed:8d:67:a0:0d: ca:44:fe:0f:d3:dc:da:58:e8:6a:22:05:50:9f:b8:31: b1:07:86:00:1b:dd:b1:1d:0d:97:2c:3e:fd:3a:dd:41: d8:e0:90:3f:3a:7a:67:d3:77:8c:f5:cf:de:bf:e5:4c: 76:dd:69:2c:ae:8e:31:3a:99:be:da:6e:78:0e:b6:71: e3:3a:76:d4:68:86:9f:86:f5:0e:7e:5c:d1:b5:27:14: 95:8e:97:59:7c:ad:a1:aa:cd:d7:07:f8:6b:58:86:9d: 11:f5:09:83:bb:66:7c:ea:4d:52:55:98:3a:70:1b:9a: 6d:7e:4d:a9:b9:3c:81:d6:33:3c:ad:4b:c7:01:66:d7: 59:6a:01:af:df:30:6a:27:6a:bd:51:da:4d:a3:5a:21: 9e:0e:9f:0f:22:c3:05:ce:f9:06:e4:dd:d3:ff:d6:47: ec:84:3b:b9:b3:94:f9:d0:67:43:ea:65:14:9a:ff:9b: 65:1b:04:7d:42:8c:d8:2a:89:79:95:79:f4:cf:be:85: a5:9f:ef:5a:39:06:15:06:b7:bc:04:e9:6e:0a:da:b4: 87:d6:e7:81:f6:3f:bf:23:35:e4:d1:37:9f:7d:49:c9: 69:7e:fa:8e:fe:63:28:db:9f:53:98:f7:44:a6:60:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:eb:16:c3:33:04:67:48:a0:b9:7a:15:ec:b2:c2:c4: 19:8a:c9:0a:c5:c5:e7:59:f1:1b:ab:21:d9:a0:b4:88: 16:c7:fc:a6:d4:5b:49:05:60:5d:de:88:ee:5c:cf:57: 46:b7:8b:0a:ff:3c:0e:6c:2d:81:d0:25:b5:88:0f:4e: cd:f6:e5:96:aa:66:43:18:47:a0:58:ed:a9:4c:d2:5d: 4f:2a:9b:60:17:5f:b2:31:91:e9:d2:51:bf:bb:c8:31: 78:cd:c1:a3:c7:15:92:ce:55:60:72:13:01:df:5e:65: 99:90:f5:81:9a:96:a3:22:40:d1:84:ef:c5:fa:39:85: 15:59:4c:e4:b3:f9:f7:33:17:c3:20:63:6e:d1:96:aa: 4e:f2:48:29:c2:c6:7e:52:66:e5:01:ac:63:40:b7:9c: 39:95:6c:d0:81:28:48:1a:e1:bd:c1:e3:f3:c2:58:8b: d5:8c:ef:0f:45:29:37:17:80:ab:18:00:6e:2c:46:2b: 75:3f:ab:36:00:19:f3:43:33:e8:aa:f9:3a:34:b9:52: 62:0c:ee:5a:36:8b:a7:93:6a:a5:9a:dc:65:ec:cc:d5: 9f:6d:ed:6d:7a:0e:60:72:b0:91:2a:3b:38:86:e6:12: 59:da:a6:94:53:80:52:0a:cb:c8:02:46:55:8f:f3:3d Fingerprint (SHA-256): 68:11:7D:00:7A:14:D8:1F:F8:A4:04:A8:8A:E2:A1:82:50:B7:B5:77:87:89:2F:AA:72:FC:C7:9C:9E:1A:62:C9 Fingerprint (SHA1): 43:BD:B4:93:45:AA:B0:90:7E:22:36:7C:E4:68:78:CB:CA:EE:86:95 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1401: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221731 (0x374447e3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:24:09 2022 Not After : Tue Sep 27 22:24:09 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:62:00:79:d2:49:df:d2:2b:ed:b5:ed:8d:67:a0:0d: ca:44:fe:0f:d3:dc:da:58:e8:6a:22:05:50:9f:b8:31: b1:07:86:00:1b:dd:b1:1d:0d:97:2c:3e:fd:3a:dd:41: d8:e0:90:3f:3a:7a:67:d3:77:8c:f5:cf:de:bf:e5:4c: 76:dd:69:2c:ae:8e:31:3a:99:be:da:6e:78:0e:b6:71: e3:3a:76:d4:68:86:9f:86:f5:0e:7e:5c:d1:b5:27:14: 95:8e:97:59:7c:ad:a1:aa:cd:d7:07:f8:6b:58:86:9d: 11:f5:09:83:bb:66:7c:ea:4d:52:55:98:3a:70:1b:9a: 6d:7e:4d:a9:b9:3c:81:d6:33:3c:ad:4b:c7:01:66:d7: 59:6a:01:af:df:30:6a:27:6a:bd:51:da:4d:a3:5a:21: 9e:0e:9f:0f:22:c3:05:ce:f9:06:e4:dd:d3:ff:d6:47: ec:84:3b:b9:b3:94:f9:d0:67:43:ea:65:14:9a:ff:9b: 65:1b:04:7d:42:8c:d8:2a:89:79:95:79:f4:cf:be:85: a5:9f:ef:5a:39:06:15:06:b7:bc:04:e9:6e:0a:da:b4: 87:d6:e7:81:f6:3f:bf:23:35:e4:d1:37:9f:7d:49:c9: 69:7e:fa:8e:fe:63:28:db:9f:53:98:f7:44:a6:60:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:eb:16:c3:33:04:67:48:a0:b9:7a:15:ec:b2:c2:c4: 19:8a:c9:0a:c5:c5:e7:59:f1:1b:ab:21:d9:a0:b4:88: 16:c7:fc:a6:d4:5b:49:05:60:5d:de:88:ee:5c:cf:57: 46:b7:8b:0a:ff:3c:0e:6c:2d:81:d0:25:b5:88:0f:4e: cd:f6:e5:96:aa:66:43:18:47:a0:58:ed:a9:4c:d2:5d: 4f:2a:9b:60:17:5f:b2:31:91:e9:d2:51:bf:bb:c8:31: 78:cd:c1:a3:c7:15:92:ce:55:60:72:13:01:df:5e:65: 99:90:f5:81:9a:96:a3:22:40:d1:84:ef:c5:fa:39:85: 15:59:4c:e4:b3:f9:f7:33:17:c3:20:63:6e:d1:96:aa: 4e:f2:48:29:c2:c6:7e:52:66:e5:01:ac:63:40:b7:9c: 39:95:6c:d0:81:28:48:1a:e1:bd:c1:e3:f3:c2:58:8b: d5:8c:ef:0f:45:29:37:17:80:ab:18:00:6e:2c:46:2b: 75:3f:ab:36:00:19:f3:43:33:e8:aa:f9:3a:34:b9:52: 62:0c:ee:5a:36:8b:a7:93:6a:a5:9a:dc:65:ec:cc:d5: 9f:6d:ed:6d:7a:0e:60:72:b0:91:2a:3b:38:86:e6:12: 59:da:a6:94:53:80:52:0a:cb:c8:02:46:55:8f:f3:3d Fingerprint (SHA-256): 68:11:7D:00:7A:14:D8:1F:F8:A4:04:A8:8A:E2:A1:82:50:B7:B5:77:87:89:2F:AA:72:FC:C7:9C:9E:1A:62:C9 Fingerprint (SHA1): 43:BD:B4:93:45:AA:B0:90:7E:22:36:7C:E4:68:78:CB:CA:EE:86:95 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1402: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221731 (0x374447e3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:24:09 2022 Not After : Tue Sep 27 22:24:09 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:62:00:79:d2:49:df:d2:2b:ed:b5:ed:8d:67:a0:0d: ca:44:fe:0f:d3:dc:da:58:e8:6a:22:05:50:9f:b8:31: b1:07:86:00:1b:dd:b1:1d:0d:97:2c:3e:fd:3a:dd:41: d8:e0:90:3f:3a:7a:67:d3:77:8c:f5:cf:de:bf:e5:4c: 76:dd:69:2c:ae:8e:31:3a:99:be:da:6e:78:0e:b6:71: e3:3a:76:d4:68:86:9f:86:f5:0e:7e:5c:d1:b5:27:14: 95:8e:97:59:7c:ad:a1:aa:cd:d7:07:f8:6b:58:86:9d: 11:f5:09:83:bb:66:7c:ea:4d:52:55:98:3a:70:1b:9a: 6d:7e:4d:a9:b9:3c:81:d6:33:3c:ad:4b:c7:01:66:d7: 59:6a:01:af:df:30:6a:27:6a:bd:51:da:4d:a3:5a:21: 9e:0e:9f:0f:22:c3:05:ce:f9:06:e4:dd:d3:ff:d6:47: ec:84:3b:b9:b3:94:f9:d0:67:43:ea:65:14:9a:ff:9b: 65:1b:04:7d:42:8c:d8:2a:89:79:95:79:f4:cf:be:85: a5:9f:ef:5a:39:06:15:06:b7:bc:04:e9:6e:0a:da:b4: 87:d6:e7:81:f6:3f:bf:23:35:e4:d1:37:9f:7d:49:c9: 69:7e:fa:8e:fe:63:28:db:9f:53:98:f7:44:a6:60:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:eb:16:c3:33:04:67:48:a0:b9:7a:15:ec:b2:c2:c4: 19:8a:c9:0a:c5:c5:e7:59:f1:1b:ab:21:d9:a0:b4:88: 16:c7:fc:a6:d4:5b:49:05:60:5d:de:88:ee:5c:cf:57: 46:b7:8b:0a:ff:3c:0e:6c:2d:81:d0:25:b5:88:0f:4e: cd:f6:e5:96:aa:66:43:18:47:a0:58:ed:a9:4c:d2:5d: 4f:2a:9b:60:17:5f:b2:31:91:e9:d2:51:bf:bb:c8:31: 78:cd:c1:a3:c7:15:92:ce:55:60:72:13:01:df:5e:65: 99:90:f5:81:9a:96:a3:22:40:d1:84:ef:c5:fa:39:85: 15:59:4c:e4:b3:f9:f7:33:17:c3:20:63:6e:d1:96:aa: 4e:f2:48:29:c2:c6:7e:52:66:e5:01:ac:63:40:b7:9c: 39:95:6c:d0:81:28:48:1a:e1:bd:c1:e3:f3:c2:58:8b: d5:8c:ef:0f:45:29:37:17:80:ab:18:00:6e:2c:46:2b: 75:3f:ab:36:00:19:f3:43:33:e8:aa:f9:3a:34:b9:52: 62:0c:ee:5a:36:8b:a7:93:6a:a5:9a:dc:65:ec:cc:d5: 9f:6d:ed:6d:7a:0e:60:72:b0:91:2a:3b:38:86:e6:12: 59:da:a6:94:53:80:52:0a:cb:c8:02:46:55:8f:f3:3d Fingerprint (SHA-256): 68:11:7D:00:7A:14:D8:1F:F8:A4:04:A8:8A:E2:A1:82:50:B7:B5:77:87:89:2F:AA:72:FC:C7:9C:9E:1A:62:C9 Fingerprint (SHA1): 43:BD:B4:93:45:AA:B0:90:7E:22:36:7C:E4:68:78:CB:CA:EE:86:95 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1403: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221731 (0x374447e3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:24:09 2022 Not After : Tue Sep 27 22:24:09 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:62:00:79:d2:49:df:d2:2b:ed:b5:ed:8d:67:a0:0d: ca:44:fe:0f:d3:dc:da:58:e8:6a:22:05:50:9f:b8:31: b1:07:86:00:1b:dd:b1:1d:0d:97:2c:3e:fd:3a:dd:41: d8:e0:90:3f:3a:7a:67:d3:77:8c:f5:cf:de:bf:e5:4c: 76:dd:69:2c:ae:8e:31:3a:99:be:da:6e:78:0e:b6:71: e3:3a:76:d4:68:86:9f:86:f5:0e:7e:5c:d1:b5:27:14: 95:8e:97:59:7c:ad:a1:aa:cd:d7:07:f8:6b:58:86:9d: 11:f5:09:83:bb:66:7c:ea:4d:52:55:98:3a:70:1b:9a: 6d:7e:4d:a9:b9:3c:81:d6:33:3c:ad:4b:c7:01:66:d7: 59:6a:01:af:df:30:6a:27:6a:bd:51:da:4d:a3:5a:21: 9e:0e:9f:0f:22:c3:05:ce:f9:06:e4:dd:d3:ff:d6:47: ec:84:3b:b9:b3:94:f9:d0:67:43:ea:65:14:9a:ff:9b: 65:1b:04:7d:42:8c:d8:2a:89:79:95:79:f4:cf:be:85: a5:9f:ef:5a:39:06:15:06:b7:bc:04:e9:6e:0a:da:b4: 87:d6:e7:81:f6:3f:bf:23:35:e4:d1:37:9f:7d:49:c9: 69:7e:fa:8e:fe:63:28:db:9f:53:98:f7:44:a6:60:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:eb:16:c3:33:04:67:48:a0:b9:7a:15:ec:b2:c2:c4: 19:8a:c9:0a:c5:c5:e7:59:f1:1b:ab:21:d9:a0:b4:88: 16:c7:fc:a6:d4:5b:49:05:60:5d:de:88:ee:5c:cf:57: 46:b7:8b:0a:ff:3c:0e:6c:2d:81:d0:25:b5:88:0f:4e: cd:f6:e5:96:aa:66:43:18:47:a0:58:ed:a9:4c:d2:5d: 4f:2a:9b:60:17:5f:b2:31:91:e9:d2:51:bf:bb:c8:31: 78:cd:c1:a3:c7:15:92:ce:55:60:72:13:01:df:5e:65: 99:90:f5:81:9a:96:a3:22:40:d1:84:ef:c5:fa:39:85: 15:59:4c:e4:b3:f9:f7:33:17:c3:20:63:6e:d1:96:aa: 4e:f2:48:29:c2:c6:7e:52:66:e5:01:ac:63:40:b7:9c: 39:95:6c:d0:81:28:48:1a:e1:bd:c1:e3:f3:c2:58:8b: d5:8c:ef:0f:45:29:37:17:80:ab:18:00:6e:2c:46:2b: 75:3f:ab:36:00:19:f3:43:33:e8:aa:f9:3a:34:b9:52: 62:0c:ee:5a:36:8b:a7:93:6a:a5:9a:dc:65:ec:cc:d5: 9f:6d:ed:6d:7a:0e:60:72:b0:91:2a:3b:38:86:e6:12: 59:da:a6:94:53:80:52:0a:cb:c8:02:46:55:8f:f3:3d Fingerprint (SHA-256): 68:11:7D:00:7A:14:D8:1F:F8:A4:04:A8:8A:E2:A1:82:50:B7:B5:77:87:89:2F:AA:72:FC:C7:9C:9E:1A:62:C9 Fingerprint (SHA1): 43:BD:B4:93:45:AA:B0:90:7E:22:36:7C:E4:68:78:CB:CA:EE:86:95 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1404: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1405: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1406: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221761 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1407: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1408: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #1409: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1410: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 927221762 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1411: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1412: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #1413: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1414: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 927221763 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1415: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1416: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #1417: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1418: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 927221764 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1419: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1420: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #1421: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1422: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 927221765 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1423: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1424: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #1425: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1426: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 927221766 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1427: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1428: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #1429: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1430: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 927221767 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1431: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1432: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1433: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221761 (0x37444801) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:25:09 2022 Not After : Tue Sep 27 22:25:09 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:19:e5:89:4a:fc:39:62:35:de:1b:ad:a1:9e:1b:2d: 03:be:37:38:26:4c:5d:5f:b5:6d:2b:12:57:4f:a5:8f: 6b:20:bf:f8:56:37:22:2f:2f:58:45:dc:d2:bc:d4:16: 13:fb:66:13:af:ca:51:b0:57:09:d3:b3:79:99:5e:28: a8:35:5b:7a:b3:06:70:e7:5a:87:04:d2:dd:26:82:ca: 07:d9:7e:c1:72:39:96:e9:ef:6c:ff:fd:86:f7:30:98: 91:f8:ea:25:67:ab:28:c4:0c:54:d1:b7:33:53:ef:44: cb:5c:76:fc:6d:49:e3:ca:99:52:84:0a:d8:90:e4:ce: 37:90:f0:36:08:d8:13:97:4f:33:9b:61:0e:f1:fb:68: 70:c5:5c:4c:99:9d:08:f9:35:76:e0:46:42:f7:20:ef: 78:9e:c4:39:70:0b:8d:bc:1b:20:89:fa:a8:86:30:79: 5e:dd:e6:39:34:45:73:0e:4c:02:14:6e:ef:28:77:11: 02:58:40:8b:36:ca:20:7e:b0:97:d2:ff:e2:fa:f7:a4: f3:53:02:6c:68:c6:cc:91:32:2b:b7:c3:13:93:8d:4a: 0a:53:da:e2:d2:c4:eb:c0:cc:a3:6f:00:47:27:41:29: 7e:9c:b3:d1:f4:22:3c:f3:01:c6:8d:ef:a7:d8:a6:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 55:80:e2:ba:33:c5:d4:a8:5c:ca:39:ff:90:bf:41:4a: 67:4d:f5:4b:75:fb:dc:8d:f5:06:35:cb:86:ad:6c:ba: 64:fb:af:bc:ea:24:1d:cd:bb:6c:a8:ff:94:77:18:37: 7c:9e:23:99:89:02:25:aa:21:df:eb:e0:47:50:df:97: 77:51:13:90:41:85:24:af:5a:fd:05:d2:6e:52:a8:c4: 33:d2:8b:ae:6d:3f:bc:f7:0d:34:b6:02:1b:fe:3b:5a: 15:bf:9b:56:2a:da:f8:cd:5a:b8:96:b2:a6:f8:ca:57: e3:31:19:03:5b:80:74:ff:43:8b:50:bf:3a:d4:4f:ee: 8b:ec:50:16:d9:16:9f:c6:18:a2:1a:0a:5f:ed:6a:21: 78:d7:d8:37:60:02:a5:04:93:7d:cb:e3:1f:0c:56:77: bf:e2:a6:bb:d8:0b:04:9d:b9:d5:58:38:51:ad:5b:02: 4c:59:fc:3b:95:d9:0a:f7:13:80:87:e3:3e:60:36:7c: 99:4f:f8:71:c6:f1:cd:ad:2e:e4:e8:51:fa:be:a5:a9: da:ba:38:13:f2:3e:4e:16:14:bb:be:66:a1:3c:cf:bf: aa:e0:46:db:a8:9d:0c:6a:85:1b:a8:6f:f0:e9:03:0e: b9:40:a8:b7:9c:15:53:34:71:62:70:e4:25:4e:50:a2 Fingerprint (SHA-256): FE:69:AC:D7:2B:A2:FE:8F:44:65:50:80:EA:18:14:DA:20:AE:31:FB:AF:D3:25:7C:CC:D2:63:98:3C:D6:8E:E9 Fingerprint (SHA1): 5C:1C:EB:0B:4F:07:80:88:DB:0B:3F:19:D6:CF:65:61:EE:1C:E4:00 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1434: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1435: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1436: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1437: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221761 (0x37444801) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:25:09 2022 Not After : Tue Sep 27 22:25:09 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:19:e5:89:4a:fc:39:62:35:de:1b:ad:a1:9e:1b:2d: 03:be:37:38:26:4c:5d:5f:b5:6d:2b:12:57:4f:a5:8f: 6b:20:bf:f8:56:37:22:2f:2f:58:45:dc:d2:bc:d4:16: 13:fb:66:13:af:ca:51:b0:57:09:d3:b3:79:99:5e:28: a8:35:5b:7a:b3:06:70:e7:5a:87:04:d2:dd:26:82:ca: 07:d9:7e:c1:72:39:96:e9:ef:6c:ff:fd:86:f7:30:98: 91:f8:ea:25:67:ab:28:c4:0c:54:d1:b7:33:53:ef:44: cb:5c:76:fc:6d:49:e3:ca:99:52:84:0a:d8:90:e4:ce: 37:90:f0:36:08:d8:13:97:4f:33:9b:61:0e:f1:fb:68: 70:c5:5c:4c:99:9d:08:f9:35:76:e0:46:42:f7:20:ef: 78:9e:c4:39:70:0b:8d:bc:1b:20:89:fa:a8:86:30:79: 5e:dd:e6:39:34:45:73:0e:4c:02:14:6e:ef:28:77:11: 02:58:40:8b:36:ca:20:7e:b0:97:d2:ff:e2:fa:f7:a4: f3:53:02:6c:68:c6:cc:91:32:2b:b7:c3:13:93:8d:4a: 0a:53:da:e2:d2:c4:eb:c0:cc:a3:6f:00:47:27:41:29: 7e:9c:b3:d1:f4:22:3c:f3:01:c6:8d:ef:a7:d8:a6:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 55:80:e2:ba:33:c5:d4:a8:5c:ca:39:ff:90:bf:41:4a: 67:4d:f5:4b:75:fb:dc:8d:f5:06:35:cb:86:ad:6c:ba: 64:fb:af:bc:ea:24:1d:cd:bb:6c:a8:ff:94:77:18:37: 7c:9e:23:99:89:02:25:aa:21:df:eb:e0:47:50:df:97: 77:51:13:90:41:85:24:af:5a:fd:05:d2:6e:52:a8:c4: 33:d2:8b:ae:6d:3f:bc:f7:0d:34:b6:02:1b:fe:3b:5a: 15:bf:9b:56:2a:da:f8:cd:5a:b8:96:b2:a6:f8:ca:57: e3:31:19:03:5b:80:74:ff:43:8b:50:bf:3a:d4:4f:ee: 8b:ec:50:16:d9:16:9f:c6:18:a2:1a:0a:5f:ed:6a:21: 78:d7:d8:37:60:02:a5:04:93:7d:cb:e3:1f:0c:56:77: bf:e2:a6:bb:d8:0b:04:9d:b9:d5:58:38:51:ad:5b:02: 4c:59:fc:3b:95:d9:0a:f7:13:80:87:e3:3e:60:36:7c: 99:4f:f8:71:c6:f1:cd:ad:2e:e4:e8:51:fa:be:a5:a9: da:ba:38:13:f2:3e:4e:16:14:bb:be:66:a1:3c:cf:bf: aa:e0:46:db:a8:9d:0c:6a:85:1b:a8:6f:f0:e9:03:0e: b9:40:a8:b7:9c:15:53:34:71:62:70:e4:25:4e:50:a2 Fingerprint (SHA-256): FE:69:AC:D7:2B:A2:FE:8F:44:65:50:80:EA:18:14:DA:20:AE:31:FB:AF:D3:25:7C:CC:D2:63:98:3C:D6:8E:E9 Fingerprint (SHA1): 5C:1C:EB:0B:4F:07:80:88:DB:0B:3F:19:D6:CF:65:61:EE:1C:E4:00 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1438: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1439: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1440: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1441: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221768 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1442: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1443: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1444: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1445: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927221769 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1446: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1447: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1448: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1449: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927221770 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1450: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1451: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1452: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1453: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 927221771 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1454: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1455: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1456: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1457: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1458: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1459: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221768 (0x37444808) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:25:24 2022 Not After : Tue Sep 27 22:25:24 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:03:bb:4b:dc:bd:32:90:8b:5d:b9:c2:4f:33:3c:18: 83:7e:4c:07:b8:31:2e:9c:6f:00:53:10:30:22:40:34: 7b:f2:6c:b7:42:7a:55:ea:b4:fb:32:12:55:2b:5a:51: af:63:76:97:30:c0:c7:cb:37:a3:aa:63:c7:c0:69:7f: 0c:2c:0c:16:6f:0d:ca:a8:8e:6f:f6:ca:30:97:a9:da: cb:f3:a7:7a:6f:88:12:e6:32:ad:2d:0d:e2:a7:b9:ff: 6f:0f:bf:c6:eb:ba:07:bf:6f:83:7b:fe:ad:a3:5a:93: 77:75:8e:5c:00:da:f4:6a:c1:04:50:d4:bf:6f:f2:b3: 1c:52:68:fc:e8:26:7c:b4:21:7e:fe:82:02:4e:70:20: e4:b5:20:f0:05:6f:ab:b5:e3:53:b5:a3:e6:40:fa:06: e4:6f:6e:1f:99:77:30:5d:07:7e:ca:aa:d3:50:a2:53: 5d:7d:3d:ef:59:eb:eb:23:84:c9:ef:ef:4f:c3:d6:bb: 4c:1a:6c:3f:de:6b:cb:fc:2b:a2:6c:00:fb:ee:39:0f: dd:59:76:07:ba:64:3a:cd:84:46:5e:49:57:0d:0d:87: 19:1f:92:8a:d7:97:c4:3c:9e:ff:20:20:3f:89:66:0b: fc:f4:35:40:ae:59:95:13:a9:97:06:23:be:2e:48:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:d5:d1:d7:20:69:1e:ff:42:19:c0:bc:17:f2:f0:a4: ba:00:65:63:0f:22:f6:79:32:3d:34:2e:77:81:77:28: 34:10:6b:0e:ab:87:6c:32:c4:91:9f:81:dd:3a:b7:ba: 6f:1a:6c:9e:61:82:8c:48:d6:b4:f1:95:13:1a:9a:8c: 0d:3e:8c:99:a0:e3:9e:a8:d9:66:e5:a8:3c:66:84:28: 72:9a:07:7b:f8:43:2d:ce:0d:45:2b:4a:7a:1c:2e:5a: 93:27:16:1c:c6:59:65:bc:dd:cf:6a:3e:e6:13:1d:15: da:43:66:85:66:ef:0b:f3:c2:4a:9e:ab:73:c9:a3:a1: 4c:c1:03:ee:dc:76:05:9f:6e:5a:32:80:0f:a6:4f:ed: 62:0f:24:e2:db:ac:bd:ce:54:ed:2a:dc:da:2f:03:43: 07:55:3b:d7:31:e7:27:e4:69:a6:29:39:15:e4:07:91: 3f:f9:a8:e7:50:f6:47:99:7f:34:e4:8a:10:9e:03:56: a0:5f:88:19:91:b0:50:ff:ac:29:5f:5c:77:2c:6d:f8: 51:4d:d8:95:07:52:57:2a:b0:73:90:32:83:e3:48:38: 1b:4d:4f:56:21:5c:ac:4f:47:3a:98:f1:41:12:c6:a7: aa:12:73:cc:20:ae:4c:e2:7b:78:16:12:9d:30:0b:f0 Fingerprint (SHA-256): D7:DC:0F:00:A1:B4:A3:3E:07:D3:C4:01:79:CF:FB:DC:E6:44:E3:B9:62:8A:B1:EB:AC:C9:AF:A8:A4:48:43:34 Fingerprint (SHA1): 90:6E:EB:64:3A:BC:75:84:4F:D1:1B:95:2D:83:21:67:05:27:2D:D4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1460: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1461: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1462: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221769 (0x37444809) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:25:26 2022 Not After : Mon Sep 27 22:25:26 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:dc:07:01:23:8a:60:d5:77:ca:a5:46:0c:a4:40:ef: 72:46:61:e7:df:06:9c:dd:de:48:55:e6:2e:49:23:0d: f0:74:5d:59:c6:3b:86:80:05:a9:a6:81:a3:c6:79:90: 0c:60:b3:01:8c:18:14:f5:80:c3:aa:78:9b:5c:8c:77: d6:4c:53:6d:62:6c:08:4c:81:22:7f:18:50:9e:75:d1: ea:62:e4:74:ea:a4:29:56:28:9e:23:26:58:cc:2c:ac: 2c:b0:86:a2:4b:85:24:a2:71:68:80:de:21:67:34:a9: 31:24:5e:5a:69:87:0a:a0:7b:a2:f9:ef:80:ac:c5:5a: 96:4c:76:90:fc:2a:43:c8:e7:53:e9:b1:d8:29:70:64: 9d:4b:0f:42:24:e7:9b:85:19:f1:a9:a4:1d:00:62:3c: 4e:2b:a2:a0:b4:3b:c4:1a:15:7b:44:be:7d:ad:7e:7f: 93:80:fa:d0:cf:43:85:09:69:fa:0f:e0:de:9c:a3:af: a5:b4:9c:89:5b:a9:eb:9d:36:c6:f7:4a:17:11:4f:e0: d7:7c:10:bf:63:bb:1f:49:93:32:93:e1:5e:c6:e4:6b: d3:3b:fe:6d:e4:8c:be:20:c7:0e:9a:18:1d:54:59:31: 4c:b9:33:a6:fd:d4:b3:96:99:89:25:52:5a:f9:2e:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:84:e5:3a:c9:9d:5c:0d:c8:07:b1:6a:b3:0e:6b:0e: 00:26:ac:ed:20:60:8e:22:e7:ac:fe:36:03:11:f1:51: 5c:08:ad:bd:20:c7:6d:47:31:02:32:ba:77:dd:57:a2: 2d:c4:a7:66:68:aa:4a:af:b8:b5:2d:a7:3d:f5:f2:a1: ec:bf:31:f5:c7:87:29:a8:d4:1a:c0:b4:b4:62:47:c8: 11:57:63:fa:87:19:14:bf:d0:ee:b1:fb:e1:a0:e5:b7: 1e:b9:52:d5:b4:8d:5b:a7:ea:3c:40:dd:c8:5b:80:15: 3f:a3:0e:00:d3:a0:31:83:fc:6e:fe:4d:a8:cc:e7:77: 19:99:9b:b5:7e:5b:77:27:fb:d0:8d:ad:f9:cb:d6:46: 5b:21:18:88:e3:53:a2:6b:7f:dd:03:59:23:1b:ec:0f: 9d:06:47:d0:c6:f3:22:7c:5f:cf:78:ad:05:d9:14:f0: 29:e9:bf:31:c1:64:48:63:9e:57:4d:3c:2b:67:f9:b4: e8:a8:dc:1a:2b:5a:2b:f1:fc:80:6e:4c:e2:d4:38:de: a7:79:ba:8e:20:02:c4:dd:30:da:fc:8f:40:f7:b3:08: 29:7e:4f:3b:20:e8:d4:1b:99:66:9a:16:c5:37:4b:26: d5:f9:30:56:5a:bc:eb:41:38:be:b2:ba:37:c0:68:8c Fingerprint (SHA-256): 95:0D:41:3C:1D:A1:E6:3A:5D:AB:E4:B8:C4:72:66:10:EA:A3:D9:C1:5F:21:51:11:94:E3:96:B2:82:5E:73:B5 Fingerprint (SHA1): 8F:70:C0:82:AC:13:FE:E0:34:4C:A5:0A:B5:7A:A6:AC:27:5D:41:54 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1463: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1464: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221770 (0x3744480a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 22:25:27 2022 Not After : Mon Sep 27 22:25:27 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:8d:63:45:e7:6c:a8:ed:fb:f7:52:a9:02:1c:9c:55: b5:da:23:23:36:8e:7c:4a:64:61:f2:1c:bd:81:18:ac: 72:18:2d:a4:2a:b4:2f:c2:a8:74:99:e5:70:57:7c:c1: f7:b3:64:d4:58:84:b0:36:ea:b6:59:66:fb:c1:68:a5: a6:63:46:d4:b7:99:ef:bb:84:ed:ef:cb:8f:6d:7c:17: 45:49:d4:f9:70:aa:2f:3e:0b:77:9c:72:c4:8d:ff:21: e6:91:51:59:94:7b:2d:31:07:30:c3:71:df:b6:44:d5: 36:ae:9f:26:0f:2a:98:b9:9e:32:f1:5f:33:1f:71:53: ba:aa:15:51:57:49:8f:1e:be:11:6a:ad:4e:96:1a:89: 9b:01:1e:8c:ad:a9:67:aa:05:fd:55:4d:e9:dc:f3:6e: 35:de:44:a8:f7:06:33:f4:9d:87:84:d7:f2:a0:f4:04: b0:e3:2a:ce:a3:7b:27:7d:03:17:82:be:90:b2:f9:5d: a1:54:51:4a:07:56:58:99:90:bf:1f:fe:f0:0f:19:5a: 99:d9:07:f7:b2:4e:cd:58:ac:db:a9:e0:fe:1e:12:70: 3b:d7:f4:9a:5b:20:5b:95:64:76:46:e9:22:ca:d1:94: af:25:ec:33:12:36:6b:db:4c:75:1c:84:83:db:86:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8a:0b:1e:55:1b:df:c4:21:06:8c:4c:b7:8c:b4:37:8c: c5:d9:4c:e2:7e:42:d5:2c:99:61:6b:7a:32:c3:dd:48: 01:ee:f6:83:ba:a4:02:c0:51:61:64:37:b4:06:8d:8f: a9:a7:fa:38:ae:f4:78:71:d3:7e:bf:11:1b:f1:85:ad: fb:c3:b4:d3:9f:15:ae:bd:8a:7b:d6:3e:74:f1:55:f0: 06:f0:70:b7:7b:83:2b:da:05:16:55:03:0d:f9:30:63: 08:9b:d5:64:90:c6:b0:94:d6:22:a3:8d:89:90:4b:41: e9:e6:11:67:c6:b5:7e:78:1d:e6:41:09:13:3d:d1:da: 41:fd:76:10:09:bb:d1:e6:47:66:57:01:05:9d:9e:2d: bb:9f:45:95:9c:e5:e6:32:79:94:52:64:e6:7e:f8:4e: 0b:a7:b6:d9:9a:33:12:f5:9f:a1:9a:77:59:60:37:91: bf:a7:0e:27:75:d3:fa:9e:72:2c:8f:f2:4f:c7:e4:16: 85:46:79:c2:04:a5:7d:2c:b2:4f:81:bc:dd:46:91:05: 0c:c4:39:07:96:71:f3:5f:c7:dc:e5:63:0d:4b:ba:45: 35:2d:48:9a:52:3f:73:54:d7:0d:41:2c:0e:07:ab:42: 6f:32:7e:9d:80:a0:3a:bd:2d:0f:8a:21:23:43:d0:8a Fingerprint (SHA-256): 11:1D:77:95:C4:F6:70:BC:8B:6F:7B:7E:E8:7D:FA:E0:52:62:B6:48:34:4F:CA:11:D4:70:5A:D5:46:E5:F0:E1 Fingerprint (SHA1): D1:7A:97:3C:28:F5:91:2B:D6:3C:E0:67:75:45:20:53:CE:55:01:D3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1465: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1466: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221772 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1467: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1468: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1469: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1470: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927221773 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1471: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1472: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1473: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1474: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927221774 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1475: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1476: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1477: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1478: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 927221775 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1479: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1480: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1481: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1482: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 927221776 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1483: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1484: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1485: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1486: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1487: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1488: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #1489: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221772 (0x3744480c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:25:34 2022 Not After : Tue Sep 27 22:25:34 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:05:fb:69:db:33:da:30:6b:c4:13:39:d0:31:52:22: 19:7e:fa:6e:ff:17:ea:97:8d:a7:0c:ce:ca:2f:e5:14: 27:5c:48:be:ba:8a:15:73:e5:1c:2d:97:35:9f:30:1c: d9:5b:7c:2a:44:72:93:22:6b:20:cf:5d:40:f3:d0:87: 32:87:99:89:da:84:d0:c9:c3:9b:ea:cb:83:24:24:79: 31:66:47:74:20:5e:5d:d3:93:cd:53:0f:be:1c:4c:c2: 9b:84:d0:2a:f5:23:4e:40:4c:e3:38:3b:e2:25:da:8f: f1:74:af:16:65:4f:fe:2b:05:b1:4e:71:fe:a5:81:b7: 7c:70:3a:24:63:e9:72:1c:6a:64:c5:18:b2:39:50:e8: 89:54:d0:20:6d:35:98:b3:44:2f:8c:ce:74:7b:e3:ca: db:a9:38:ec:ea:08:cf:d9:9d:7d:91:a5:38:33:e2:c6: f2:0b:ca:da:44:b7:f3:3f:b3:b1:bf:34:ae:2b:57:e5: 58:69:d5:46:45:31:40:d2:f4:07:e8:93:7f:be:f8:e6: c9:74:a7:c0:9a:08:87:ec:8c:1e:19:22:73:86:65:f1: 74:e5:34:37:43:b3:d4:fb:98:f1:d9:35:8e:86:da:be: 36:4e:d7:80:85:1e:8b:4f:51:ab:2d:78:e7:1b:1b:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:fa:9f:89:bf:73:d7:23:17:d3:2a:e0:da:47:b4:17: 1b:93:97:41:9a:09:c7:13:08:d6:33:cf:79:16:45:13: af:d1:72:44:b5:48:0c:f0:46:79:07:25:de:02:ed:9f: 22:83:d2:86:0b:96:8b:e6:66:2d:cc:14:1d:b8:9a:38: 7b:24:17:c2:1b:3c:35:9d:d6:a1:d1:9c:16:e7:71:06: a7:cc:54:0d:1b:a9:7c:c6:02:86:7e:e2:c4:03:a1:64: 04:9e:5e:76:2f:82:97:fd:6e:c5:c9:00:59:9d:78:c2: 2f:c3:7f:fb:74:e3:bd:6f:4b:0c:4d:c9:49:bf:43:1b: 11:35:ff:ff:25:09:20:be:24:c7:90:76:8e:5a:37:b5: 58:df:0e:a4:8d:dc:cc:c1:89:66:c2:69:4c:cd:c5:ae: 31:25:e7:68:c5:b4:49:5a:7b:75:f1:b8:c2:a7:0f:9b: b9:41:d9:27:9d:fe:c6:8f:9c:09:16:10:5c:b9:e1:17: e7:c2:33:53:02:4c:e8:51:e5:f4:13:3e:f5:63:98:bc: b7:74:cc:65:36:c4:85:a3:36:a7:51:2b:52:28:73:ef: 57:12:1e:ea:de:a4:d5:d8:88:5b:f1:35:8d:90:18:4f: 2f:f0:2c:44:6a:64:95:c7:97:a6:a3:d1:00:66:3f:47 Fingerprint (SHA-256): 05:86:FC:97:51:D4:F8:68:0C:E8:F2:2C:A9:44:5D:AB:FC:A4:11:0E:FB:8D:C5:E8:49:3D:A8:D4:88:F0:9E:FC Fingerprint (SHA1): CE:9B:F4:0E:62:E5:FB:2D:3F:C7:BA:39:6B:FA:FE:FC:3E:F2:43:83 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1490: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1491: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221773 (0x3744480d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:25:36 2022 Not After : Mon Sep 27 22:25:36 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:09:7d:8f:d2:58:e1:78:e3:68:cc:20:25:0d:80:e6: ec:0b:7d:f1:62:49:34:af:fa:e1:d7:9c:92:d5:a1:12: 6f:3e:38:ad:3e:bd:2a:14:48:e4:6d:f8:bb:59:b1:49: 96:0c:14:dc:d4:8a:38:b1:cf:32:50:cd:f2:87:64:bb: 98:5f:8e:6c:e4:16:fc:7b:d2:7a:55:85:9d:e8:0b:0f: 2d:32:38:0a:40:db:ff:4c:e5:61:bb:92:a2:b9:19:53: e2:cb:74:50:1b:ab:5b:ca:97:a7:61:96:fa:61:57:8e: 9e:69:db:97:a5:97:5e:71:06:7b:5d:30:49:7a:70:10: d9:da:a4:19:d7:5e:b3:8e:71:21:90:e6:f0:b5:f9:a2: 8e:3a:3d:e9:f7:1b:31:2a:a8:c9:7f:cd:16:d4:af:4f: 53:4e:58:4d:11:d4:9f:70:5b:e2:bf:49:da:74:18:8d: 8f:71:24:d5:d7:df:83:f8:87:34:95:07:ae:1e:8f:82: ad:99:4d:80:be:49:20:48:4e:cb:bd:67:66:d2:7a:9a: 18:11:ec:5b:f5:c8:fb:83:48:81:4b:4e:32:cb:1a:b7: 3f:77:5a:b1:80:9c:d1:0c:fc:49:f8:33:6e:8c:5c:8e: 34:43:42:0d:6b:1c:cf:13:c9:e1:62:12:0e:65:a4:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:15:97:60:ed:26:57:a9:8f:53:2d:73:f2:5b:59:5e: aa:ee:b6:cc:d1:8b:7d:0b:0b:25:fe:c9:1d:a6:f0:b2: 5f:1f:33:09:fb:ef:e0:71:6d:43:78:39:d2:5c:97:bf: 09:96:8b:75:c8:6e:6c:1b:77:62:69:a9:25:d8:af:31: 2d:be:36:c6:ee:a3:e6:54:41:8d:2f:8a:02:62:f5:43: 9b:c2:17:e4:fe:53:8e:25:1b:4f:fb:a1:c2:a8:93:f5: e3:6f:f9:53:1f:de:49:ab:06:53:02:66:a5:14:e4:06: 8c:22:b9:c1:96:2d:2a:f0:6a:b3:3d:3f:eb:65:1a:b7: e2:13:8b:54:62:a8:d2:44:44:36:ac:60:ab:51:9b:95: 05:61:45:5c:6a:68:6d:7f:12:a3:58:7c:a8:5e:74:c3: 89:f9:ef:71:57:e6:c7:51:39:01:1f:a6:ab:17:f7:29: 59:f0:8c:17:1d:da:f2:7c:f6:9e:6e:18:e6:91:5e:02: a2:59:0c:5e:e2:ff:79:d3:b4:e8:0e:b8:c2:52:1a:0e: f9:93:38:6f:81:74:73:ce:ee:da:3a:4f:f4:f5:50:1f: e5:32:60:61:d9:aa:00:4c:47:82:87:3f:eb:a9:c9:6e: 63:06:00:93:26:a3:2b:4c:ad:df:1a:d0:0f:e5:5a:af Fingerprint (SHA-256): 12:AA:98:A0:C2:03:25:2D:89:02:A1:10:4F:52:9A:2E:21:0F:42:54:66:89:84:B1:9D:BF:C5:A9:62:65:9C:28 Fingerprint (SHA1): 39:06:FE:FB:1A:5B:2C:95:39:D1:64:AE:7F:9E:93:B1:28:FA:FF:73 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1492: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1493: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1494: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221774 (0x3744480e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 22:25:37 2022 Not After : Mon Sep 27 22:25:37 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:a7:e3:99:69:3d:21:bd:62:86:4f:d3:97:64:df:87: bc:5f:d9:61:21:c4:7d:dd:ab:f4:fd:25:72:38:70:92: b2:0e:d8:9c:95:b8:c2:2f:eb:20:89:67:48:72:bc:8e: fd:b1:05:58:48:21:db:66:6e:a8:dd:98:38:b9:51:46: 78:1a:e0:01:14:f7:fe:d8:b4:1a:0d:eb:d5:e4:7a:80: 0c:11:98:13:64:50:41:e2:86:2a:f6:c8:2a:f0:21:a7: 39:74:b6:78:1d:44:8b:8c:c0:4d:77:20:89:03:b1:eb: 05:cb:6b:9a:fe:27:3a:9f:e5:3d:8d:b8:48:0c:fa:78: 5b:26:ff:cb:26:df:4c:81:c8:ca:76:7e:06:45:ef:d0: 68:34:ba:d7:cf:b3:c1:4c:91:45:25:e2:b4:ba:04:1c: b9:37:46:47:a3:1d:c3:80:8e:39:a5:e8:c6:aa:23:8c: f4:12:bf:03:2b:9a:a8:d7:77:5a:4e:e5:5d:8f:7c:8e: f3:e3:1c:db:b2:6a:16:db:6d:19:5a:7d:7f:c9:f2:9c: 72:67:cf:95:93:69:6c:b2:cf:f9:dd:af:8b:e8:7e:b3: 87:72:4b:a5:e1:9f:9c:83:b4:72:9f:d0:70:bd:75:3f: 77:3c:e5:b8:3b:6a:ad:8e:38:d1:e3:cb:ae:d6:95:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:86:98:c6:61:7f:5c:82:34:48:ff:7a:47:71:55:77: c3:9e:ed:e6:12:14:b0:46:c5:3f:c7:bf:9a:ca:4a:46: 66:90:be:4b:60:12:b5:c4:38:f9:08:9e:48:e6:5f:ae: 4a:37:5b:ca:32:1a:b2:4d:bb:2c:17:04:84:49:49:16: af:08:12:ac:d8:7d:18:76:5c:4a:e0:85:12:cd:d8:62: 1b:72:cc:1d:11:ee:ed:a2:6f:a3:64:ec:6d:73:e1:3e: b3:82:3b:eb:fd:22:f6:49:d7:ce:43:4b:a2:e2:df:10: 1b:d1:5c:6e:5f:db:70:7b:3b:14:15:3c:09:6f:f9:da: 03:ff:dc:1a:24:f3:b7:58:34:9f:fa:78:09:70:a1:10: 78:bc:92:eb:b7:74:e9:f1:83:8b:3a:85:83:63:72:cc: 37:fc:2e:67:0a:95:f4:a7:19:06:04:e4:51:39:ba:9a: 2a:92:ec:78:35:9a:74:83:54:86:c2:b0:a2:aa:34:17: b1:df:13:b9:8b:9b:ee:78:48:e7:0a:f3:28:f6:d5:7a: 8b:e2:22:22:aa:15:b5:c5:f6:9b:bf:ce:9a:f8:ec:53: 53:74:d6:d2:3d:e1:30:af:6e:6b:2f:3d:3e:c3:4b:e8: 13:5a:65:9e:1a:a9:aa:0b:60:6c:74:d8:fb:ac:54:a7 Fingerprint (SHA-256): DD:70:77:79:24:E1:46:4F:9A:06:3C:B6:8C:9A:23:9E:49:84:93:A2:9B:93:7D:6E:2E:04:DF:2E:C8:A9:C1:87 Fingerprint (SHA1): 00:02:73:E4:C5:AC:00:34:3E:14:7B:43:C4:ED:C7:34:E1:73:4A:6F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1495: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1496: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221777 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1497: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1498: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1499: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1500: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927221778 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1501: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1502: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1503: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1504: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927221779 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA1Root-927221540.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1505: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1506: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1507: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1508: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 927221780 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1509: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1510: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #1511: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221777 (0x37444811) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:25:45 2022 Not After : Tue Sep 27 22:25:45 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:99:ca:ac:30:2b:58:ec:78:ed:ea:3d:30:09:d5:99: f8:7e:93:6b:b0:4e:95:d9:1e:ea:87:09:e9:49:0b:09: 04:37:b6:aa:f3:99:67:74:09:9b:fa:ad:92:e4:a6:75: 0c:a1:21:cb:78:2b:98:ef:b3:52:03:d4:c2:f5:08:cd: 4a:0f:30:25:2a:d6:18:49:c5:7a:25:52:25:fc:74:06: 24:d3:ba:a4:d1:0a:5e:fd:e8:28:c2:46:57:17:a5:1b: ec:d4:83:89:93:16:4b:f0:81:42:30:f8:8c:59:d1:b9: 43:fa:18:94:6f:c7:67:ae:ab:f5:3d:e6:2b:ea:f3:86: 69:b3:63:41:ee:e0:17:79:8d:59:e0:9e:80:68:dc:3f: a4:0f:ff:87:ad:80:a6:f3:c1:ff:37:e2:9d:26:ae:29: 1a:5f:f1:5c:5c:a5:7b:b6:5e:c1:63:68:9c:16:ba:0f: 57:a7:3a:6d:82:ed:11:2b:49:e2:7c:f5:a5:25:14:96: 97:be:89:b0:78:21:df:3b:6b:a7:49:a4:c4:60:e0:a0: e6:85:b2:c7:d8:3e:95:4a:b7:02:ab:43:73:c1:57:6f: 8c:6d:1e:13:46:74:c1:41:99:3e:3a:19:08:a5:56:23: 00:4d:4a:38:7f:81:cf:83:5a:5c:8e:af:6d:8f:d8:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:aa:5b:d1:de:ee:7e:63:e3:14:db:35:ca:20:f9:c3: 09:3e:48:2e:b4:67:ca:51:e0:7a:c3:75:4c:61:bd:60: 13:4f:12:07:a1:41:00:ea:45:48:88:8d:66:91:cd:a2: 31:17:1b:eb:56:ec:51:dd:4b:9c:0d:86:45:f1:6b:5a: 78:0d:0b:de:a6:3a:5a:2d:94:d7:d7:b7:f6:6c:54:ea: 87:f1:e4:4b:40:ab:52:00:0e:ea:6a:d9:f6:1b:f6:9f: a0:d0:48:9e:8a:be:13:b4:30:55:fa:77:22:76:bd:2a: 94:e5:db:de:a5:dc:ce:30:05:f6:2a:97:86:2a:37:7b: 4d:1e:9e:cc:04:79:1b:99:d9:f8:7a:10:36:56:6f:40: b2:67:83:42:b9:59:23:63:38:92:60:0b:d9:ae:83:6d: b1:8f:d6:e6:f0:c2:1f:6f:2d:a9:80:6a:fc:3f:2f:4d: b2:4e:cd:c5:64:31:fb:70:65:97:c0:ea:16:fb:86:46: 34:55:ff:e8:d1:f4:8c:5d:01:c4:9e:61:c7:ce:5d:fa: a8:42:19:d2:95:56:60:6a:58:b0:06:31:6e:fc:b5:9e: 53:d6:11:89:65:b8:aa:6c:df:68:33:99:2c:3e:0e:47: 08:15:40:c4:2d:29:a9:ac:a3:aa:12:41:75:21:a6:72 Fingerprint (SHA-256): 7E:7F:9C:34:67:5A:6B:7B:E3:18:EC:C4:B8:DD:39:BC:76:17:9F:BF:4A:EF:5F:7C:4B:9D:7F:3C:5E:73:AD:BE Fingerprint (SHA1): AB:29:09:9B:33:7A:8D:4E:B5:04:A9:1F:38:79:4A:75:5F:73:DF:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1512: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1513: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221781 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1514: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1515: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1516: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221782 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1517: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1518: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1519: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1520: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 927221783 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1521: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1522: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 927221784 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1523: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1524: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1525: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1526: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1527: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 927221785 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-Bridge-927221541.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1528: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1529: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1530: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1531: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 927221786 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1532: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1533: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1534: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1535: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221782 (0x37444816) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 22:25:53 2022 Not After : Tue Sep 27 22:25:53 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:24:80:9b:98:55:1d:10:a4:3e:69:cb:68:a8:7a:93: a1:84:96:17:5d:f4:2b:48:03:77:c2:c8:19:bf:f4:64: a1:59:0c:44:e0:d7:78:3c:b6:c3:4c:f7:9a:2f:ec:94: 5a:2c:ca:2d:ba:8e:30:3b:57:84:1b:b6:de:1c:94:2c: 36:86:1b:a2:63:d9:4d:4e:62:a8:90:8c:20:a3:6b:f2: 98:e4:a7:cc:6b:d1:57:6e:87:17:4f:cb:e8:b3:95:3d: 9d:ab:29:b7:9c:10:5f:ec:0a:17:a1:a2:17:eb:6e:c9: 99:88:0e:3e:f4:b6:b2:3b:cd:34:34:70:b6:94:40:97: 7b:e8:01:dc:be:4f:ae:54:98:cb:4c:03:fa:20:fd:2a: 0c:5d:fd:b4:9a:67:07:b2:67:81:d2:28:60:af:a4:33: 84:02:16:d3:fb:05:65:3f:77:33:06:98:90:3c:bd:4e: b1:06:fe:74:5d:f3:43:f5:2e:fc:4f:ed:56:30:7b:26: df:81:73:cf:cc:e2:e3:11:d4:fe:5d:86:1a:50:33:f8: 4e:10:9c:48:6b:86:3b:7e:c2:38:e6:a6:e3:14:ec:dc: 45:7c:29:3f:bf:07:82:b3:ab:b1:fc:d7:95:c2:1b:d8: e3:bd:71:70:c9:c1:a3:66:ad:25:34:87:a7:31:9a:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:a4:3a:b2:ca:33:c3:3c:39:0b:39:e7:3d:d1:4b:73: 1f:27:8a:d5:ae:ee:ce:2f:01:db:ae:5d:3a:05:79:c2: 1e:87:4d:3a:23:71:5a:7d:c6:c6:d8:4d:6e:3d:d2:5d: 85:eb:99:af:3b:30:8f:fd:14:bc:f6:3f:c2:e2:41:23: 98:f2:91:17:85:d1:43:a0:6b:e0:c0:af:63:04:cc:89: 99:26:02:7c:1e:e6:a6:53:b5:11:ab:e7:b1:0c:f2:c4: 38:f6:ed:21:b9:a6:dc:c2:97:30:a8:01:f4:a5:92:48: 48:99:1e:e5:0f:28:9c:e4:90:d4:57:47:a4:55:49:0a: a3:74:44:06:00:32:cf:e7:ea:c3:3d:fb:02:fa:2b:d2: 77:66:94:e3:5a:55:f7:b4:bb:ef:d0:a4:0f:8b:1a:10: 62:47:d6:8d:25:a8:9e:18:dd:05:cc:b4:34:7d:e3:77: 25:99:d3:c9:06:30:ab:07:7c:9e:27:ce:0f:51:f3:b5: 40:e3:84:27:68:db:b0:78:f1:f4:bd:85:a4:28:d8:b9: 00:ab:22:06:5b:60:59:ee:3a:15:82:24:29:73:a5:2c: ac:0e:84:b4:5a:6d:98:1d:a3:23:bc:50:0d:6c:ad:03: 54:46:2b:7a:84:a0:57:1b:10:96:f7:85:2e:33:38:fd Fingerprint (SHA-256): C0:73:9D:98:8B:56:55:36:48:5C:2B:A1:9F:3C:6A:33:8A:60:1B:F7:A4:45:66:D0:6F:6F:DC:10:E0:C8:8B:3D Fingerprint (SHA1): 93:F8:E5:CD:E5:79:F8:63:54:80:7F:71:80:95:BC:05:5E:DC:FE:B4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1536: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221782 (0x37444816) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 22:25:53 2022 Not After : Tue Sep 27 22:25:53 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:24:80:9b:98:55:1d:10:a4:3e:69:cb:68:a8:7a:93: a1:84:96:17:5d:f4:2b:48:03:77:c2:c8:19:bf:f4:64: a1:59:0c:44:e0:d7:78:3c:b6:c3:4c:f7:9a:2f:ec:94: 5a:2c:ca:2d:ba:8e:30:3b:57:84:1b:b6:de:1c:94:2c: 36:86:1b:a2:63:d9:4d:4e:62:a8:90:8c:20:a3:6b:f2: 98:e4:a7:cc:6b:d1:57:6e:87:17:4f:cb:e8:b3:95:3d: 9d:ab:29:b7:9c:10:5f:ec:0a:17:a1:a2:17:eb:6e:c9: 99:88:0e:3e:f4:b6:b2:3b:cd:34:34:70:b6:94:40:97: 7b:e8:01:dc:be:4f:ae:54:98:cb:4c:03:fa:20:fd:2a: 0c:5d:fd:b4:9a:67:07:b2:67:81:d2:28:60:af:a4:33: 84:02:16:d3:fb:05:65:3f:77:33:06:98:90:3c:bd:4e: b1:06:fe:74:5d:f3:43:f5:2e:fc:4f:ed:56:30:7b:26: df:81:73:cf:cc:e2:e3:11:d4:fe:5d:86:1a:50:33:f8: 4e:10:9c:48:6b:86:3b:7e:c2:38:e6:a6:e3:14:ec:dc: 45:7c:29:3f:bf:07:82:b3:ab:b1:fc:d7:95:c2:1b:d8: e3:bd:71:70:c9:c1:a3:66:ad:25:34:87:a7:31:9a:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:a4:3a:b2:ca:33:c3:3c:39:0b:39:e7:3d:d1:4b:73: 1f:27:8a:d5:ae:ee:ce:2f:01:db:ae:5d:3a:05:79:c2: 1e:87:4d:3a:23:71:5a:7d:c6:c6:d8:4d:6e:3d:d2:5d: 85:eb:99:af:3b:30:8f:fd:14:bc:f6:3f:c2:e2:41:23: 98:f2:91:17:85:d1:43:a0:6b:e0:c0:af:63:04:cc:89: 99:26:02:7c:1e:e6:a6:53:b5:11:ab:e7:b1:0c:f2:c4: 38:f6:ed:21:b9:a6:dc:c2:97:30:a8:01:f4:a5:92:48: 48:99:1e:e5:0f:28:9c:e4:90:d4:57:47:a4:55:49:0a: a3:74:44:06:00:32:cf:e7:ea:c3:3d:fb:02:fa:2b:d2: 77:66:94:e3:5a:55:f7:b4:bb:ef:d0:a4:0f:8b:1a:10: 62:47:d6:8d:25:a8:9e:18:dd:05:cc:b4:34:7d:e3:77: 25:99:d3:c9:06:30:ab:07:7c:9e:27:ce:0f:51:f3:b5: 40:e3:84:27:68:db:b0:78:f1:f4:bd:85:a4:28:d8:b9: 00:ab:22:06:5b:60:59:ee:3a:15:82:24:29:73:a5:2c: ac:0e:84:b4:5a:6d:98:1d:a3:23:bc:50:0d:6c:ad:03: 54:46:2b:7a:84:a0:57:1b:10:96:f7:85:2e:33:38:fd Fingerprint (SHA-256): C0:73:9D:98:8B:56:55:36:48:5C:2B:A1:9F:3C:6A:33:8A:60:1B:F7:A4:45:66:D0:6F:6F:DC:10:E0:C8:8B:3D Fingerprint (SHA1): 93:F8:E5:CD:E5:79:F8:63:54:80:7F:71:80:95:BC:05:5E:DC:FE:B4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1537: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1538: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221787 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1539: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1540: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1541: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221788 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1542: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1543: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1544: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1545: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 927221789 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1546: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1547: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 927221790 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1548: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1549: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1550: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1551: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1552: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 927221791 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-Bridge-927221542.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1553: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1554: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1555: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1556: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 927221792 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1557: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1558: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1559: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1560: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 927221793 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-BridgeNavy-927221543.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1561: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1562: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1563: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1564: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 927221794 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1565: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1566: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1567: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1568: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221788 (0x3744481c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 22:26:04 2022 Not After : Tue Sep 27 22:26:04 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:14:88:91:d9:3a:65:6f:5c:cc:07:99:0a:ce:a7:e8: ab:12:b6:8e:41:d0:8e:07:6b:e1:41:05:6d:d7:83:78: a1:87:9b:7e:b7:4b:91:68:d7:d6:d7:59:12:20:bd:d7: c6:22:a5:2f:b6:f6:c4:8b:b3:5a:27:ec:ee:58:e0:c5: 97:c6:fd:c0:c7:3b:7c:8d:d3:d2:25:2b:73:ba:70:3e: 0b:e0:57:c8:b6:9a:dd:91:64:8e:f9:71:ff:93:6e:ae: 63:81:34:db:f7:e7:e7:bc:d6:a0:db:49:ac:86:e3:81: 5c:46:e0:70:e2:2c:da:15:7b:ff:0b:97:c1:4a:3d:a9: 3f:93:4a:6b:c8:75:fb:e6:95:a6:cd:87:47:79:c0:bd: 3c:0a:ed:a0:2e:73:e9:c9:e1:a3:d1:67:4f:30:06:20: e9:5b:85:57:c8:94:a8:ae:5f:50:51:a7:15:09:f9:f8: 99:b1:fa:d6:44:d7:e5:9c:ef:77:b9:e5:25:1b:44:9c: 9d:00:f9:ed:08:2a:e6:92:6e:49:d0:a3:2f:59:1f:45: e5:ab:9d:00:3b:f4:10:15:35:d4:48:ce:35:f6:4c:3c: a3:be:a9:f8:d1:2c:1f:9b:56:9f:ea:50:3b:21:e3:58: d8:a0:10:19:d6:c7:08:bc:a4:ec:e0:14:48:30:08:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:7c:da:16:07:50:22:d4:18:66:14:8f:fd:fa:9f:75: a4:e0:43:5c:11:16:f8:b2:89:60:b0:e7:29:26:80:ab: dd:ed:55:62:f7:c7:7a:c0:64:e5:24:d7:b2:aa:22:2b: de:21:92:1d:0d:b4:f4:4f:ce:76:bb:f6:83:a5:bb:fe: b5:19:34:94:31:fb:26:a6:6f:8a:e8:e4:42:1c:ae:70: c3:d5:b7:76:1b:fb:b9:39:44:58:d3:3a:03:13:f2:30: 30:f4:52:c1:e5:a1:ef:d3:f7:62:b0:67:81:11:03:5a: 55:d7:27:f6:a9:4d:74:0a:c1:e9:8e:e5:23:8d:fc:d3: 74:bc:a8:ec:ed:c8:ac:b7:6d:5a:33:8a:53:cf:8b:d6: ee:47:a0:4e:83:be:02:b8:1a:81:ee:9e:a2:74:3e:f6: c4:66:52:68:5b:f0:97:ed:f6:f5:78:6e:ce:12:85:fd: dd:41:d6:47:07:a6:ca:21:b3:a1:3e:46:29:c5:a0:2c: 04:e7:f3:f6:9e:38:1a:22:87:e6:65:b2:45:35:62:5a: 41:f2:92:e9:9e:cd:b5:34:39:fc:17:dc:10:7c:1f:5f: 1f:eb:3d:2d:1b:70:b2:cb:c4:dd:3d:43:2c:d7:52:a2: aa:a7:ed:14:af:a3:91:11:79:bd:14:22:08:09:d2:e1 Fingerprint (SHA-256): 0D:85:13:BE:9A:3E:75:BC:8C:F1:84:E7:A6:B2:77:A9:E1:FD:A5:1E:31:4B:84:F7:FC:EC:2E:80:9A:E0:5A:06 Fingerprint (SHA1): 6F:2B:EB:B4:7C:9D:84:12:53:7C:D3:6F:19:25:C4:54:7E:C0:CB:15 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1569: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221788 (0x3744481c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 22:26:04 2022 Not After : Tue Sep 27 22:26:04 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:14:88:91:d9:3a:65:6f:5c:cc:07:99:0a:ce:a7:e8: ab:12:b6:8e:41:d0:8e:07:6b:e1:41:05:6d:d7:83:78: a1:87:9b:7e:b7:4b:91:68:d7:d6:d7:59:12:20:bd:d7: c6:22:a5:2f:b6:f6:c4:8b:b3:5a:27:ec:ee:58:e0:c5: 97:c6:fd:c0:c7:3b:7c:8d:d3:d2:25:2b:73:ba:70:3e: 0b:e0:57:c8:b6:9a:dd:91:64:8e:f9:71:ff:93:6e:ae: 63:81:34:db:f7:e7:e7:bc:d6:a0:db:49:ac:86:e3:81: 5c:46:e0:70:e2:2c:da:15:7b:ff:0b:97:c1:4a:3d:a9: 3f:93:4a:6b:c8:75:fb:e6:95:a6:cd:87:47:79:c0:bd: 3c:0a:ed:a0:2e:73:e9:c9:e1:a3:d1:67:4f:30:06:20: e9:5b:85:57:c8:94:a8:ae:5f:50:51:a7:15:09:f9:f8: 99:b1:fa:d6:44:d7:e5:9c:ef:77:b9:e5:25:1b:44:9c: 9d:00:f9:ed:08:2a:e6:92:6e:49:d0:a3:2f:59:1f:45: e5:ab:9d:00:3b:f4:10:15:35:d4:48:ce:35:f6:4c:3c: a3:be:a9:f8:d1:2c:1f:9b:56:9f:ea:50:3b:21:e3:58: d8:a0:10:19:d6:c7:08:bc:a4:ec:e0:14:48:30:08:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:7c:da:16:07:50:22:d4:18:66:14:8f:fd:fa:9f:75: a4:e0:43:5c:11:16:f8:b2:89:60:b0:e7:29:26:80:ab: dd:ed:55:62:f7:c7:7a:c0:64:e5:24:d7:b2:aa:22:2b: de:21:92:1d:0d:b4:f4:4f:ce:76:bb:f6:83:a5:bb:fe: b5:19:34:94:31:fb:26:a6:6f:8a:e8:e4:42:1c:ae:70: c3:d5:b7:76:1b:fb:b9:39:44:58:d3:3a:03:13:f2:30: 30:f4:52:c1:e5:a1:ef:d3:f7:62:b0:67:81:11:03:5a: 55:d7:27:f6:a9:4d:74:0a:c1:e9:8e:e5:23:8d:fc:d3: 74:bc:a8:ec:ed:c8:ac:b7:6d:5a:33:8a:53:cf:8b:d6: ee:47:a0:4e:83:be:02:b8:1a:81:ee:9e:a2:74:3e:f6: c4:66:52:68:5b:f0:97:ed:f6:f5:78:6e:ce:12:85:fd: dd:41:d6:47:07:a6:ca:21:b3:a1:3e:46:29:c5:a0:2c: 04:e7:f3:f6:9e:38:1a:22:87:e6:65:b2:45:35:62:5a: 41:f2:92:e9:9e:cd:b5:34:39:fc:17:dc:10:7c:1f:5f: 1f:eb:3d:2d:1b:70:b2:cb:c4:dd:3d:43:2c:d7:52:a2: aa:a7:ed:14:af:a3:91:11:79:bd:14:22:08:09:d2:e1 Fingerprint (SHA-256): 0D:85:13:BE:9A:3E:75:BC:8C:F1:84:E7:A6:B2:77:A9:E1:FD:A5:1E:31:4B:84:F7:FC:EC:2E:80:9A:E0:5A:06 Fingerprint (SHA1): 6F:2B:EB:B4:7C:9D:84:12:53:7C:D3:6F:19:25:C4:54:7E:C0:CB:15 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1570: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #1571: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221787 (0x3744481b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 22:26:02 2022 Not After : Tue Sep 27 22:26:02 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:cd:55:20:2e:b6:f6:e8:ae:d9:59:21:fd:a7:47:9f: df:dd:5d:b2:c5:a6:de:44:ca:5f:5c:d4:35:86:67:25: 41:04:1c:47:0e:b8:bc:6e:87:fb:a9:81:23:aa:db:68: 28:0a:83:4f:91:e8:5e:75:c0:7c:07:d4:a0:0d:08:de: f3:a8:31:8f:20:4f:bb:44:74:14:2f:b8:df:28:da:97: d8:0e:95:9f:94:4f:4d:cb:14:35:66:21:8f:5e:cb:c2: c7:e7:37:f3:bf:06:18:4a:32:25:c7:57:aa:b4:b2:2a: c9:57:a2:64:24:a0:87:6d:1d:f2:de:e2:d6:49:56:8f: 4b:9e:4b:96:90:f5:ba:a0:ef:b7:90:69:0c:79:b5:fe: 56:9b:6f:9f:1e:95:32:dc:9b:ac:2f:b2:1f:db:19:dc: 50:3b:9b:ea:13:2a:32:d8:4f:88:dc:93:e5:60:c3:8a: 75:6f:28:67:68:e5:90:bb:c1:3b:b8:98:a2:9a:1b:b1: 39:21:92:47:0e:28:8f:0e:9f:22:31:3e:b7:51:4a:75: eb:30:4e:80:90:dc:da:a5:29:0a:55:1f:6e:af:89:20: b7:f4:5f:d9:03:16:7e:d5:4d:54:2b:dc:55:2a:c2:d4: 7c:3a:af:83:88:07:4f:10:e2:5b:9f:08:47:eb:78:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:60:63:dd:bb:df:24:ba:84:b7:95:94:dd:78:85:82: 86:25:6b:f5:e9:c2:7b:2f:97:72:8a:d8:50:1b:db:df: 93:a6:7e:77:f1:38:10:57:69:95:be:56:9e:1f:85:29: 11:cb:3b:0e:7a:f1:1e:79:07:55:60:b0:99:e4:ba:1b: cc:fc:16:90:16:9d:41:11:79:89:12:bd:46:33:bd:73: 4f:5b:1d:91:df:9f:bc:9c:86:ee:19:33:fb:08:b5:8d: 7b:4a:de:8c:52:95:cc:de:b4:42:3f:ca:c1:59:d4:ec: f7:fe:8c:b5:50:a5:6b:3f:a2:24:04:34:2b:3a:66:4b: 85:9d:43:ee:e7:98:06:d8:05:c1:0e:d5:90:97:fa:e2: 1e:e9:fb:69:29:ed:f7:0f:73:85:a0:47:ed:4d:2b:1f: 49:41:59:dd:01:18:26:58:4d:96:c0:93:c0:70:10:b8: c7:74:10:2f:1c:7e:38:65:cc:d6:a7:10:7e:4d:1f:09: 60:1c:ec:84:62:be:ff:51:29:f0:b3:31:36:0d:66:d9: 2e:4d:f9:9e:61:3c:d4:6b:53:80:e0:a9:f6:46:5d:ba: 4a:f0:cf:35:c9:de:cb:68:f5:68:3a:34:0e:07:c4:90: 5a:2d:31:00:43:6b:5d:9a:ac:d5:a4:ae:b0:23:5a:a1 Fingerprint (SHA-256): 08:BB:4F:08:CA:5C:E6:CE:D6:ED:7C:B0:A1:2D:B5:03:E9:A9:46:AC:9A:51:78:03:47:CA:23:66:45:BB:03:18 Fingerprint (SHA1): 1E:CA:C7:3F:FA:E2:7E:EC:6A:B7:2B:DF:66:E4:DE:BA:29:5C:60:9A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1572: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221788 (0x3744481c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 22:26:04 2022 Not After : Tue Sep 27 22:26:04 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:14:88:91:d9:3a:65:6f:5c:cc:07:99:0a:ce:a7:e8: ab:12:b6:8e:41:d0:8e:07:6b:e1:41:05:6d:d7:83:78: a1:87:9b:7e:b7:4b:91:68:d7:d6:d7:59:12:20:bd:d7: c6:22:a5:2f:b6:f6:c4:8b:b3:5a:27:ec:ee:58:e0:c5: 97:c6:fd:c0:c7:3b:7c:8d:d3:d2:25:2b:73:ba:70:3e: 0b:e0:57:c8:b6:9a:dd:91:64:8e:f9:71:ff:93:6e:ae: 63:81:34:db:f7:e7:e7:bc:d6:a0:db:49:ac:86:e3:81: 5c:46:e0:70:e2:2c:da:15:7b:ff:0b:97:c1:4a:3d:a9: 3f:93:4a:6b:c8:75:fb:e6:95:a6:cd:87:47:79:c0:bd: 3c:0a:ed:a0:2e:73:e9:c9:e1:a3:d1:67:4f:30:06:20: e9:5b:85:57:c8:94:a8:ae:5f:50:51:a7:15:09:f9:f8: 99:b1:fa:d6:44:d7:e5:9c:ef:77:b9:e5:25:1b:44:9c: 9d:00:f9:ed:08:2a:e6:92:6e:49:d0:a3:2f:59:1f:45: e5:ab:9d:00:3b:f4:10:15:35:d4:48:ce:35:f6:4c:3c: a3:be:a9:f8:d1:2c:1f:9b:56:9f:ea:50:3b:21:e3:58: d8:a0:10:19:d6:c7:08:bc:a4:ec:e0:14:48:30:08:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:7c:da:16:07:50:22:d4:18:66:14:8f:fd:fa:9f:75: a4:e0:43:5c:11:16:f8:b2:89:60:b0:e7:29:26:80:ab: dd:ed:55:62:f7:c7:7a:c0:64:e5:24:d7:b2:aa:22:2b: de:21:92:1d:0d:b4:f4:4f:ce:76:bb:f6:83:a5:bb:fe: b5:19:34:94:31:fb:26:a6:6f:8a:e8:e4:42:1c:ae:70: c3:d5:b7:76:1b:fb:b9:39:44:58:d3:3a:03:13:f2:30: 30:f4:52:c1:e5:a1:ef:d3:f7:62:b0:67:81:11:03:5a: 55:d7:27:f6:a9:4d:74:0a:c1:e9:8e:e5:23:8d:fc:d3: 74:bc:a8:ec:ed:c8:ac:b7:6d:5a:33:8a:53:cf:8b:d6: ee:47:a0:4e:83:be:02:b8:1a:81:ee:9e:a2:74:3e:f6: c4:66:52:68:5b:f0:97:ed:f6:f5:78:6e:ce:12:85:fd: dd:41:d6:47:07:a6:ca:21:b3:a1:3e:46:29:c5:a0:2c: 04:e7:f3:f6:9e:38:1a:22:87:e6:65:b2:45:35:62:5a: 41:f2:92:e9:9e:cd:b5:34:39:fc:17:dc:10:7c:1f:5f: 1f:eb:3d:2d:1b:70:b2:cb:c4:dd:3d:43:2c:d7:52:a2: aa:a7:ed:14:af:a3:91:11:79:bd:14:22:08:09:d2:e1 Fingerprint (SHA-256): 0D:85:13:BE:9A:3E:75:BC:8C:F1:84:E7:A6:B2:77:A9:E1:FD:A5:1E:31:4B:84:F7:FC:EC:2E:80:9A:E0:5A:06 Fingerprint (SHA1): 6F:2B:EB:B4:7C:9D:84:12:53:7C:D3:6F:19:25:C4:54:7E:C0:CB:15 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1573: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221788 (0x3744481c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 22:26:04 2022 Not After : Tue Sep 27 22:26:04 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:14:88:91:d9:3a:65:6f:5c:cc:07:99:0a:ce:a7:e8: ab:12:b6:8e:41:d0:8e:07:6b:e1:41:05:6d:d7:83:78: a1:87:9b:7e:b7:4b:91:68:d7:d6:d7:59:12:20:bd:d7: c6:22:a5:2f:b6:f6:c4:8b:b3:5a:27:ec:ee:58:e0:c5: 97:c6:fd:c0:c7:3b:7c:8d:d3:d2:25:2b:73:ba:70:3e: 0b:e0:57:c8:b6:9a:dd:91:64:8e:f9:71:ff:93:6e:ae: 63:81:34:db:f7:e7:e7:bc:d6:a0:db:49:ac:86:e3:81: 5c:46:e0:70:e2:2c:da:15:7b:ff:0b:97:c1:4a:3d:a9: 3f:93:4a:6b:c8:75:fb:e6:95:a6:cd:87:47:79:c0:bd: 3c:0a:ed:a0:2e:73:e9:c9:e1:a3:d1:67:4f:30:06:20: e9:5b:85:57:c8:94:a8:ae:5f:50:51:a7:15:09:f9:f8: 99:b1:fa:d6:44:d7:e5:9c:ef:77:b9:e5:25:1b:44:9c: 9d:00:f9:ed:08:2a:e6:92:6e:49:d0:a3:2f:59:1f:45: e5:ab:9d:00:3b:f4:10:15:35:d4:48:ce:35:f6:4c:3c: a3:be:a9:f8:d1:2c:1f:9b:56:9f:ea:50:3b:21:e3:58: d8:a0:10:19:d6:c7:08:bc:a4:ec:e0:14:48:30:08:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:7c:da:16:07:50:22:d4:18:66:14:8f:fd:fa:9f:75: a4:e0:43:5c:11:16:f8:b2:89:60:b0:e7:29:26:80:ab: dd:ed:55:62:f7:c7:7a:c0:64:e5:24:d7:b2:aa:22:2b: de:21:92:1d:0d:b4:f4:4f:ce:76:bb:f6:83:a5:bb:fe: b5:19:34:94:31:fb:26:a6:6f:8a:e8:e4:42:1c:ae:70: c3:d5:b7:76:1b:fb:b9:39:44:58:d3:3a:03:13:f2:30: 30:f4:52:c1:e5:a1:ef:d3:f7:62:b0:67:81:11:03:5a: 55:d7:27:f6:a9:4d:74:0a:c1:e9:8e:e5:23:8d:fc:d3: 74:bc:a8:ec:ed:c8:ac:b7:6d:5a:33:8a:53:cf:8b:d6: ee:47:a0:4e:83:be:02:b8:1a:81:ee:9e:a2:74:3e:f6: c4:66:52:68:5b:f0:97:ed:f6:f5:78:6e:ce:12:85:fd: dd:41:d6:47:07:a6:ca:21:b3:a1:3e:46:29:c5:a0:2c: 04:e7:f3:f6:9e:38:1a:22:87:e6:65:b2:45:35:62:5a: 41:f2:92:e9:9e:cd:b5:34:39:fc:17:dc:10:7c:1f:5f: 1f:eb:3d:2d:1b:70:b2:cb:c4:dd:3d:43:2c:d7:52:a2: aa:a7:ed:14:af:a3:91:11:79:bd:14:22:08:09:d2:e1 Fingerprint (SHA-256): 0D:85:13:BE:9A:3E:75:BC:8C:F1:84:E7:A6:B2:77:A9:E1:FD:A5:1E:31:4B:84:F7:FC:EC:2E:80:9A:E0:5A:06 Fingerprint (SHA1): 6F:2B:EB:B4:7C:9D:84:12:53:7C:D3:6F:19:25:C4:54:7E:C0:CB:15 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1574: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1575: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221795 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1576: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1577: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1578: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221796 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1579: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1580: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #1581: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1582: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 927221797 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1583: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1584: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #1585: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1586: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 927221798 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1587: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1588: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1589: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1590: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 927221799 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1591: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1592: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 927221800 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1593: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1594: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #1595: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1596: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1597: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 927221801 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1598: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1599: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1600: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1601: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 927221802 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1602: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1603: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1604: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1605: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 927221803 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1606: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1607: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1608: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1609: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 927221804 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1610: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1611: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1612: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221795 (0x37444823) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Sep 27 22:26:17 2022 Not After : Tue Sep 27 22:26:17 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:1c:e5:05:3c:bb:b7:40:87:32:6c:77:6f:df:57:8f: 0c:b7:b0:7f:f6:d5:7a:28:f0:ff:50:60:25:be:d9:8f: a2:1a:ed:bc:be:29:49:f6:90:07:bd:07:98:8e:0d:aa: 9f:4a:87:7d:72:96:2a:53:be:15:36:15:61:7a:bc:46: 9d:77:ba:2e:2c:45:a2:aa:5b:4c:1d:70:66:41:46:68: 8d:68:dd:90:ce:36:87:be:63:74:3b:38:4d:57:f4:68: c7:6e:f2:93:2c:98:12:7c:f7:e3:0e:e2:17:0d:1f:11: 80:d5:74:1f:74:02:0f:08:8b:47:ec:35:69:aa:a6:20: d8:b1:d2:6a:0d:ec:10:ee:6a:6a:34:e8:da:ca:97:0c: 76:33:74:37:d4:93:c7:18:e3:04:08:61:98:11:96:69: 52:ff:c4:54:48:8e:3a:89:29:61:ce:59:d4:ad:5e:ed: c6:cb:b0:17:a1:2f:78:66:e8:1b:2c:51:d7:ce:76:18: 8b:45:a4:ea:53:0f:2a:fb:f2:51:fa:29:76:a4:9a:3b: f8:cc:0a:1d:3b:b4:ab:24:4a:e6:9a:8d:5b:7d:36:0b: 85:af:0e:ed:1f:18:16:d8:a0:c8:e0:7e:e7:07:c0:dc: e2:6a:42:7f:8c:86:b3:6a:95:7c:e3:e6:96:d6:9d:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:3e:43:70:10:54:06:6e:fb:4a:6a:d3:27:4c:46:31: 67:be:83:8c:88:8b:92:6b:73:53:92:77:89:4a:5b:12: a2:47:42:e3:05:05:28:9e:7a:84:7c:5a:54:1b:0c:d7: 77:38:53:78:d6:92:09:be:9a:f1:fa:fc:a8:ec:b6:e0: 98:a2:c1:27:c1:38:42:7b:0d:63:46:01:3e:bb:4b:3c: 13:53:8a:14:79:4d:e5:ec:19:40:3f:fc:44:7c:e1:0b: 1c:a4:47:57:39:3c:3d:94:23:e3:61:fa:37:75:c3:cd: 9f:e5:84:e4:59:3b:a8:11:2c:cd:eb:59:ab:9c:54:e7: 27:75:71:01:8a:aa:81:1a:14:cb:e4:ba:07:d3:bf:99: fb:63:14:09:75:67:8f:96:fe:87:c0:cb:38:e4:66:16: 6d:16:0d:48:b8:2c:ab:fb:f9:ca:ec:f2:1e:7a:3a:7f: af:45:af:df:c8:06:c1:9a:97:78:32:f9:43:51:d0:5f: e7:03:ee:05:dc:60:0c:c4:a3:00:ec:4f:2b:d6:9a:7c: 07:5a:4b:1e:29:92:4b:c6:8c:83:5f:eb:e1:e7:16:ce: 4c:1a:18:b5:ee:53:cb:0a:10:04:42:8c:e8:f5:f5:f9: da:cd:a0:49:ce:42:6d:e0:50:84:d2:04:5b:94:4a:58 Fingerprint (SHA-256): 5B:29:70:47:78:FC:EF:A1:47:C0:24:F9:4B:BD:0A:AA:09:60:8B:0C:BE:76:17:4B:A9:3D:E1:7E:AE:FC:67:D6 Fingerprint (SHA1): 0E:B6:F2:B4:25:60:C0:1E:92:B1:68:C3:9C:3A:58:65:E4:B9:93:DC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #1613: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1614: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1615: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1616: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1617: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1618: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1619: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1620: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1621: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221796 (0x37444824) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Sep 27 22:26:18 2022 Not After : Tue Sep 27 22:26:18 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:e0:a0:96:c5:0c:ff:d4:0e:37:0f:59:4b:13:3b:7a: 5c:d1:e9:54:bb:1e:91:00:b6:77:d5:43:3e:31:7b:a8: 8e:96:56:87:88:02:ae:6f:0d:e3:5b:e1:e3:82:d3:8e: de:15:d9:35:05:f7:2d:4e:6c:82:d9:0f:90:1f:df:9c: d3:4e:ab:88:dc:27:92:df:fb:e1:d7:ae:ed:72:a7:dd: ff:69:36:6e:1f:ab:cb:6d:6a:cc:e0:84:47:17:fd:78: a0:41:ce:cb:7a:3b:af:76:8d:07:f6:db:70:e0:c5:f3: 71:b2:21:1c:7c:32:bf:88:ed:68:2c:b2:42:01:40:49: 04:3f:9d:28:7e:c0:38:12:d8:86:a0:93:1e:11:c7:4c: 69:01:01:a8:67:5e:83:00:26:ee:76:92:a7:db:a8:47: 36:9e:06:41:f8:9d:03:cd:f2:f2:df:ca:0b:a0:3e:06: 8d:78:fe:71:e8:21:f4:ba:2e:7e:39:88:03:05:d0:ab: 6b:ce:32:03:b9:ea:68:b7:dd:40:66:f2:c2:18:df:06: a8:6c:da:b3:ed:a7:7b:6e:77:7b:f1:86:bb:54:9a:d7: 26:aa:27:4e:5d:fe:38:8a:0c:23:03:78:1a:f5:88:0d: 4c:30:4e:b6:bf:86:43:09:1b:83:c5:f1:c5:7a:b8:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:00:16:f9:ef:e8:5e:06:fc:49:c0:fb:13:26:e7:94: a3:4e:89:71:36:17:fa:2a:a3:f9:80:d3:8d:36:61:75: 88:2c:82:97:1d:d7:71:bc:38:60:49:65:69:d4:3a:a1: da:62:b2:6e:aa:45:5f:08:ac:08:61:33:d9:e1:2d:e5: ec:38:f3:54:26:22:74:e1:71:f4:ac:c9:0f:3a:cd:97: a4:a1:99:7c:10:4d:e9:6a:a1:b8:d5:57:79:53:a8:c9: 20:42:a9:28:bc:35:97:8c:dd:14:71:5e:8c:8f:f1:a5: bd:f7:69:08:c4:e5:ba:e0:ae:66:67:de:9e:72:03:d3: e4:e5:15:10:0e:e3:54:64:35:a4:16:6c:2c:da:7a:64: f4:63:2a:73:05:be:60:b6:4d:d3:bf:44:b8:58:7e:51: d6:fa:16:ee:ae:fb:23:21:ee:5c:fa:de:5d:01:07:cd: c6:fa:e9:6c:a9:50:47:3b:70:c1:25:74:dd:00:c1:32: 9f:cc:0e:53:72:06:e9:84:e4:fa:ed:2d:34:9b:20:3a: 19:73:c1:56:9a:01:3d:a3:32:fd:6a:99:85:fc:20:a6: 26:4c:1d:c2:c1:fe:18:37:ea:45:e8:8e:7b:58:75:e0: c7:77:4e:e5:5f:5f:0c:fa:7a:77:39:35:64:0d:e8:2b Fingerprint (SHA-256): 76:4F:A3:C3:74:BF:09:CD:34:3A:FC:4F:30:91:78:5A:D3:B8:7F:DA:6E:72:D2:EE:95:49:A9:71:2D:07:BE:3A Fingerprint (SHA1): 01:FB:4A:FF:61:3D:4A:36:41:F7:CB:F3:AC:A1:6D:FA:F5:10:32:D1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #1622: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1623: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1624: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1625: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1626: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1627: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1628: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #1629: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #1630: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #1631: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #1632: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #1633: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #1634: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #1635: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1636: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1637: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #1638: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1639: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1640: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221805 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1641: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1642: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1643: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1644: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 927221806 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1645: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1646: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1647: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1648: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 927221807 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1649: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1650: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1651: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1652: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 927221808 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1653: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1654: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1655: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1656: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 927221809 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1657: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1658: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1659: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1660: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 927221810 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1661: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1662: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1663: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1664: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 927221811 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1665: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1666: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #1667: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1668: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 927221812 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1669: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1670: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1671: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1672: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 927221813 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1673: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1674: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1675: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221805 (0x3744482d) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:26:38 2022 Not After : Tue Sep 27 22:26:38 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 6d:cc:a3:bc:9c:02:ae:e9:e3:22:c8:c1:e5:bf:c2:6d: 14:6b:d0:0c:e3:82:78:a4:76:46:56:4e:e7:f7:fb:6f: 66:cb:9c:6b:e5:40:89:58:58:4c:96:a6:d4:5d:8f:6f: 46:80:a0:ac:8d:fa:ba:4d:bd:af:3d:31:b5:1b:b2:1b: 1c:f3:35:59:93:60:59:62:c3:bd:b9:13:61:cc:af:d0: ed:df:51:77:8b:67:c7:b2:be:2c:f6:bf:cd:a5:0f:46: ec:5f:33:a7:97:90:9d:15:85:19:14:2e:81:47:a2:f9: 6e:98:8c:8f:d5:16:43:31:86:75:a5:85:ba:1c:7e:1f: 8d:8a:e7:10:99:2c:5e:f0:fc:9d:e6:de:99:52:4e:24: 34:bc:01:7a:13:22:88:37:af:3a:3e:b6:09:a5:d8:14: 5e:40:46:7e:b6:ba:19:b9:f6:b3:49:ff:ab:ce:ac:2b: 0d:86:c4:41:5d:96:37:10:84:a5:9e:a9:66:76:77:8a: 69:42:0a:fe:a3:d2:aa:e4:59:6a:ea:8a:26:a1:70:52: 27:99:dd:7a:ef:81:09:51:4c:6a:9e:77:f4:7e:6c:bb: ce:e2:d8:d5:06:26:c8:a0:0a:ec:2f:b5:97:e9:33:40: 45:f7:fa:2e:c1:4c:69:29:7f:16:36:b0:f6:af:e6:d5 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3e:02:1d:00:9c:b9:96:68:4b:81:c0:c0:84:82:1a: bf:15:e7:8f:cf:17:be:75:a0:b6:57:d1:5c:4d:5d:fc: 40:02:1d:00:cd:28:8b:31:bb:00:e2:9a:1d:6b:0a:2a: c4:45:cb:6c:f3:fd:03:14:4c:99:f3:bd:a0:f7:bb:a3 Fingerprint (SHA-256): 56:94:3E:71:F5:33:12:1D:47:EA:82:B1:78:C4:A7:23:CB:90:5B:99:32:77:4F:90:17:9D:DE:A6:C4:88:04:81 Fingerprint (SHA1): CC:F7:D5:22:05:27:C5:5C:A2:B9:D7:45:06:5C:B7:2A:97:A3:95:4F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1676: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221805 (0x3744482d) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:26:38 2022 Not After : Tue Sep 27 22:26:38 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 6d:cc:a3:bc:9c:02:ae:e9:e3:22:c8:c1:e5:bf:c2:6d: 14:6b:d0:0c:e3:82:78:a4:76:46:56:4e:e7:f7:fb:6f: 66:cb:9c:6b:e5:40:89:58:58:4c:96:a6:d4:5d:8f:6f: 46:80:a0:ac:8d:fa:ba:4d:bd:af:3d:31:b5:1b:b2:1b: 1c:f3:35:59:93:60:59:62:c3:bd:b9:13:61:cc:af:d0: ed:df:51:77:8b:67:c7:b2:be:2c:f6:bf:cd:a5:0f:46: ec:5f:33:a7:97:90:9d:15:85:19:14:2e:81:47:a2:f9: 6e:98:8c:8f:d5:16:43:31:86:75:a5:85:ba:1c:7e:1f: 8d:8a:e7:10:99:2c:5e:f0:fc:9d:e6:de:99:52:4e:24: 34:bc:01:7a:13:22:88:37:af:3a:3e:b6:09:a5:d8:14: 5e:40:46:7e:b6:ba:19:b9:f6:b3:49:ff:ab:ce:ac:2b: 0d:86:c4:41:5d:96:37:10:84:a5:9e:a9:66:76:77:8a: 69:42:0a:fe:a3:d2:aa:e4:59:6a:ea:8a:26:a1:70:52: 27:99:dd:7a:ef:81:09:51:4c:6a:9e:77:f4:7e:6c:bb: ce:e2:d8:d5:06:26:c8:a0:0a:ec:2f:b5:97:e9:33:40: 45:f7:fa:2e:c1:4c:69:29:7f:16:36:b0:f6:af:e6:d5 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3e:02:1d:00:9c:b9:96:68:4b:81:c0:c0:84:82:1a: bf:15:e7:8f:cf:17:be:75:a0:b6:57:d1:5c:4d:5d:fc: 40:02:1d:00:cd:28:8b:31:bb:00:e2:9a:1d:6b:0a:2a: c4:45:cb:6c:f3:fd:03:14:4c:99:f3:bd:a0:f7:bb:a3 Fingerprint (SHA-256): 56:94:3E:71:F5:33:12:1D:47:EA:82:B1:78:C4:A7:23:CB:90:5B:99:32:77:4F:90:17:9D:DE:A6:C4:88:04:81 Fingerprint (SHA1): CC:F7:D5:22:05:27:C5:5C:A2:B9:D7:45:06:5C:B7:2A:97:A3:95:4F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1677: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221805 (0x3744482d) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:26:38 2022 Not After : Tue Sep 27 22:26:38 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 6d:cc:a3:bc:9c:02:ae:e9:e3:22:c8:c1:e5:bf:c2:6d: 14:6b:d0:0c:e3:82:78:a4:76:46:56:4e:e7:f7:fb:6f: 66:cb:9c:6b:e5:40:89:58:58:4c:96:a6:d4:5d:8f:6f: 46:80:a0:ac:8d:fa:ba:4d:bd:af:3d:31:b5:1b:b2:1b: 1c:f3:35:59:93:60:59:62:c3:bd:b9:13:61:cc:af:d0: ed:df:51:77:8b:67:c7:b2:be:2c:f6:bf:cd:a5:0f:46: ec:5f:33:a7:97:90:9d:15:85:19:14:2e:81:47:a2:f9: 6e:98:8c:8f:d5:16:43:31:86:75:a5:85:ba:1c:7e:1f: 8d:8a:e7:10:99:2c:5e:f0:fc:9d:e6:de:99:52:4e:24: 34:bc:01:7a:13:22:88:37:af:3a:3e:b6:09:a5:d8:14: 5e:40:46:7e:b6:ba:19:b9:f6:b3:49:ff:ab:ce:ac:2b: 0d:86:c4:41:5d:96:37:10:84:a5:9e:a9:66:76:77:8a: 69:42:0a:fe:a3:d2:aa:e4:59:6a:ea:8a:26:a1:70:52: 27:99:dd:7a:ef:81:09:51:4c:6a:9e:77:f4:7e:6c:bb: ce:e2:d8:d5:06:26:c8:a0:0a:ec:2f:b5:97:e9:33:40: 45:f7:fa:2e:c1:4c:69:29:7f:16:36:b0:f6:af:e6:d5 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3e:02:1d:00:9c:b9:96:68:4b:81:c0:c0:84:82:1a: bf:15:e7:8f:cf:17:be:75:a0:b6:57:d1:5c:4d:5d:fc: 40:02:1d:00:cd:28:8b:31:bb:00:e2:9a:1d:6b:0a:2a: c4:45:cb:6c:f3:fd:03:14:4c:99:f3:bd:a0:f7:bb:a3 Fingerprint (SHA-256): 56:94:3E:71:F5:33:12:1D:47:EA:82:B1:78:C4:A7:23:CB:90:5B:99:32:77:4F:90:17:9D:DE:A6:C4:88:04:81 Fingerprint (SHA1): CC:F7:D5:22:05:27:C5:5C:A2:B9:D7:45:06:5C:B7:2A:97:A3:95:4F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1678: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221805 (0x3744482d) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:26:38 2022 Not After : Tue Sep 27 22:26:38 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 6d:cc:a3:bc:9c:02:ae:e9:e3:22:c8:c1:e5:bf:c2:6d: 14:6b:d0:0c:e3:82:78:a4:76:46:56:4e:e7:f7:fb:6f: 66:cb:9c:6b:e5:40:89:58:58:4c:96:a6:d4:5d:8f:6f: 46:80:a0:ac:8d:fa:ba:4d:bd:af:3d:31:b5:1b:b2:1b: 1c:f3:35:59:93:60:59:62:c3:bd:b9:13:61:cc:af:d0: ed:df:51:77:8b:67:c7:b2:be:2c:f6:bf:cd:a5:0f:46: ec:5f:33:a7:97:90:9d:15:85:19:14:2e:81:47:a2:f9: 6e:98:8c:8f:d5:16:43:31:86:75:a5:85:ba:1c:7e:1f: 8d:8a:e7:10:99:2c:5e:f0:fc:9d:e6:de:99:52:4e:24: 34:bc:01:7a:13:22:88:37:af:3a:3e:b6:09:a5:d8:14: 5e:40:46:7e:b6:ba:19:b9:f6:b3:49:ff:ab:ce:ac:2b: 0d:86:c4:41:5d:96:37:10:84:a5:9e:a9:66:76:77:8a: 69:42:0a:fe:a3:d2:aa:e4:59:6a:ea:8a:26:a1:70:52: 27:99:dd:7a:ef:81:09:51:4c:6a:9e:77:f4:7e:6c:bb: ce:e2:d8:d5:06:26:c8:a0:0a:ec:2f:b5:97:e9:33:40: 45:f7:fa:2e:c1:4c:69:29:7f:16:36:b0:f6:af:e6:d5 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3e:02:1d:00:9c:b9:96:68:4b:81:c0:c0:84:82:1a: bf:15:e7:8f:cf:17:be:75:a0:b6:57:d1:5c:4d:5d:fc: 40:02:1d:00:cd:28:8b:31:bb:00:e2:9a:1d:6b:0a:2a: c4:45:cb:6c:f3:fd:03:14:4c:99:f3:bd:a0:f7:bb:a3 Fingerprint (SHA-256): 56:94:3E:71:F5:33:12:1D:47:EA:82:B1:78:C4:A7:23:CB:90:5B:99:32:77:4F:90:17:9D:DE:A6:C4:88:04:81 Fingerprint (SHA1): CC:F7:D5:22:05:27:C5:5C:A2:B9:D7:45:06:5C:B7:2A:97:A3:95:4F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #1679: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1680: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1681: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1682: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1683: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1684: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1685: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1686: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1687: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1688: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1689: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1690: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1691: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1692: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1693: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1694: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #1695: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1696: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1697: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1698: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1699: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1700: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1701: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1702: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1703: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1704: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1705: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1706: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20220927222702Z nextupdate=20230927222702Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Tue Sep 27 22:27:02 2022 Next Update: Wed Sep 27 22:27:02 2023 CRL Extensions: chains.sh: #1707: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220927222702Z nextupdate=20230927222702Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Sep 27 22:27:02 2022 Next Update: Wed Sep 27 22:27:02 2023 CRL Extensions: chains.sh: #1708: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20220927222702Z nextupdate=20230927222702Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Tue Sep 27 22:27:02 2022 Next Update: Wed Sep 27 22:27:02 2023 CRL Extensions: chains.sh: #1709: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20220927222703Z nextupdate=20230927222703Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Tue Sep 27 22:27:03 2022 Next Update: Wed Sep 27 22:27:03 2023 CRL Extensions: chains.sh: #1710: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20220927222704Z addcert 14 20220927222704Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Tue Sep 27 22:27:04 2022 Next Update: Wed Sep 27 22:27:02 2023 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Tue Sep 27 22:27:04 2022 CRL Extensions: chains.sh: #1711: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220927222705Z addcert 15 20220927222705Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Sep 27 22:27:05 2022 Next Update: Wed Sep 27 22:27:02 2023 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Tue Sep 27 22:27:05 2022 CRL Extensions: chains.sh: #1712: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1713: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1714: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1715: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #1716: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #1717: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #1718: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #1719: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #1720: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #1721: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:26:51 2022 Not After : Tue Sep 27 22:26:51 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:ba:89:10:a9:4b:5b:a7:ce:fb:e9:e1:b4:99:15:32: c8:f0:60:92:05:cc:45:63:b7:1a:b9:61:c1:d3:74:36: f4:43:20:45:f6:29:1e:c7:e2:6e:f2:7a:64:fe:f1:8b: 01:d7:85:25:a3:4e:08:f3:af:61:52:39:4d:80:7a:2d: 82:a5:b5:7f:70:a0:2d:8e:f6:6f:8b:e2:b7:7f:cd:d1: cc:bb:1b:c1:9e:1d:7c:41:40:64:82:cf:7a:28:48:b4: e3:56:98:da:b6:5a:9e:e6:59:e8:bf:a0:5b:46:a5:1d: 83:99:ee:cb:df:fb:f7:be:b2:85:bd:6d:19:5b:1a:ea: f7:10:76:cc:40:da:5e:90:8b:3c:28:57:cd:4a:b1:c3: 23:18:05:0f:c9:e7:b0:d5:77:af:b1:95:96:81:24:08: df:0a:d9:57:a3:94:9d:e5:fb:76:57:a9:7f:74:54:b8: c6:cc:fb:9e:48:98:84:36:d8:52:6f:4f:8c:05:e4:d8: a0:84:e2:b7:ef:c0:45:83:ca:1e:41:09:11:f6:e7:65: bb:a4:c3:91:03:47:38:6b:57:a6:56:60:ca:65:43:54: 50:8b:50:4d:c3:6d:32:cc:3a:33:e6:5e:2e:0b:ec:34: 3b:8d:4b:1c:9d:67:19:2e:30:65:50:73:e5:59:96:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:e1:8e:5f:15:28:26:8a:12:3c:1f:f1:5b:5d:25:57: e1:54:ed:42:26:2d:39:54:5d:66:e0:7c:f3:8d:68:e5: b7:99:86:34:4b:8f:ab:29:79:07:90:72:f8:1f:41:17: 7a:2d:13:66:90:8d:d9:e1:c2:e1:7f:5b:c1:03:a7:92: 51:43:56:85:13:99:c3:49:14:42:26:b1:07:e8:9a:60: e6:0a:3f:33:e1:f0:9d:cc:f8:aa:22:03:64:5f:08:0d: 0e:92:40:27:65:06:aa:ca:f4:52:be:66:b3:6d:e4:5a: 37:1e:f0:9c:1a:8d:bd:d1:2e:07:ef:40:ef:f8:ff:9c: 1b:f9:17:17:54:99:ad:45:51:34:7d:d4:91:f9:93:75: 27:54:a2:df:a1:06:96:0d:ab:07:b3:37:97:32:74:ff: f9:f6:85:e3:8d:d0:42:af:b3:f6:c8:aa:cc:4b:15:68: 4d:18:29:93:01:46:39:aa:ea:4c:11:0e:51:58:66:13: ea:ce:dc:43:fa:05:00:b1:7a:82:e9:4a:25:60:39:a2: 67:9d:2c:a2:e1:8f:2f:7e:b9:8d:6f:1d:1e:b2:bd:47: 90:40:3b:7e:c4:6a:ec:aa:75:8b:14:3a:73:8b:1b:f3: 8c:42:94:39:18:49:42:02:bf:8d:f5:fa:6f:28:b9:5d Fingerprint (SHA-256): 56:B9:33:63:0B:FD:9A:A3:B4:70:55:31:D7:C3:DF:53:C6:6B:AE:51:8D:88:CA:74:21:74:FF:9D:D3:1C:8E:19 Fingerprint (SHA1): 0B:02:59:88:BE:B6:9F:8E:A6:48:0C:36:5E:52:58:EF:84:7E:40:1D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1722: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1723: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:26:51 2022 Not After : Tue Sep 27 22:26:51 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:ba:89:10:a9:4b:5b:a7:ce:fb:e9:e1:b4:99:15:32: c8:f0:60:92:05:cc:45:63:b7:1a:b9:61:c1:d3:74:36: f4:43:20:45:f6:29:1e:c7:e2:6e:f2:7a:64:fe:f1:8b: 01:d7:85:25:a3:4e:08:f3:af:61:52:39:4d:80:7a:2d: 82:a5:b5:7f:70:a0:2d:8e:f6:6f:8b:e2:b7:7f:cd:d1: cc:bb:1b:c1:9e:1d:7c:41:40:64:82:cf:7a:28:48:b4: e3:56:98:da:b6:5a:9e:e6:59:e8:bf:a0:5b:46:a5:1d: 83:99:ee:cb:df:fb:f7:be:b2:85:bd:6d:19:5b:1a:ea: f7:10:76:cc:40:da:5e:90:8b:3c:28:57:cd:4a:b1:c3: 23:18:05:0f:c9:e7:b0:d5:77:af:b1:95:96:81:24:08: df:0a:d9:57:a3:94:9d:e5:fb:76:57:a9:7f:74:54:b8: c6:cc:fb:9e:48:98:84:36:d8:52:6f:4f:8c:05:e4:d8: a0:84:e2:b7:ef:c0:45:83:ca:1e:41:09:11:f6:e7:65: bb:a4:c3:91:03:47:38:6b:57:a6:56:60:ca:65:43:54: 50:8b:50:4d:c3:6d:32:cc:3a:33:e6:5e:2e:0b:ec:34: 3b:8d:4b:1c:9d:67:19:2e:30:65:50:73:e5:59:96:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:e1:8e:5f:15:28:26:8a:12:3c:1f:f1:5b:5d:25:57: e1:54:ed:42:26:2d:39:54:5d:66:e0:7c:f3:8d:68:e5: b7:99:86:34:4b:8f:ab:29:79:07:90:72:f8:1f:41:17: 7a:2d:13:66:90:8d:d9:e1:c2:e1:7f:5b:c1:03:a7:92: 51:43:56:85:13:99:c3:49:14:42:26:b1:07:e8:9a:60: e6:0a:3f:33:e1:f0:9d:cc:f8:aa:22:03:64:5f:08:0d: 0e:92:40:27:65:06:aa:ca:f4:52:be:66:b3:6d:e4:5a: 37:1e:f0:9c:1a:8d:bd:d1:2e:07:ef:40:ef:f8:ff:9c: 1b:f9:17:17:54:99:ad:45:51:34:7d:d4:91:f9:93:75: 27:54:a2:df:a1:06:96:0d:ab:07:b3:37:97:32:74:ff: f9:f6:85:e3:8d:d0:42:af:b3:f6:c8:aa:cc:4b:15:68: 4d:18:29:93:01:46:39:aa:ea:4c:11:0e:51:58:66:13: ea:ce:dc:43:fa:05:00:b1:7a:82:e9:4a:25:60:39:a2: 67:9d:2c:a2:e1:8f:2f:7e:b9:8d:6f:1d:1e:b2:bd:47: 90:40:3b:7e:c4:6a:ec:aa:75:8b:14:3a:73:8b:1b:f3: 8c:42:94:39:18:49:42:02:bf:8d:f5:fa:6f:28:b9:5d Fingerprint (SHA-256): 56:B9:33:63:0B:FD:9A:A3:B4:70:55:31:D7:C3:DF:53:C6:6B:AE:51:8D:88:CA:74:21:74:FF:9D:D3:1C:8E:19 Fingerprint (SHA1): 0B:02:59:88:BE:B6:9F:8E:A6:48:0C:36:5E:52:58:EF:84:7E:40:1D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1724: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1725: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1726: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221814 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1727: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1728: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1729: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1730: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 927221815 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1731: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1732: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1733: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-927221571.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1734: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-927221544.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1735: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1736: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1737: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-927221571.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1738: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 927221816 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1739: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1740: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1741: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-927221571.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1742: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-927221545.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1743: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1744: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1745: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1746: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 927221817 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1747: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1748: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1749: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-927221571.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1750: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-927221546.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1751: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1752: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1753: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-927221571.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1754: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-927221547.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1755: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1756: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20220927222721Z nextupdate=20230927222721Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Tue Sep 27 22:27:21 2022 Next Update: Wed Sep 27 22:27:21 2023 CRL Extensions: chains.sh: #1757: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220927222722Z nextupdate=20230927222722Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Sep 27 22:27:22 2022 Next Update: Wed Sep 27 22:27:22 2023 CRL Extensions: chains.sh: #1758: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20220927222722Z nextupdate=20230927222722Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Tue Sep 27 22:27:22 2022 Next Update: Wed Sep 27 22:27:22 2023 CRL Extensions: chains.sh: #1759: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20220927222722Z nextupdate=20230927222722Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Tue Sep 27 22:27:22 2022 Next Update: Wed Sep 27 22:27:22 2023 CRL Extensions: chains.sh: #1760: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220927222723Z addcert 20 20220927222723Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Sep 27 22:27:23 2022 Next Update: Wed Sep 27 22:27:22 2023 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Tue Sep 27 22:27:23 2022 CRL Extensions: chains.sh: #1761: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220927222724Z addcert 40 20220927222724Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Sep 27 22:27:24 2022 Next Update: Wed Sep 27 22:27:22 2023 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Tue Sep 27 22:27:23 2022 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Tue Sep 27 22:27:24 2022 CRL Extensions: chains.sh: #1762: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1763: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1764: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1765: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221814 (0x37444836) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:27:10 2022 Not After : Tue Sep 27 22:27:10 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:4d:d5:72:eb:e6:02:ed:2f:55:4d:56:22:d7:b9:ad: 53:a9:76:0a:f7:27:1e:a5:5c:07:d6:32:7c:78:76:d8: 77:cb:4e:97:fd:4f:eb:c1:ff:c0:eb:64:31:58:eb:20: 0f:09:c0:d3:8d:1e:cb:10:54:36:f2:af:ce:7f:59:80: b8:1c:a5:79:74:1e:75:d8:ae:c3:63:8c:42:0b:83:6c: 95:a2:e6:39:fa:d2:61:1d:26:b8:08:c0:d1:7f:3e:06: 11:5c:8b:bd:87:88:80:f8:a3:ff:f3:3a:1a:89:c2:6f: 5c:03:86:cd:a4:58:b9:4b:19:2b:3f:50:f3:62:3f:94: 8e:c4:43:6c:02:b8:b5:a6:f6:80:ba:7c:41:04:4f:d3: e8:bd:16:8c:c5:ec:cb:38:68:84:c1:0b:e5:57:fa:03: 77:4d:eb:15:18:c7:c2:00:e6:13:f1:1e:08:c5:2f:e0: cb:c2:f7:67:2f:8b:36:a2:12:66:b8:cf:d5:3b:d9:04: dc:2e:20:d5:41:27:79:c0:9b:66:06:59:80:b9:50:5c: bc:ec:14:59:ed:0e:9d:da:10:8a:d0:ce:46:15:96:42: ec:8f:d8:98:98:6f:2c:01:2c:9a:c7:35:07:05:41:ac: 89:ed:d0:60:7c:36:21:7e:dd:a7:0d:2a:6a:ab:2b:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:5e:ec:31:65:3e:59:38:93:d7:08:a1:d4:ed:9e:e4: 31:d1:f4:dc:96:f0:71:75:f4:8a:cf:0e:50:ff:a3:07: 9e:6c:bb:0c:1c:3b:04:fb:01:4c:67:5e:02:57:6f:52: f6:e3:c8:10:8c:c6:ff:34:e7:a2:53:b6:5d:ed:f2:65: c4:df:25:87:9f:84:e2:7b:59:3f:de:0d:67:4c:8a:f7: 16:13:68:cb:1b:d5:b8:33:dc:d6:85:01:4f:9a:3d:73: b2:17:61:09:ae:a1:fa:6e:bc:77:f5:5a:a2:dc:3d:ea: dd:bd:cc:eb:22:f9:b0:1b:9f:2d:25:8d:98:bd:11:e4: 59:c4:d0:28:99:6b:ce:3a:df:14:d9:a7:63:51:85:4e: fd:ae:de:62:54:cc:f3:7f:30:64:f1:72:22:ff:00:c7: ff:66:05:12:a6:e7:22:57:3f:28:4c:18:8f:7d:70:15: 6f:68:75:18:5b:e3:c6:77:b8:88:c2:d2:88:fa:ed:26: d9:d5:7b:b3:18:38:ec:2b:bb:4c:03:d9:82:75:09:a0: 91:54:ab:14:74:24:4c:4e:04:f1:fd:4e:41:c6:04:13: d2:a5:91:52:f8:34:16:81:51:11:3c:8d:7b:00:8c:89: fd:6c:eb:b6:bb:13:26:15:ab:42:c0:fa:54:c9:72:4f Fingerprint (SHA-256): 85:17:52:13:F2:D1:54:6F:67:76:74:9F:1B:EE:DB:07:1E:04:14:1F:10:7E:6C:3F:50:18:DD:99:F1:20:D6:A7 Fingerprint (SHA1): 62:44:7B:BF:98:AB:F7:45:EC:89:4A:53:89:A4:A8:8E:F8:C2:9B:95 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1766: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1767: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221814 (0x37444836) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Sep 27 22:27:10 2022 Not After : Tue Sep 27 22:27:10 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:4d:d5:72:eb:e6:02:ed:2f:55:4d:56:22:d7:b9:ad: 53:a9:76:0a:f7:27:1e:a5:5c:07:d6:32:7c:78:76:d8: 77:cb:4e:97:fd:4f:eb:c1:ff:c0:eb:64:31:58:eb:20: 0f:09:c0:d3:8d:1e:cb:10:54:36:f2:af:ce:7f:59:80: b8:1c:a5:79:74:1e:75:d8:ae:c3:63:8c:42:0b:83:6c: 95:a2:e6:39:fa:d2:61:1d:26:b8:08:c0:d1:7f:3e:06: 11:5c:8b:bd:87:88:80:f8:a3:ff:f3:3a:1a:89:c2:6f: 5c:03:86:cd:a4:58:b9:4b:19:2b:3f:50:f3:62:3f:94: 8e:c4:43:6c:02:b8:b5:a6:f6:80:ba:7c:41:04:4f:d3: e8:bd:16:8c:c5:ec:cb:38:68:84:c1:0b:e5:57:fa:03: 77:4d:eb:15:18:c7:c2:00:e6:13:f1:1e:08:c5:2f:e0: cb:c2:f7:67:2f:8b:36:a2:12:66:b8:cf:d5:3b:d9:04: dc:2e:20:d5:41:27:79:c0:9b:66:06:59:80:b9:50:5c: bc:ec:14:59:ed:0e:9d:da:10:8a:d0:ce:46:15:96:42: ec:8f:d8:98:98:6f:2c:01:2c:9a:c7:35:07:05:41:ac: 89:ed:d0:60:7c:36:21:7e:dd:a7:0d:2a:6a:ab:2b:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:5e:ec:31:65:3e:59:38:93:d7:08:a1:d4:ed:9e:e4: 31:d1:f4:dc:96:f0:71:75:f4:8a:cf:0e:50:ff:a3:07: 9e:6c:bb:0c:1c:3b:04:fb:01:4c:67:5e:02:57:6f:52: f6:e3:c8:10:8c:c6:ff:34:e7:a2:53:b6:5d:ed:f2:65: c4:df:25:87:9f:84:e2:7b:59:3f:de:0d:67:4c:8a:f7: 16:13:68:cb:1b:d5:b8:33:dc:d6:85:01:4f:9a:3d:73: b2:17:61:09:ae:a1:fa:6e:bc:77:f5:5a:a2:dc:3d:ea: dd:bd:cc:eb:22:f9:b0:1b:9f:2d:25:8d:98:bd:11:e4: 59:c4:d0:28:99:6b:ce:3a:df:14:d9:a7:63:51:85:4e: fd:ae:de:62:54:cc:f3:7f:30:64:f1:72:22:ff:00:c7: ff:66:05:12:a6:e7:22:57:3f:28:4c:18:8f:7d:70:15: 6f:68:75:18:5b:e3:c6:77:b8:88:c2:d2:88:fa:ed:26: d9:d5:7b:b3:18:38:ec:2b:bb:4c:03:d9:82:75:09:a0: 91:54:ab:14:74:24:4c:4e:04:f1:fd:4e:41:c6:04:13: d2:a5:91:52:f8:34:16:81:51:11:3c:8d:7b:00:8c:89: fd:6c:eb:b6:bb:13:26:15:ab:42:c0:fa:54:c9:72:4f Fingerprint (SHA-256): 85:17:52:13:F2:D1:54:6F:67:76:74:9F:1B:EE:DB:07:1E:04:14:1F:10:7E:6C:3F:50:18:DD:99:F1:20:D6:A7 Fingerprint (SHA1): 62:44:7B:BF:98:AB:F7:45:EC:89:4A:53:89:A4:A8:8E:F8:C2:9B:95 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1768: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1769: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1770: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221818 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1771: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1772: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1773: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1774: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 927221819 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1775: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1776: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1777: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1778: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 927221820 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1779: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1780: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1781: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1782: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 927221821 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1783: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1784: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #1785: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -m 927221822 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1786: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #1787: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #1788: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1789: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 927221823 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1790: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1791: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1792: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1793: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 927221824 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1794: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1795: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #1796: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #1797: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #1798: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221818 (0x3744483a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:27:27 2022 Not After : Tue Sep 27 22:27:27 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:16:81:50:10:6b:68:32:9c:76:1a:c6:42:96:8e:ee: a2:ec:1f:b9:fe:04:c5:f0:10:13:8e:02:1e:3d:b6:99: aa:3b:fa:90:f0:ad:11:30:4c:93:1f:42:d6:6e:36:06: 38:ed:90:0c:c9:32:75:97:12:c9:7f:42:b7:e9:25:5d: 3f:10:d2:f5:e3:32:4c:37:6a:6d:a1:27:3e:d2:da:32: 89:27:bd:4a:84:37:77:40:69:37:1b:7f:dd:b8:35:f1: 69:10:2c:6f:d3:d6:3a:67:86:56:71:c8:97:bc:24:cd: 00:14:8c:84:49:fe:5b:4c:9c:dd:0a:a4:42:3a:d7:64: d8:5c:90:47:be:8f:35:46:a6:87:08:4a:52:d0:33:09: 65:75:53:f4:4a:10:5d:24:03:f1:ca:b7:81:2c:67:8e: cd:e7:9a:54:2d:5d:32:3a:6e:9f:bf:ea:b4:35:5e:b3: 60:a0:6a:fc:44:07:1b:99:1a:1a:cc:5f:1a:6c:bd:35: bb:9e:5e:72:0e:8b:50:8c:9f:65:8b:7c:e4:0c:04:ad: 45:3c:57:d1:62:a6:25:0d:11:b8:41:cf:d6:8f:06:e5: 21:13:46:46:8d:27:32:69:9b:7c:25:93:ea:d0:9e:b9: b7:46:50:39:dc:e1:24:d2:ad:44:84:03:5c:8d:40:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:41:1d:96:fe:39:70:04:0c:31:1c:0c:19:f6:26:2a: 1f:41:83:11:92:dc:67:76:4f:01:bb:6d:30:dc:12:f3: 4b:97:f3:3b:6d:4b:ab:a7:2a:df:8e:41:87:64:c3:4f: da:b0:41:7c:fc:7d:0e:b6:41:0e:57:98:70:ac:68:b4: 40:af:61:f3:36:c0:61:f9:06:8b:74:2e:69:3d:23:e0: 19:16:ea:45:9b:86:41:cb:c7:63:78:1b:9b:84:2e:04: 01:24:09:a8:cf:69:c8:76:05:05:f7:7e:e7:dc:3c:15: 5e:b3:5f:d3:66:17:5b:b2:61:1a:db:4d:0c:a7:0e:35: 56:67:a9:bb:73:11:5c:20:8b:2d:c4:f1:99:71:b8:17: c5:98:75:87:53:26:42:1b:b8:63:9a:f5:92:2e:26:93: 42:1b:00:4e:77:7c:c5:e6:6f:a7:4d:81:29:cd:6a:a9: 07:65:60:01:eb:e8:f3:21:34:b4:32:cb:29:8d:8a:f8: b2:4d:04:53:d5:18:7d:b9:85:29:4a:62:96:02:a9:0d: 68:6d:dd:b0:c9:43:1a:6a:6d:84:0a:f3:ac:67:9e:dc: 1f:09:3d:a8:8d:de:e6:52:a4:c7:e4:33:08:12:95:e3: 4a:da:d1:f5:ca:7e:df:47:6e:f1:83:eb:5a:20:4f:25 Fingerprint (SHA-256): C3:43:91:E3:00:11:AB:D8:52:57:C8:9F:AF:42:2D:C9:4A:08:FE:99:F0:53:36:51:FD:43:86:35:4D:AE:2E:BE Fingerprint (SHA1): 9B:EF:BE:C5:28:4F:DC:98:81:CB:C6:67:61:ED:EC:15:FF:4A:96:D4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1799: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221820 (0x3744483c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 22:27:31 2022 Not After : Mon Sep 27 22:27:31 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:b1:cb:52:bd:ef:fb:46:b3:cb:7e:44:21:15:99:7d: 3e:6f:2d:ed:cc:fd:eb:3e:68:f3:ef:de:e4:0e:0b:0c: d9:13:1b:27:6f:f9:d3:0c:63:d9:31:22:e8:95:9e:f4: 07:b5:72:ff:b5:79:96:2d:68:22:b9:af:0a:b2:27:23: f0:59:b5:12:9f:13:63:46:cd:71:bc:cf:d9:43:22:59: 19:63:32:0e:1e:47:cf:49:cd:53:61:c0:c6:ea:1e:09: 36:be:5d:f6:46:bf:04:a9:cf:d6:fc:ed:e2:f1:5a:b7: 13:25:01:cf:fd:f1:be:1a:48:60:79:10:87:21:32:f5: dd:27:46:a5:53:39:a2:b8:19:1f:cc:1e:df:58:cd:65: 67:e9:aa:b4:16:2d:c3:9e:ff:2e:f4:36:92:bc:76:a4: b2:6c:df:90:09:59:58:40:15:0a:e4:f6:d9:eb:2d:9c: 1e:b2:5f:e8:91:de:67:0f:53:8e:fc:45:82:22:b4:b2: cb:23:ef:57:ca:93:31:52:83:d6:3c:75:1e:79:74:ff: e8:99:17:08:0f:a9:7e:18:8b:96:c2:3b:59:1c:ca:ca: 03:ff:e0:19:36:a8:22:3a:5c:f4:fa:9a:07:e0:01:6d: ba:85:38:f8:b0:13:56:c2:5e:67:b4:60:84:80:c1:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:a0:f7:23:3d:ce:83:d9:e6:f3:07:30:e4:c0:5f:ed: 11:3b:ad:a6:e2:84:9a:4f:6c:2d:5f:1c:0e:1f:e2:31: 45:bc:80:a8:5b:6f:fd:3b:76:98:5f:a1:7e:8f:85:02: 80:ce:b1:74:4e:35:88:52:3c:ed:96:f8:98:a3:31:de: cb:21:3e:84:02:0c:a8:f8:cd:b2:22:a4:14:22:b3:37: 15:e5:ba:a1:10:c6:d5:2d:12:41:a2:ff:86:58:7a:18: f1:e0:18:56:2e:ee:cb:d5:4b:65:f9:1f:ce:2d:37:02: ed:e3:3f:bd:94:7f:03:f3:89:fd:e2:76:fa:3e:49:e9: 3b:67:92:a2:fb:95:8a:7d:39:4c:91:f4:9a:76:1c:c3: de:22:0f:96:f6:e9:ad:4a:c6:cc:6c:da:79:2d:1a:74: 9c:47:56:40:28:8c:99:86:9d:55:d9:a1:20:59:d1:2b: 81:5e:b5:ce:8c:0a:d6:b6:42:50:3e:e2:40:3f:82:b7: 7d:aa:8d:4d:fd:7d:73:97:0f:58:01:cb:59:74:35:0d: 29:df:c7:83:4a:8f:76:64:f1:0b:62:31:57:b8:7e:fe: 6f:ea:f4:5b:37:f5:9b:1f:a8:cf:ca:d5:e9:6b:48:9d: cc:3a:f9:4b:8b:97:2d:e5:53:31:bb:58:42:b0:e9:c7 Fingerprint (SHA-256): 77:5E:12:92:92:4A:23:26:EC:7F:1D:AA:7A:61:64:0C:A4:A0:DE:14:34:C3:E0:F8:AA:41:5A:B6:67:47:37:DC Fingerprint (SHA1): 08:29:4B:B9:9A:A7:4E:11:F3:17:30:F3:52:B2:27:04:7A:30:9B:1A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1800: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221818 (0x3744483a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:27:27 2022 Not After : Tue Sep 27 22:27:27 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:16:81:50:10:6b:68:32:9c:76:1a:c6:42:96:8e:ee: a2:ec:1f:b9:fe:04:c5:f0:10:13:8e:02:1e:3d:b6:99: aa:3b:fa:90:f0:ad:11:30:4c:93:1f:42:d6:6e:36:06: 38:ed:90:0c:c9:32:75:97:12:c9:7f:42:b7:e9:25:5d: 3f:10:d2:f5:e3:32:4c:37:6a:6d:a1:27:3e:d2:da:32: 89:27:bd:4a:84:37:77:40:69:37:1b:7f:dd:b8:35:f1: 69:10:2c:6f:d3:d6:3a:67:86:56:71:c8:97:bc:24:cd: 00:14:8c:84:49:fe:5b:4c:9c:dd:0a:a4:42:3a:d7:64: d8:5c:90:47:be:8f:35:46:a6:87:08:4a:52:d0:33:09: 65:75:53:f4:4a:10:5d:24:03:f1:ca:b7:81:2c:67:8e: cd:e7:9a:54:2d:5d:32:3a:6e:9f:bf:ea:b4:35:5e:b3: 60:a0:6a:fc:44:07:1b:99:1a:1a:cc:5f:1a:6c:bd:35: bb:9e:5e:72:0e:8b:50:8c:9f:65:8b:7c:e4:0c:04:ad: 45:3c:57:d1:62:a6:25:0d:11:b8:41:cf:d6:8f:06:e5: 21:13:46:46:8d:27:32:69:9b:7c:25:93:ea:d0:9e:b9: b7:46:50:39:dc:e1:24:d2:ad:44:84:03:5c:8d:40:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:41:1d:96:fe:39:70:04:0c:31:1c:0c:19:f6:26:2a: 1f:41:83:11:92:dc:67:76:4f:01:bb:6d:30:dc:12:f3: 4b:97:f3:3b:6d:4b:ab:a7:2a:df:8e:41:87:64:c3:4f: da:b0:41:7c:fc:7d:0e:b6:41:0e:57:98:70:ac:68:b4: 40:af:61:f3:36:c0:61:f9:06:8b:74:2e:69:3d:23:e0: 19:16:ea:45:9b:86:41:cb:c7:63:78:1b:9b:84:2e:04: 01:24:09:a8:cf:69:c8:76:05:05:f7:7e:e7:dc:3c:15: 5e:b3:5f:d3:66:17:5b:b2:61:1a:db:4d:0c:a7:0e:35: 56:67:a9:bb:73:11:5c:20:8b:2d:c4:f1:99:71:b8:17: c5:98:75:87:53:26:42:1b:b8:63:9a:f5:92:2e:26:93: 42:1b:00:4e:77:7c:c5:e6:6f:a7:4d:81:29:cd:6a:a9: 07:65:60:01:eb:e8:f3:21:34:b4:32:cb:29:8d:8a:f8: b2:4d:04:53:d5:18:7d:b9:85:29:4a:62:96:02:a9:0d: 68:6d:dd:b0:c9:43:1a:6a:6d:84:0a:f3:ac:67:9e:dc: 1f:09:3d:a8:8d:de:e6:52:a4:c7:e4:33:08:12:95:e3: 4a:da:d1:f5:ca:7e:df:47:6e:f1:83:eb:5a:20:4f:25 Fingerprint (SHA-256): C3:43:91:E3:00:11:AB:D8:52:57:C8:9F:AF:42:2D:C9:4A:08:FE:99:F0:53:36:51:FD:43:86:35:4D:AE:2E:BE Fingerprint (SHA1): 9B:EF:BE:C5:28:4F:DC:98:81:CB:C6:67:61:ED:EC:15:FF:4A:96:D4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1801: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #1802: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221818 (0x3744483a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:27:27 2022 Not After : Tue Sep 27 22:27:27 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:16:81:50:10:6b:68:32:9c:76:1a:c6:42:96:8e:ee: a2:ec:1f:b9:fe:04:c5:f0:10:13:8e:02:1e:3d:b6:99: aa:3b:fa:90:f0:ad:11:30:4c:93:1f:42:d6:6e:36:06: 38:ed:90:0c:c9:32:75:97:12:c9:7f:42:b7:e9:25:5d: 3f:10:d2:f5:e3:32:4c:37:6a:6d:a1:27:3e:d2:da:32: 89:27:bd:4a:84:37:77:40:69:37:1b:7f:dd:b8:35:f1: 69:10:2c:6f:d3:d6:3a:67:86:56:71:c8:97:bc:24:cd: 00:14:8c:84:49:fe:5b:4c:9c:dd:0a:a4:42:3a:d7:64: d8:5c:90:47:be:8f:35:46:a6:87:08:4a:52:d0:33:09: 65:75:53:f4:4a:10:5d:24:03:f1:ca:b7:81:2c:67:8e: cd:e7:9a:54:2d:5d:32:3a:6e:9f:bf:ea:b4:35:5e:b3: 60:a0:6a:fc:44:07:1b:99:1a:1a:cc:5f:1a:6c:bd:35: bb:9e:5e:72:0e:8b:50:8c:9f:65:8b:7c:e4:0c:04:ad: 45:3c:57:d1:62:a6:25:0d:11:b8:41:cf:d6:8f:06:e5: 21:13:46:46:8d:27:32:69:9b:7c:25:93:ea:d0:9e:b9: b7:46:50:39:dc:e1:24:d2:ad:44:84:03:5c:8d:40:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:41:1d:96:fe:39:70:04:0c:31:1c:0c:19:f6:26:2a: 1f:41:83:11:92:dc:67:76:4f:01:bb:6d:30:dc:12:f3: 4b:97:f3:3b:6d:4b:ab:a7:2a:df:8e:41:87:64:c3:4f: da:b0:41:7c:fc:7d:0e:b6:41:0e:57:98:70:ac:68:b4: 40:af:61:f3:36:c0:61:f9:06:8b:74:2e:69:3d:23:e0: 19:16:ea:45:9b:86:41:cb:c7:63:78:1b:9b:84:2e:04: 01:24:09:a8:cf:69:c8:76:05:05:f7:7e:e7:dc:3c:15: 5e:b3:5f:d3:66:17:5b:b2:61:1a:db:4d:0c:a7:0e:35: 56:67:a9:bb:73:11:5c:20:8b:2d:c4:f1:99:71:b8:17: c5:98:75:87:53:26:42:1b:b8:63:9a:f5:92:2e:26:93: 42:1b:00:4e:77:7c:c5:e6:6f:a7:4d:81:29:cd:6a:a9: 07:65:60:01:eb:e8:f3:21:34:b4:32:cb:29:8d:8a:f8: b2:4d:04:53:d5:18:7d:b9:85:29:4a:62:96:02:a9:0d: 68:6d:dd:b0:c9:43:1a:6a:6d:84:0a:f3:ac:67:9e:dc: 1f:09:3d:a8:8d:de:e6:52:a4:c7:e4:33:08:12:95:e3: 4a:da:d1:f5:ca:7e:df:47:6e:f1:83:eb:5a:20:4f:25 Fingerprint (SHA-256): C3:43:91:E3:00:11:AB:D8:52:57:C8:9F:AF:42:2D:C9:4A:08:FE:99:F0:53:36:51:FD:43:86:35:4D:AE:2E:BE Fingerprint (SHA1): 9B:EF:BE:C5:28:4F:DC:98:81:CB:C6:67:61:ED:EC:15:FF:4A:96:D4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1803: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221820 (0x3744483c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Sep 27 22:27:31 2022 Not After : Mon Sep 27 22:27:31 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:b1:cb:52:bd:ef:fb:46:b3:cb:7e:44:21:15:99:7d: 3e:6f:2d:ed:cc:fd:eb:3e:68:f3:ef:de:e4:0e:0b:0c: d9:13:1b:27:6f:f9:d3:0c:63:d9:31:22:e8:95:9e:f4: 07:b5:72:ff:b5:79:96:2d:68:22:b9:af:0a:b2:27:23: f0:59:b5:12:9f:13:63:46:cd:71:bc:cf:d9:43:22:59: 19:63:32:0e:1e:47:cf:49:cd:53:61:c0:c6:ea:1e:09: 36:be:5d:f6:46:bf:04:a9:cf:d6:fc:ed:e2:f1:5a:b7: 13:25:01:cf:fd:f1:be:1a:48:60:79:10:87:21:32:f5: dd:27:46:a5:53:39:a2:b8:19:1f:cc:1e:df:58:cd:65: 67:e9:aa:b4:16:2d:c3:9e:ff:2e:f4:36:92:bc:76:a4: b2:6c:df:90:09:59:58:40:15:0a:e4:f6:d9:eb:2d:9c: 1e:b2:5f:e8:91:de:67:0f:53:8e:fc:45:82:22:b4:b2: cb:23:ef:57:ca:93:31:52:83:d6:3c:75:1e:79:74:ff: e8:99:17:08:0f:a9:7e:18:8b:96:c2:3b:59:1c:ca:ca: 03:ff:e0:19:36:a8:22:3a:5c:f4:fa:9a:07:e0:01:6d: ba:85:38:f8:b0:13:56:c2:5e:67:b4:60:84:80:c1:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:a0:f7:23:3d:ce:83:d9:e6:f3:07:30:e4:c0:5f:ed: 11:3b:ad:a6:e2:84:9a:4f:6c:2d:5f:1c:0e:1f:e2:31: 45:bc:80:a8:5b:6f:fd:3b:76:98:5f:a1:7e:8f:85:02: 80:ce:b1:74:4e:35:88:52:3c:ed:96:f8:98:a3:31:de: cb:21:3e:84:02:0c:a8:f8:cd:b2:22:a4:14:22:b3:37: 15:e5:ba:a1:10:c6:d5:2d:12:41:a2:ff:86:58:7a:18: f1:e0:18:56:2e:ee:cb:d5:4b:65:f9:1f:ce:2d:37:02: ed:e3:3f:bd:94:7f:03:f3:89:fd:e2:76:fa:3e:49:e9: 3b:67:92:a2:fb:95:8a:7d:39:4c:91:f4:9a:76:1c:c3: de:22:0f:96:f6:e9:ad:4a:c6:cc:6c:da:79:2d:1a:74: 9c:47:56:40:28:8c:99:86:9d:55:d9:a1:20:59:d1:2b: 81:5e:b5:ce:8c:0a:d6:b6:42:50:3e:e2:40:3f:82:b7: 7d:aa:8d:4d:fd:7d:73:97:0f:58:01:cb:59:74:35:0d: 29:df:c7:83:4a:8f:76:64:f1:0b:62:31:57:b8:7e:fe: 6f:ea:f4:5b:37:f5:9b:1f:a8:cf:ca:d5:e9:6b:48:9d: cc:3a:f9:4b:8b:97:2d:e5:53:31:bb:58:42:b0:e9:c7 Fingerprint (SHA-256): 77:5E:12:92:92:4A:23:26:EC:7F:1D:AA:7A:61:64:0C:A4:A0:DE:14:34:C3:E0:F8:AA:41:5A:B6:67:47:37:DC Fingerprint (SHA1): 08:29:4B:B9:9A:A7:4E:11:F3:17:30:F3:52:B2:27:04:7A:30:9B:1A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1804: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #1805: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #1806: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #1807: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221818 (0x3744483a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:27:27 2022 Not After : Tue Sep 27 22:27:27 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:16:81:50:10:6b:68:32:9c:76:1a:c6:42:96:8e:ee: a2:ec:1f:b9:fe:04:c5:f0:10:13:8e:02:1e:3d:b6:99: aa:3b:fa:90:f0:ad:11:30:4c:93:1f:42:d6:6e:36:06: 38:ed:90:0c:c9:32:75:97:12:c9:7f:42:b7:e9:25:5d: 3f:10:d2:f5:e3:32:4c:37:6a:6d:a1:27:3e:d2:da:32: 89:27:bd:4a:84:37:77:40:69:37:1b:7f:dd:b8:35:f1: 69:10:2c:6f:d3:d6:3a:67:86:56:71:c8:97:bc:24:cd: 00:14:8c:84:49:fe:5b:4c:9c:dd:0a:a4:42:3a:d7:64: d8:5c:90:47:be:8f:35:46:a6:87:08:4a:52:d0:33:09: 65:75:53:f4:4a:10:5d:24:03:f1:ca:b7:81:2c:67:8e: cd:e7:9a:54:2d:5d:32:3a:6e:9f:bf:ea:b4:35:5e:b3: 60:a0:6a:fc:44:07:1b:99:1a:1a:cc:5f:1a:6c:bd:35: bb:9e:5e:72:0e:8b:50:8c:9f:65:8b:7c:e4:0c:04:ad: 45:3c:57:d1:62:a6:25:0d:11:b8:41:cf:d6:8f:06:e5: 21:13:46:46:8d:27:32:69:9b:7c:25:93:ea:d0:9e:b9: b7:46:50:39:dc:e1:24:d2:ad:44:84:03:5c:8d:40:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:41:1d:96:fe:39:70:04:0c:31:1c:0c:19:f6:26:2a: 1f:41:83:11:92:dc:67:76:4f:01:bb:6d:30:dc:12:f3: 4b:97:f3:3b:6d:4b:ab:a7:2a:df:8e:41:87:64:c3:4f: da:b0:41:7c:fc:7d:0e:b6:41:0e:57:98:70:ac:68:b4: 40:af:61:f3:36:c0:61:f9:06:8b:74:2e:69:3d:23:e0: 19:16:ea:45:9b:86:41:cb:c7:63:78:1b:9b:84:2e:04: 01:24:09:a8:cf:69:c8:76:05:05:f7:7e:e7:dc:3c:15: 5e:b3:5f:d3:66:17:5b:b2:61:1a:db:4d:0c:a7:0e:35: 56:67:a9:bb:73:11:5c:20:8b:2d:c4:f1:99:71:b8:17: c5:98:75:87:53:26:42:1b:b8:63:9a:f5:92:2e:26:93: 42:1b:00:4e:77:7c:c5:e6:6f:a7:4d:81:29:cd:6a:a9: 07:65:60:01:eb:e8:f3:21:34:b4:32:cb:29:8d:8a:f8: b2:4d:04:53:d5:18:7d:b9:85:29:4a:62:96:02:a9:0d: 68:6d:dd:b0:c9:43:1a:6a:6d:84:0a:f3:ac:67:9e:dc: 1f:09:3d:a8:8d:de:e6:52:a4:c7:e4:33:08:12:95:e3: 4a:da:d1:f5:ca:7e:df:47:6e:f1:83:eb:5a:20:4f:25 Fingerprint (SHA-256): C3:43:91:E3:00:11:AB:D8:52:57:C8:9F:AF:42:2D:C9:4A:08:FE:99:F0:53:36:51:FD:43:86:35:4D:AE:2E:BE Fingerprint (SHA1): 9B:EF:BE:C5:28:4F:DC:98:81:CB:C6:67:61:ED:EC:15:FF:4A:96:D4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1808: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221822 (0x3744483e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Tue Sep 27 22:27:35 2022 Not After : Tue Sep 27 22:27:35 2072 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:82:53:b6:45:63:06:e3:f8:df:58:f1:4f:2b:ed:98: 9a:19:ff:f8:32:1f:e7:52:52:29:57:30:99:df:11:60: 4e:1c:c8:da:d6:d8:b8:18:8b:e5:9e:01:a4:86:87:97: bf:2d:67:28:23:c8:32:0f:ec:fd:2c:60:17:7f:63:02: c1:ba:4d:c0:88:a7:64:de:2a:32:e7:d4:d0:4d:49:3b: df:2c:66:bd:18:17:67:ef:3a:3c:9e:e5:a1:8a:ac:50: 62:d3:f3:0b:cb:65:95:0c:93:03:32:a1:62:76:38:f6: 9b:bb:4e:fe:ec:01:6d:57:09:92:96:e5:35:b5:a4:00: d7:f7:ec:15:3e:52:09:ed:a5:78:53:a1:53:b6:38:43: 56:0e:80:86:db:b9:00:00:d7:e5:7c:59:e0:c5:85:ca: c4:13:e9:d2:47:76:54:02:3d:a0:59:fc:f9:b1:1f:c5: 47:35:cc:60:b5:65:ae:9f:9e:1d:59:11:6e:02:85:38: 2e:f7:82:cc:3c:98:a6:1e:57:7b:ba:9f:67:45:d1:68: 66:b8:b0:42:1e:0c:fe:30:14:56:9d:7f:54:63:0f:90: 3a:f8:ed:a0:09:a2:a2:90:49:d2:40:5c:b4:da:5c:b6: 7d:78:3d:08:8c:74:a3:82:21:b7:ae:39:dc:ff:ec:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:45:b9:5f:2a:6e:ed:a0:0e:a6:12:f9:33:ec:46:9c: 9b:88:85:cf:65:3b:bd:4f:21:15:43:da:af:3c:87:9f: e6:30:e9:8c:c1:be:49:35:f2:c9:7b:ef:b4:d7:10:da: 3b:6e:ac:30:b3:89:ea:c3:f0:99:1a:a8:c8:fe:a9:f1: 78:3e:18:f8:60:2b:b6:e2:80:1a:66:65:22:5f:fd:a6: 04:ee:65:25:eb:5d:9b:03:8e:52:66:e0:7e:97:cb:4b: 33:c1:3b:f8:d0:0c:e0:d1:81:b0:1d:a3:a2:85:f6:1a: ab:54:d8:5e:71:b7:3b:a4:86:c1:0f:53:6b:92:be:54: da:76:e4:ed:03:e8:8e:d4:0d:c7:04:47:41:ab:28:83: c2:5c:99:9c:ab:6e:64:3c:78:fe:5c:17:69:67:4d:1b: 47:78:57:3b:5a:18:72:d4:a1:77:8f:98:49:58:cb:09: 33:5f:ae:bb:4c:9c:44:3c:1d:f5:06:22:a8:3e:7f:a4: 9c:82:19:11:c9:65:5f:cf:cb:1e:c0:fb:7d:77:3d:02: 5f:83:36:bc:32:9f:16:c6:a8:56:7f:13:ed:8b:98:8f: 26:d4:c5:00:c1:50:33:8d:f0:32:f9:4b:bc:48:2a:42: 86:0b:ce:7e:83:f6:b4:7c:dd:92:bc:4b:ac:5d:55:0d Fingerprint (SHA-256): 50:33:DF:75:20:06:B1:51:11:B9:C5:51:4A:15:B4:8F:DC:5F:38:91:2F:A2:73:5A:5B:81:F7:E1:73:64:C3:29 Fingerprint (SHA1): 89:00:20:14:89:06:15:3C:38:FD:31:F6:97:B6:36:6F:0A:49:46:5E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #1809: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221818 (0x3744483a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Sep 27 22:27:27 2022 Not After : Tue Sep 27 22:27:27 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:16:81:50:10:6b:68:32:9c:76:1a:c6:42:96:8e:ee: a2:ec:1f:b9:fe:04:c5:f0:10:13:8e:02:1e:3d:b6:99: aa:3b:fa:90:f0:ad:11:30:4c:93:1f:42:d6:6e:36:06: 38:ed:90:0c:c9:32:75:97:12:c9:7f:42:b7:e9:25:5d: 3f:10:d2:f5:e3:32:4c:37:6a:6d:a1:27:3e:d2:da:32: 89:27:bd:4a:84:37:77:40:69:37:1b:7f:dd:b8:35:f1: 69:10:2c:6f:d3:d6:3a:67:86:56:71:c8:97:bc:24:cd: 00:14:8c:84:49:fe:5b:4c:9c:dd:0a:a4:42:3a:d7:64: d8:5c:90:47:be:8f:35:46:a6:87:08:4a:52:d0:33:09: 65:75:53:f4:4a:10:5d:24:03:f1:ca:b7:81:2c:67:8e: cd:e7:9a:54:2d:5d:32:3a:6e:9f:bf:ea:b4:35:5e:b3: 60:a0:6a:fc:44:07:1b:99:1a:1a:cc:5f:1a:6c:bd:35: bb:9e:5e:72:0e:8b:50:8c:9f:65:8b:7c:e4:0c:04:ad: 45:3c:57:d1:62:a6:25:0d:11:b8:41:cf:d6:8f:06:e5: 21:13:46:46:8d:27:32:69:9b:7c:25:93:ea:d0:9e:b9: b7:46:50:39:dc:e1:24:d2:ad:44:84:03:5c:8d:40:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:41:1d:96:fe:39:70:04:0c:31:1c:0c:19:f6:26:2a: 1f:41:83:11:92:dc:67:76:4f:01:bb:6d:30:dc:12:f3: 4b:97:f3:3b:6d:4b:ab:a7:2a:df:8e:41:87:64:c3:4f: da:b0:41:7c:fc:7d:0e:b6:41:0e:57:98:70:ac:68:b4: 40:af:61:f3:36:c0:61:f9:06:8b:74:2e:69:3d:23:e0: 19:16:ea:45:9b:86:41:cb:c7:63:78:1b:9b:84:2e:04: 01:24:09:a8:cf:69:c8:76:05:05:f7:7e:e7:dc:3c:15: 5e:b3:5f:d3:66:17:5b:b2:61:1a:db:4d:0c:a7:0e:35: 56:67:a9:bb:73:11:5c:20:8b:2d:c4:f1:99:71:b8:17: c5:98:75:87:53:26:42:1b:b8:63:9a:f5:92:2e:26:93: 42:1b:00:4e:77:7c:c5:e6:6f:a7:4d:81:29:cd:6a:a9: 07:65:60:01:eb:e8:f3:21:34:b4:32:cb:29:8d:8a:f8: b2:4d:04:53:d5:18:7d:b9:85:29:4a:62:96:02:a9:0d: 68:6d:dd:b0:c9:43:1a:6a:6d:84:0a:f3:ac:67:9e:dc: 1f:09:3d:a8:8d:de:e6:52:a4:c7:e4:33:08:12:95:e3: 4a:da:d1:f5:ca:7e:df:47:6e:f1:83:eb:5a:20:4f:25 Fingerprint (SHA-256): C3:43:91:E3:00:11:AB:D8:52:57:C8:9F:AF:42:2D:C9:4A:08:FE:99:F0:53:36:51:FD:43:86:35:4D:AE:2E:BE Fingerprint (SHA1): 9B:EF:BE:C5:28:4F:DC:98:81:CB:C6:67:61:ED:EC:15:FF:4A:96:D4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1810: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #1811: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1812: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1813: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1814: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1815: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 927221823 (0x3744483f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Tue Sep 27 22:27:37 2022 Not After : Mon Sep 27 22:27:37 2027 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:18:60:25:f1:27:bc:ba:e5:79:f2:e1:4c:53:be:82: 6a:65:af:a7:24:cd:40:43:3d:0d:5b:b3:31:59:4d:73: fc:89:7e:b2:ba:95:f2:77:b0:42:a0:c3:b7:dd:25:56: d7:4c:63:87:87:37:1e:c8:01:a2:80:c6:35:71:fe:12: cf:08:19:c1:48:37:72:5c:e2:19:51:1b:4a:29:33:38: b6:22:26:c9:56:d0:9b:bc:98:70:ce:e2:5e:fe:94:c7: 63:5b:97:de:7d:96:c1:9d:90:0f:19:06:89:9b:d2:33: 03:dd:06:65:03:20:23:6d:21:ab:ae:fc:f9:a5:27:c8: af:f9:ac:82:cf:7c:28:5a:47:35:93:96:80:f2:49:c9: 62:c1:7b:bd:0a:ba:28:ec:cf:59:f7:53:2a:98:00:b8: 6a:9b:ef:76:11:ce:ee:fb:b8:65:fd:cb:58:ef:21:03: 30:e3:82:73:4f:47:a9:f7:20:65:6e:5c:45:6d:ca:20: bd:f7:2a:d0:4a:bd:7b:77:01:5b:53:b2:ca:c4:7d:e4: 88:23:10:f9:19:3f:d7:de:a1:41:7a:72:da:1f:33:61: 3d:5e:b5:0d:70:13:7e:5a:06:91:e9:f8:57:a6:db:39: 4a:9d:30:c4:e0:d9:4f:2b:5d:b0:40:e3:a9:76:4e:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:cd:b5:9c:e5:9d:c5:8c:b9:c3:8c:28:c8:67:9d:c9: ae:81:b9:57:bf:11:49:09:2f:08:de:1c:ed:9c:14:90: 84:07:79:c7:ff:c9:7a:dc:bf:9a:8d:70:2c:c1:55:28: 57:39:d3:77:5c:bd:36:a1:1e:4c:f0:e6:79:5d:06:12: b4:cb:19:18:c8:34:f7:62:d3:f7:91:b1:c0:05:01:66: 4d:7e:f2:42:6b:9d:e5:d0:4e:19:f2:2d:f5:7c:c5:3b: af:1d:46:37:2a:5e:7b:67:90:fd:87:ec:1c:4e:c5:d8: 4d:de:34:4a:52:97:15:77:e2:fd:98:72:5a:c6:1b:fb: c6:de:83:75:ea:02:45:15:e7:39:c4:f1:45:2e:7e:5f: 46:a9:8e:0c:ab:37:25:55:61:1f:6d:ba:5c:b9:25:c2: 1e:c6:be:41:2e:18:b6:31:07:9c:86:c7:ae:4a:74:7c: 9f:ba:d8:98:b8:2d:0e:d8:14:3c:d3:af:92:3b:4f:f8: 47:f7:03:f1:b9:f8:9b:a3:62:7b:57:bb:aa:1a:f5:d3: af:61:7c:a8:de:7f:ff:30:40:cc:39:aa:12:70:d3:68: 0c:85:98:b6:68:7c:18:d7:c8:83:2f:3e:6d:1b:d9:50: 2d:3e:b7:50:36:fa:69:bf:38:77:4f:2d:cc:3a:64:eb Fingerprint (SHA-256): 08:DD:59:FD:7F:A2:12:E3:47:66:92:4A:8D:3C:DD:D3:EA:0D:38:1D:50:D9:CC:5D:6A:E0:28:C4:D1:5A:DE:C3 Fingerprint (SHA1): 2C:6D:D9:97:EF:86:A1:09:E3:83:17:F0:87:FC:7A:23:50:E9:EA:9A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1816: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1817: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1818: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1819: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1820: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1821: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1822: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1823: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1824: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1825: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1826: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1827: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1828: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1829: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1830: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1831: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1832: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1833: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #1834: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1835: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1836: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1837: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1838: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1839: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1840: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1841: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 511 at Tue Sep 27 22:27:52 UTC 2022 kill -USR1 511 httpserv: normal termination httpserv -b -p 9233 2>/dev/null; httpserv with PID 511 killed at Tue Sep 27 22:27:52 UTC 2022 TIMESTAMP chains END: Tue Sep 27 22:27:52 UTC 2022 Running tests for ec TIMESTAMP ec BEGIN: Tue Sep 27 22:27:52 UTC 2022 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Tue Sep 27 22:27:52 UTC 2022 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #1: ec(perf) test - PASSED TIMESTAMP ecperf END: Tue Sep 27 22:27:52 UTC 2022 Running ec tests for ectest TIMESTAMP ectest BEGIN: Tue Sep 27 22:27:52 UTC 2022 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test curve25519 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #1: ec test certutil keygen - curve25519 - PASSED Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #2: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #3: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #5: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #6: pk11 ec tests - PASSED TIMESTAMP ectest END: Tue Sep 27 22:27:54 UTC 2022 TIMESTAMP ec END: Tue Sep 27 22:27:54 UTC 2022 ec.sh: Testing with upgraded library =============================== cp: cannot stat '/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/cert.done': No such file or directory Running tests for dbupgrade TIMESTAMP dbupgrade BEGIN: Tue Sep 27 22:27:54 UTC 2022 dbupgrade.sh: DB upgrade tests =============================== Reset databases to their initial values: certutil: could not find certificate named "objsigner": SEC_ERROR_BAD_DATABASE: security library: bad database. Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu dbupgrade.sh: Legacy to shared Library update =============================== alicedir upgrading db alicedir Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x3c751a1d updateID= - merging object Type 0xce534353 id=0x24751a1d updateID= - merging object Type 0x00000001 id=0x39720866 updateID= - merging object Type 0x00000001 id=0x3c517208 updateID= - merging object Type 0x00000001 id=0x3b740a1f updateID= - merging object Type 0x00000001 id=0x3f720866 updateID= - merging object Type 0x00000001 id=0x3d720866 updateID= - merging object Type 0x00000001 id=0x3b720866 updateID= - merging object Type 0x00000001 id=0x3d740a1f updateID= - merging object Type 0x00000001 id=0x3f740a1f updateID= - merging object Type 0x00000001 id=0x3e720866 updateID= - merging object Type 0xce534353 id=0x26720866 updateID= - merging object Type 0x00000001 id=0x3c740a1f updateID= - merging object Type 0xce534353 id=0x24740a1f updateID= - merging object Type 0x00000001 id=0x3b751a1d updateID= - merging object Type 0x00000001 id=0x3d417208 updateID= - merging object Type 0x00000001 id=0x3f783422 updateID= - merging object Type 0x00000001 id=0x3f217208 updateID= - merging object Type 0x00000002 id=0x11ffb851 updateID= - merging object Type 0x00000002 id=0x14d71220 updateID= - merging object Type 0x00000002 id=0x149aeafd updateID= - merging object Type 0x00000002 id=0x152808db updateID= - merging object Type 0x00000002 id=0x16cb8c2b updateID= - merging object Type 0x00000002 id=0x10d17354 updateID= - merging object Type 0xce534352 id=0x31427b6b updateID= - merging object Type 0xce534352 id=0x37377769 updateID= - merging object Type 0xce534352 id=0x377b6603 updateID= - merging object Type 0xce534352 id=0x30626103 updateID= - merging object Type 0xce534352 id=0x34101166 updateID= - merging object Type 0xce534352 id=0x306f1f18 updateID= - merging object Type 0xce534352 id=0x344c671e updateID= - merging object Type 0xce534352 id=0x312b021e updateID= - merging object Type 0xce534352 id=0x326f1d18 updateID= - merging object Type 0xce534352 id=0x37170d0c updateID= - merging object Type 0xce534352 id=0x30626104 updateID= - merging object Type 0xce534352 id=0x30626105 updateID= - merging object Type 0xce534352 id=0x31130d0c updateID= - merging object Type 0xce534352 id=0x3308615b updateID= - merging object Type 0x00000003 id=0x09ffb851 updateID= - merging object Type 0x00000003 id=0x0cd71220 updateID= - merging object Type 0x00000003 id=0x0c9aeafd updateID= - merging object Type 0x00000003 id=0x0d2808db updateID= - merging object Type 0x00000003 id=0x0ecb8c2b updateID= - merging object Type 0x00000003 id=0x08d17354 updateID= dbupgrade.sh: #1: Upgrading alicedir - PASSED bobdir upgrading db bobdir Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x3c751a1d updateID= - merging object Type 0xce534353 id=0x24751a1d updateID= - merging object Type 0x00000001 id=0x3f720866 updateID= - merging object Type 0x00000001 id=0x3c277208 updateID= - merging object Type 0x00000001 id=0x3d740a1f updateID= - merging object Type 0x00000001 id=0x3d720866 updateID= - merging object Type 0x00000001 id=0x3b720866 updateID= - merging object Type 0x00000001 id=0x3f740a1f updateID= - merging object Type 0x00000001 id=0x3e720866 updateID= - merging object Type 0xce534353 id=0x26720866 updateID= - merging object Type 0x00000001 id=0x3c740a1f updateID= - merging object Type 0xce534353 id=0x24740a1f updateID= - merging object Type 0x00000001 id=0x3d751a1d updateID= - merging object Type 0x00000001 id=0x3d577208 updateID= - merging object Type 0x00000001 id=0x3f783422 updateID= - merging object Type 0x00000001 id=0x3f377208 updateID= - merging object Type 0x00000002 id=0x1565e25c updateID= - merging object Type 0x00000002 id=0x172a9a23 updateID= - merging object Type 0x00000002 id=0x12d0e59d updateID= - merging object Type 0x00000002 id=0x15449b9c updateID= - merging object Type 0x00000002 id=0x16cb8c2b updateID= - merging object Type 0x00000002 id=0x15c35e9c updateID= - merging object Type 0xce534352 id=0x377b6603 updateID= - merging object Type 0xce534352 id=0x34121d4d updateID= - merging object Type 0xce534352 id=0x327d6f47 updateID= - merging object Type 0xce534352 id=0x357b7403 updateID= - merging object Type 0xce534352 id=0x30626103 updateID= - merging object Type 0xce534352 id=0x34101166 updateID= - merging object Type 0xce534352 id=0x3308072e updateID= - merging object Type 0xce534352 id=0x3308615b updateID= - merging object Type 0xce534352 id=0x37170d0c updateID= - merging object Type 0xce534352 id=0x30626104 updateID= - merging object Type 0xce534352 id=0x30626105 updateID= - merging object Type 0xce534352 id=0x31130d0c updateID= - merging object Type 0x00000003 id=0x0d65e25c updateID= - merging object Type 0x00000003 id=0x0f2a9a23 updateID= - merging object Type 0x00000003 id=0x0ad0e59d updateID= - merging object Type 0x00000003 id=0x0d449b9c updateID= - merging object Type 0x00000003 id=0x0ecb8c2b updateID= - merging object Type 0x00000003 id=0x0dc35e9c updateID= dbupgrade.sh: #2: Upgrading bobdir - PASSED CA upgrading db CA Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x3c751a1d updateID= - merging object Type 0xce534353 id=0x24751a1d updateID= - merging object Type 0x00000001 id=0x3e720866 updateID= - merging object Type 0xce534353 id=0x26720866 updateID= - merging object Type 0x00000001 id=0x3d33494a updateID= - merging object Type 0xce534353 id=0x2533494a updateID= - merging object Type 0x00000001 id=0x3d602104 updateID= - merging object Type 0xce534353 id=0x25602104 updateID= - merging object Type 0x00000001 id=0x3c740a1f updateID= - merging object Type 0xce534353 id=0x24740a1f updateID= - merging object Type 0x00000001 id=0x3db57208 updateID= - merging object Type 0xce534353 id=0x25b57208 updateID= - merging object Type 0x00000002 id=0x146dfd8a updateID= - merging object Type 0x00000002 id=0x13d4935f updateID= - merging object Type 0x00000002 id=0x17181582 updateID= - merging object Type 0x00000002 id=0x126544f5 updateID= - merging object Type 0x00000002 id=0x1555bf10 updateID= - merging object Type 0x00000002 id=0x1470fb87 updateID= - merging object Type 0xce534351 id=0x29495c6d updateID= - merging object Type 0xce534351 id=0x2a08664f updateID= - merging object Type 0xce534351 id=0x29495c6e updateID= - merging object Type 0xce534352 id=0x300e1808 updateID= - merging object Type 0x00000003 id=0x0c6dfd8a updateID= - merging object Type 0x00000003 id=0x0bd4935f updateID= - merging object Type 0x00000003 id=0x0f181582 updateID= - merging object Type 0x00000003 id=0x0a6544f5 updateID= - merging object Type 0x00000003 id=0x0d55bf10 updateID= - merging object Type 0x00000003 id=0x0c70fb87 updateID= dbupgrade.sh: #3: Upgrading CA - PASSED cert_extensions upgrading db cert_extensions Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x3c751a1d updateID= - merging object Type 0xce534353 id=0x24751a1d updateID= - merging object Type 0x00000001 id=0x3d720866 updateID= - merging object Type 0x00000001 id=0x3f740a1f updateID= - merging object Type 0x00000001 id=0x3a37a0ff updateID= - merging object Type 0x00000001 id=0x3e51b981 updateID= - merging object Type 0x00000001 id=0x3f751a1d updateID= - merging object Type 0x00000001 id=0x3fe57208 updateID= - merging object Type 0x00000001 id=0x3b37afff updateID= - merging object Type 0x00000001 id=0x3c157208 updateID= - merging object Type 0x00000001 id=0x3c37a8ff updateID= - merging object Type 0x00000001 id=0x3e37abff updateID= - merging object Type 0x00000001 id=0x3c37aeff updateID= - merging object Type 0x00000001 id=0x3a51b980 updateID= - merging object Type 0x00000001 id=0x3e720866 updateID= - merging object Type 0xce534353 id=0x26720866 updateID= - merging object Type 0x00000001 id=0x3c740a1f updateID= - merging object Type 0xce534353 id=0x24740a1f updateID= - merging object Type 0x00000001 id=0x3d057208 updateID= - merging object Type 0x00000001 id=0x3f783422 updateID= - merging object Type 0x00000001 id=0x3b37aaff updateID= - merging object Type 0x00000001 id=0x3d37adff updateID= - merging object Type 0x00000001 id=0x3f37acff updateID= - merging object Type 0x00000001 id=0x3937a1ff updateID= - merging object Type 0x00000002 id=0x11ef2b3b updateID= - merging object Type 0x00000002 id=0x16cb8c2b updateID= - merging object Type 0x00000002 id=0x1167a109 updateID= - merging object Type 0x00000002 id=0x15367976 updateID= - merging object Type 0x00000002 id=0x14f79ce2 updateID= - merging object Type 0x00000002 id=0x1410ca35 updateID= - merging object Type 0x00000002 id=0x113f16de updateID= - merging object Type 0x00000002 id=0x139595dd updateID= - merging object Type 0x00000002 id=0x16cc95e3 updateID= - merging object Type 0x00000002 id=0x12f67637 updateID= - merging object Type 0x00000002 id=0x11e00204 updateID= - merging object Type 0x00000002 id=0x10ea9e73 updateID= - merging object Type 0x00000002 id=0x14ddbc01 updateID= - merging object Type 0x00000002 id=0x1404afaa updateID= - merging object Type 0x00000002 id=0x163ffca7 updateID= - merging object Type 0x00000002 id=0x164c682d updateID= - merging object Type 0x00000002 id=0x161b1d59 updateID= - merging object Type 0x00000002 id=0x179c3905 updateID= - merging object Type 0x00000002 id=0x151cb74d updateID= - merging object Type 0x00000002 id=0x11c26cf0 updateID= - merging object Type 0x00000002 id=0x15f3788c updateID= - merging object Type 0x00000002 id=0x125e2e4a updateID= - merging object Type 0x00000002 id=0x128bf757 updateID= - merging object Type 0x00000002 id=0x106cd42b updateID= - merging object Type 0xce534352 id=0x34090377 updateID= - merging object Type 0xce534352 id=0x37607839 updateID= - merging object Type 0xce534352 id=0x310f0a33 updateID= - merging object Type 0xce534352 id=0x326b7c29 updateID= - merging object Type 0xce534352 id=0x326b7c25 updateID= - merging object Type 0xce534352 id=0x307a625a updateID= - merging object Type 0xce534352 id=0x307a042f updateID= - merging object Type 0xce534352 id=0x326b7c2c updateID= - merging object Type 0xce534352 id=0x326b7c28 updateID= - merging object Type 0xce534352 id=0x326b7c24 updateID= - merging object Type 0xce534352 id=0x351e713e updateID= - merging object Type 0xce534352 id=0x36091177 updateID= - merging object Type 0xce534352 id=0x326b7c2f updateID= - merging object Type 0xce534352 id=0x326b7c2b updateID= - merging object Type 0xce534352 id=0x341e713e updateID= - merging object Type 0xce534352 id=0x326b7c2e updateID= - merging object Type 0xce534352 id=0x326b7c2a updateID= - merging object Type 0x00000003 id=0x09ef2b3b updateID= - merging object Type 0x00000003 id=0x0ecb8c2b updateID= - merging object Type 0x00000003 id=0x0967a109 updateID= - merging object Type 0x00000003 id=0x0d367976 updateID= - merging object Type 0x00000003 id=0x0cf79ce2 updateID= - merging object Type 0x00000003 id=0x0c10ca35 updateID= - merging object Type 0x00000003 id=0x093f16de updateID= - merging object Type 0x00000003 id=0x0b9595dd updateID= - merging object Type 0x00000003 id=0x0ecc95e3 updateID= - merging object Type 0x00000003 id=0x0af67637 updateID= - merging object Type 0x00000003 id=0x09e00204 updateID= - merging object Type 0x00000003 id=0x08ea9e73 updateID= - merging object Type 0x00000003 id=0x0cddbc01 updateID= - merging object Type 0x00000003 id=0x0c04afaa updateID= - merging object Type 0x00000003 id=0x0e3ffca7 updateID= - merging object Type 0x00000003 id=0x0e4c682d updateID= - merging object Type 0x00000003 id=0x0e1b1d59 updateID= - merging object Type 0x00000003 id=0x0f9c3905 updateID= - merging object Type 0x00000003 id=0x0d1cb74d updateID= - merging object Type 0x00000003 id=0x09c26cf0 updateID= - merging object Type 0x00000003 id=0x0df3788c updateID= - merging object Type 0x00000003 id=0x0a5e2e4a updateID= - merging object Type 0x00000003 id=0x0a8bf757 updateID= - merging object Type 0x00000003 id=0x086cd42b updateID= dbupgrade.sh: #4: Upgrading cert_extensions - PASSED client upgrading db client - merging object Type 0x00000001 id=0x3c751a1d updateID= - merging object Type 0xce534353 id=0x24751a1d updateID= - merging object Type 0x00000001 id=0x3d547208 updateID= - merging object Type 0x00000001 id=0x3f327208 updateID= - merging object Type 0x00000001 id=0x3b740a1f updateID= - merging object Type 0x00000001 id=0x3c751a1e updateID= - merging object Type 0x00000001 id=0x3d720866 updateID= - merging object Type 0x00000001 id=0x3c3b7208 updateID= - merging object Type 0x00000001 id=0x3d537208 updateID= - merging object Type 0x00000001 id=0x3f317208 updateID= - merging object Type 0x00000001 id=0x3a740a1f updateID= - merging object Type 0x00000001 id=0x3f751a1d updateID= - merging object Type 0x00000001 id=0x3c720866 updateID= - merging object Type 0x00000001 id=0x3c097208 updateID= - merging object Type 0x00000001 id=0x3d527208 updateID= - merging object Type 0x00000001 id=0x3f307208 updateID= - merging object Type 0x00000001 id=0x3d740a1f updateID= - merging object Type 0x00000001 id=0x3e751a1d updateID= - merging object Type 0x00000001 id=0x3b720866 updateID= - merging object Type 0x00000001 id=0x3c740a1f updateID= - merging object Type 0xce534353 id=0x24740a1f updateID= - merging object Type 0x00000001 id=0x3d517208 updateID= - merging object Type 0x00000001 id=0x3f0f7208 updateID= - merging object Type 0x00000001 id=0x3c740a20 updateID= - merging object Type 0x00000001 id=0x39751a1d updateID= - merging object Type 0x00000001 id=0x39720866 updateID= - merging object Type 0x00000001 id=0x3c277208 updateID= - merging object Type 0x00000001 id=0x3f367208 updateID= - merging object Type 0x00000001 id=0x3f740a1f updateID= - merging object Type 0x00000001 id=0x38751a1d updateID= - merging object Type 0x00000001 id=0x39720867 updateID= - merging object Type 0x00000001 id=0x3d507208 updateID= - merging object Type 0x00000001 id=0x3c3f7208 updateID= - merging object Type 0x00000001 id=0x3f0e7208 updateID= - merging object Type 0x00000001 id=0x3f740a20 updateID= - merging object Type 0x00000001 id=0x3b751a1d updateID= - merging object Type 0x00000001 id=0x3d577208 updateID= - merging object Type 0x00000001 id=0x3c267208 updateID= - merging object Type 0x00000001 id=0x3f357208 updateID= - merging object Type 0x00000001 id=0x3e740a1f updateID= - merging object Type 0x00000001 id=0x3b751a1e updateID= - merging object Type 0x00000001 id=0x38720866 updateID= - merging object Type 0x00000001 id=0x3d2f7208 updateID= - merging object Type 0x00000001 id=0x3c3e7208 updateID= - merging object Type 0x00000001 id=0x3f0d7208 updateID= - merging object Type 0x00000001 id=0x3e740a20 updateID= - merging object Type 0x00000001 id=0x3f720866 updateID= - merging object Type 0x00000001 id=0x3d567208 updateID= - merging object Type 0x00000001 id=0x3c257208 updateID= - merging object Type 0x00000001 id=0x3f347208 updateID= - merging object Type 0x00000001 id=0x39740a1f updateID= - merging object Type 0x00000001 id=0x3a751a1d updateID= - merging object Type 0x00000001 id=0x3f720867 updateID= - merging object Type 0x00000001 id=0x3d2e7208 updateID= - merging object Type 0x00000001 id=0x3c3d7208 updateID= - merging object Type 0x00000001 id=0x3f0c7208 updateID= - merging object Type 0x00000001 id=0x39740a20 updateID= - merging object Type 0x00000001 id=0x3e720866 updateID= - merging object Type 0xce534353 id=0x26720866 updateID= - merging object Type 0x00000001 id=0x3f783422 updateID= - merging object Type 0x00000001 id=0x3d751a1d updateID= - merging object Type 0x00000001 id=0x3e720867 updateID= - merging object Type 0x00000001 id=0x3d557208 updateID= - merging object Type 0x00000001 id=0x3c247208 updateID= - merging object Type 0x00000001 id=0x3f337208 updateID= - merging object Type 0x00000001 id=0x38740a1f updateID= - merging object Type 0x00000001 id=0x3d751a1e updateID= - merging object Type 0x00000001 id=0x3e720868 updateID= - merging object Type 0x00000001 id=0x3d2d7208 updateID= - merging object Type 0x00000001 id=0x3c3c7208 updateID= - merging object Type 0x00000001 id=0x3f0b7208 updateID= - merging object Type 0x00000001 id=0x3b740a20 updateID= - merging object Type 0x00000001 id=0x3c751a1f updateID= - merging object Type 0x00000001 id=0x3d720867 updateID= - merging object Type 0x00000001 id=0x3c237208 updateID= - merging object Type 0x00000001 id=0x3d2c7208 updateID= - merging object Type 0x00000001 id=0x3f197208 updateID= - merging object Type 0x00000001 id=0x3f751a1e updateID= - merging object Type 0x00000001 id=0x3c720867 updateID= - merging object Type 0x00000001 id=0x3c227208 updateID= - merging object Type 0x00000001 id=0x3d2b7208 updateID= - merging object Type 0x00000001 id=0x3d740a20 updateID= - merging object Type 0x00000001 id=0x3e751a1e updateID= - merging object Type 0x00000001 id=0x3b720867 updateID= - merging object Type 0x00000001 id=0x3c217208 updateID= - merging object Type 0x00000001 id=0x3d397208 updateID= - merging object Type 0x00000001 id=0x3f377208 updateID= - merging object Type 0x00000001 id=0x3c740a21 updateID= - merging object Type 0x00000001 id=0x39751a1e updateID= - merging object Type 0x00000001 id=0x3a720866 updateID= - merging object Type 0x00000001 id=0x3c207208 updateID= - merging object Type 0x00000002 id=0x119a6824 updateID= - merging object Type 0x00000002 id=0x10ea9ec5 updateID= - merging object Type 0x00000002 id=0x16cb8c2b updateID= - merging object Type 0x00000002 id=0x10972e63 updateID= - merging object Type 0x00000002 id=0x14a97567 updateID= - merging object Type 0x00000002 id=0x176f0aa9 updateID= - merging object Type 0x00000002 id=0x157ec4a1 updateID= - merging object Type 0x00000002 id=0x178508a3 updateID= - merging object Type 0x00000002 id=0x1643a78b updateID= - merging object Type 0x00000002 id=0x101f9478 updateID= - merging object Type 0x00000002 id=0x13c19e0f updateID= - merging object Type 0x00000002 id=0x119f8ed8 updateID= - merging object Type 0x00000002 id=0x132acf96 updateID= - merging object Type 0x00000002 id=0x15beec21 updateID= - merging object Type 0x00000002 id=0x17a08b1c updateID= - merging object Type 0x00000002 id=0x10758165 updateID= - merging object Type 0x00000002 id=0x12e98029 updateID= - merging object Type 0x00000002 id=0x10e505ba updateID= - merging object Type 0x00000002 id=0x16ff2c69 updateID= - merging object Type 0x00000002 id=0x10161371 updateID= - merging object Type 0x00000002 id=0x13b25540 updateID= - merging object Type 0x00000002 id=0x11ab37e0 updateID= - merging object Type 0x00000002 id=0x118e8d56 updateID= - merging object Type 0x00000002 id=0x1175c0ab updateID= - merging object Type 0x00000002 id=0x12bdb443 updateID= - merging object Type 0x00000002 id=0x10e2fb6f updateID= - merging object Type 0x00000002 id=0x10ebaef7 updateID= - merging object Type 0x00000002 id=0x1144b62d updateID= - merging object Type 0x00000002 id=0x135cadc8 updateID= - merging object Type 0x00000002 id=0x142fe759 updateID= - merging object Type 0x00000002 id=0x15646f0c updateID= - merging object Type 0x00000002 id=0x11530a3d updateID= - merging object Type 0x00000002 id=0x11a639bc updateID= - merging object Type 0x00000002 id=0x17d1484b updateID= - merging object Type 0x00000002 id=0x1244d899 updateID= - merging object Type 0x00000002 id=0x17025172 updateID= - merging object Type 0x00000002 id=0x1404aa9f updateID= - merging object Type 0x00000002 id=0x11e476e5 updateID= - merging object Type 0x00000002 id=0x1756991f updateID= - merging object Type 0x00000002 id=0x12bb182d updateID= - merging object Type 0x00000002 id=0x15b2928c updateID= - merging object Type 0x00000002 id=0x11bc55b5 updateID= - merging object Type 0x00000002 id=0x13da989d updateID= - merging object Type 0x00000002 id=0x12d0c6ea updateID= - merging object Type 0x00000002 id=0x13769288 updateID= - merging object Type 0x00000002 id=0x167bb754 updateID= - merging object Type 0x00000002 id=0x14d6ef18 updateID= - merging object Type 0x00000002 id=0x111276d9 updateID= - merging object Type 0x00000002 id=0x162a9edc updateID= - merging object Type 0x00000002 id=0x17f73a10 updateID= - merging object Type 0x00000002 id=0x13ec2248 updateID= - merging object Type 0x00000002 id=0x1076db8b updateID= - merging object Type 0x00000002 id=0x1768b71f updateID= - merging object Type 0x00000002 id=0x1737e0e9 updateID= - merging object Type 0x00000002 id=0x16e6a2fb updateID= - merging object Type 0x00000002 id=0x11832cb3 updateID= - merging object Type 0x00000002 id=0x11e7d5fb updateID= - merging object Type 0x00000002 id=0x1422b33d updateID= - merging object Type 0x00000002 id=0x147c2e50 updateID= - merging object Type 0x00000002 id=0x156089a9 updateID= - merging object Type 0x00000002 id=0x1372d0a4 updateID= - merging object Type 0x00000002 id=0x16e8a460 updateID= - merging object Type 0x00000002 id=0x17cdfd8d updateID= - merging object Type 0x00000002 id=0x16b7459b updateID= - merging object Type 0x00000002 id=0x11217105 updateID= - merging object Type 0x00000002 id=0x11ab612c updateID= - merging object Type 0x00000002 id=0x1016ff29 updateID= - merging object Type 0x00000002 id=0x1482ecc4 updateID= - merging object Type 0x00000002 id=0x1065d7b6 updateID= - merging object Type 0x00000002 id=0x159ae884 updateID= - merging object Type 0x00000002 id=0x12e7dcee updateID= - merging object Type 0xce534352 id=0x33343608 updateID= - merging object Type 0xce534352 id=0x3729516d updateID= - merging object Type 0xce534352 id=0x31381572 updateID= - merging object Type 0xce534352 id=0x324a3814 updateID= - merging object Type 0xce534352 id=0x322c4d18 updateID= - merging object Type 0xce534352 id=0x32373608 updateID= - merging object Type 0xce534352 id=0x362a516d updateID= - merging object Type 0xce534352 id=0x33353608 updateID= - merging object Type 0xce534352 id=0x3728516d updateID= - merging object Type 0xce534352 id=0x31391572 updateID= - merging object Type 0xce534352 id=0x32343608 updateID= - merging object Type 0xce534352 id=0x3629516d updateID= - merging object Type 0xce534352 id=0x31221570 updateID= - merging object Type 0xce534352 id=0x33323608 updateID= - merging object Type 0xce534352 id=0x372f516d updateID= - merging object Type 0xce534352 id=0x37041e0e updateID= - merging object Type 0xce534352 id=0x31677105 updateID= - merging object Type 0xce534352 id=0x31231570 updateID= - merging object Type 0xce534352 id=0x33333608 updateID= - merging object Type 0xce534352 id=0x372e516d updateID= - merging object Type 0xce534352 id=0x30221570 updateID= - merging object Type 0xce534352 id=0x32626d7d updateID= - merging object Type 0xce534352 id=0x31201570 updateID= - merging object Type 0xce534352 id=0x31341572 updateID= - merging object Type 0xce534352 id=0x32463814 updateID= - merging object Type 0xce534352 id=0x32204d18 updateID= - merging object Type 0xce534352 id=0x33303608 updateID= - merging object Type 0xce534352 id=0x372d516d updateID= - merging object Type 0xce534352 id=0x30231570 updateID= - merging object Type 0xce534352 id=0x31211570 updateID= - merging object Type 0xce534352 id=0x31351572 updateID= - merging object Type 0xce534352 id=0x32453814 updateID= - merging object Type 0xce534352 id=0x32234d18 updateID= - merging object Type 0xce534352 id=0x33313608 updateID= - merging object Type 0xce534352 id=0x372c516d updateID= - merging object Type 0xce534352 id=0x30201570 updateID= - merging object Type 0xce534352 id=0x32606d6f updateID= - merging object Type 0xce534352 id=0x33363608 updateID= - merging object Type 0xce534352 id=0x372b516d updateID= - merging object Type 0xce534352 id=0x31261570 updateID= - merging object Type 0xce534352 id=0x31361572 updateID= - merging object Type 0xce534352 id=0x32443814 updateID= - merging object Type 0xce534352 id=0x32224d18 updateID= - merging object Type 0xce534352 id=0x333e3608 updateID= - merging object Type 0xce534352 id=0x3723516d updateID= - merging object Type 0xce534352 id=0x32433814 updateID= - merging object Type 0xce534352 id=0x32254d18 updateID= - merging object Type 0xce534352 id=0x33373608 updateID= - merging object Type 0xce534352 id=0x372a516d updateID= - merging object Type 0xce534352 id=0x31271570 updateID= - merging object Type 0xce534352 id=0x31371572 updateID= - merging object Type 0xce534352 id=0x324b3814 updateID= - merging object Type 0xce534352 id=0x322d4d18 updateID= - merging object Type 0xce534352 id=0x333f3608 updateID= - merging object Type 0xce534352 id=0x3722516d updateID= - merging object Type 0xce534352 id=0x32363608 updateID= - merging object Type 0xce534352 id=0x362b516d updateID= - merging object Type 0xce534352 id=0x31301572 updateID= - merging object Type 0xce534352 id=0x32423814 updateID= - merging object Type 0xce534352 id=0x32244d18 updateID= - merging object Type 0xce534352 id=0x31241570 updateID= - merging object Type 0xce534352 id=0x33433814 updateID= - merging object Type 0xce534352 id=0x33254d18 updateID= - merging object Type 0xce534352 id=0x31311572 updateID= - merging object Type 0xce534352 id=0x32413814 updateID= - merging object Type 0xce534352 id=0x32274d18 updateID= - merging object Type 0xce534352 id=0x31251570 updateID= - merging object Type 0xce534352 id=0x30301572 updateID= - merging object Type 0xce534352 id=0x33423814 updateID= - merging object Type 0xce534352 id=0x33244d18 updateID= - merging object Type 0xce534352 id=0x31186b79 updateID= - merging object Type 0xce534352 id=0x367d6b66 updateID= - merging object Type 0xce534352 id=0x31321572 updateID= - merging object Type 0xce534352 id=0x32403814 updateID= - merging object Type 0xce534352 id=0x32264d18 updateID= - merging object Type 0xce534352 id=0x312a1570 updateID= - merging object Type 0xce534352 id=0x30311572 updateID= - merging object Type 0xce534352 id=0x33413814 updateID= - merging object Type 0xce534352 id=0x33274d18 updateID= - merging object Type 0xce534352 id=0x31331572 updateID= - merging object Type 0xce534352 id=0x32473814 updateID= - merging object Type 0xce534352 id=0x32214d18 updateID= - merging object Type 0xce534352 id=0x312b1570 updateID= - merging object Type 0xce534352 id=0x30321572 updateID= - merging object Type 0x00000003 id=0x099a6824 updateID= - merging object Type 0x00000003 id=0x08ea9ec5 updateID= - merging object Type 0x00000003 id=0x0ecb8c2b updateID= - merging object Type 0x00000003 id=0x08972e63 updateID= - merging object Type 0x00000003 id=0x0ca97567 updateID= - merging object Type 0x00000003 id=0x0f6f0aa9 updateID= - merging object Type 0x00000003 id=0x0d7ec4a1 updateID= - merging object Type 0x00000003 id=0x0f8508a3 updateID= - merging object Type 0x00000003 id=0x0e43a78b updateID= - merging object Type 0x00000003 id=0x081f9478 updateID= Generating key. This may take a few moments... - merging object Type 0x00000003 id=0x0bc19e0f updateID= - merging object Type 0x00000003 id=0x099f8ed8 updateID= - merging object Type 0x00000003 id=0x0b2acf96 updateID= - merging object Type 0x00000003 id=0x0dbeec21 updateID= - merging object Type 0x00000003 id=0x0fa08b1c updateID= - merging object Type 0x00000003 id=0x08758165 updateID= - merging object Type 0x00000003 id=0x0ae98029 updateID= - merging object Type 0x00000003 id=0x08e505ba updateID= - merging object Type 0x00000003 id=0x0eff2c69 updateID= - merging object Type 0x00000003 id=0x08161371 updateID= - merging object Type 0x00000003 id=0x0bb25540 updateID= - merging object Type 0x00000003 id=0x09ab37e0 updateID= - merging object Type 0x00000003 id=0x098e8d56 updateID= - merging object Type 0x00000003 id=0x0975c0ab updateID= - merging object Type 0x00000003 id=0x0abdb443 updateID= - merging object Type 0x00000003 id=0x08e2fb6f updateID= - merging object Type 0x00000003 id=0x08ebaef7 updateID= - merging object Type 0x00000003 id=0x0944b62d updateID= - merging object Type 0x00000003 id=0x0b5cadc8 updateID= - merging object Type 0x00000003 id=0x0c2fe759 updateID= - merging object Type 0x00000003 id=0x0d646f0c updateID= - merging object Type 0x00000003 id=0x09530a3d updateID= - merging object Type 0x00000003 id=0x09a639bc updateID= - merging object Type 0x00000003 id=0x0fd1484b updateID= - merging object Type 0x00000003 id=0x0a44d899 updateID= - merging object Type 0x00000003 id=0x0f025172 updateID= - merging object Type 0x00000003 id=0x0c04aa9f updateID= - merging object Type 0x00000003 id=0x09e476e5 updateID= - merging object Type 0x00000003 id=0x0f56991f updateID= - merging object Type 0x00000003 id=0x0abb182d updateID= - merging object Type 0x00000003 id=0x0db2928c updateID= - merging object Type 0x00000003 id=0x09bc55b5 updateID= - merging object Type 0x00000003 id=0x0bda989d updateID= - merging object Type 0x00000003 id=0x0ad0c6ea updateID= - merging object Type 0x00000003 id=0x0b769288 updateID= - merging object Type 0x00000003 id=0x0e7bb754 updateID= - merging object Type 0x00000003 id=0x0cd6ef18 updateID= - merging object Type 0x00000003 id=0x091276d9 updateID= - merging object Type 0x00000003 id=0x0e2a9edc updateID= - merging object Type 0x00000003 id=0x0ff73a10 updateID= - merging object Type 0x00000003 id=0x0bec2248 updateID= - merging object Type 0x00000003 id=0x0876db8b updateID= - merging object Type 0x00000003 id=0x0f68b71f updateID= - merging object Type 0x00000003 id=0x0f37e0e9 updateID= - merging object Type 0x00000003 id=0x0ee6a2fb updateID= - merging object Type 0x00000003 id=0x09832cb3 updateID= - merging object Type 0x00000003 id=0x09e7d5fb updateID= - merging object Type 0x00000003 id=0x0c22b33d updateID= - merging object Type 0x00000003 id=0x0c7c2e50 updateID= - merging object Type 0x00000003 id=0x0d6089a9 updateID= - merging object Type 0x00000003 id=0x0b72d0a4 updateID= - merging object Type 0x00000003 id=0x0ee8a460 updateID= - merging object Type 0x00000003 id=0x0fcdfd8d updateID= - merging object Type 0x00000003 id=0x0eb7459b updateID= - merging object Type 0x00000003 id=0x09217105 updateID= - merging object Type 0x00000003 id=0x09ab612c updateID= - merging object Type 0x00000003 id=0x0816ff29 updateID= - merging object Type 0x00000003 id=0x0c82ecc4 updateID= - merging object Type 0x00000003 id=0x0865d7b6 updateID= - merging object Type 0x00000003 id=0x0d9ae884 updateID= - merging object Type 0x00000003 id=0x0ae7dcee updateID= dbupgrade.sh: #5: Upgrading client - PASSED clientCA upgrading db clientCA Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x39455c13 updateID= - merging object Type 0xce534353 id=0x21455c13 updateID= - merging object Type 0x00000001 id=0x3b5e721c updateID= - merging object Type 0x00000001 id=0x3c475b01 updateID= - merging object Type 0x00000001 id=0x3f475a11 updateID= - merging object Type 0xce534353 id=0x27475a11 updateID= - merging object Type 0x00000001 id=0x395e707f updateID= - merging object Type 0x00000001 id=0x3a455c13 updateID= - merging object Type 0x00000001 id=0x3f475b01 updateID= - merging object Type 0xce534353 id=0x27475b01 updateID= - merging object Type 0x00000001 id=0x395f607d updateID= - merging object Type 0x00000001 id=0x3c475a11 updateID= - merging object Type 0x00000002 id=0x1100529e updateID= - merging object Type 0x00000002 id=0x15c252c9 updateID= - merging object Type 0x00000002 id=0x104ab777 updateID= - merging object Type 0x00000002 id=0x1053bc16 updateID= - merging object Type 0x00000002 id=0x141a41d1 updateID= - merging object Type 0x00000002 id=0x1111d958 updateID= - merging object Type 0x00000002 id=0x10837f47 updateID= - merging object Type 0x00000002 id=0x13bc8b2b updateID= - merging object Type 0x00000002 id=0x130e8562 updateID= - merging object Type 0x00000003 id=0x0900529e updateID= - merging object Type 0x00000003 id=0x0dc252c9 updateID= - merging object Type 0x00000003 id=0x084ab777 updateID= - merging object Type 0x00000003 id=0x0853bc16 updateID= - merging object Type 0x00000003 id=0x0c1a41d1 updateID= - merging object Type 0x00000003 id=0x0911d958 updateID= - merging object Type 0x00000003 id=0x08837f47 updateID= - merging object Type 0x00000003 id=0x0bbc8b2b updateID= - merging object Type 0x00000003 id=0x0b0e8562 updateID= dbupgrade.sh: #6: Upgrading clientCA - PASSED dave upgrading db dave Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x3c751a1d updateID= - merging object Type 0xce534353 id=0x24751a1d updateID= - merging object Type 0x00000001 id=0x3d720866 updateID= - merging object Type 0x00000001 id=0x3c3d7208 updateID= - merging object Type 0x00000001 id=0x3f740a1f updateID= - merging object Type 0x00000001 id=0x3e720866 updateID= - merging object Type 0xce534353 id=0x26720866 updateID= - merging object Type 0x00000001 id=0x3c740a1f updateID= - merging object Type 0xce534353 id=0x24740a1f updateID= - merging object Type 0x00000001 id=0x3f751a1d updateID= - merging object Type 0x00000001 id=0x3d2d7208 updateID= - merging object Type 0x00000001 id=0x3f783422 updateID= - merging object Type 0x00000001 id=0x3f0d7208 updateID= - merging object Type 0x00000002 id=0x108a390d updateID= - merging object Type 0x00000002 id=0x15deb4fd updateID= - merging object Type 0x00000002 id=0x1729a95c updateID= - merging object Type 0x00000002 id=0x13e595a9 updateID= - merging object Type 0x00000002 id=0x1697bcb7 updateID= - merging object Type 0x00000002 id=0x16cb8c2b updateID= - merging object Type 0xce534352 id=0x32737e6d updateID= - merging object Type 0xce534352 id=0x34101166 updateID= - merging object Type 0xce534352 id=0x37170d0c updateID= - merging object Type 0xce534352 id=0x346f0b1a updateID= - merging object Type 0xce534352 id=0x330a0b05 updateID= - merging object Type 0xce534352 id=0x37150d1e updateID= - merging object Type 0x00000003 id=0x088a390d updateID= - merging object Type 0x00000003 id=0x0ddeb4fd updateID= - merging object Type 0x00000003 id=0x0f29a95c updateID= - merging object Type 0x00000003 id=0x0be595a9 updateID= - merging object Type 0x00000003 id=0x0e97bcb7 updateID= - merging object Type 0x00000003 id=0x0ecb8c2b updateID= dbupgrade.sh: #7: Upgrading dave - PASSED eccurves upgrading db eccurves Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x3bbc740a updateID= - merging object Type 0x00000001 id=0x3bbe740a updateID= - merging object Type 0x00000001 id=0x3c740a1f updateID= - merging object Type 0xce534353 id=0x24740a1f updateID= - merging object Type 0x00000001 id=0x3bbf740a updateID= - merging object Type 0x00000002 id=0x1332b3cb updateID= - merging object Type 0x00000002 id=0x104db1e7 updateID= - merging object Type 0x00000002 id=0x17656a9c updateID= - merging object Type 0xce534352 id=0x301e3734 updateID= - merging object Type 0xce534352 id=0x37193733 updateID= - merging object Type 0xce534352 id=0x321b3732 updateID= - merging object Type 0x00000003 id=0x0b32b3cb updateID= - merging object Type 0x00000003 id=0x084db1e7 updateID= - merging object Type 0x00000003 id=0x0f656a9c updateID= dbupgrade.sh: #8: Upgrading eccurves - PASSED eve upgrading db eve Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x3c751a1d updateID= - merging object Type 0xce534353 id=0x24751a1d updateID= - merging object Type 0x00000001 id=0x3b720866 updateID= - merging object Type 0x00000001 id=0x3c337208 updateID= - merging object Type 0x00000001 id=0x39740a1f updateID= - merging object Type 0x00000001 id=0x3e720866 updateID= - merging object Type 0xce534353 id=0x26720866 updateID= - merging object Type 0x00000001 id=0x3c740a1f updateID= - merging object Type 0xce534353 id=0x24740a1f updateID= - merging object Type 0x00000001 id=0x39751a1d updateID= - merging object Type 0x00000001 id=0x3d237208 updateID= - merging object Type 0x00000001 id=0x3f783422 updateID= - merging object Type 0x00000001 id=0x3f037208 updateID= - merging object Type 0x00000002 id=0x11e3cddc updateID= - merging object Type 0x00000002 id=0x12afefb5 updateID= - merging object Type 0x00000002 id=0x13c4f1d7 updateID= - merging object Type 0x00000002 id=0x15ab5d0a updateID= - merging object Type 0x00000002 id=0x14b21932 updateID= - merging object Type 0x00000002 id=0x16cb8c2b updateID= - merging object Type 0xce534352 id=0x3411002e updateID= - merging object Type 0xce534352 id=0x3411665b updateID= - merging object Type 0xce534352 id=0x30626103 updateID= - merging object Type 0xce534352 id=0x330b1a4d updateID= - merging object Type 0xce534352 id=0x35646847 updateID= - merging object Type 0xce534352 id=0x32627303 updateID= - merging object Type 0x00000003 id=0x09e3cddc updateID= - merging object Type 0x00000003 id=0x0aafefb5 updateID= - merging object Type 0x00000003 id=0x0bc4f1d7 updateID= - merging object Type 0x00000003 id=0x0dab5d0a updateID= - merging object Type 0x00000003 id=0x0cb21932 updateID= - merging object Type 0x00000003 id=0x0ecb8c2b updateID= dbupgrade.sh: #9: Upgrading eve - PASSED ext_client upgrading db ext_client Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x3e3a5f60 updateID= - merging object Type 0x00000001 id=0x3b54400e updateID= - merging object Type 0xce534353 id=0x2354400e updateID= - merging object Type 0x00000001 id=0x3a395e72 updateID= - merging object Type 0x00000001 id=0x39455c13 updateID= - merging object Type 0xce534353 id=0x21455c13 updateID= - merging object Type 0x00000001 id=0x3c475b01 updateID= - merging object Type 0xce534353 id=0x24475b01 updateID= - merging object Type 0x00000001 id=0x395e707f updateID= - merging object Type 0xce534353 id=0x215e707f updateID= - merging object Type 0x00000001 id=0x3b5e721c updateID= - merging object Type 0xce534353 id=0x235e721c updateID= - merging object Type 0x00000001 id=0x3f475a11 updateID= - merging object Type 0xce534353 id=0x27475a11 updateID= - merging object Type 0x00000001 id=0x3a385e72 updateID= - merging object Type 0x00000001 id=0x3d56471c updateID= - merging object Type 0xce534353 id=0x2556471c updateID= - merging object Type 0x00000001 id=0x3a3a5e72 updateID= - merging object Type 0x00000001 id=0x3e3a5e70 updateID= - merging object Type 0x00000001 id=0x3b54411e updateID= - merging object Type 0xce534353 id=0x2354411e updateID= - merging object Type 0x00000001 id=0x3f475b01 updateID= - merging object Type 0xce534353 id=0x27475b01 updateID= - merging object Type 0x00000001 id=0x395f607d updateID= - merging object Type 0xce534353 id=0x215f607d updateID= - merging object Type 0x00000001 id=0x3a455c13 updateID= - merging object Type 0xce534353 id=0x22455c13 updateID= - merging object Type 0x00000001 id=0x3c475a11 updateID= - merging object Type 0xce534353 id=0x24475a11 updateID= - merging object Type 0x00000002 id=0x13bc7013 updateID= - merging object Type 0x00000002 id=0x15b67c55 updateID= - merging object Type 0x00000002 id=0x11b8becc updateID= - merging object Type 0x00000002 id=0x1765d72d updateID= - merging object Type 0x00000002 id=0x13cf0307 updateID= - merging object Type 0xce534352 id=0x326d6a5a updateID= - merging object Type 0xce534352 id=0x326d0c2f updateID= - merging object Type 0xce534352 id=0x361e0b77 updateID= - merging object Type 0xce534352 id=0x35777039 updateID= - merging object Type 0xce534352 id=0x33180233 updateID= - merging object Type 0x00000003 id=0x0bbc7013 updateID= - merging object Type 0x00000003 id=0x0db67c55 updateID= - merging object Type 0x00000003 id=0x09b8becc updateID= - merging object Type 0x00000003 id=0x0f65d72d updateID= - merging object Type 0x00000003 id=0x0bcf0307 updateID= dbupgrade.sh: #10: Upgrading ext_client - PASSED ext_server upgrading db ext_server Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x38cf457d updateID= - merging object Type 0x00000001 id=0x39455c13 updateID= - merging object Type 0xce534353 id=0x21455c13 updateID= - merging object Type 0x00000001 id=0x38cd457d updateID= - merging object Type 0x00000001 id=0x3ccd457f updateID= - merging object Type 0x00000001 id=0x3f475a11 updateID= - merging object Type 0xce534353 id=0x27475a11 updateID= - merging object Type 0x00000001 id=0x3b54400e updateID= - merging object Type 0xce534353 id=0x2354400e updateID= - merging object Type 0x00000001 id=0x3c56471c updateID= - merging object Type 0xce534353 id=0x2456471c updateID= - merging object Type 0x00000001 id=0x3a54411e updateID= - merging object Type 0xce534353 id=0x2254411e updateID= - merging object Type 0x00000001 id=0x39446f66 updateID= - merging object Type 0xce534353 id=0x21446f66 updateID= - merging object Type 0x00000001 id=0x3ccd446f updateID= - merging object Type 0x00000001 id=0x3f475b01 updateID= - merging object Type 0xce534353 id=0x27475b01 updateID= - merging object Type 0x00000001 id=0x38ce457d updateID= - merging object Type 0x00000001 id=0x3b457d07 updateID= - merging object Type 0xce534353 id=0x23457d07 updateID= - merging object Type 0x00000001 id=0x3b54411e updateID= - merging object Type 0xce534353 id=0x2354411e updateID= - merging object Type 0x00000001 id=0x3d56471c updateID= - merging object Type 0xce534353 id=0x2556471c updateID= - merging object Type 0x00000001 id=0x39457f64 updateID= - merging object Type 0xce534353 id=0x21457f64 updateID= - merging object Type 0x00000001 id=0x3a54400e updateID= - merging object Type 0xce534353 id=0x2254400e updateID= - merging object Type 0x00000002 id=0x16aafda0 updateID= - merging object Type 0x00000002 id=0x1579cf9e updateID= - merging object Type 0x00000002 id=0x125d3fb8 updateID= - merging object Type 0x00000002 id=0x17db0768 updateID= - merging object Type 0x00000002 id=0x149ef107 updateID= - merging object Type 0xce534352 id=0x330b7f78 updateID= - merging object Type 0xce534352 id=0x357e737a updateID= - merging object Type 0xce534352 id=0x32261b0b updateID= - merging object Type 0xce534352 id=0x3605630d updateID= - merging object Type 0xce534352 id=0x3362060d updateID= - merging object Type 0x00000003 id=0x0eaafda0 updateID= - merging object Type 0x00000003 id=0x0d79cf9e updateID= - merging object Type 0x00000003 id=0x0a5d3fb8 updateID= - merging object Type 0x00000003 id=0x0fdb0768 updateID= - merging object Type 0x00000003 id=0x0c9ef107 updateID= dbupgrade.sh: #11: Upgrading ext_server - PASSED SDR upgrading db SDR Generating key. This may take a few moments... - merging object Type 0x00000004 id=0x18000000 updateID= dbupgrade.sh: #12: Upgrading SDR - PASSED server upgrading db server Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x3c751a1d updateID= - merging object Type 0xce534353 id=0x24751a1d updateID= - merging object Type 0x00000001 id=0x3b720866 updateID= - merging object Type 0x00000001 id=0x3ceb7208 updateID= - merging object Type 0x00000001 id=0x39740a1f updateID= - merging object Type 0x00000001 id=0x38751a1d updateID= - merging object Type 0x00000001 id=0x3d1a7208 updateID= - merging object Type 0x00000001 id=0x3ffa7208 updateID= - merging object Type 0x00000001 id=0x3e720866 updateID= - merging object Type 0xce534353 id=0x26720866 updateID= - merging object Type 0x00000001 id=0x3c740a1f updateID= - merging object Type 0xce534353 id=0x24740a1f updateID= - merging object Type 0x00000001 id=0x39751a1d updateID= - merging object Type 0x00000001 id=0x3d1b7208 updateID= - merging object Type 0x00000001 id=0x3f783422 updateID= - merging object Type 0x00000001 id=0x3ffb7208 updateID= - merging object Type 0x00000001 id=0x3a720866 updateID= - merging object Type 0x00000001 id=0x3cea7208 updateID= - merging object Type 0x00000001 id=0x38740a1f updateID= - merging object Type 0x00000002 id=0x15e89207 updateID= - merging object Type 0x00000002 id=0x14564d5f updateID= - merging object Type 0x00000002 id=0x101f118b updateID= - merging object Type 0x00000002 id=0x13e0597a updateID= - merging object Type 0x00000002 id=0x16cb8c2b updateID= - merging object Type 0x00000002 id=0x156c17f5 updateID= - merging object Type 0x00000002 id=0x149b65ee updateID= - merging object Type 0x00000002 id=0x138dd34a updateID= - merging object Type 0x00000002 id=0x153f28af updateID= - merging object Type 0x00000002 id=0x1288da20 updateID= - merging object Type 0x00000002 id=0x15e1835c updateID= - merging object Type 0x00000002 id=0x1048ddf4 updateID= - merging object Type 0xce534351 id=0x2a08664f updateID= - merging object Type 0xce534351 id=0x29495c6d updateID= - merging object Type 0xce534352 id=0x330b7f78 updateID= - merging object Type 0xce534352 id=0x357e737a updateID= - merging object Type 0xce534352 id=0x330b6865 updateID= - merging object Type 0xce534352 id=0x37281063 updateID= - merging object Type 0xce534352 id=0x324f7563 updateID= - merging object Type 0xce534352 id=0x310b6a65 updateID= - merging object Type 0xce534352 id=0x32261b0b updateID= - merging object Type 0xce534352 id=0x3605630d updateID= - merging object Type 0xce534352 id=0x3362060d updateID= - merging object Type 0xce534352 id=0x3026190b updateID= - merging object Type 0xce534352 id=0x32260c16 updateID= - merging object Type 0xce534352 id=0x34530014 updateID= - merging object Type 0x00000003 id=0x0de89207 updateID= - merging object Type 0x00000003 id=0x0c564d5f updateID= - merging object Type 0x00000003 id=0x081f118b updateID= - merging object Type 0x00000003 id=0x0be0597a updateID= - merging object Type 0x00000003 id=0x0ecb8c2b updateID= - merging object Type 0x00000003 id=0x0d6c17f5 updateID= - merging object Type 0x00000003 id=0x0c9b65ee updateID= - merging object Type 0x00000003 id=0x0b8dd34a updateID= - merging object Type 0x00000003 id=0x0d3f28af updateID= - merging object Type 0x00000003 id=0x0a88da20 updateID= - merging object Type 0x00000003 id=0x0de1835c updateID= - merging object Type 0x00000003 id=0x0848ddf4 updateID= dbupgrade.sh: #13: Upgrading server - PASSED serverCA upgrading db serverCA Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x3c56471c updateID= - merging object Type 0x00000001 id=0x3b54400e updateID= - merging object Type 0xce534353 id=0x2354400e updateID= - merging object Type 0x00000001 id=0x39446f66 updateID= - merging object Type 0x00000001 id=0x3a54411e updateID= - merging object Type 0x00000001 id=0x3d56471c updateID= - merging object Type 0xce534353 id=0x2556471c updateID= - merging object Type 0x00000001 id=0x3b457d07 updateID= - merging object Type 0x00000001 id=0x3a54400e updateID= - merging object Type 0x00000001 id=0x3b54411e updateID= - merging object Type 0xce534353 id=0x2354411e updateID= - merging object Type 0x00000001 id=0x39457f64 updateID= - merging object Type 0x00000002 id=0x162c1302 updateID= - merging object Type 0x00000002 id=0x11a53d09 updateID= - merging object Type 0x00000002 id=0x13b47cb4 updateID= - merging object Type 0x00000002 id=0x12adfed6 updateID= - merging object Type 0x00000002 id=0x15d01317 updateID= - merging object Type 0x00000002 id=0x10ee3b29 updateID= - merging object Type 0x00000002 id=0x1579c006 updateID= - merging object Type 0x00000002 id=0x1556bc86 updateID= - merging object Type 0x00000002 id=0x1019c5b1 updateID= - merging object Type 0x00000003 id=0x0e2c1302 updateID= - merging object Type 0x00000003 id=0x09a53d09 updateID= - merging object Type 0x00000003 id=0x0bb47cb4 updateID= - merging object Type 0x00000003 id=0x0aadfed6 updateID= - merging object Type 0x00000003 id=0x0dd01317 updateID= - merging object Type 0x00000003 id=0x08ee3b29 updateID= - merging object Type 0x00000003 id=0x0d79c006 updateID= - merging object Type 0x00000003 id=0x0d56bc86 updateID= - merging object Type 0x00000003 id=0x0819c5b1 updateID= dbupgrade.sh: #14: Upgrading serverCA - PASSED ssl_gtests skipping db ssl_gtests dbupgrade.sh: #15: No directory ssl_gtests - PASSED stapling upgrading db stapling Generating key. This may take a few moments... - merging object Type 0x00000001 id=0x3c751a1d updateID= - merging object Type 0xce534353 id=0x24751a1d updateID= - merging object Type 0x00000001 id=0x3b720866 updateID= - merging object Type 0x00000001 id=0x3ceb7208 updateID= - merging object Type 0x00000001 id=0x39740a1f updateID= - merging object Type 0x00000001 id=0x38751a1d updateID= - merging object Type 0x00000001 id=0x3d1a7208 updateID= - merging object Type 0x00000001 id=0x3ffa7208 updateID= - merging object Type 0x00000001 id=0x3c740a1f updateID= - merging object Type 0xce534353 id=0x24740a1f updateID= - merging object Type 0x00000001 id=0x39751a1d updateID= - merging object Type 0x00000001 id=0x3d1b7208 updateID= - merging object Type 0x00000001 id=0x3f783422 updateID= - merging object Type 0x00000001 id=0x3ffb7208 updateID= - merging object Type 0x00000001 id=0x3a720866 updateID= - merging object Type 0x00000001 id=0x3cea7208 updateID= - merging object Type 0x00000001 id=0x38740a1f updateID= - merging object Type 0x00000001 id=0x3e720866 updateID= - merging object Type 0xce534353 id=0x26720866 updateID= - merging object Type 0x00000002 id=0x15e89207 updateID= - merging object Type 0x00000002 id=0x14564d5f updateID= - merging object Type 0x00000002 id=0x101f118b updateID= - merging object Type 0x00000002 id=0x146dfd8a updateID= - merging object Type 0x00000002 id=0x13e0597a updateID= - merging object Type 0x00000002 id=0x16cb8c2b updateID= - merging object Type 0x00000002 id=0x149b65ee updateID= - merging object Type 0x00000002 id=0x138dd34a updateID= - merging object Type 0x00000002 id=0x153f28af updateID= - merging object Type 0x00000002 id=0x1288da20 updateID= - merging object Type 0x00000002 id=0x15e1835c updateID= - merging object Type 0x00000002 id=0x1048ddf4 updateID= - merging object Type 0xce534352 id=0x330b7f78 updateID= - merging object Type 0xce534352 id=0x357e737a updateID= - merging object Type 0xce534352 id=0x330b6865 updateID= - merging object Type 0xce534352 id=0x37281063 updateID= - merging object Type 0xce534352 id=0x324f7563 updateID= - merging object Type 0xce534352 id=0x310b6a65 updateID= - merging object Type 0xce534352 id=0x32261b0b updateID= - merging object Type 0xce534352 id=0x3605630d updateID= - merging object Type 0xce534352 id=0x3362060d updateID= - merging object Type 0xce534352 id=0x3026190b updateID= - merging object Type 0xce534352 id=0x32260c16 updateID= - merging object Type 0xce534352 id=0x34530014 updateID= - merging object Type 0x00000003 id=0x0de89207 updateID= - merging object Type 0x00000003 id=0x0c564d5f updateID= - merging object Type 0x00000003 id=0x081f118b updateID= - merging object Type 0x00000003 id=0x0c6dfd8a updateID= - merging object Type 0x00000003 id=0x0be0597a updateID= - merging object Type 0x00000003 id=0x0ecb8c2b updateID= - merging object Type 0x00000003 id=0x0c9b65ee updateID= - merging object Type 0x00000003 id=0x0b8dd34a updateID= - merging object Type 0x00000003 id=0x0d3f28af updateID= - merging object Type 0x00000003 id=0x0a88da20 updateID= - merging object Type 0x00000003 id=0x0de1835c updateID= - merging object Type 0x00000003 id=0x0848ddf4 updateID= dbupgrade.sh: #16: Upgrading stapling - PASSED tools/copydir skipping db tools/copydir dbupgrade.sh: #17: No directory tools/copydir - PASSED upgrading db fips Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. - merging object Type 0x00000001 id=0x397e5b0f updateID= - merging object Type 0xce534353 id=0x217e5b0f updateID= - merging object Type 0x00000002 id=0x132c0de1 updateID= - merging object Type 0xce534352 id=0x351f0b1a updateID= - merging object Type 0x00000003 id=0x0b2c0de1 updateID= dbupgrade.sh: #18: Upgrading fips - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu TIMESTAMP dbupgrade END: Tue Sep 27 22:29:43 UTC 2022 Running tests for tools TIMESTAMP tools BEGIN: Tue Sep 27 22:29:43 UTC 2022 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #1: Exporting with [default:default:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #2: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3d:42:b9:06:63:4d:9c:44:5a:4a:f5:1e:ac:5b:6c:7e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #3: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5: Exporting Alice's email EC cert & key (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #6: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 30:e9:0d:37:3c:ef:28:b9:87:f1:bd:21:e2:10:81:18 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Tue Sep 27 19:15:39 2022 Not After : Tue Sep 27 19:15:39 2072 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:bd:85:b5:57:24:8f:2d:75:7d:ea:be:e6:fb:74: be:c3:c2:dc:df:01:ba:c9:88:87:40:a1:53:33:a1:81: bc:16:44:a3:6b:2a:76:54:bf:13:ee:63:39:fe:4b:8b: bb:33:2b:30:2d:ea:ae:2d:6b:fb:2d:aa:91:22:a0:cf: c0:12:39:01:a9:5e:f8:26:12:ca:aa:9d:a7:39:90:3c: c5:59:00:66:0d:ba:d6:15:9f:ab:29:77:ea:ab:66:a8: 95:fc:04:2e:31:d6:0c:f1:e8:b5:02:96:23:a8:6a:1b: 26:2f:88:b9:ce:2b:c6:4b:b4:0b:ab:62:6f:44:3e:86: aa:26:84:5d:01 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:87:02:41:62:92:c8:8b:1a:c7:f0:9a:2f:15:01: 37:4c:2e:de:68:7b:3d:43:be:61:07:09:e1:99:b1:33: c7:03:c1:b3:c1:74:3f:65:41:b2:42:ee:95:b3:6e:fa: 3d:01:31:a8:66:03:a8:35:7a:33:63:54:72:74:d7:b3: 00:98:13:a1:84:e4:02:42:00:bb:9a:40:d9:ef:6d:01: 31:23:86:d6:16:20:da:18:cd:e6:d8:32:9d:b1:79:1e: 8f:03:6c:80:7d:d4:53:7c:08:63:fd:03:8f:be:ca:05: 15:0a:25:1d:6c:fc:26:69:30:38:9e:55:81:1b:48:b9: ee:5f:4d:57:ce:a7:b5:fe:72:0d Fingerprint (SHA-256): F2:91:8E:AA:90:41:CE:1F:79:79:DD:8B:62:61:0D:2F:2C:DE:C5:10:22:C2:5A:73:76:9C:01:79:4C:E5:DF:FA Fingerprint (SHA1): 29:36:DB:1E:91:74:30:ED:65:67:77:93:E3:7A:DA:28:7C:AF:8A:36 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Tue Sep 27 19:16:38 2022 Not After : Mon Sep 27 19:16:38 2027 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:0c:52:a0:92:3c:7d:b2:64:b2:4c:9d:ec:8a:6f:c5: b1:8d:2c:74:49:f0:82:04:35:50:e4:24:fb:cc:cc:9e: 62:0b:bd:d3:7c:91:b4:6b:75:d0:fd:cb:42:65:f1:ea: ec:a2:71:5e:31:9f:a7:f5:6e:1f:04:4b:bb:6d:66:f0: bc:f5:b8:b2:f7:1c:09:35:71:46:ac:d5:7f:50:e3:d9: be:62:54:f9:81:f3:3e:f8:c1:9d:45:e3:bb:85:52:31: 9b Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:87:02:41:3c:55:08:84:f2:1c:3d:52:8b:ee:bb: 63:07:76:db:d2:47:c4:c7:7c:e9:65:28:3c:61:e7:dd: 44:ce:ae:38:4c:11:ca:12:c9:9c:f2:7c:1c:f2:8a:8e: 27:91:1e:05:a7:1e:dc:c7:c2:b2:df:da:4a:2f:8c:27: c0:21:8a:2a:dc:eb:02:42:01:f3:0c:3b:5c:5f:42:18: c7:79:01:28:91:63:cf:45:a6:16:6a:18:ae:00:ae:68: 6c:ac:dd:f5:59:c2:3d:b5:ba:6b:77:b2:eb:fb:68:a9: 9f:3a:44:cb:eb:e1:69:82:9b:21:02:29:f9:54:64:97: 21:58:a6:26:69:1e:1a:b8:4f:17 Fingerprint (SHA-256): 6C:26:69:48:8F:B5:E9:81:33:D9:A6:44:C1:A1:95:C5:32:EF:CD:01:51:A8:0A:DA:D5:B9:E9:65:06:CB:C0:77 Fingerprint (SHA1): B2:E2:B1:BD:26:71:73:8F:6C:BF:C2:C7:3F:21:34:DF:35:5E:E1:C6 Friendly Name: Alice-ec tools.sh: #8: Listing Alice's pk12 EC file (pk12util -l) - PASSED tools.sh: Exporting Alice's email EC cert & key with long pw------ pk12util -o Alice-ec-long.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.longpw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9: Exporting Alice's email EC cert & key with long pw (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #10: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key with long pw----- pk12util -i Alice-ec-long.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.longpw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #11: Importing Alice's email EC cert & key with long pw (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file with long pw ------------ pk12util -l Alice-ec-long.p12 -w ../tests.longpw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9b:79:77:2d:bb:43:51:0b:70:79:92:45:7b:ce:31:3e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Tue Sep 27 19:15:39 2022 Not After : Tue Sep 27 19:15:39 2072 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:bd:85:b5:57:24:8f:2d:75:7d:ea:be:e6:fb:74: be:c3:c2:dc:df:01:ba:c9:88:87:40:a1:53:33:a1:81: bc:16:44:a3:6b:2a:76:54:bf:13:ee:63:39:fe:4b:8b: bb:33:2b:30:2d:ea:ae:2d:6b:fb:2d:aa:91:22:a0:cf: c0:12:39:01:a9:5e:f8:26:12:ca:aa:9d:a7:39:90:3c: c5:59:00:66:0d:ba:d6:15:9f:ab:29:77:ea:ab:66:a8: 95:fc:04:2e:31:d6:0c:f1:e8:b5:02:96:23:a8:6a:1b: 26:2f:88:b9:ce:2b:c6:4b:b4:0b:ab:62:6f:44:3e:86: aa:26:84:5d:01 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:87:02:41:62:92:c8:8b:1a:c7:f0:9a:2f:15:01: 37:4c:2e:de:68:7b:3d:43:be:61:07:09:e1:99:b1:33: c7:03:c1:b3:c1:74:3f:65:41:b2:42:ee:95:b3:6e:fa: 3d:01:31:a8:66:03:a8:35:7a:33:63:54:72:74:d7:b3: 00:98:13:a1:84:e4:02:42:00:bb:9a:40:d9:ef:6d:01: 31:23:86:d6:16:20:da:18:cd:e6:d8:32:9d:b1:79:1e: 8f:03:6c:80:7d:d4:53:7c:08:63:fd:03:8f:be:ca:05: 15:0a:25:1d:6c:fc:26:69:30:38:9e:55:81:1b:48:b9: ee:5f:4d:57:ce:a7:b5:fe:72:0d Fingerprint (SHA-256): F2:91:8E:AA:90:41:CE:1F:79:79:DD:8B:62:61:0D:2F:2C:DE:C5:10:22:C2:5A:73:76:9C:01:79:4C:E5:DF:FA Fingerprint (SHA1): 29:36:DB:1E:91:74:30:ED:65:67:77:93:E3:7A:DA:28:7C:AF:8A:36 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Tue Sep 27 19:16:38 2022 Not After : Mon Sep 27 19:16:38 2027 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:0c:52:a0:92:3c:7d:b2:64:b2:4c:9d:ec:8a:6f:c5: b1:8d:2c:74:49:f0:82:04:35:50:e4:24:fb:cc:cc:9e: 62:0b:bd:d3:7c:91:b4:6b:75:d0:fd:cb:42:65:f1:ea: ec:a2:71:5e:31:9f:a7:f5:6e:1f:04:4b:bb:6d:66:f0: bc:f5:b8:b2:f7:1c:09:35:71:46:ac:d5:7f:50:e3:d9: be:62:54:f9:81:f3:3e:f8:c1:9d:45:e3:bb:85:52:31: 9b Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:87:02:41:3c:55:08:84:f2:1c:3d:52:8b:ee:bb: 63:07:76:db:d2:47:c4:c7:7c:e9:65:28:3c:61:e7:dd: 44:ce:ae:38:4c:11:ca:12:c9:9c:f2:7c:1c:f2:8a:8e: 27:91:1e:05:a7:1e:dc:c7:c2:b2:df:da:4a:2f:8c:27: c0:21:8a:2a:dc:eb:02:42:01:f3:0c:3b:5c:5f:42:18: c7:79:01:28:91:63:cf:45:a6:16:6a:18:ae:00:ae:68: 6c:ac:dd:f5:59:c2:3d:b5:ba:6b:77:b2:eb:fb:68:a9: 9f:3a:44:cb:eb:e1:69:82:9b:21:02:29:f9:54:64:97: 21:58:a6:26:69:1e:1a:b8:4f:17 Fingerprint (SHA-256): 6C:26:69:48:8F:B5:E9:81:33:D9:A6:44:C1:A1:95:C5:32:EF:CD:01:51:A8:0A:DA:D5:B9:E9:65:06:CB:C0:77 Fingerprint (SHA1): B2:E2:B1:BD:26:71:73:8F:6C:BF:C2:C7:3F:21:34:DF:35:5E:E1:C6 Friendly Name: Alice-ec tools.sh: #12: Listing Alice's pk12 EC file with long pw (pk12util -l) - PASSED Iteration count=600000 pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #13: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #14: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: b5:70:21:77:cf:51:96:19:c4:e2:22:93:c6:cd:35:98 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #15: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #16: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #17: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #18: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: a2:d9:f7:cf:e0:20:94:ad:fc:f0:58:aa:0f:4f:54:c8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #19: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #20: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #21: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #22: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 10:33:c0:99:db:6e:5d:16:0a:d4:66:35:46:fd:f4:03 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #23: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #24: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #25: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #26: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: e7:38:9d:f5:80:be:d6:14:64:c2:02:b8:74:fb:4d:85 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #27: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #28: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #29: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #30: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 55:3c:51:b3:32:93:9d:fc:f9:50:40:92:83:cf:2e:64 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:f4:ed:31:ed:00:ea:71:db:2d:a9:df:da:b8:c8: b2:4c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #31: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #32: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #33: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #34: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 40:20:74:0f:2d:42:bf:00:42:c1:98:b7:de:2b:b3:b2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #35: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #36: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #37: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #38: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 56:8a:2d:fc:b7:30:38:22:90:e5:db:ad:30:3e:85:c2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #39: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #40: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #41: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #42: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 95:64:59:83:44:3d:0e:c4:56:91:07:08:31:02:38:5b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #43: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #44: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #45: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #46: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 49:ce:cb:d7:37:28:6b:9e:ee:c3:3d:0c:43:ce:26:8d Iteration Count: 600000 (0x927c0) tools.sh: #47: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #48: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #49: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #50: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: b4:bc:77:b3:90:9c:b8:32:c5:94:b9:2f:49:65:0f:44 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #51: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #52: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #53: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #54: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 52:00:fe:65:07:10:99:32:7f:c8:23:59:dd:9b:e9:42 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #55: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #56: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #57: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #58: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 35:85:2a:8a:15:b9:4e:c6:6f:84:73:26:91:6b:f8:9c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #59: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #60: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #61: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #62: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ca:9a:53:01:e7:0e:e4:ce:0c:f5:11:12:db:da:39:c5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #63: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #64: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #65: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #66: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 5e:ae:d3:5c:58:0a:dd:9a:83:3c:c1:2e:db:ee:f9:97 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #67: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #68: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #69: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #70: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f8:ab:db:2c:fc:e7:28:ef:3b:42:ae:fa:81:5a:5c:13 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:5c:ba:54:db:9e:20:21:79:2e:09:08:6f:0d:67: 8c:de Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #71: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #72: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #73: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #74: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 7c:5b:64:e5:b4:8d:d7:9f:70:ef:48:02:af:c7:e9:27 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #75: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #76: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #77: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #78: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d7:88:15:a8:78:48:86:b6:31:d0:26:2c:6b:31:2c:2b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #79: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #80: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #81: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #82: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 21:a5:6a:79:1a:0d:27:ff:3b:78:b0:db:f6:1d:7a:82 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #83: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #84: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #85: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #86: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 1e:12:bc:2c:ee:9f:6a:d7:a9:55:70:a8:1e:19:55:82 Iteration Count: 600000 (0x927c0) tools.sh: #87: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #88: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #89: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #90: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 85:5e:37:ec:ee:5d:82:04:bb:7d:7b:ee:da:2f:5b:e5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #91: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #92: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #93: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #94: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1a:71:25:59:be:22:b3:37:3a:8c:34:86:34:c7:2a:57 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #95: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #96: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #97: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #98: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3c:8b:0a:9a:7f:9c:66:23:e0:b4:bc:f2:de:b1:03:ba Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #99: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #100: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #101: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #102: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c4:c9:29:60:cf:3a:7b:0d:38:64:a4:12:88:7c:3e:7f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:fb:ee:59:77:cb:3b:a6:ce:a6:83:fd:73:d1:9a: 0d:54 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #103: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #104: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #105: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #106: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 97:9c:41:9e:42:68:de:71:39:13:2c:b2:9b:98:22:f9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #107: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #108: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #109: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #110: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c2:bf:5b:80:bf:30:a6:66:18:de:da:f2:44:09:2f:29 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #111: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #112: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #113: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #114: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 67:7e:b0:a2:5e:11:d1:4b:25:e4:e4:65:70:7d:9f:0a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #115: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #116: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #117: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #118: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 94:30:4b:d2:0c:3f:22:ac:5d:f8:0c:b2:01:f2:06:44 Iteration Count: 600000 (0x927c0) tools.sh: #119: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #120: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #121: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #122: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 51:d1:4b:d4:66:83:b6:29:9b:4c:f2:21:e0:6c:ea:56 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #123: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #124: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #125: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #126: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 15:1c:f3:13:70:c5:a5:ca:23:cb:da:26:b8:93:bc:54 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #127: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #128: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #129: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #130: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 9b:a8:ce:da:98:ad:79:af:8d:e2:ae:88:a6:25:d5:8d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #131: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #132: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #133: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #134: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c6:d8:4b:5b:a0:24:58:11:20:7b:72:92:1c:1b:e6:67 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #135: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #136: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #137: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #138: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 4f:c7:c4:ad:36:43:fa:b4:61:a6:26:86:d4:c3:a2:e5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #139: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #140: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #141: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #142: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 28:2b:e3:c0:d3:be:43:fd:3b:37:70:70:7a:11:83:66 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:be:17:e9:77:ea:33:74:54:3a:c3:43:ef:9f:48: 15:b8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #143: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #144: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #145: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #146: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 5a:c9:f2:7f:94:d7:84:48:99:f0:91:07:73:5c:80:08 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #147: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #148: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #149: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #150: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 38:18:7e:75:76:a7:2e:c8:de:11:c0:05:6f:4f:ac:e1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #151: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #152: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #153: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #154: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: f1:8a:41:f0:47:45:8e:5c:70:d5:42:27:36:ef:78:61 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #155: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #156: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #157: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #158: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 04:30:ec:4c:ae:8c:2e:8a:3b:a6:7e:18:52:d4:30:b7 Iteration Count: 600000 (0x927c0) tools.sh: #159: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #160: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #161: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #162: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: c5:7c:c5:ee:bb:25:83:4f:36:da:35:36:be:b8:e2:99 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #163: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #164: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #165: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #166: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 9d:07:fe:a9:85:bb:4d:aa:ed:46:cd:3c:f0:ed:00:7e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #167: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #168: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #169: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #170: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 9f:29:57:45:a1:0c:12:3a:9e:9e:e9:05:10:c6:f3:b1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #171: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #172: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #173: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #174: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d2:04:21:5b:a5:f0:5e:97:fa:12:2a:4a:fe:b6:5e:93 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #175: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #176: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #177: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #178: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: cf:8f:4a:63:0e:50:87:c3:5f:4e:9c:5b:42:f1:6f:d6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #179: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #180: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #181: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #182: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 16:bc:1d:bf:f7:cb:b6:3c:a0:d6:a3:99:ef:2a:e7:a5 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:db:2e:40:27:ba:a4:71:bd:c6:2f:2c:22:95:f3: 42:2a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #183: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #184: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #185: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #186: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 43:6e:3d:b4:7c:ec:8d:0e:86:4b:21:b9:e7:d5:9f:ab Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #187: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #188: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #189: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #190: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8b:6a:db:fd:47:bb:bc:0b:db:8f:b3:2e:df:50:94:1e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #191: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #192: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #193: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #194: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: a2:88:7a:7e:4f:d1:44:b1:5c:eb:39:c8:be:b7:cc:2a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #195: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #196: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #197: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #198: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: b9:07:0f:f1:1f:de:ac:df:ad:d4:5b:6e:9c:72:9e:ba Iteration Count: 600000 (0x927c0) tools.sh: #199: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #200: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #201: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #202: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 82:3e:58:53:5f:92:83:16:b8:83:9b:55:89:b6:0c:3e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #203: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #204: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #205: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #206: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: dd:6f:28:62:9d:0a:f8:35:ee:42:69:3c:1b:d3:b9:24 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #207: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #208: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #209: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #210: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 55:fc:e2:e7:89:53:73:60:e9:cf:fe:73:51:ce:83:31 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #211: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #212: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #213: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #214: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fd:65:8e:c5:8a:43:dd:fc:8a:e4:5a:ca:bc:38:01:bd Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:b4:ff:75:e3:30:08:d7:a0:32:2c:f4:0f:0d:06: 06:50 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #215: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #216: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #217: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #218: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f3:d6:ba:7a:06:3b:0d:38:ad:9a:8d:87:46:1e:33:40 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #219: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #220: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #221: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #222: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 15:00:cb:6b:74:1c:5d:08:47:3c:67:c2:7d:7d:05:d8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #223: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #224: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #225: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #226: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 98:1f:3c:fa:99:4f:91:77:d5:bd:ec:f6:ed:8a:c0:3b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #227: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #228: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #229: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #230: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9d:16:d1:b1:0f:e3:6f:13:19:ff:a8:f9:e3:6d:92:6c Iteration Count: 600000 (0x927c0) tools.sh: #231: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #232: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #233: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #234: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 37:51:5f:3c:56:ed:05:86:67:e6:66:1b:c5:7e:88:e3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #235: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #236: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #237: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #238: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 62:81:71:03:90:53:8f:89:29:79:87:d5:08:9c:f6:29 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #239: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #240: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #241: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #242: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: a6:de:8a:a1:f6:e2:54:a4:44:c7:e1:c1:3e:8f:0d:2d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #244: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #245: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #246: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6d:30:ff:80:1d:c2:58:cc:3f:7d:fa:39:3e:36:37:64 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #247: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #248: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #249: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #250: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 8e:6c:b9:df:a9:ae:15:e2:7a:99:77:8f:f7:1f:89:3d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #251: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #252: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #253: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #254: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3a:78:d0:c1:18:d3:bb:b3:76:5d:f8:4a:73:e6:00:5c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:7d:47:21:de:df:91:7e:4e:59:d6:e5:7b:05:24: d5:2e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #256: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #257: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #258: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 97:f7:9f:d4:0f:f0:47:a4:d3:bf:11:a8:19:fc:b7:6c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #259: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #260: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #261: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #262: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 80:fb:9f:56:2a:d8:f5:92:9f:77:42:74:60:82:85:65 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #263: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #264: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #265: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #266: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 98:d0:f9:7c:25:29:40:3b:1b:37:6d:31:50:73:76:1d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #267: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #268: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #269: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #270: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 8a:09:a0:c8:8c:0f:cc:98:6b:7d:c6:85:32:d1:3b:ce Iteration Count: 600000 (0x927c0) tools.sh: #271: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #272: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #273: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #274: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 2e:29:ce:aa:70:dc:83:d9:43:d6:8e:a2:d6:ae:76:df Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #275: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #276: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #277: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #278: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 38:36:e0:c7:8b:41:fa:0a:81:30:55:da:c8:5d:83:c5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #280: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #281: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #282: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 55:74:98:42:0d:ef:b6:68:8a:99:8e:1a:c1:8d:d6:07 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #283: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #284: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #285: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #286: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ad:5c:54:81:72:9d:ec:b3:41:ea:33:31:21:89:9c:19 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #287: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #288: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #289: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #290: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 84:c3:c3:92:8e:7d:88:1a:dd:fe:80:03:ae:a2:9e:1a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #292: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #293: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #294: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1b:78:23:0a:ba:7a:f3:c5:a5:fd:9c:9a:e9:82:98:3a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:f5:f0:ab:61:af:3b:dd:a7:c3:19:d1:2d:65:1f: 31:79 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #295: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #296: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #297: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #298: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 9f:e0:22:85:39:63:de:57:fd:40:f1:47:8a:0e:47:75 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #299: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #300: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #301: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #302: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d9:df:5a:ac:db:ca:a3:5d:64:6e:05:d9:1e:e0:0b:d3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #304: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #305: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #306: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 78:ab:7a:24:4f:9b:d7:84:bd:c6:b4:ed:0f:9c:32:2b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #307: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #308: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #309: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #310: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: a0:ed:bc:39:e7:09:4a:51:42:ee:52:7d:da:78:c9:48 Iteration Count: 600000 (0x927c0) tools.sh: #311: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #312: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #313: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #314: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 33:28:2b:3b:5d:0b:5b:08:ab:4a:99:1b:0a:82:29:b9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #316: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #317: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #318: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: bc:b4:d9:af:ad:c2:f7:19:83:ea:a7:ea:de:7e:8c:7b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #319: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #320: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #321: Exporting with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #322: Verifying p12 file generated with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 3e:ef:85:aa:44:70:f7:39:72:f1:f0:50:e4:8b:33:e4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #323: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #324: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #325: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #326: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 10:cd:18:d2:f0:b9:f7:f8:7d:8d:aa:1e:42:63:e7:c0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #328: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #329: Exporting with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #330: Verifying p12 file generated with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 27:dd:5c:7a:a1:81:9d:0e:52:57:58:35:b9:84:06:88 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #331: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #332: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #333: Exporting with [AES-256-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #334: Verifying p12 file generated with [AES-256-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1a:21:62:85:21:f3:c0:81:e9:3d:36:6c:d5:9d:ee:32 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:20:9d:dc:ce:01:95:19:30:1e:8a:a4:4a:38:6e: b9:4e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #335: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #336: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #337: Exporting with [RC2-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #338: Verifying p12 file generated with [RC2-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 53:f2:6f:32:cf:07:33:38:cc:c5:3f:b9:50:a9:b2:90 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #339: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #340: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #341: Exporting with [default:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #342: Verifying p12 file generated with [default:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 78:ce:f4:5d:14:27:51:4f:29:05:f1:0c:26:e0:ae:8f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #343: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #344: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #345: Exporting with [RC2-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #346: Verifying p12 file generated with [RC2-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: c4:65:c9:f2:a1:5b:52:49:7a:dd:7b:5e:ff:74:e2:60 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #347: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #348: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #349: Exporting with [RC2-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #350: Verifying p12 file generated with [RC2-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 17:cd:46:a8:d8:f0:e2:c4:ae:53:81:69:24:3d:eb:f4 Iteration Count: 600000 (0x927c0) tools.sh: #351: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #352: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "RC2-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #353: Exporting with [RC2-CBC:RC2-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #354: Verifying p12 file generated with [RC2-CBC:RC2-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: b1:8f:18:9e:2a:55:5d:8b:fc:d8:41:e8:c9:28:be:86 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #355: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #356: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #357: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #358: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: b1:c6:22:ca:93:a3:a3:05:cd:30:84:9c:ec:ff:61:7e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #359: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #360: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #361: Exporting with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #362: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 58:60:20:d7:65:33:c0:e8:c8:9b:3d:ed:ff:87:11:ac Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #364: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #365: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #366: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ae:10:0a:e2:e9:e7:c3:e4:a2:71:2a:01:8d:d5:2d:cf Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #367: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #368: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #369: Exporting with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #370: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c7:3c:b5:4c:be:32:b2:cb:67:1a:a1:e1:71:03:32:ed Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #371: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #372: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #373: Exporting with [AES-256-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #374: Verifying p12 file generated with [AES-256-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 12:fa:ef:23:2c:2e:2f:85:8d:00:6e:23:5b:64:e6:e0 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:dc:c4:33:ce:12:97:39:73:dc:46:a1:eb:f4:d1: f6:6f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #376: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #377: Exporting with [DES-EDE3-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #378: Verifying p12 file generated with [DES-EDE3-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 21:a4:69:ce:43:11:20:1f:93:60:0e:78:f9:9e:cc:2b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #379: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #380: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #381: Exporting with [default:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #382: Verifying p12 file generated with [default:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cc:ab:cb:35:df:fd:07:50:2d:7b:4a:e4:9c:05:37:88 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #383: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #384: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #385: Exporting with [DES-EDE3-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #386: Verifying p12 file generated with [DES-EDE3-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d7:de:a1:00:8c:e8:8b:ec:9f:82:4b:3b:a7:cc:0c:75 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #387: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #388: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #389: Exporting with [DES-EDE3-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #390: Verifying p12 file generated with [DES-EDE3-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a4:3c:af:61:5d:9d:b7:68:10:e5:b7:ac:e3:45:85:a9 Iteration Count: 600000 (0x927c0) tools.sh: #391: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #392: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #393: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #394: Verifying p12 file generated with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ba:1d:eb:59:b9:ff:88:02:d2:be:1e:3e:a1:68:a9:09 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #395: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #396: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #397: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #398: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d0:2c:94:4a:17:89:3c:0b:50:12:d6:69:d2:7e:c3:b4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #399: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #400: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #401: Exporting with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #402: Verifying p12 file generated with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7b:35:a4:cb:b6:2d:bd:ff:99:33:99:90:d5:0b:93:21 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:40:fc:e2:34:d3:e6:24:8f:c2:af:2a:30:62:de: 2d:05 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #403: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #404: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #405: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #406: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c1:ac:14:70:63:85:bf:d7:fa:84:c9:c6:65:ee:14:37 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #407: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #408: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #409: Exporting with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #410: Verifying p12 file generated with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 66:58:d6:61:bd:21:e0:2c:53:23:4c:6f:cc:7b:5e:e5 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:93:d2:16:a0:5f:14:73:a8:c1:4a:c5:f9:1d:1b: 99:a9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #411: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #412: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #413: Exporting with [AES-256-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #414: Verifying p12 file generated with [AES-256-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e5:15:30:72:a7:35:fa:ee:5d:2c:d2:86:74:0a:79:6e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ad:fa:b9:01:dd:7d:6a:41:3d:8e:65:32:26:ba: 75:51 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #415: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #416: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #417: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #418: Verifying p12 file generated with [AES-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8d:b5:24:26:1b:b7:c3:90:1c:1a:1d:67:88:b8:c5:82 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:ab:be:73:78:86:cf:1e:46:91:63:c7:2d:67:01: 9c:2a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #419: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #420: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #421: Exporting with [default:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #422: Verifying p12 file generated with [default:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 85:18:67:a5:d2:4f:c5:36:33:0b:e1:fb:a1:79:2c:56 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #423: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #424: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #425: Exporting with [AES-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #426: Verifying p12 file generated with [AES-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 79:91:b0:c9:9b:a2:45:87:2f:42:0f:7e:91:19:0e:c0 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:19:23:68:40:77:cd:d1:68:8a:13:bb:e0:b6:a2: b4:96 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #427: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #428: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #429: Exporting with [AES-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #430: Verifying p12 file generated with [AES-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 71:cd:4a:2e:3b:47:5e:d3:3e:d7:ad:40:a5:14:4f:c2 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: AES-128-CBC Args: 04:10:c7:10:ac:59:63:c3:4a:e2:75:63:b0:d6:f2:01: 8b:8d tools.sh: #431: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #432: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #433: Exporting with [AES-128-CBC:AES-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #434: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: af:9f:9c:83:aa:a4:ec:be:5e:e7:a8:da:d6:50:6d:f0 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: AES-128-CBC Args: 04:10:96:ba:71:b4:a9:70:1c:69:0c:6f:85:66:05:0a: f5:50 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #435: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #436: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #437: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #438: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: cf:e4:ce:ee:5a:4a:89:c4:5b:8c:34:4c:78:24:8a:c6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #439: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #440: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #441: Exporting with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #442: Verifying p12 file generated with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 00:d2:f8:8d:2d:f9:3b:14:20:ff:66:0b:e9:60:18:70 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:13:82:44:cb:60:aa:48:e1:90:4a:fc:a5:9f:42: 80:f3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #443: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #444: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #445: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #446: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5e:a1:21:42:4a:5a:92:a0:ca:9b:90:b4:3d:d0:27:67 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #447: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #448: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #449: Exporting with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #450: Verifying p12 file generated with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6b:92:e7:f7:e4:96:2e:e2:44:ca:ad:6e:22:f3:f7:bb Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:f3:11:c8:3f:ed:5e:d5:a9:61:00:8e:4d:02:ee: 80:b1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #451: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #452: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #453: Exporting with [AES-256-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #454: Verifying p12 file generated with [AES-256-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 22:81:29:12:0d:1f:f8:dc:35:eb:fd:5f:80:4b:51:8d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:a1:5d:b4:54:a7:5d:7b:3c:98:f0:54:3d:1b:ab: 97:47 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #455: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #456: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #457: Exporting with [AES-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #458: Verifying p12 file generated with [AES-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b2:f3:21:44:95:35:b7:b6:0b:72:d6:0c:0b:db:51:f1 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:6b:06:ea:51:ea:19:dc:53:54:03:f2:55:34:e5: 87:ee Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #459: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #460: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #461: Exporting with [default:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #462: Verifying p12 file generated with [default:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 00:fa:03:50:eb:ea:ac:7f:fa:2e:52:7b:38:7f:e8:29 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #463: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #464: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #465: Exporting with [AES-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #466: Verifying p12 file generated with [AES-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 87:79:90:f1:47:c4:b3:8f:36:88:60:0d:b7:31:20:9e Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:b8:de:27:82:f3:ef:db:33:3a:5c:35:16:56:b1: 7f:f3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #467: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #468: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #469: Exporting with [AES-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #470: Verifying p12 file generated with [AES-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 30:66:a4:71:1b:51:37:da:29:f7:31:70:a3:cf:50:cd Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: AES-192-CBC Args: 04:10:ef:d1:a7:bd:3e:f0:70:59:62:1d:5b:f9:c2:9d: a4:3b tools.sh: #471: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #472: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #473: Exporting with [AES-192-CBC:AES-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #474: Verifying p12 file generated with [AES-192-CBC:AES-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 12:05:57:f0:94:ec:fd:74:88:03:8b:a5:b6:f7:6c:15 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: AES-192-CBC Args: 04:10:ac:94:aa:5a:7f:48:97:f8:5a:bf:e8:18:61:ed: 05:ed Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #475: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #476: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #477: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #478: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a4:d5:2f:66:a2:d1:a2:d5:28:26:5c:8a:f3:a5:91:47 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #479: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #480: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #481: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #482: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ea:95:4d:b6:31:ea:61:30:bd:f1:46:65:02:13:4c:7f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:a7:a5:8b:fb:37:10:06:02:12:10:4f:a0:67:94: ec:ab Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #483: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #484: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #485: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #486: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 03:6b:fa:09:8b:b5:41:22:6e:72:b4:0b:e8:fe:c7:a2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #487: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #488: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #489: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #490: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c3:ff:59:f4:d0:16:e0:a4:be:87:40:80:eb:24:90:57 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:90:f2:70:d6:13:56:98:56:c8:05:0f:c8:c8:74: 98:cd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #491: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #492: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #493: Exporting with [default:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #494: Verifying p12 file generated with [default:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4f:08:c1:4f:15:47:69:9d:da:28:6b:c8:34:ac:fd:88 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #495: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #496: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #497: Exporting with [AES-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #498: Verifying p12 file generated with [AES-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 35:1e:32:89:69:69:ce:ea:34:3e:34:6e:c2:f7:08:a8 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:cd:79:d6:02:ee:c3:46:f8:0c:6d:eb:6e:07:74: 65:fb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #499: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #500: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #501: Exporting with [AES-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #502: Verifying p12 file generated with [AES-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d5:19:a7:14:b4:c8:45:14:39:1e:88:d1:70:de:7d:79 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:92:c0:09:bd:d6:f8:d1:dc:05:aa:02:68:f3:f9: fb:55 tools.sh: #503: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #504: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #505: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #506: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 30:61:e8:97:01:66:39:c5:5f:ec:4e:b9:21:72:44:82 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:40:42:d6:15:89:e3:cd:41:f3:60:3f:89:19:d3: 2a:eb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #507: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #508: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #509: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #510: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 2c:46:f5:65:c5:35:57:60:c0:a6:bb:55:75:dd:3a:56 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #511: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #512: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #513: Exporting with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #514: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6d:a6:8d:e9:b1:53:46:cc:18:5a:97:6c:2c:1a:13:0b Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:de:8d:bb:24:16:2c:46:8f:71:0b:17:03:02:3b: f9:48 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #515: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #516: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #517: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #518: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fa:1d:57:0a:11:ad:4d:59:35:4f:ce:fc:f8:26:5c:03 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #519: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #520: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #521: Exporting with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #522: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 05:01:ea:81:d2:ba:a0:e8:6c:8d:18:13:b6:1e:13:06 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:4b:ea:dd:e4:f3:b9:4f:14:b0:5b:05:df:d6:fb: b2:b4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #523: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #524: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #525: Exporting with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #526: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d8:42:10:df:71:fc:9d:08:0e:f6:ca:28:a7:d3:42:ab Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:89:5e:19:e2:bf:3f:2d:57:12:b7:e7:0a:5e:10: 21:3f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #527: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #528: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #529: Exporting with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #530: Verifying p12 file generated with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 11:27:1b:1c:53:23:1d:4f:6e:98:b5:8d:58:68:de:c5 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:04:cb:92:f3:7e:31:2b:68:d2:fc:7a:60:3d:2b: f9:d7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #531: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #532: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #533: Exporting with [default:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #534: Verifying p12 file generated with [default:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 25:e2:6e:11:33:42:07:aa:d5:93:42:82:cf:0f:c9:42 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #535: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #536: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #537: Exporting with [CAMELLIA-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #538: Verifying p12 file generated with [CAMELLIA-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 77:45:d4:d4:aa:ab:11:5a:12:89:0f:d8:03:04:4b:da Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:31:ba:fe:62:87:76:f7:22:e6:87:75:47:4c:3b: 8e:3e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #539: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #540: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #541: Exporting with [CAMELLIA-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #542: Verifying p12 file generated with [CAMELLIA-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: df:bc:1a:f7:aa:3c:01:20:29:a6:0e:84:a9:ab:68:e3 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-128-CBC Args: 04:10:f2:b7:58:2e:64:31:52:53:81:3b:02:1e:40:99: 09:81 tools.sh: #543: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #544: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #545: Exporting with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #546: Verifying p12 file generated with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cf:13:90:22:c0:2f:52:31:41:96:54:52:d9:c2:7f:ca Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-128-CBC Args: 04:10:fd:4e:c6:d5:f1:1e:de:80:20:97:82:49:6b:8f: 01:06 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #547: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #548: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #549: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #550: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 71:04:2d:fc:1f:13:3d:55:71:a5:2a:5f:75:40:04:87 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #551: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #552: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #553: Exporting with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #554: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 19:aa:a8:e0:06:4d:07:e4:ee:18:73:3d:9e:63:54:bb Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:07:f7:e7:a3:b8:e7:e1:da:b9:d1:c6:86:a2:67: 1d:ea Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #555: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #556: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #557: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #558: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 31:98:79:14:8f:91:74:61:b4:cc:a2:44:1c:42:45:57 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #559: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #560: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #561: Exporting with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #562: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4d:fd:df:5f:83:5f:e0:14:dd:43:d2:63:c9:b6:7c:35 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:57:a1:a9:e4:77:51:d6:e4:ae:f0:26:21:83:a5: ac:09 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #563: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #564: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #565: Exporting with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #566: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 21:31:54:53:02:7f:94:37:0b:09:3d:05:e0:69:ec:84 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:85:97:a6:48:11:d4:87:71:ce:34:08:72:fb:eb: ac:c3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #567: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #568: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #569: Exporting with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #570: Verifying p12 file generated with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c0:81:b2:57:23:8a:49:46:67:6b:2d:4c:6a:0e:d9:5a Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:7b:98:98:61:54:45:91:70:f3:5c:e5:ea:5c:e8: 4f:16 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #571: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #572: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #573: Exporting with [default:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #574: Verifying p12 file generated with [default:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 34:4f:c9:de:6d:52:8d:83:03:33:bf:f1:f6:28:2c:98 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #575: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #576: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #577: Exporting with [CAMELLIA-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #578: Verifying p12 file generated with [CAMELLIA-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 56:df:b6:7d:56:49:ba:06:14:b9:9d:e5:26:d9:1c:81 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:ce:4e:58:86:16:14:68:b2:c1:68:d4:d0:19:06: 18:5d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #579: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #580: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #581: Exporting with [CAMELLIA-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #582: Verifying p12 file generated with [CAMELLIA-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3a:2a:57:40:e3:f9:9c:ea:bb:71:60:10:2e:e9:5e:37 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-192-CBC Args: 04:10:b3:fb:df:e3:c0:e7:40:a1:3f:4c:53:78:73:1e: 99:0d tools.sh: #583: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #584: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #585: Exporting with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #586: Verifying p12 file generated with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ed:87:46:6e:ef:e0:e3:84:f1:63:cb:0a:1e:a0:b6:9d Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-192-CBC Args: 04:10:b2:df:1c:04:df:c7:d6:89:47:a3:1d:5a:f5:23: e9:ad Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #587: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #588: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #589: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #590: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: df:cb:ec:0f:fd:f9:3c:dd:f9:6d:c2:02:ce:d3:90:27 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #591: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #592: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #593: Exporting with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #594: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9f:23:3e:8f:d2:80:94:ec:46:83:f8:bc:40:84:e4:85 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:5d:80:08:6b:31:8e:c4:62:7a:46:0d:46:bc:38: 2b:71 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #595: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #596: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #597: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #598: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 98:50:05:84:56:0d:36:57:4a:61:0b:f7:96:63:48:b5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #602: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 79:af:35:d0:da:3f:99:d9:d4:55:04:98:0a:f8:5c:ac Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:bc:9b:18:fb:e9:d7:2f:8c:d8:33:66:0f:00:83: 61:66 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #603: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #604: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #605: Exporting with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #606: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e1:4a:68:74:ed:cf:bd:3f:15:3a:c3:5d:16:6c:df:36 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:2c:24:5c:06:d0:05:bb:b3:c8:79:6a:0e:d1:72: a3:9f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #607: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #608: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #609: Exporting with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #610: Verifying p12 file generated with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 27:b3:33:65:c2:7d:84:11:27:31:f0:5c:3e:39:64:f3 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:7c:11:72:ea:51:4e:5b:7d:8d:14:fd:1a:1d:75: 4c:f1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #611: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [default:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #614: Verifying p12 file generated with [default:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f1:8a:98:de:1c:24:ed:92:54:ef:07:3e:33:0b:1f:53 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #615: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #616: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #617: Exporting with [CAMELLIA-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #618: Verifying p12 file generated with [CAMELLIA-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 72:da:7d:99:23:53:e1:5a:3e:7a:42:cb:61:bb:47:fe Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:31:6d:06:cb:32:c2:f7:25:9d:8a:3f:e7:c5:b3: 8a:2b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #619: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #620: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #621: Exporting with [CAMELLIA-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #622: Verifying p12 file generated with [CAMELLIA-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 93:53:b4:8d:f2:a2:02:37:1e:8d:ba:b6:e1:13:f5:72 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-256-CBC Args: 04:10:c7:be:f4:f7:18:5b:2f:1b:99:19:79:2a:94:bc: 43:ee tools.sh: #623: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #626: Verifying p12 file generated with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fb:9e:0e:df:10:02:eb:ab:7b:fc:49:4b:29:8d:48:90 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-256-CBC Args: 04:10:bf:5c:90:37:d9:d4:91:3f:ea:8e:96:92:62:8e: 0b:bb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #627: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #628: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #629: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #630: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e2:ab:f6:39:44:e7:30:6d:99:8c:d3:5a:dd:7d:b5:82 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #631: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #632: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #633: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #634: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 41:a7:9a:c0:0f:0f:f4:de:c4:9e:0d:af:3e:ba:29:dc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #638: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 52:1c:37:c4:55:d6:f5:6a:d6:24:9c:84:b5:a9:d5:35 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #639: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #640: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #641: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #642: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 70:97:25:f0:04:b3:06:05:37:c4:57:58:1d:7c:c8:9e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #643: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #644: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #645: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #646: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 08:04:99:c2:80:0f:1e:69:04:d7:27:31:64:f8:bc:be Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #647: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #650: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e8:23:f2:4d:58:32:89:db:d3:7e:ff:5a:a5:30:df:f8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #651: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #652: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #653: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #654: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 34:24:71:12:c8:8b:2d:3e:f1:dc:6f:99:2d:b9:0d:cb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #655: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #656: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #657: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #658: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 21:33:64:68:99:49:b1:0d:e1:5c:9e:99:cc:23:16:3e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #662: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 76:4d:63:3a:0d:88:d5:56:5d:89:1d:de:99:a5:4d:9a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #663: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #664: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #665: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #666: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 17:27:7c:50:7c:e2:ab:e5:21:46:58:49:4d:e6:92:7c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #667: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #668: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #669: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #670: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 23:62:13:c9:4d:16:d2:14:f1:18:cc:23:68:08:12:ef Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #674: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7a:ef:01:3a:26:57:e2:23:a3:df:2e:68:fd:48:9d:18 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #675: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #676: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #677: Exporting with [AES-256-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #678: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9a:88:d4:74:98:23:17:8c:e2:37:87:a8:6a:29:e1:71 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:15:a5:da:f7:93:5b:f2:c4:63:d0:47:2a:89:42: 27:e1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #679: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #680: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #681: Exporting with [AES-256-CBC:AES-256-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #682: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 89:13:94:18:37:10:be:31:ff:97:81:2e:8b:29:7b:eb Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:27:8c:cd:45:f4:bb:17:91:f3:be:8e:96:ba:a1: 25:8f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #683: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [AES-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #686: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a8:4b:d1:8e:cc:74:09:e1:30:fb:f4:40:12:07:fd:bc Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:69:68:31:d4:e0:1c:df:cd:f4:6c:2d:fe:ad:36: f7:07 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #687: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #688: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #689: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #690: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 89:7a:6c:69:78:8f:82:a7:a8:57:31:83:ef:c8:94:f7 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:21:fa:e6:7a:b3:89:05:44:8f:93:07:ae:40:ba: f4:90 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #691: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #692: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #693: Exporting with [AES-256-CBC:AES-256-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #694: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c4:8e:f1:a5:4f:2a:34:80:98:43:06:37:97:f8:68:fa Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: AES-256-CBC Args: 04:10:4e:b0:f3:37:33:5c:93:fb:0d:01:d7:dc:2f:23: ee:b6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [AES-256-CBC:AES-256-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #698: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9d:0f:06:70:21:bf:c8:64:f0:05:90:8b:83:48:68:a7 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:44:d1:69:af:bc:12:e8:59:19:d9:6e:b9:e9:f5: 51:49 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #699: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #700: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #701: Exporting with [default:default:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #702: Verifying p12 file generated with [default:default:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 62:d5:52:66:6c:1b:37:97:9d:7d:75:11:b0:50:46:02 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #703: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #704: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #705: Exporting with [default:default:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #706: Verifying p12 file generated with [default:default:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 41:b9:0b:74:53:e6:92:6f:0f:b7:9a:9c:a8:21:9e:09 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #709: Exporting with [default:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #710: Verifying p12 file generated with [default:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ba:03:0d:61:e6:b1:8f:23:a9:c9:66:c3:36:08:83:0b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #711: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #712: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #713: Exporting with [default:default:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #714: Verifying p12 file generated with [default:default:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5d:95:0d:ea:58:31:06:13:3d:5f:cb:a4:23:4d:52:a5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #715: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #716: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #717: Exporting with [default:default:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #718: Verifying p12 file generated with [default:default:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 95:f6:b5:a1:7c:c9:f0:fa:42:0d:7d:78:73:a6:b3:1a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #719: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #721: Exporting with [default:default:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #722: Verifying p12 file generated with [default:default:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 83:b1:b0:47:e4:e0:1c:18:49:2b:2c:44:53:ad:fd:85 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:15:23 2022 Not After : Tue Sep 27 19:15:23 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:52:40:7f:38:bb:a3:6a:6e:cc:59:6e:8a:ca:b5:71: 46:28:8e:67:73:fe:89:b9:31:fc:5a:7e:80:c1:c7:1e: d2:6d:e6:fb:de:d5:8c:b6:f9:c1:72:1f:ff:eb:32:d1: a1:d1:f8:eb:7c:56:81:ca:4d:17:28:85:4e:c3:1a:b9: d9:58:85:8e:92:68:c0:18:86:4b:05:be:29:20:5a:69: 26:ed:38:08:4d:5d:77:b3:6c:64:15:e7:e6:62:b0:eb: c0:46:f3:87:b7:f5:e0:41:f1:9e:6f:69:06:00:e8:f9: 4b:e0:80:55:e9:72:a1:7b:87:71:57:83:a0:c4:99:d1: e3:7b:81:ad:07:c8:8d:c6:fb:d1:8b:f9:09:0d:27:40: 0c:e8:32:57:c2:a0:d7:8f:d0:5c:ee:06:03:82:65:49: f0:f9:36:f2:49:47:a4:7b:23:91:17:d4:24:f2:8f:9e: ee:e1:b9:a2:9d:f5:8a:4b:a5:2f:d9:f3:23:3d:75:cb: ea:88:4a:6e:74:25:56:ca:81:b3:b9:7b:4a:02:c6:09: 19:61:9a:d5:0e:8a:38:b8:a1:71:2a:6b:ad:e2:e2:55: 1a:ee:ba:3f:0c:2d:cf:f4:3b:5f:1b:36:42:8e:19:e8: 9e:64:a2:f4:e6:6f:1b:31:40:10:1e:7e:4f:af:e3:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:0c:e5:8e:05:d2:83:05:08:fb:02:8f:d3:bb:a5:e9: 6f:b0:c6:c2:54:58:e1:10:1a:42:c6:31:1e:8e:32:3b: c5:8b:20:1b:2c:58:30:b1:54:dd:5d:14:67:61:16:c1: 08:30:c6:2d:0d:1c:15:46:76:c5:f5:f7:6c:8a:0e:dc: 1c:5b:07:18:da:b8:ee:46:b4:09:08:a0:e5:9a:68:37: 36:e9:78:5c:f7:18:7e:5d:19:be:1d:b8:95:8f:25:be: 08:a2:d7:a4:a0:cb:c1:04:cb:0a:81:93:62:e3:98:7d: 4b:9f:58:e0:58:25:16:f0:6a:75:45:be:5c:98:63:f1: df:14:68:40:ec:de:27:e7:88:09:80:cd:85:ce:f0:91: 70:93:32:9c:bd:c6:8a:a6:2a:28:86:c8:ad:df:8c:63: a8:6f:cb:03:f9:62:35:6d:3a:a6:ad:79:72:9a:6c:f1: a4:f7:53:8f:9a:4c:e5:a7:48:1e:ae:14:31:ee:95:5a: 77:af:74:65:a6:da:f3:44:ba:ef:69:d9:a7:11:fd:5c: ad:8c:2b:43:b1:5f:c9:e2:48:f8:a1:a7:b6:68:13:0a: 95:3f:26:e3:e9:fd:97:e9:c6:ae:a7:e4:73:38:bb:24: 88:dd:e2:12:d3:5e:e3:06:ef:17:44:e3:06:3d:f6:20 Fingerprint (SHA-256): 6B:50:33:A1:52:AB:F8:82:8C:A4:E3:8B:1E:25:07:3A:55:4F:8A:16:E7:55:7A:AD:FC:73:6C:4C:6E:ED:D4:E9 Fingerprint (SHA1): 64:F0:D2:18:F4:D6:78:29:78:E4:2E:F3:D9:A8:20:61:A3:FD:BA:A4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:16:36 2022 Not After : Mon Sep 27 19:16:36 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:19:d9:41:6a:ef:5b:27:b3:19:cc:5b:bb:43:48:c8: 51:6e:1d:32:7a:0e:3f:27:75:6a:d8:18:a7:3b:19:5b: ae:91:0f:5c:86:e5:d3:84:fa:83:4b:04:9d:7c:58:f3: d0:ff:0f:77:ce:0c:80:b8:f0:88:31:19:b9:60:7e:3d: 4c:9f:eb:a3:df:04:7c:32:10:b8:5a:ce:62:fe:48:05: 42:a4:a3:4f:64:a3:35:68:dd:c5:48:da:d4:1e:a7:14: d0:2a:54:41:17:af:84:19:7c:a2:fc:52:5a:c5:7a:5d: a1:31:d7:d4:02:ba:05:57:5b:9b:61:f3:6d:58:0e:2f: a0:6e:c9:1a:bf:d8:73:2e:e1:80:0c:7f:d9:85:44:2b: d4:f5:00:d5:bc:e8:24:fe:2b:3f:fe:11:db:3e:b8:88: 48:23:c5:42:68:99:ea:a5:9d:7d:fe:52:c4:bc:79:df: 1b:65:ba:39:1b:c1:c6:b0:d4:09:2c:24:0b:8d:fd:48: e3:29:ed:18:d5:8f:af:ca:49:ac:45:25:25:ed:eb:a6: 01:38:f5:b0:04:8c:1c:40:9f:e9:f7:42:53:f3:e6:7f: c7:f7:a6:6e:0f:09:05:a4:4a:30:3a:97:dd:66:82:6e: 9f:c3:39:6a:f2:2a:81:c5:79:8d:cd:a1:d9:66:24:71 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2e:8f:e8:88:65:68:b1:82:8c:a0:9b:15:70:50:64: 96:b3:54:67:b8:31:83:e6:bf:64:f9:dd:9c:ff:fc:6f: 54:15:0e:d1:33:0c:55:5d:c8:44:ee:79:50:b9:ec:51: 83:b9:7c:e1:0f:0e:0a:44:3e:6e:48:bb:d0:b1:7c:b1: ff:27:76:18:f0:51:cf:01:2c:d7:b2:9a:8e:7e:59:56: a5:6b:09:2c:3f:da:63:5e:6d:f4:f3:93:84:82:04:d1: cb:e2:d9:1e:77:b2:ae:92:34:17:62:f8:f5:ff:c7:e1: 5b:ba:64:24:c0:17:68:44:46:bf:17:cc:0c:d9:3d:ff: 57:ce:a9:a3:b7:bc:5e:79:85:01:1b:60:30:a2:cf:73: 20:a4:62:aa:99:48:fa:79:53:e2:e5:b8:a4:ea:2c:e6: 6b:7c:50:9b:80:9f:46:98:b3:eb:81:91:90:1e:30:06: ee:0d:88:e1:b2:e2:03:42:95:c8:3b:3b:c2:f2:ab:47: ec:63:df:5c:37:fb:06:0e:05:d6:ab:fa:3a:49:5f:d7: 21:69:27:08:e8:e5:f4:31:02:ca:fc:71:e8:a2:fe:82: a1:5f:0d:68:87:fc:53:76:09:e2:94:0c:3f:48:f3:de: a2:c8:e5:4a:d7:5a:d4:f8:82:f0:a1:bc:6c:73:7a:00 Fingerprint (SHA-256): B7:13:B2:D9:6A:99:BA:4A:B9:AC:21:D7:12:15:CD:B3:6C:93:93:FB:BC:2B:06:06:86:35:A1:FD:3F:8F:D1:EB Fingerprint (SHA1): 34:F6:2C:8F:51:0A:51:BB:E4:7E:A1:84:F5:9F:89:E1:3C:18:2E:08 Friendly Name: Alice tools.sh: #723: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #724: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c none pk12util: Algorithm: "none": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #725: Exporting with [none:default:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C none pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #726: Exporting with [default:none:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #727: Verifying p12 file generated with [default:none:default] - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #728: Exporting with [INVALID_CIPHER:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #729: Exporting with [default:INVALID_CIPHER] (pk12util -o) - PASSED tools.sh: Importing PKCS#12 files created with older NSS -------------- pk12util -i TestOldCA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #730: Importing PKCS#12 file created with NSS 3.21 (PBES2 with BMPString password) - PASSED pk12util -i TestOldAES128CA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #731: Importing PKCS#12 file created with NSS 3.29.5 (PBES2 with incorrect AES-128-CBC algorithm ID) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #732: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #733: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #734: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #735: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #736: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #737: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #738: Show who signed xpi (signtool -w) - PASSED tools.sh: Test if DB created by modutil -create is initialized WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Generating key. This may take a few moments... tools.sh: #739: Test if DB created by modutil -create is initialized - PASSED TIMESTAMP tools END: Tue Sep 27 23:21:35 UTC 2022 Running tests for fips TIMESTAMP fips BEGIN: Tue Sep 27 23:21:35 UTC 2022 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Internal%20Crypto%20Services;library-version=3.79 slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB uri: pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 2. RootCerts library name: /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Builtin%20Object%20Cryptoki%20Modu;library-version=2.54 slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token uri: pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 ----------------------------------------------------------- FIPS mode enabled. fips.sh: #1: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 8f528182bf231e402ca7748f3fdabda39b05b1da FIPS_PUB_140_Test_Certificate fips.sh: #3: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #4: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #5: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #6: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #7: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #8: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #9: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #11: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #13: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 8f528182bf231e402ca7748f3fdabda39b05b1da FIPS_PUB_140_Test_Certificate fips.sh: #14: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #15: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #16: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #17: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #18: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 8f528182bf231e402ca7748f3fdabda39b05b1da FIPS_PUB_140_Test_Certificate fips.sh: #19: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 - merging object Type 0x00000002 id=0x14e20046 updateID= - merging object Type 0x00000002 id=0x13c4652f updateID= - merging object Type 0x00000002 id=0x12cb6d53 updateID= - merging object Type 0x00000003 id=0x0ce20046 updateID= - merging object Type 0x00000003 id=0x0bc4652f updateID= - merging object Type 0x00000003 id=0x0acb6d53 updateID= **** Total number of TESTS ran in FIPS MODE is 99. **** **** ALL TESTS PASSED **** fips.sh: #20: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 - merging object Type 0x00000002 id=0x164ce933 updateID= - merging object Type 0x00000002 id=0x16f900e6 updateID= - merging object Type 0x00000002 id=0x13ed8ddf updateID= - merging object Type 0x00000003 id=0x0e4ce933 updateID= - merging object Type 0x00000003 id=0x0ef900e6 updateID= - merging object Type 0x00000003 id=0x0bed8ddf updateID= **** Total number of TESTS ran in NON FIPS MODE is 97. **** **** ALL TESTS PASSED **** fips.sh: #21: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle mkdir: cannot create directory '/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle': File exists cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi-testlib.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x00053dc0 (343488): from 20 (32) to 00 (0) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/fips/mangle dbtest -r -d ../fips fips.sh: #22: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Tue Sep 27 23:22:25 UTC 2022 Running tests for crmf TIMESTAMP crmf BEGIN: Tue Sep 27 23:22:25 UTC 2022 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #1: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #2: CMMF test . - PASSED TIMESTAMP crmf END: Tue Sep 27 23:22:27 UTC 2022 Running tests for smime TIMESTAMP smime BEGIN: Tue Sep 27 23:22:27 UTC 2022 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #1: Create Detached Signature Alice (1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #2: Verifying Alice's Detached Signature (1) . - PASSED smime.sh: Signing Attached Message (1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #3: Create Attached Signature Alice (1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.1 smime.sh: #4: Decode Alice's Attached Signature (1) . - PASSED diff alice.txt alice.data.1 smime.sh: #5: Compare Attached Signed Data and Original (1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #6: Create Detached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #7: Verifying Alice's Detached Signature (ECDSA w/ 1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #8: Create Attached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.1 smime.sh: #9: Decode Alice's Attached Signature (ECDSA w/ 1) . - PASSED diff alice.txt alice-ec.data.1 smime.sh: #10: Compare Attached Signed Data and Original (ECDSA w/ 1) . - PASSED smime.sh: Signing Detached Message {256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #11: Create Detached Signature Alice (256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #12: Verifying Alice's Detached Signature (256) . - PASSED smime.sh: Signing Attached Message (256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #13: Create Attached Signature Alice (256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.256 smime.sh: #14: Decode Alice's Attached Signature (256) . - PASSED diff alice.txt alice.data.256 smime.sh: #15: Compare Attached Signed Data and Original (256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #16: Create Detached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #17: Verifying Alice's Detached Signature (ECDSA w/ 256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #18: Create Attached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.256 smime.sh: #19: Decode Alice's Attached Signature (ECDSA w/ 256) . - PASSED diff alice.txt alice-ec.data.256 smime.sh: #20: Compare Attached Signed Data and Original (ECDSA w/ 256) . - PASSED smime.sh: Signing Detached Message {384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #21: Create Detached Signature Alice (384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #22: Verifying Alice's Detached Signature (384) . - PASSED smime.sh: Signing Attached Message (384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #23: Create Attached Signature Alice (384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.384 smime.sh: #24: Decode Alice's Attached Signature (384) . - PASSED diff alice.txt alice.data.384 smime.sh: #25: Compare Attached Signed Data and Original (384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #26: Create Detached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #27: Verifying Alice's Detached Signature (ECDSA w/ 384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #28: Create Attached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.384 smime.sh: #29: Decode Alice's Attached Signature (ECDSA w/ 384) . - PASSED diff alice.txt alice-ec.data.384 smime.sh: #30: Compare Attached Signed Data and Original (ECDSA w/ 384) . - PASSED smime.sh: Signing Detached Message {512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #31: Create Detached Signature Alice (512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #32: Verifying Alice's Detached Signature (512) . - PASSED smime.sh: Signing Attached Message (512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #33: Create Attached Signature Alice (512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.512 smime.sh: #34: Decode Alice's Attached Signature (512) . - PASSED diff alice.txt alice.data.512 smime.sh: #35: Compare Attached Signed Data and Original (512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #36: Create Detached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #37: Verifying Alice's Detached Signature (ECDSA w/ 512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #38: Create Attached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.512 smime.sh: #39: Decode Alice's Attached Signature (ECDSA w/ 512) . - PASSED diff alice.txt alice-ec.data.512 smime.sh: #40: Compare Attached Signed Data and Original (ECDSA w/ 512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@example.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #41: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #42: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #43: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@example.com,dave@example.com smime.sh: #44: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@example.net smime.sh: #45: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #46: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #47: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #48: Decrypt with a Multiple Email cert . - PASSED smime.sh: #49: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #50: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #51: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@example.com,dave@example.com" \ -d ../alicedir > co.der smime.sh: #52: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #53: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@example.com" > alice.enc smime.sh: #54: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #55: Decode Encrypted-Data . - PASSED smime.sh: #56: Compare Decoded and Original Data . - PASSED pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #57: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice_p7.env -o alice_p7.data smime.sh: #58: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #59: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #60: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #61: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Tue Sep 27 23:23:55 UTC 2022 Running tests for ssl TIMESTAMP ssl BEGIN: Tue Sep 27 23:23:55 UTC 2022 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:23:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:23:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20541 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20541 found at Tue Sep 27 23:23:55 UTC 2022 selfserv_9223 with PID 20541 started at Tue Sep 27 23:23:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20541 at Tue Sep 27 23:23:58 UTC 2022 kill -USR1 20541 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20541 killed at Tue Sep 27 23:23:58 UTC 2022 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:23:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:23:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20593 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20593 found at Tue Sep 27 23:23:58 UTC 2022 selfserv_9223 with PID 20593 started at Tue Sep 27 23:23:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20593 at Tue Sep 27 23:24:01 UTC 2022 kill -USR1 20593 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20593 killed at Tue Sep 27 23:24:01 UTC 2022 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:24:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:24:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20645 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20645 found at Tue Sep 27 23:24:01 UTC 2022 selfserv_9223 with PID 20645 started at Tue Sep 27 23:24:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #3: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20645 at Tue Sep 27 23:24:04 UTC 2022 kill -USR1 20645 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20645 killed at Tue Sep 27 23:24:04 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:24:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:24:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20711 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20711 found at Tue Sep 27 23:24:05 UTC 2022 selfserv_9223 with PID 20711 started at Tue Sep 27 23:24:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #4: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20711 at Tue Sep 27 23:24:07 UTC 2022 kill -USR1 20711 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20711 killed at Tue Sep 27 23:24:07 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:24:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:24:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20763 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20763 found at Tue Sep 27 23:24:07 UTC 2022 selfserv_9223 with PID 20763 started at Tue Sep 27 23:24:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20763 at Tue Sep 27 23:24:09 UTC 2022 kill -USR1 20763 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20763 killed at Tue Sep 27 23:24:10 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:24:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:24:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20815 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20815 found at Tue Sep 27 23:24:10 UTC 2022 selfserv_9223 with PID 20815 started at Tue Sep 27 23:24:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #6: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20815 at Tue Sep 27 23:24:12 UTC 2022 kill -USR1 20815 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20815 killed at Tue Sep 27 23:24:12 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:24:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:24:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20882 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20882 found at Tue Sep 27 23:24:13 UTC 2022 selfserv_9223 with PID 20882 started at Tue Sep 27 23:24:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #7: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 20882 at Tue Sep 27 23:24:16 UTC 2022 kill -USR1 20882 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20882 killed at Tue Sep 27 23:24:16 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:24:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:24:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20934 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20934 found at Tue Sep 27 23:24:16 UTC 2022 selfserv_9223 with PID 20934 started at Tue Sep 27 23:24:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20934 at Tue Sep 27 23:24:19 UTC 2022 kill -USR1 20934 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20934 killed at Tue Sep 27 23:24:19 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:24:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:24:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20986 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20986 found at Tue Sep 27 23:24:20 UTC 2022 selfserv_9223 with PID 20986 started at Tue Sep 27 23:24:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 20986 at Tue Sep 27 23:24:22 UTC 2022 kill -USR1 20986 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20986 killed at Tue Sep 27 23:24:23 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:24:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:24:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21067 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21067 found at Tue Sep 27 23:24:23 UTC 2022 selfserv_9223 with PID 21067 started at Tue Sep 27 23:24:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 21067 at Tue Sep 27 23:24:26 UTC 2022 kill -USR1 21067 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21067 killed at Tue Sep 27 23:24:26 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:24:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:24:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21119 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21119 found at Tue Sep 27 23:24:26 UTC 2022 selfserv_9223 with PID 21119 started at Tue Sep 27 23:24:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #11: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 21119 at Tue Sep 27 23:24:29 UTC 2022 kill -USR1 21119 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21119 killed at Tue Sep 27 23:24:29 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:24:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:24:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21171 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21171 found at Tue Sep 27 23:24:29 UTC 2022 selfserv_9223 with PID 21171 started at Tue Sep 27 23:24:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #12: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 21171 at Tue Sep 27 23:24:32 UTC 2022 kill -USR1 21171 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21171 killed at Tue Sep 27 23:24:32 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:24:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:24:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21237 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21237 found at Tue Sep 27 23:24:32 UTC 2022 selfserv_9223 with PID 21237 started at Tue Sep 27 23:24:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #13: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 21237 at Tue Sep 27 23:24:35 UTC 2022 kill -USR1 21237 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21237 killed at Tue Sep 27 23:24:35 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:24:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:24:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21289 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21289 found at Tue Sep 27 23:24:35 UTC 2022 selfserv_9223 with PID 21289 started at Tue Sep 27 23:24:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #14: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 21289 at Tue Sep 27 23:24:37 UTC 2022 kill -USR1 21289 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21289 killed at Tue Sep 27 23:24:37 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:24:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:24:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21341 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21341 found at Tue Sep 27 23:24:38 UTC 2022 selfserv_9223 with PID 21341 started at Tue Sep 27 23:24:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #15: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 21341 at Tue Sep 27 23:24:40 UTC 2022 kill -USR1 21341 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21341 killed at Tue Sep 27 23:24:40 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:24:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:24:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21407 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21407 found at Tue Sep 27 23:24:40 UTC 2022 selfserv_9223 with PID 21407 started at Tue Sep 27 23:24:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #16: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 21407 at Tue Sep 27 23:24:43 UTC 2022 kill -USR1 21407 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21407 killed at Tue Sep 27 23:24:43 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:24:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:24:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21460 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21460 found at Tue Sep 27 23:24:44 UTC 2022 selfserv_9223 with PID 21460 started at Tue Sep 27 23:24:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #17: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21460 at Tue Sep 27 23:24:47 UTC 2022 kill -USR1 21460 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21460 killed at Tue Sep 27 23:24:47 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:24:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:24:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21512 found at Tue Sep 27 23:24:47 UTC 2022 selfserv_9223 with PID 21512 started at Tue Sep 27 23:24:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #18: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 21512 at Tue Sep 27 23:24:50 UTC 2022 kill -USR1 21512 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21512 killed at Tue Sep 27 23:24:50 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:24:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:24:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21578 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21578 found at Tue Sep 27 23:24:51 UTC 2022 selfserv_9223 with PID 21578 started at Tue Sep 27 23:24:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #19: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21578 at Tue Sep 27 23:24:53 UTC 2022 kill -USR1 21578 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21578 killed at Tue Sep 27 23:24:53 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:24:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:24:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21630 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21630 found at Tue Sep 27 23:24:54 UTC 2022 selfserv_9223 with PID 21630 started at Tue Sep 27 23:24:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #20: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21630 at Tue Sep 27 23:24:56 UTC 2022 kill -USR1 21630 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21630 killed at Tue Sep 27 23:24:57 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:24:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:24:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21682 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21682 found at Tue Sep 27 23:24:57 UTC 2022 selfserv_9223 with PID 21682 started at Tue Sep 27 23:24:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #21: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21682 at Tue Sep 27 23:24:59 UTC 2022 kill -USR1 21682 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21682 killed at Tue Sep 27 23:25:00 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:25:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:25:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21748 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21748 found at Tue Sep 27 23:25:00 UTC 2022 selfserv_9223 with PID 21748 started at Tue Sep 27 23:25:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #22: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21748 at Tue Sep 27 23:25:02 UTC 2022 kill -USR1 21748 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21748 killed at Tue Sep 27 23:25:02 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:25:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:25:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21800 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21800 found at Tue Sep 27 23:25:03 UTC 2022 selfserv_9223 with PID 21800 started at Tue Sep 27 23:25:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #23: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21800 at Tue Sep 27 23:25:05 UTC 2022 kill -USR1 21800 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21800 killed at Tue Sep 27 23:25:05 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:25:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:25:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21852 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21852 found at Tue Sep 27 23:25:05 UTC 2022 selfserv_9223 with PID 21852 started at Tue Sep 27 23:25:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #24: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21852 at Tue Sep 27 23:25:07 UTC 2022 kill -USR1 21852 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21852 killed at Tue Sep 27 23:25:08 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:25:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:25:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21918 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21918 found at Tue Sep 27 23:25:08 UTC 2022 selfserv_9223 with PID 21918 started at Tue Sep 27 23:25:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #25: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 21918 at Tue Sep 27 23:25:10 UTC 2022 kill -USR1 21918 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21918 killed at Tue Sep 27 23:25:10 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:25:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:25:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21970 found at Tue Sep 27 23:25:11 UTC 2022 selfserv_9223 with PID 21970 started at Tue Sep 27 23:25:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #26: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21970 at Tue Sep 27 23:25:13 UTC 2022 kill -USR1 21970 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21970 killed at Tue Sep 27 23:25:13 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:25:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:25:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22022 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22022 found at Tue Sep 27 23:25:14 UTC 2022 selfserv_9223 with PID 22022 started at Tue Sep 27 23:25:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #27: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22022 at Tue Sep 27 23:25:16 UTC 2022 kill -USR1 22022 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22022 killed at Tue Sep 27 23:25:16 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:25:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:25:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22089 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22089 found at Tue Sep 27 23:25:16 UTC 2022 selfserv_9223 with PID 22089 started at Tue Sep 27 23:25:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #28: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22089 at Tue Sep 27 23:25:19 UTC 2022 kill -USR1 22089 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22089 killed at Tue Sep 27 23:25:19 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:25:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:25:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22142 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22142 found at Tue Sep 27 23:25:20 UTC 2022 selfserv_9223 with PID 22142 started at Tue Sep 27 23:25:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #29: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22142 at Tue Sep 27 23:25:22 UTC 2022 kill -USR1 22142 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22142 killed at Tue Sep 27 23:25:22 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:25:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:25:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Tue Sep 27 23:25:23 UTC 2022 selfserv_9223 with PID 22209 started at Tue Sep 27 23:25:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #30: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22209 at Tue Sep 27 23:25:25 UTC 2022 kill -USR1 22209 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22209 killed at Tue Sep 27 23:25:25 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:25:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:25:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22275 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22275 found at Tue Sep 27 23:25:26 UTC 2022 selfserv_9223 with PID 22275 started at Tue Sep 27 23:25:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #31: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22275 at Tue Sep 27 23:25:28 UTC 2022 kill -USR1 22275 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22275 killed at Tue Sep 27 23:25:28 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:25:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:25:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22327 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22327 found at Tue Sep 27 23:25:28 UTC 2022 selfserv_9223 with PID 22327 started at Tue Sep 27 23:25:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #32: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22327 at Tue Sep 27 23:25:30 UTC 2022 kill -USR1 22327 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22327 killed at Tue Sep 27 23:25:30 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:25:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:25:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22379 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22379 found at Tue Sep 27 23:25:31 UTC 2022 selfserv_9223 with PID 22379 started at Tue Sep 27 23:25:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #33: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22379 at Tue Sep 27 23:25:33 UTC 2022 kill -USR1 22379 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22379 killed at Tue Sep 27 23:25:33 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:25:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:25:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22445 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22445 found at Tue Sep 27 23:25:33 UTC 2022 selfserv_9223 with PID 22445 started at Tue Sep 27 23:25:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #34: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22445 at Tue Sep 27 23:25:36 UTC 2022 kill -USR1 22445 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22445 killed at Tue Sep 27 23:25:36 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:25:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:25:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22497 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22497 found at Tue Sep 27 23:25:36 UTC 2022 selfserv_9223 with PID 22497 started at Tue Sep 27 23:25:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #35: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22497 at Tue Sep 27 23:25:39 UTC 2022 kill -USR1 22497 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22497 killed at Tue Sep 27 23:25:39 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:25:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:25:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22549 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22549 found at Tue Sep 27 23:25:39 UTC 2022 selfserv_9223 with PID 22549 started at Tue Sep 27 23:25:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #36: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 22549 at Tue Sep 27 23:25:41 UTC 2022 kill -USR1 22549 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22549 killed at Tue Sep 27 23:25:42 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:25:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:25:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22616 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22616 found at Tue Sep 27 23:25:42 UTC 2022 selfserv_9223 with PID 22616 started at Tue Sep 27 23:25:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #37: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22616 at Tue Sep 27 23:25:45 UTC 2022 kill -USR1 22616 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22616 killed at Tue Sep 27 23:25:45 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:25:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:25:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22671 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22671 found at Tue Sep 27 23:25:45 UTC 2022 selfserv_9223 with PID 22671 started at Tue Sep 27 23:25:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #38: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22671 at Tue Sep 27 23:25:48 UTC 2022 kill -USR1 22671 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22671 killed at Tue Sep 27 23:25:48 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:25:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:25:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22723 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22723 found at Tue Sep 27 23:25:49 UTC 2022 selfserv_9223 with PID 22723 started at Tue Sep 27 23:25:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #39: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22723 at Tue Sep 27 23:25:51 UTC 2022 kill -USR1 22723 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22723 killed at Tue Sep 27 23:25:52 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:25:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:25:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22789 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22789 found at Tue Sep 27 23:25:52 UTC 2022 selfserv_9223 with PID 22789 started at Tue Sep 27 23:25:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #40: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22789 at Tue Sep 27 23:25:54 UTC 2022 kill -USR1 22789 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22789 killed at Tue Sep 27 23:25:54 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:25:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:25:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22841 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22841 found at Tue Sep 27 23:25:55 UTC 2022 selfserv_9223 with PID 22841 started at Tue Sep 27 23:25:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #41: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22841 at Tue Sep 27 23:25:57 UTC 2022 kill -USR1 22841 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22841 killed at Tue Sep 27 23:25:57 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:25:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:25:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22893 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22893 found at Tue Sep 27 23:25:58 UTC 2022 selfserv_9223 with PID 22893 started at Tue Sep 27 23:25:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #42: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22893 at Tue Sep 27 23:26:00 UTC 2022 kill -USR1 22893 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22893 killed at Tue Sep 27 23:26:00 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:26:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:26:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22959 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22959 found at Tue Sep 27 23:26:00 UTC 2022 selfserv_9223 with PID 22959 started at Tue Sep 27 23:26:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #43: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22959 at Tue Sep 27 23:26:03 UTC 2022 kill -USR1 22959 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22959 killed at Tue Sep 27 23:26:04 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:26:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:26:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23011 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23011 found at Tue Sep 27 23:26:04 UTC 2022 selfserv_9223 with PID 23011 started at Tue Sep 27 23:26:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #44: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23011 at Tue Sep 27 23:26:07 UTC 2022 kill -USR1 23011 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23011 killed at Tue Sep 27 23:26:07 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:26:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:26:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23063 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23063 found at Tue Sep 27 23:26:08 UTC 2022 selfserv_9223 with PID 23063 started at Tue Sep 27 23:26:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #45: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23063 at Tue Sep 27 23:26:11 UTC 2022 kill -USR1 23063 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23063 killed at Tue Sep 27 23:26:11 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:26:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:26:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23129 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23129 found at Tue Sep 27 23:26:11 UTC 2022 selfserv_9223 with PID 23129 started at Tue Sep 27 23:26:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #46: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23129 at Tue Sep 27 23:26:14 UTC 2022 kill -USR1 23129 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23129 killed at Tue Sep 27 23:26:14 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:26:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:26:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23181 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23181 found at Tue Sep 27 23:26:14 UTC 2022 selfserv_9223 with PID 23181 started at Tue Sep 27 23:26:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #47: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23181 at Tue Sep 27 23:26:17 UTC 2022 kill -USR1 23181 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23181 killed at Tue Sep 27 23:26:17 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:26:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:26:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23233 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23233 found at Tue Sep 27 23:26:18 UTC 2022 selfserv_9223 with PID 23233 started at Tue Sep 27 23:26:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #48: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23233 at Tue Sep 27 23:26:20 UTC 2022 kill -USR1 23233 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23233 killed at Tue Sep 27 23:26:21 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:26:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:26:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23314 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23314 found at Tue Sep 27 23:26:21 UTC 2022 selfserv_9223 with PID 23314 started at Tue Sep 27 23:26:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #49: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23314 at Tue Sep 27 23:26:23 UTC 2022 kill -USR1 23314 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23314 killed at Tue Sep 27 23:26:23 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:26:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:26:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23366 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23366 found at Tue Sep 27 23:26:24 UTC 2022 selfserv_9223 with PID 23366 started at Tue Sep 27 23:26:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #50: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23366 at Tue Sep 27 23:26:26 UTC 2022 kill -USR1 23366 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23366 killed at Tue Sep 27 23:26:26 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:26:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:26:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23418 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23418 found at Tue Sep 27 23:26:27 UTC 2022 selfserv_9223 with PID 23418 started at Tue Sep 27 23:26:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #51: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23418 at Tue Sep 27 23:26:29 UTC 2022 kill -USR1 23418 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23418 killed at Tue Sep 27 23:26:29 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:26:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:26:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23484 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23484 found at Tue Sep 27 23:26:29 UTC 2022 selfserv_9223 with PID 23484 started at Tue Sep 27 23:26:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #52: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23484 at Tue Sep 27 23:26:32 UTC 2022 kill -USR1 23484 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23484 killed at Tue Sep 27 23:26:33 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:26:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:26:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23536 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23536 found at Tue Sep 27 23:26:33 UTC 2022 selfserv_9223 with PID 23536 started at Tue Sep 27 23:26:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #53: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23536 at Tue Sep 27 23:26:36 UTC 2022 kill -USR1 23536 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23536 killed at Tue Sep 27 23:26:36 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:26:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:26:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23588 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23588 found at Tue Sep 27 23:26:37 UTC 2022 selfserv_9223 with PID 23588 started at Tue Sep 27 23:26:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #54: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23588 at Tue Sep 27 23:26:40 UTC 2022 kill -USR1 23588 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23588 killed at Tue Sep 27 23:26:40 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:26:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:26:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23654 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23654 found at Tue Sep 27 23:26:40 UTC 2022 selfserv_9223 with PID 23654 started at Tue Sep 27 23:26:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #55: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23654 at Tue Sep 27 23:26:43 UTC 2022 kill -USR1 23654 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23654 killed at Tue Sep 27 23:26:43 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:26:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:26:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23706 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23706 found at Tue Sep 27 23:26:43 UTC 2022 selfserv_9223 with PID 23706 started at Tue Sep 27 23:26:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #56: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23706 at Tue Sep 27 23:26:46 UTC 2022 kill -USR1 23706 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23706 killed at Tue Sep 27 23:26:46 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:26:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:26:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23758 found at Tue Sep 27 23:26:47 UTC 2022 selfserv_9223 with PID 23758 started at Tue Sep 27 23:26:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #57: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23758 at Tue Sep 27 23:26:50 UTC 2022 kill -USR1 23758 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23758 killed at Tue Sep 27 23:26:50 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:26:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:26:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23825 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23825 found at Tue Sep 27 23:26:50 UTC 2022 selfserv_9223 with PID 23825 started at Tue Sep 27 23:26:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #58: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23825 at Tue Sep 27 23:26:52 UTC 2022 kill -USR1 23825 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23825 killed at Tue Sep 27 23:26:53 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:26:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:26:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23877 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23877 found at Tue Sep 27 23:26:53 UTC 2022 selfserv_9223 with PID 23877 started at Tue Sep 27 23:26:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #59: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23877 at Tue Sep 27 23:26:55 UTC 2022 kill -USR1 23877 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23877 killed at Tue Sep 27 23:26:55 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:26:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:26:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23929 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23929 found at Tue Sep 27 23:26:56 UTC 2022 selfserv_9223 with PID 23929 started at Tue Sep 27 23:26:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #60: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23929 at Tue Sep 27 23:26:58 UTC 2022 kill -USR1 23929 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23929 killed at Tue Sep 27 23:26:58 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:26:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:26:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23995 found at Tue Sep 27 23:26:59 UTC 2022 selfserv_9223 with PID 23995 started at Tue Sep 27 23:26:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #61: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23995 at Tue Sep 27 23:27:02 UTC 2022 kill -USR1 23995 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23995 killed at Tue Sep 27 23:27:02 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:27:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:27:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24047 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24047 found at Tue Sep 27 23:27:02 UTC 2022 selfserv_9223 with PID 24047 started at Tue Sep 27 23:27:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #62: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24047 at Tue Sep 27 23:27:05 UTC 2022 kill -USR1 24047 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24047 killed at Tue Sep 27 23:27:05 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:27:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:27:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24099 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24099 found at Tue Sep 27 23:27:06 UTC 2022 selfserv_9223 with PID 24099 started at Tue Sep 27 23:27:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #63: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24099 at Tue Sep 27 23:27:09 UTC 2022 kill -USR1 24099 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24099 killed at Tue Sep 27 23:27:09 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:27:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:27:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24165 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24165 found at Tue Sep 27 23:27:09 UTC 2022 selfserv_9223 with PID 24165 started at Tue Sep 27 23:27:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #64: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24165 at Tue Sep 27 23:27:12 UTC 2022 kill -USR1 24165 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24165 killed at Tue Sep 27 23:27:12 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:27:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:27:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24217 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24217 found at Tue Sep 27 23:27:13 UTC 2022 selfserv_9223 with PID 24217 started at Tue Sep 27 23:27:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #65: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24217 at Tue Sep 27 23:27:15 UTC 2022 kill -USR1 24217 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24217 killed at Tue Sep 27 23:27:16 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:27:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:27:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24269 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24269 found at Tue Sep 27 23:27:16 UTC 2022 selfserv_9223 with PID 24269 started at Tue Sep 27 23:27:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #66: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24269 at Tue Sep 27 23:27:19 UTC 2022 kill -USR1 24269 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24269 killed at Tue Sep 27 23:27:19 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:27:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:27:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24335 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24335 found at Tue Sep 27 23:27:19 UTC 2022 selfserv_9223 with PID 24335 started at Tue Sep 27 23:27:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #67: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24335 at Tue Sep 27 23:27:22 UTC 2022 kill -USR1 24335 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24335 killed at Tue Sep 27 23:27:22 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:27:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:27:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24402 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24402 found at Tue Sep 27 23:27:22 UTC 2022 selfserv_9223 with PID 24402 started at Tue Sep 27 23:27:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #68: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24402 at Tue Sep 27 23:27:24 UTC 2022 kill -USR1 24402 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24402 killed at Tue Sep 27 23:27:25 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:27:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:27:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24455 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24455 found at Tue Sep 27 23:27:25 UTC 2022 selfserv_9223 with PID 24455 started at Tue Sep 27 23:27:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #69: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24455 at Tue Sep 27 23:27:27 UTC 2022 kill -USR1 24455 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24455 killed at Tue Sep 27 23:27:27 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:27:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:27:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24521 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24521 found at Tue Sep 27 23:27:28 UTC 2022 selfserv_9223 with PID 24521 started at Tue Sep 27 23:27:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #70: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24521 at Tue Sep 27 23:27:31 UTC 2022 kill -USR1 24521 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24521 killed at Tue Sep 27 23:27:31 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:27:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:27:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24573 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24573 found at Tue Sep 27 23:27:31 UTC 2022 selfserv_9223 with PID 24573 started at Tue Sep 27 23:27:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #71: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24573 at Tue Sep 27 23:27:34 UTC 2022 kill -USR1 24573 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24573 killed at Tue Sep 27 23:27:35 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:27:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:27:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24625 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24625 found at Tue Sep 27 23:27:35 UTC 2022 selfserv_9223 with PID 24625 started at Tue Sep 27 23:27:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #72: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24625 at Tue Sep 27 23:27:38 UTC 2022 kill -USR1 24625 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24625 killed at Tue Sep 27 23:27:38 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:27:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:27:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24691 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24691 found at Tue Sep 27 23:27:39 UTC 2022 selfserv_9223 with PID 24691 started at Tue Sep 27 23:27:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #73: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24691 at Tue Sep 27 23:27:41 UTC 2022 kill -USR1 24691 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24691 killed at Tue Sep 27 23:27:41 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:27:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:27:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24743 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24743 found at Tue Sep 27 23:27:42 UTC 2022 selfserv_9223 with PID 24743 started at Tue Sep 27 23:27:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #74: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24743 at Tue Sep 27 23:27:44 UTC 2022 kill -USR1 24743 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24743 killed at Tue Sep 27 23:27:45 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:27:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:27:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24795 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24795 found at Tue Sep 27 23:27:45 UTC 2022 selfserv_9223 with PID 24795 started at Tue Sep 27 23:27:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #75: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24795 at Tue Sep 27 23:27:48 UTC 2022 kill -USR1 24795 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24795 killed at Tue Sep 27 23:27:48 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:27:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:27:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24861 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24861 found at Tue Sep 27 23:27:48 UTC 2022 selfserv_9223 with PID 24861 started at Tue Sep 27 23:27:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #76: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24861 at Tue Sep 27 23:27:50 UTC 2022 kill -USR1 24861 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24861 killed at Tue Sep 27 23:27:50 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:27:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:27:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24913 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24913 found at Tue Sep 27 23:27:51 UTC 2022 selfserv_9223 with PID 24913 started at Tue Sep 27 23:27:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #77: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24913 at Tue Sep 27 23:27:53 UTC 2022 kill -USR1 24913 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24913 killed at Tue Sep 27 23:27:53 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:27:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:27:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24965 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24965 found at Tue Sep 27 23:27:54 UTC 2022 selfserv_9223 with PID 24965 started at Tue Sep 27 23:27:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #78: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24965 at Tue Sep 27 23:27:56 UTC 2022 kill -USR1 24965 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24965 killed at Tue Sep 27 23:27:56 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:27:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:27:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25031 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25031 found at Tue Sep 27 23:27:56 UTC 2022 selfserv_9223 with PID 25031 started at Tue Sep 27 23:27:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #79: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25031 at Tue Sep 27 23:27:59 UTC 2022 kill -USR1 25031 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25031 killed at Tue Sep 27 23:27:59 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:27:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:27:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25083 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25083 found at Tue Sep 27 23:27:59 UTC 2022 selfserv_9223 with PID 25083 started at Tue Sep 27 23:27:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #80: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25083 at Tue Sep 27 23:28:01 UTC 2022 kill -USR1 25083 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25083 killed at Tue Sep 27 23:28:02 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:28:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:28:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25136 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25136 found at Tue Sep 27 23:28:02 UTC 2022 selfserv_9223 with PID 25136 started at Tue Sep 27 23:28:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #81: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25136 at Tue Sep 27 23:28:04 UTC 2022 kill -USR1 25136 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25136 killed at Tue Sep 27 23:28:05 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:28:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:28:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25202 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25202 found at Tue Sep 27 23:28:05 UTC 2022 selfserv_9223 with PID 25202 started at Tue Sep 27 23:28:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #82: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25202 at Tue Sep 27 23:28:08 UTC 2022 kill -USR1 25202 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25202 killed at Tue Sep 27 23:28:08 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:28:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:28:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25254 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25254 found at Tue Sep 27 23:28:08 UTC 2022 selfserv_9223 with PID 25254 started at Tue Sep 27 23:28:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #83: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25254 at Tue Sep 27 23:28:11 UTC 2022 kill -USR1 25254 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25254 killed at Tue Sep 27 23:28:11 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:28:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:28:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25306 found at Tue Sep 27 23:28:11 UTC 2022 selfserv_9223 with PID 25306 started at Tue Sep 27 23:28:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #84: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25306 at Tue Sep 27 23:28:14 UTC 2022 kill -USR1 25306 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25306 killed at Tue Sep 27 23:28:14 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:28:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:28:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25372 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25372 found at Tue Sep 27 23:28:15 UTC 2022 selfserv_9223 with PID 25372 started at Tue Sep 27 23:28:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #85: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25372 at Tue Sep 27 23:28:17 UTC 2022 kill -USR1 25372 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25372 killed at Tue Sep 27 23:28:17 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:28:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:28:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25424 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25424 found at Tue Sep 27 23:28:17 UTC 2022 selfserv_9223 with PID 25424 started at Tue Sep 27 23:28:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #86: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25424 at Tue Sep 27 23:28:19 UTC 2022 kill -USR1 25424 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25424 killed at Tue Sep 27 23:28:20 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:28:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:28:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25476 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25476 found at Tue Sep 27 23:28:20 UTC 2022 selfserv_9223 with PID 25476 started at Tue Sep 27 23:28:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #87: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25476 at Tue Sep 27 23:28:22 UTC 2022 kill -USR1 25476 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25476 killed at Tue Sep 27 23:28:22 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:28:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:28:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25557 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25557 found at Tue Sep 27 23:28:23 UTC 2022 selfserv_9223 with PID 25557 started at Tue Sep 27 23:28:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #88: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25557 at Tue Sep 27 23:28:25 UTC 2022 kill -USR1 25557 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25557 killed at Tue Sep 27 23:28:25 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:28:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:28:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25609 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25609 found at Tue Sep 27 23:28:26 UTC 2022 selfserv_9223 with PID 25609 started at Tue Sep 27 23:28:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #89: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25609 at Tue Sep 27 23:28:28 UTC 2022 kill -USR1 25609 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25609 killed at Tue Sep 27 23:28:28 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:28:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:28:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25661 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25661 found at Tue Sep 27 23:28:29 UTC 2022 selfserv_9223 with PID 25661 started at Tue Sep 27 23:28:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #90: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25661 at Tue Sep 27 23:28:31 UTC 2022 kill -USR1 25661 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25661 killed at Tue Sep 27 23:28:31 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:28:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:28:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25727 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25727 found at Tue Sep 27 23:28:31 UTC 2022 selfserv_9223 with PID 25727 started at Tue Sep 27 23:28:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #91: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25727 at Tue Sep 27 23:28:34 UTC 2022 kill -USR1 25727 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25727 killed at Tue Sep 27 23:28:34 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:28:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:28:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25779 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25779 found at Tue Sep 27 23:28:34 UTC 2022 selfserv_9223 with PID 25779 started at Tue Sep 27 23:28:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #92: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25779 at Tue Sep 27 23:28:36 UTC 2022 kill -USR1 25779 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25779 killed at Tue Sep 27 23:28:37 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:28:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:28:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25831 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25831 found at Tue Sep 27 23:28:37 UTC 2022 selfserv_9223 with PID 25831 started at Tue Sep 27 23:28:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #93: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25831 at Tue Sep 27 23:28:39 UTC 2022 kill -USR1 25831 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25831 killed at Tue Sep 27 23:28:39 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:28:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:28:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25897 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25897 found at Tue Sep 27 23:28:40 UTC 2022 selfserv_9223 with PID 25897 started at Tue Sep 27 23:28:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #94: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25897 at Tue Sep 27 23:28:42 UTC 2022 kill -USR1 25897 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25897 killed at Tue Sep 27 23:28:42 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:28:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:28:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25949 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25949 found at Tue Sep 27 23:28:43 UTC 2022 selfserv_9223 with PID 25949 started at Tue Sep 27 23:28:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #95: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25949 at Tue Sep 27 23:28:45 UTC 2022 kill -USR1 25949 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25949 killed at Tue Sep 27 23:28:45 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:28:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:28:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26001 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26001 found at Tue Sep 27 23:28:45 UTC 2022 selfserv_9223 with PID 26001 started at Tue Sep 27 23:28:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #96: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 26001 at Tue Sep 27 23:28:48 UTC 2022 kill -USR1 26001 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26001 killed at Tue Sep 27 23:28:48 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:28:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:28:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26067 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26067 found at Tue Sep 27 23:28:48 UTC 2022 selfserv_9223 with PID 26067 started at Tue Sep 27 23:28:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #97: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26067 at Tue Sep 27 23:28:51 UTC 2022 kill -USR1 26067 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26067 killed at Tue Sep 27 23:28:51 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:28:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:28:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26119 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26119 found at Tue Sep 27 23:28:51 UTC 2022 selfserv_9223 with PID 26119 started at Tue Sep 27 23:28:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #98: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26119 at Tue Sep 27 23:28:54 UTC 2022 kill -USR1 26119 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26119 killed at Tue Sep 27 23:28:54 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:28:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:28:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26171 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26171 found at Tue Sep 27 23:28:54 UTC 2022 selfserv_9223 with PID 26171 started at Tue Sep 27 23:28:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #99: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26171 at Tue Sep 27 23:28:57 UTC 2022 kill -USR1 26171 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26171 killed at Tue Sep 27 23:28:57 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:28:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:28:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26237 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26237 found at Tue Sep 27 23:28:57 UTC 2022 selfserv_9223 with PID 26237 started at Tue Sep 27 23:28:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #100: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 26237 at Tue Sep 27 23:29:00 UTC 2022 kill -USR1 26237 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26237 killed at Tue Sep 27 23:29:00 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:29:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:29:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26289 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26289 found at Tue Sep 27 23:29:01 UTC 2022 selfserv_9223 with PID 26289 started at Tue Sep 27 23:29:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #101: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 26289 at Tue Sep 27 23:29:03 UTC 2022 kill -USR1 26289 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26289 killed at Tue Sep 27 23:29:03 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:29:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:29:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26341 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26341 found at Tue Sep 27 23:29:04 UTC 2022 selfserv_9223 with PID 26341 started at Tue Sep 27 23:29:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #102: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 26341 at Tue Sep 27 23:29:06 UTC 2022 kill -USR1 26341 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26341 killed at Tue Sep 27 23:29:06 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:29:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:29:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26411 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26411 found at Tue Sep 27 23:29:07 UTC 2022 selfserv_9223 with PID 26411 started at Tue Sep 27 23:29:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #103: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 26411 at Tue Sep 27 23:29:09 UTC 2022 kill -USR1 26411 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26411 killed at Tue Sep 27 23:29:09 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:29:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:29:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26463 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26463 found at Tue Sep 27 23:29:09 UTC 2022 selfserv_9223 with PID 26463 started at Tue Sep 27 23:29:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #104: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26463 at Tue Sep 27 23:29:12 UTC 2022 kill -USR1 26463 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26463 killed at Tue Sep 27 23:29:12 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:29:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:29:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26515 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26515 found at Tue Sep 27 23:29:12 UTC 2022 selfserv_9223 with PID 26515 started at Tue Sep 27 23:29:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #105: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 26515 at Tue Sep 27 23:29:14 UTC 2022 kill -USR1 26515 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26515 killed at Tue Sep 27 23:29:15 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:29:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:29:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26581 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26581 found at Tue Sep 27 23:29:15 UTC 2022 selfserv_9223 with PID 26581 started at Tue Sep 27 23:29:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #106: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26581 at Tue Sep 27 23:29:18 UTC 2022 kill -USR1 26581 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26581 killed at Tue Sep 27 23:29:18 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:29:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:29:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26633 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26633 found at Tue Sep 27 23:29:18 UTC 2022 selfserv_9223 with PID 26633 started at Tue Sep 27 23:29:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #107: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26633 at Tue Sep 27 23:29:21 UTC 2022 kill -USR1 26633 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26633 killed at Tue Sep 27 23:29:21 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:29:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:29:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26700 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26700 found at Tue Sep 27 23:29:22 UTC 2022 selfserv_9223 with PID 26700 started at Tue Sep 27 23:29:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #108: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26700 at Tue Sep 27 23:29:25 UTC 2022 kill -USR1 26700 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26700 killed at Tue Sep 27 23:29:25 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:29:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:29:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26767 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26767 found at Tue Sep 27 23:29:25 UTC 2022 selfserv_9223 with PID 26767 started at Tue Sep 27 23:29:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #109: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26767 at Tue Sep 27 23:29:27 UTC 2022 kill -USR1 26767 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26767 killed at Tue Sep 27 23:29:28 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:29:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:29:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26819 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26819 found at Tue Sep 27 23:29:28 UTC 2022 selfserv_9223 with PID 26819 started at Tue Sep 27 23:29:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #110: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26819 at Tue Sep 27 23:29:30 UTC 2022 kill -USR1 26819 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26819 killed at Tue Sep 27 23:29:30 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:29:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:29:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26871 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26871 found at Tue Sep 27 23:29:31 UTC 2022 selfserv_9223 with PID 26871 started at Tue Sep 27 23:29:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #111: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26871 at Tue Sep 27 23:29:33 UTC 2022 kill -USR1 26871 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26871 killed at Tue Sep 27 23:29:33 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:29:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:29:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26938 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26938 found at Tue Sep 27 23:29:33 UTC 2022 selfserv_9223 with PID 26938 started at Tue Sep 27 23:29:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #112: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 26938 at Tue Sep 27 23:29:35 UTC 2022 kill -USR1 26938 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26938 killed at Tue Sep 27 23:29:36 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:29:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:29:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26990 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26990 found at Tue Sep 27 23:29:36 UTC 2022 selfserv_9223 with PID 26990 started at Tue Sep 27 23:29:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #113: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26990 at Tue Sep 27 23:29:38 UTC 2022 kill -USR1 26990 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26990 killed at Tue Sep 27 23:29:38 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:29:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:29:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27042 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27042 found at Tue Sep 27 23:29:39 UTC 2022 selfserv_9223 with PID 27042 started at Tue Sep 27 23:29:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #114: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 27042 at Tue Sep 27 23:29:41 UTC 2022 kill -USR1 27042 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27042 killed at Tue Sep 27 23:29:41 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:29:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:29:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27108 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27108 found at Tue Sep 27 23:29:41 UTC 2022 selfserv_9223 with PID 27108 started at Tue Sep 27 23:29:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #115: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 27108 at Tue Sep 27 23:29:44 UTC 2022 kill -USR1 27108 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27108 killed at Tue Sep 27 23:29:44 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:29:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:29:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27160 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27160 found at Tue Sep 27 23:29:44 UTC 2022 selfserv_9223 with PID 27160 started at Tue Sep 27 23:29:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #116: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 27160 at Tue Sep 27 23:29:46 UTC 2022 kill -USR1 27160 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27160 killed at Tue Sep 27 23:29:46 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:29:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:29:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27212 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27212 found at Tue Sep 27 23:29:47 UTC 2022 selfserv_9223 with PID 27212 started at Tue Sep 27 23:29:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #117: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 27212 at Tue Sep 27 23:29:49 UTC 2022 kill -USR1 27212 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27212 killed at Tue Sep 27 23:29:49 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:29:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:29:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27278 found at Tue Sep 27 23:29:49 UTC 2022 selfserv_9223 with PID 27278 started at Tue Sep 27 23:29:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #118: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 27278 at Tue Sep 27 23:29:51 UTC 2022 kill -USR1 27278 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27278 killed at Tue Sep 27 23:29:52 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:29:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:29:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27330 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27330 found at Tue Sep 27 23:29:52 UTC 2022 selfserv_9223 with PID 27330 started at Tue Sep 27 23:29:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #119: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27330 at Tue Sep 27 23:29:54 UTC 2022 kill -USR1 27330 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27330 killed at Tue Sep 27 23:29:54 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:29:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:29:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27383 found at Tue Sep 27 23:29:55 UTC 2022 selfserv_9223 with PID 27383 started at Tue Sep 27 23:29:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #120: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 27383 at Tue Sep 27 23:29:57 UTC 2022 kill -USR1 27383 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27383 killed at Tue Sep 27 23:29:57 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:29:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:29:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27449 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27449 found at Tue Sep 27 23:29:57 UTC 2022 selfserv_9223 with PID 27449 started at Tue Sep 27 23:29:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #121: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27449 at Tue Sep 27 23:30:00 UTC 2022 kill -USR1 27449 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27449 killed at Tue Sep 27 23:30:00 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:30:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:30:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27501 found at Tue Sep 27 23:30:00 UTC 2022 selfserv_9223 with PID 27501 started at Tue Sep 27 23:30:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #122: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27501 at Tue Sep 27 23:30:02 UTC 2022 kill -USR1 27501 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27501 killed at Tue Sep 27 23:30:02 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:30:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:30:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27631 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27631 found at Tue Sep 27 23:30:03 UTC 2022 selfserv_9223 with PID 27631 started at Tue Sep 27 23:30:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #123: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27631 at Tue Sep 27 23:30:05 UTC 2022 kill -USR1 27631 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27631 killed at Tue Sep 27 23:30:05 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:30:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:30:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27697 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27697 found at Tue Sep 27 23:30:05 UTC 2022 selfserv_9223 with PID 27697 started at Tue Sep 27 23:30:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #124: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 27697 at Tue Sep 27 23:30:08 UTC 2022 kill -USR1 27697 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27697 killed at Tue Sep 27 23:30:08 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:30:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:30:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27749 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27749 found at Tue Sep 27 23:30:09 UTC 2022 selfserv_9223 with PID 27749 started at Tue Sep 27 23:30:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #125: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27749 at Tue Sep 27 23:30:11 UTC 2022 kill -USR1 27749 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27749 killed at Tue Sep 27 23:30:11 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:30:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:30:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27801 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27801 found at Tue Sep 27 23:30:12 UTC 2022 selfserv_9223 with PID 27801 started at Tue Sep 27 23:30:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #126: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 27801 at Tue Sep 27 23:30:14 UTC 2022 kill -USR1 27801 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27801 killed at Tue Sep 27 23:30:14 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:30:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:30:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27867 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27867 found at Tue Sep 27 23:30:15 UTC 2022 selfserv_9223 with PID 27867 started at Tue Sep 27 23:30:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #127: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 27867 at Tue Sep 27 23:30:17 UTC 2022 kill -USR1 27867 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27867 killed at Tue Sep 27 23:30:17 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:30:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:30:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27919 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27919 found at Tue Sep 27 23:30:17 UTC 2022 selfserv_9223 with PID 27919 started at Tue Sep 27 23:30:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #128: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 27919 at Tue Sep 27 23:30:19 UTC 2022 kill -USR1 27919 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27919 killed at Tue Sep 27 23:30:20 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:30:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:30:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27971 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27971 found at Tue Sep 27 23:30:20 UTC 2022 selfserv_9223 with PID 27971 started at Tue Sep 27 23:30:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #129: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 27971 at Tue Sep 27 23:30:22 UTC 2022 kill -USR1 27971 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27971 killed at Tue Sep 27 23:30:22 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:30:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:30:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28052 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28052 found at Tue Sep 27 23:30:23 UTC 2022 selfserv_9223 with PID 28052 started at Tue Sep 27 23:30:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #130: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 28052 at Tue Sep 27 23:30:25 UTC 2022 kill -USR1 28052 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28052 killed at Tue Sep 27 23:30:25 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:30:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:30:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28104 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28104 found at Tue Sep 27 23:30:26 UTC 2022 selfserv_9223 with PID 28104 started at Tue Sep 27 23:30:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #131: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28104 at Tue Sep 27 23:30:28 UTC 2022 kill -USR1 28104 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28104 killed at Tue Sep 27 23:30:29 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:30:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:30:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28156 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28156 found at Tue Sep 27 23:30:29 UTC 2022 selfserv_9223 with PID 28156 started at Tue Sep 27 23:30:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #132: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 28156 at Tue Sep 27 23:30:31 UTC 2022 kill -USR1 28156 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28156 killed at Tue Sep 27 23:30:32 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:30:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:30:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28222 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28222 found at Tue Sep 27 23:30:32 UTC 2022 selfserv_9223 with PID 28222 started at Tue Sep 27 23:30:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #133: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28222 at Tue Sep 27 23:30:34 UTC 2022 kill -USR1 28222 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28222 killed at Tue Sep 27 23:30:34 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:30:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:30:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28274 found at Tue Sep 27 23:30:35 UTC 2022 selfserv_9223 with PID 28274 started at Tue Sep 27 23:30:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #134: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28274 at Tue Sep 27 23:30:37 UTC 2022 kill -USR1 28274 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28274 killed at Tue Sep 27 23:30:37 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:30:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:30:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28326 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28326 found at Tue Sep 27 23:30:38 UTC 2022 selfserv_9223 with PID 28326 started at Tue Sep 27 23:30:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #135: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28326 at Tue Sep 27 23:30:40 UTC 2022 kill -USR1 28326 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28326 killed at Tue Sep 27 23:30:40 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:30:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:30:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28392 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28392 found at Tue Sep 27 23:30:41 UTC 2022 selfserv_9223 with PID 28392 started at Tue Sep 27 23:30:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #136: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28392 at Tue Sep 27 23:30:43 UTC 2022 kill -USR1 28392 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28392 killed at Tue Sep 27 23:30:43 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:30:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:30:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28444 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28444 found at Tue Sep 27 23:30:43 UTC 2022 selfserv_9223 with PID 28444 started at Tue Sep 27 23:30:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #137: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28444 at Tue Sep 27 23:30:46 UTC 2022 kill -USR1 28444 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28444 killed at Tue Sep 27 23:30:46 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:30:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:30:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28497 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28497 found at Tue Sep 27 23:30:46 UTC 2022 selfserv_9223 with PID 28497 started at Tue Sep 27 23:30:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #138: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28497 at Tue Sep 27 23:30:48 UTC 2022 kill -USR1 28497 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28497 killed at Tue Sep 27 23:30:49 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:30:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:30:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28564 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28564 found at Tue Sep 27 23:30:49 UTC 2022 selfserv_9223 with PID 28564 started at Tue Sep 27 23:30:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #139: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28564 at Tue Sep 27 23:30:51 UTC 2022 kill -USR1 28564 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28564 killed at Tue Sep 27 23:30:51 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:30:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:30:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28616 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28616 found at Tue Sep 27 23:30:52 UTC 2022 selfserv_9223 with PID 28616 started at Tue Sep 27 23:30:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #140: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28616 at Tue Sep 27 23:30:54 UTC 2022 kill -USR1 28616 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28616 killed at Tue Sep 27 23:30:54 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:30:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:30:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28668 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28668 found at Tue Sep 27 23:30:55 UTC 2022 selfserv_9223 with PID 28668 started at Tue Sep 27 23:30:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #141: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28668 at Tue Sep 27 23:30:57 UTC 2022 kill -USR1 28668 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28668 killed at Tue Sep 27 23:30:57 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:30:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:30:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28734 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28734 found at Tue Sep 27 23:30:57 UTC 2022 selfserv_9223 with PID 28734 started at Tue Sep 27 23:30:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #142: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28734 at Tue Sep 27 23:31:00 UTC 2022 kill -USR1 28734 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28734 killed at Tue Sep 27 23:31:00 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:31:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:31:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28786 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28786 found at Tue Sep 27 23:31:00 UTC 2022 selfserv_9223 with PID 28786 started at Tue Sep 27 23:31:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #143: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28786 at Tue Sep 27 23:31:03 UTC 2022 kill -USR1 28786 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28786 killed at Tue Sep 27 23:31:03 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:31:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:31:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28838 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28838 found at Tue Sep 27 23:31:03 UTC 2022 selfserv_9223 with PID 28838 started at Tue Sep 27 23:31:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #144: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28838 at Tue Sep 27 23:31:05 UTC 2022 kill -USR1 28838 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28838 killed at Tue Sep 27 23:31:06 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:31:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:31:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28904 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28904 found at Tue Sep 27 23:31:06 UTC 2022 selfserv_9223 with PID 28904 started at Tue Sep 27 23:31:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28904 at Tue Sep 27 23:31:08 UTC 2022 kill -USR1 28904 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28904 killed at Tue Sep 27 23:31:08 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:31:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:31:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28956 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28956 found at Tue Sep 27 23:31:09 UTC 2022 selfserv_9223 with PID 28956 started at Tue Sep 27 23:31:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28956 at Tue Sep 27 23:31:11 UTC 2022 kill -USR1 28956 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28956 killed at Tue Sep 27 23:31:11 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:31:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:31:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29008 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29008 found at Tue Sep 27 23:31:12 UTC 2022 selfserv_9223 with PID 29008 started at Tue Sep 27 23:31:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29008 at Tue Sep 27 23:31:14 UTC 2022 kill -USR1 29008 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29008 killed at Tue Sep 27 23:31:14 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:31:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:31:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29074 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29074 found at Tue Sep 27 23:31:15 UTC 2022 selfserv_9223 with PID 29074 started at Tue Sep 27 23:31:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29074 at Tue Sep 27 23:31:17 UTC 2022 kill -USR1 29074 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29074 killed at Tue Sep 27 23:31:17 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:31:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:31:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29126 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29126 found at Tue Sep 27 23:31:17 UTC 2022 selfserv_9223 with PID 29126 started at Tue Sep 27 23:31:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29126 at Tue Sep 27 23:31:20 UTC 2022 kill -USR1 29126 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29126 killed at Tue Sep 27 23:31:20 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:31:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:31:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29178 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29178 found at Tue Sep 27 23:31:20 UTC 2022 selfserv_9223 with PID 29178 started at Tue Sep 27 23:31:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29178 at Tue Sep 27 23:31:22 UTC 2022 kill -USR1 29178 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29178 killed at Tue Sep 27 23:31:23 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:31:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:31:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29259 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29259 found at Tue Sep 27 23:31:23 UTC 2022 selfserv_9223 with PID 29259 started at Tue Sep 27 23:31:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #151: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29259 at Tue Sep 27 23:31:25 UTC 2022 kill -USR1 29259 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29259 killed at Tue Sep 27 23:31:25 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:31:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:31:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29311 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29311 found at Tue Sep 27 23:31:26 UTC 2022 selfserv_9223 with PID 29311 started at Tue Sep 27 23:31:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #152: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29311 at Tue Sep 27 23:31:28 UTC 2022 kill -USR1 29311 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29311 killed at Tue Sep 27 23:31:28 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:31:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:31:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29363 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29363 found at Tue Sep 27 23:31:29 UTC 2022 selfserv_9223 with PID 29363 started at Tue Sep 27 23:31:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #153: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29363 at Tue Sep 27 23:31:31 UTC 2022 kill -USR1 29363 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29363 killed at Tue Sep 27 23:31:31 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:31:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:31:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29429 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29429 found at Tue Sep 27 23:31:32 UTC 2022 selfserv_9223 with PID 29429 started at Tue Sep 27 23:31:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #154: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29429 at Tue Sep 27 23:31:34 UTC 2022 kill -USR1 29429 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29429 killed at Tue Sep 27 23:31:34 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:31:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:31:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29481 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29481 found at Tue Sep 27 23:31:34 UTC 2022 selfserv_9223 with PID 29481 started at Tue Sep 27 23:31:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #155: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29481 at Tue Sep 27 23:31:37 UTC 2022 kill -USR1 29481 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29481 killed at Tue Sep 27 23:31:37 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:31:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:31:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29533 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29533 found at Tue Sep 27 23:31:37 UTC 2022 selfserv_9223 with PID 29533 started at Tue Sep 27 23:31:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #156: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29533 at Tue Sep 27 23:31:39 UTC 2022 kill -USR1 29533 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29533 killed at Tue Sep 27 23:31:40 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:31:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:31:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29599 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29599 found at Tue Sep 27 23:31:40 UTC 2022 selfserv_9223 with PID 29599 started at Tue Sep 27 23:31:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #157: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29599 at Tue Sep 27 23:31:42 UTC 2022 kill -USR1 29599 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29599 killed at Tue Sep 27 23:31:42 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:31:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:31:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29651 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29651 found at Tue Sep 27 23:31:43 UTC 2022 selfserv_9223 with PID 29651 started at Tue Sep 27 23:31:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #158: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29651 at Tue Sep 27 23:31:45 UTC 2022 kill -USR1 29651 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29651 killed at Tue Sep 27 23:31:45 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:31:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:31:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29703 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29703 found at Tue Sep 27 23:31:45 UTC 2022 selfserv_9223 with PID 29703 started at Tue Sep 27 23:31:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #159: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29703 at Tue Sep 27 23:31:48 UTC 2022 kill -USR1 29703 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29703 killed at Tue Sep 27 23:31:48 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:31:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:31:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29769 found at Tue Sep 27 23:31:48 UTC 2022 selfserv_9223 with PID 29769 started at Tue Sep 27 23:31:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #160: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29769 at Tue Sep 27 23:31:51 UTC 2022 kill -USR1 29769 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29769 killed at Tue Sep 27 23:31:51 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:31:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:31:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29821 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29821 found at Tue Sep 27 23:31:51 UTC 2022 selfserv_9223 with PID 29821 started at Tue Sep 27 23:31:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #161: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29821 at Tue Sep 27 23:31:54 UTC 2022 kill -USR1 29821 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29821 killed at Tue Sep 27 23:31:54 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:31:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:31:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29873 found at Tue Sep 27 23:31:55 UTC 2022 selfserv_9223 with PID 29873 started at Tue Sep 27 23:31:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #162: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29873 at Tue Sep 27 23:31:57 UTC 2022 kill -USR1 29873 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29873 killed at Tue Sep 27 23:31:58 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:31:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:31:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29939 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29939 found at Tue Sep 27 23:31:58 UTC 2022 selfserv_9223 with PID 29939 started at Tue Sep 27 23:31:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #163: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29939 at Tue Sep 27 23:32:00 UTC 2022 kill -USR1 29939 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29939 killed at Tue Sep 27 23:32:00 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:32:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:32:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29991 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29991 found at Tue Sep 27 23:32:01 UTC 2022 selfserv_9223 with PID 29991 started at Tue Sep 27 23:32:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #164: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29991 at Tue Sep 27 23:32:03 UTC 2022 kill -USR1 29991 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29991 killed at Tue Sep 27 23:32:03 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:32:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:32:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30043 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30043 found at Tue Sep 27 23:32:03 UTC 2022 selfserv_9223 with PID 30043 started at Tue Sep 27 23:32:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #165: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 30043 at Tue Sep 27 23:32:05 UTC 2022 kill -USR1 30043 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30043 killed at Tue Sep 27 23:32:06 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:32:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:32:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30109 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30109 found at Tue Sep 27 23:32:06 UTC 2022 selfserv_9223 with PID 30109 started at Tue Sep 27 23:32:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #166: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 30109 at Tue Sep 27 23:32:09 UTC 2022 kill -USR1 30109 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30109 killed at Tue Sep 27 23:32:09 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:32:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:32:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30161 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30161 found at Tue Sep 27 23:32:09 UTC 2022 selfserv_9223 with PID 30161 started at Tue Sep 27 23:32:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #167: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30161 at Tue Sep 27 23:32:12 UTC 2022 kill -USR1 30161 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30161 killed at Tue Sep 27 23:32:12 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:32:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:32:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30213 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30213 found at Tue Sep 27 23:32:13 UTC 2022 selfserv_9223 with PID 30213 started at Tue Sep 27 23:32:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #168: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 30213 at Tue Sep 27 23:32:15 UTC 2022 kill -USR1 30213 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30213 killed at Tue Sep 27 23:32:15 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:32:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:32:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30279 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30279 found at Tue Sep 27 23:32:16 UTC 2022 selfserv_9223 with PID 30279 started at Tue Sep 27 23:32:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #169: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30279 at Tue Sep 27 23:32:19 UTC 2022 kill -USR1 30279 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30279 killed at Tue Sep 27 23:32:19 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:32:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:32:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30331 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30331 found at Tue Sep 27 23:32:20 UTC 2022 selfserv_9223 with PID 30331 started at Tue Sep 27 23:32:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #170: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30331 at Tue Sep 27 23:32:23 UTC 2022 kill -USR1 30331 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30331 killed at Tue Sep 27 23:32:23 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:32:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:32:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30398 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30398 found at Tue Sep 27 23:32:24 UTC 2022 selfserv_9223 with PID 30398 started at Tue Sep 27 23:32:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #171: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30398 at Tue Sep 27 23:32:27 UTC 2022 kill -USR1 30398 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30398 killed at Tue Sep 27 23:32:27 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:32:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:32:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30466 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30466 found at Tue Sep 27 23:32:27 UTC 2022 selfserv_9223 with PID 30466 started at Tue Sep 27 23:32:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #172: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30466 at Tue Sep 27 23:32:30 UTC 2022 kill -USR1 30466 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30466 killed at Tue Sep 27 23:32:30 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:32:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:32:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30518 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30518 found at Tue Sep 27 23:32:31 UTC 2022 selfserv_9223 with PID 30518 started at Tue Sep 27 23:32:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #173: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30518 at Tue Sep 27 23:32:33 UTC 2022 kill -USR1 30518 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30518 killed at Tue Sep 27 23:32:33 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:32:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:32:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30570 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30570 found at Tue Sep 27 23:32:34 UTC 2022 selfserv_9223 with PID 30570 started at Tue Sep 27 23:32:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #174: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30570 at Tue Sep 27 23:32:36 UTC 2022 kill -USR1 30570 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30570 killed at Tue Sep 27 23:32:37 UTC 2022 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/authin.tl.tmp 0 selfserv_9223 starting at Tue Sep 27 23:32:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:32:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:32:37 UTC 2022 selfserv_9223 with PID 30641 started at Tue Sep 27 23:32:37 UTC 2022 Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:32:40 UTC 2022 ssl.sh: #1: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:32:41 UTC 2022 ssl.sh: #2: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:32:42 UTC 2022 ssl.sh: #3: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:32:44 UTC 2022 ssl.sh: #4: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:32:45 UTC 2022 ssl.sh: #5: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:32:46 UTC 2022 ssl.sh: #6: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:32:47 UTC 2022 ssl.sh: #7: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:32:49 UTC 2022 ssl.sh: #8: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:32:50 UTC 2022 ssl.sh: #9: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:32:51 UTC 2022 ssl.sh: #10: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:32:52 UTC 2022 ssl.sh: #11: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:32:54 UTC 2022 ssl.sh: #12: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:32:55 UTC 2022 ssl.sh: #13: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:32:56 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #14: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:32:58 UTC 2022 ssl.sh: #15: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:32:59 UTC 2022 ssl.sh: #16: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:00 UTC 2022 ssl.sh: #17: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:01 UTC 2022 ssl.sh: #18: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:03 UTC 2022 ssl.sh: #19: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:04 UTC 2022 ssl.sh: #20: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:05 UTC 2022 ssl.sh: #21: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:06 UTC 2022 ssl.sh: #22: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:08 UTC 2022 ssl.sh: #23: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:09 UTC 2022 ssl.sh: #24: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:10 UTC 2022 ssl.sh: #25: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:11 UTC 2022 ssl.sh: #26: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:13 UTC 2022 ssl.sh: #27: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:14 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #28: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:15 UTC 2022 ssl.sh: #29: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:17 UTC 2022 ssl.sh: #30: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:18 UTC 2022 ssl.sh: #31: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:19 UTC 2022 ssl.sh: #32: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:20 UTC 2022 ssl.sh: #33: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:22 UTC 2022 ssl.sh: #34: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:23 UTC 2022 ssl.sh: #35: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:24 UTC 2022 ssl.sh: #36: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:25 UTC 2022 ssl.sh: #37: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:27 UTC 2022 ssl.sh: #38: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:28 UTC 2022 ssl.sh: #39: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:29 UTC 2022 ssl.sh: #40: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30641 found at Tue Sep 27 23:33:30 UTC 2022 ssl.sh: #41: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 30641 at Tue Sep 27 23:33:30 UTC 2022 kill -USR1 30641 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30641 killed at Tue Sep 27 23:33:31 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:33:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:33:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:31 UTC 2022 selfserv_9223 with PID 31922 started at Tue Sep 27 23:33:31 UTC 2022 Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:33 UTC 2022 ssl.sh: #42: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:34 UTC 2022 ssl.sh: #43: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:35 UTC 2022 ssl.sh: #44: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:35 UTC 2022 ssl.sh: #45: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:36 UTC 2022 ssl.sh: #46: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:37 UTC 2022 ssl.sh: #47: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:37 UTC 2022 ssl.sh: #48: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:38 UTC 2022 ssl.sh: #49: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:39 UTC 2022 ssl.sh: #50: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:40 UTC 2022 ssl.sh: #51: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:40 UTC 2022 ssl.sh: #52: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:41 UTC 2022 ssl.sh: #53: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:42 UTC 2022 ssl.sh: #54: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:43 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #55: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:44 UTC 2022 ssl.sh: #56: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:44 UTC 2022 ssl.sh: #57: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:45 UTC 2022 ssl.sh: #58: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:46 UTC 2022 ssl.sh: #59: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:46 UTC 2022 ssl.sh: #60: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:47 UTC 2022 ssl.sh: #61: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:48 UTC 2022 ssl.sh: #62: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:48 UTC 2022 ssl.sh: #63: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:49 UTC 2022 ssl.sh: #64: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:50 UTC 2022 ssl.sh: #65: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:50 UTC 2022 ssl.sh: #66: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:51 UTC 2022 ssl.sh: #67: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:52 UTC 2022 ssl.sh: #68: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:53 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #69: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:54 UTC 2022 ssl.sh: #70: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:55 UTC 2022 ssl.sh: #71: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:55 UTC 2022 ssl.sh: #72: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:56 UTC 2022 ssl.sh: #73: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:57 UTC 2022 ssl.sh: #74: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:57 UTC 2022 ssl.sh: #75: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:58 UTC 2022 ssl.sh: #76: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:59 UTC 2022 ssl.sh: #77: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:33:59 UTC 2022 ssl.sh: #78: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:34:00 UTC 2022 ssl.sh: #79: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:34:01 UTC 2022 ssl.sh: #80: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:34:01 UTC 2022 ssl.sh: #81: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31922 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31922 found at Tue Sep 27 23:34:02 UTC 2022 ssl.sh: #82: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 31922 at Tue Sep 27 23:34:02 UTC 2022 kill -USR1 31922 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 31922 killed at Tue Sep 27 23:34:02 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:34:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:34:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:03 UTC 2022 selfserv_9223 with PID 33182 started at Tue Sep 27 23:34:03 UTC 2022 Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:05 UTC 2022 ssl.sh: #83: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:05 UTC 2022 ssl.sh: #84: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:06 UTC 2022 ssl.sh: #85: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:06 UTC 2022 ssl.sh: #86: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:07 UTC 2022 ssl.sh: #87: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:07 UTC 2022 ssl.sh: #88: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:08 UTC 2022 ssl.sh: #89: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:08 UTC 2022 ssl.sh: #90: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:09 UTC 2022 ssl.sh: #91: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:10 UTC 2022 ssl.sh: #92: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:10 UTC 2022 ssl.sh: #93: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:11 UTC 2022 ssl.sh: #94: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:11 UTC 2022 ssl.sh: #95: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:12 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #96: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:12 UTC 2022 ssl.sh: #97: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:13 UTC 2022 ssl.sh: #98: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:13 UTC 2022 ssl.sh: #99: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:14 UTC 2022 ssl.sh: #100: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:14 UTC 2022 ssl.sh: #101: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:15 UTC 2022 ssl.sh: #102: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:15 UTC 2022 ssl.sh: #103: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:16 UTC 2022 ssl.sh: #104: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:16 UTC 2022 ssl.sh: #105: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:17 UTC 2022 ssl.sh: #106: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:18 UTC 2022 ssl.sh: #107: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:18 UTC 2022 ssl.sh: #108: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:19 UTC 2022 ssl.sh: #109: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:19 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #110: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:20 UTC 2022 ssl.sh: #111: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:20 UTC 2022 ssl.sh: #112: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:21 UTC 2022 ssl.sh: #113: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:21 UTC 2022 ssl.sh: #114: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:22 UTC 2022 ssl.sh: #115: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:22 UTC 2022 ssl.sh: #116: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:23 UTC 2022 ssl.sh: #117: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:23 UTC 2022 ssl.sh: #118: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:24 UTC 2022 ssl.sh: #119: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:24 UTC 2022 ssl.sh: #120: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:25 UTC 2022 ssl.sh: #121: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:25 UTC 2022 ssl.sh: #122: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 33182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33182 found at Tue Sep 27 23:34:26 UTC 2022 ssl.sh: #123: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 33182 at Tue Sep 27 23:34:26 UTC 2022 kill -USR1 33182 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33182 killed at Tue Sep 27 23:34:26 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:34:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:34:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:27 UTC 2022 selfserv_9223 with PID 34457 started at Tue Sep 27 23:34:27 UTC 2022 Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:29 UTC 2022 ssl.sh: #124: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:30 UTC 2022 ssl.sh: #125: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:31 UTC 2022 ssl.sh: #126: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:32 UTC 2022 ssl.sh: #127: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:33 UTC 2022 ssl.sh: #128: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:34 UTC 2022 ssl.sh: #129: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:35 UTC 2022 ssl.sh: #130: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:36 UTC 2022 ssl.sh: #131: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:37 UTC 2022 ssl.sh: #132: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:38 UTC 2022 ssl.sh: #133: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:39 UTC 2022 ssl.sh: #134: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:40 UTC 2022 ssl.sh: #135: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:41 UTC 2022 ssl.sh: #136: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:42 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #137: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:43 UTC 2022 ssl.sh: #138: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:44 UTC 2022 ssl.sh: #139: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:45 UTC 2022 ssl.sh: #140: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:46 UTC 2022 ssl.sh: #141: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:47 UTC 2022 ssl.sh: #142: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:48 UTC 2022 ssl.sh: #143: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:49 UTC 2022 ssl.sh: #144: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:50 UTC 2022 ssl.sh: #145: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:51 UTC 2022 ssl.sh: #146: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:52 UTC 2022 ssl.sh: #147: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:53 UTC 2022 ssl.sh: #148: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:54 UTC 2022 ssl.sh: #149: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:55 UTC 2022 ssl.sh: #150: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:55 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #151: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:56 UTC 2022 ssl.sh: #152: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:57 UTC 2022 ssl.sh: #153: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:58 UTC 2022 ssl.sh: #154: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:34:59 UTC 2022 ssl.sh: #155: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:35:00 UTC 2022 ssl.sh: #156: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:35:01 UTC 2022 ssl.sh: #157: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:35:02 UTC 2022 ssl.sh: #158: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:35:03 UTC 2022 ssl.sh: #159: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:35:04 UTC 2022 ssl.sh: #160: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:35:05 UTC 2022 ssl.sh: #161: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:35:06 UTC 2022 ssl.sh: #162: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:35:07 UTC 2022 ssl.sh: #163: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 34457 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34457 found at Tue Sep 27 23:35:08 UTC 2022 ssl.sh: #164: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 34457 at Tue Sep 27 23:35:08 UTC 2022 kill -USR1 34457 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34457 killed at Tue Sep 27 23:35:08 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:35:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:35:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35716 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35716 found at Tue Sep 27 23:35:08 UTC 2022 selfserv_9223 with PID 35716 started at Tue Sep 27 23:35:08 UTC 2022 trying to kill selfserv_9223 with PID 35716 at Tue Sep 27 23:35:08 UTC 2022 kill -USR1 35716 ./ssl.sh: line 228: 35716 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9223 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35716 killed at Tue Sep 27 23:35:09 UTC 2022 selfserv_9223 starting at Tue Sep 27 23:35:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:35:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:09 UTC 2022 selfserv_9223 with PID 35758 started at Tue Sep 27 23:35:09 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:12 UTC 2022 ssl.sh: #165: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:13 UTC 2022 ssl.sh: #166: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:15 UTC 2022 ssl.sh: #167: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:16 UTC 2022 ssl.sh: #168: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:18 UTC 2022 ssl.sh: #169: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:19 UTC 2022 ssl.sh: #170: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:20 UTC 2022 ssl.sh: #171: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:22 UTC 2022 ssl.sh: #172: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:23 UTC 2022 ssl.sh: #173: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:25 UTC 2022 ssl.sh: #174: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:26 UTC 2022 ssl.sh: #175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:27 UTC 2022 ssl.sh: #176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:29 UTC 2022 ssl.sh: #177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:30 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #178: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:32 UTC 2022 ssl.sh: #179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:33 UTC 2022 ssl.sh: #180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:34 UTC 2022 ssl.sh: #181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:36 UTC 2022 ssl.sh: #182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:37 UTC 2022 ssl.sh: #183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:39 UTC 2022 ssl.sh: #184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:40 UTC 2022 ssl.sh: #185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:41 UTC 2022 ssl.sh: #186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:43 UTC 2022 ssl.sh: #187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:44 UTC 2022 ssl.sh: #188: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:46 UTC 2022 ssl.sh: #189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:47 UTC 2022 ssl.sh: #190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:48 UTC 2022 ssl.sh: #191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:50 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #192: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:51 UTC 2022 ssl.sh: #193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:52 UTC 2022 ssl.sh: #194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:54 UTC 2022 ssl.sh: #195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:55 UTC 2022 ssl.sh: #196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:57 UTC 2022 ssl.sh: #197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:58 UTC 2022 ssl.sh: #198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:35:59 UTC 2022 ssl.sh: #199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:36:01 UTC 2022 ssl.sh: #200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:36:02 UTC 2022 ssl.sh: #201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:36:04 UTC 2022 ssl.sh: #202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:36:05 UTC 2022 ssl.sh: #203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:36:06 UTC 2022 ssl.sh: #204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35758 found at Tue Sep 27 23:36:08 UTC 2022 ssl.sh: #205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 35758 at Tue Sep 27 23:36:08 UTC 2022 kill -USR1 35758 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35758 killed at Tue Sep 27 23:36:08 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:36:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:36:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:08 UTC 2022 selfserv_9223 with PID 37035 started at Tue Sep 27 23:36:08 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:11 UTC 2022 ssl.sh: #206: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:13 UTC 2022 ssl.sh: #207: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:14 UTC 2022 ssl.sh: #208: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:16 UTC 2022 ssl.sh: #209: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:17 UTC 2022 ssl.sh: #210: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:19 UTC 2022 ssl.sh: #211: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:20 UTC 2022 ssl.sh: #212: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:21 UTC 2022 ssl.sh: #213: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:23 UTC 2022 ssl.sh: #214: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:24 UTC 2022 ssl.sh: #215: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:26 UTC 2022 ssl.sh: #216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:27 UTC 2022 ssl.sh: #217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:29 UTC 2022 ssl.sh: #218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:30 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #219: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:31 UTC 2022 ssl.sh: #220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:33 UTC 2022 ssl.sh: #221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:34 UTC 2022 ssl.sh: #222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:36 UTC 2022 ssl.sh: #223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:37 UTC 2022 ssl.sh: #224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:39 UTC 2022 ssl.sh: #225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:40 UTC 2022 ssl.sh: #226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:41 UTC 2022 ssl.sh: #227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:43 UTC 2022 ssl.sh: #228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:44 UTC 2022 ssl.sh: #229: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:46 UTC 2022 ssl.sh: #230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:47 UTC 2022 ssl.sh: #231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:49 UTC 2022 ssl.sh: #232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:50 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #233: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:52 UTC 2022 ssl.sh: #234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:53 UTC 2022 ssl.sh: #235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:54 UTC 2022 ssl.sh: #236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:56 UTC 2022 ssl.sh: #237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:57 UTC 2022 ssl.sh: #238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:36:59 UTC 2022 ssl.sh: #239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:37:00 UTC 2022 ssl.sh: #240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:37:02 UTC 2022 ssl.sh: #241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:37:03 UTC 2022 ssl.sh: #242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:37:04 UTC 2022 ssl.sh: #243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:37:06 UTC 2022 ssl.sh: #244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:37:07 UTC 2022 ssl.sh: #245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37035 found at Tue Sep 27 23:37:09 UTC 2022 ssl.sh: #246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 37035 at Tue Sep 27 23:37:09 UTC 2022 kill -USR1 37035 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37035 killed at Tue Sep 27 23:37:09 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:37:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:37:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:09 UTC 2022 selfserv_9223 with PID 38308 started at Tue Sep 27 23:37:09 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:12 UTC 2022 ssl.sh: #247: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:12 UTC 2022 ssl.sh: #248: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:13 UTC 2022 ssl.sh: #249: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:14 UTC 2022 ssl.sh: #250: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:15 UTC 2022 ssl.sh: #251: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:16 UTC 2022 ssl.sh: #252: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:16 UTC 2022 ssl.sh: #253: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:17 UTC 2022 ssl.sh: #254: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:18 UTC 2022 ssl.sh: #255: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:19 UTC 2022 ssl.sh: #256: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:19 UTC 2022 ssl.sh: #257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:20 UTC 2022 ssl.sh: #258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:21 UTC 2022 ssl.sh: #259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:22 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #260: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:23 UTC 2022 ssl.sh: #261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:24 UTC 2022 ssl.sh: #262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:25 UTC 2022 ssl.sh: #263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:25 UTC 2022 ssl.sh: #264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:26 UTC 2022 ssl.sh: #265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:27 UTC 2022 ssl.sh: #266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:28 UTC 2022 ssl.sh: #267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:29 UTC 2022 ssl.sh: #268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:29 UTC 2022 ssl.sh: #269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:30 UTC 2022 ssl.sh: #270: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:31 UTC 2022 ssl.sh: #271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:32 UTC 2022 ssl.sh: #272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:32 UTC 2022 ssl.sh: #273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:34 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #274: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:35 UTC 2022 ssl.sh: #275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:35 UTC 2022 ssl.sh: #276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:36 UTC 2022 ssl.sh: #277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:37 UTC 2022 ssl.sh: #278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:38 UTC 2022 ssl.sh: #279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:38 UTC 2022 ssl.sh: #280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:39 UTC 2022 ssl.sh: #281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:40 UTC 2022 ssl.sh: #282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:41 UTC 2022 ssl.sh: #283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:41 UTC 2022 ssl.sh: #284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:42 UTC 2022 ssl.sh: #285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:43 UTC 2022 ssl.sh: #286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38308 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38308 found at Tue Sep 27 23:37:44 UTC 2022 ssl.sh: #287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 38308 at Tue Sep 27 23:37:44 UTC 2022 kill -USR1 38308 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 38308 killed at Tue Sep 27 23:37:44 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:37:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:37:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:37:44 UTC 2022 selfserv_9223 with PID 39586 started at Tue Sep 27 23:37:44 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:37:47 UTC 2022 ssl.sh: #288: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:37:47 UTC 2022 ssl.sh: #289: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:37:48 UTC 2022 ssl.sh: #290: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:37:49 UTC 2022 ssl.sh: #291: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:37:49 UTC 2022 ssl.sh: #292: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:37:50 UTC 2022 ssl.sh: #293: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:37:51 UTC 2022 ssl.sh: #294: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:37:51 UTC 2022 ssl.sh: #295: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:37:52 UTC 2022 ssl.sh: #296: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:37:53 UTC 2022 ssl.sh: #297: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:37:53 UTC 2022 ssl.sh: #298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:37:54 UTC 2022 ssl.sh: #299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:37:55 UTC 2022 ssl.sh: #300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:37:55 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #301: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:37:56 UTC 2022 ssl.sh: #302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:37:57 UTC 2022 ssl.sh: #303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:37:57 UTC 2022 ssl.sh: #304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:37:58 UTC 2022 ssl.sh: #305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:37:59 UTC 2022 ssl.sh: #306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:37:59 UTC 2022 ssl.sh: #307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:38:00 UTC 2022 ssl.sh: #308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:38:01 UTC 2022 ssl.sh: #309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:38:01 UTC 2022 ssl.sh: #310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:38:02 UTC 2022 ssl.sh: #311: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:38:03 UTC 2022 ssl.sh: #312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:38:03 UTC 2022 ssl.sh: #313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:38:04 UTC 2022 ssl.sh: #314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:38:05 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #315: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:38:05 UTC 2022 ssl.sh: #316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:38:06 UTC 2022 ssl.sh: #317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:38:07 UTC 2022 ssl.sh: #318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:38:07 UTC 2022 ssl.sh: #319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:38:08 UTC 2022 ssl.sh: #320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:38:08 UTC 2022 ssl.sh: #321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:38:09 UTC 2022 ssl.sh: #322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:38:10 UTC 2022 ssl.sh: #323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:38:10 UTC 2022 ssl.sh: #324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:38:11 UTC 2022 ssl.sh: #325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:38:12 UTC 2022 ssl.sh: #326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:38:12 UTC 2022 ssl.sh: #327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39586 found at Tue Sep 27 23:38:13 UTC 2022 ssl.sh: #328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 39586 at Tue Sep 27 23:38:13 UTC 2022 kill -USR1 39586 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39586 killed at Tue Sep 27 23:38:13 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:38:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:38:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:14 UTC 2022 selfserv_9223 with PID 40847 started at Tue Sep 27 23:38:14 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:16 UTC 2022 ssl.sh: #329: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:17 UTC 2022 ssl.sh: #330: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:17 UTC 2022 ssl.sh: #331: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:18 UTC 2022 ssl.sh: #332: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:19 UTC 2022 ssl.sh: #333: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:19 UTC 2022 ssl.sh: #334: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:20 UTC 2022 ssl.sh: #335: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:21 UTC 2022 ssl.sh: #336: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:22 UTC 2022 ssl.sh: #337: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:22 UTC 2022 ssl.sh: #338: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:23 UTC 2022 ssl.sh: #339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:24 UTC 2022 ssl.sh: #340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:25 UTC 2022 ssl.sh: #341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:25 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #342: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:26 UTC 2022 ssl.sh: #343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:27 UTC 2022 ssl.sh: #344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:27 UTC 2022 ssl.sh: #345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:28 UTC 2022 ssl.sh: #346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:29 UTC 2022 ssl.sh: #347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:29 UTC 2022 ssl.sh: #348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:30 UTC 2022 ssl.sh: #349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:31 UTC 2022 ssl.sh: #350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:31 UTC 2022 ssl.sh: #351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:32 UTC 2022 ssl.sh: #352: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:33 UTC 2022 ssl.sh: #353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:34 UTC 2022 ssl.sh: #354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:34 UTC 2022 ssl.sh: #355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:35 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #356: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:36 UTC 2022 ssl.sh: #357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:36 UTC 2022 ssl.sh: #358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:37 UTC 2022 ssl.sh: #359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:38 UTC 2022 ssl.sh: #360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:38 UTC 2022 ssl.sh: #361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:39 UTC 2022 ssl.sh: #362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:40 UTC 2022 ssl.sh: #363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:41 UTC 2022 ssl.sh: #364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:41 UTC 2022 ssl.sh: #365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:42 UTC 2022 ssl.sh: #366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:43 UTC 2022 ssl.sh: #367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:43 UTC 2022 ssl.sh: #368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40847 found at Tue Sep 27 23:38:44 UTC 2022 ssl.sh: #369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 40847 at Tue Sep 27 23:38:44 UTC 2022 kill -USR1 40847 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40847 killed at Tue Sep 27 23:38:44 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:38:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:38:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:38:45 UTC 2022 selfserv_9223 with PID 42132 started at Tue Sep 27 23:38:45 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:38:47 UTC 2022 ssl.sh: #370: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:38:48 UTC 2022 ssl.sh: #371: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:38:49 UTC 2022 ssl.sh: #372: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:38:51 UTC 2022 ssl.sh: #373: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:38:52 UTC 2022 ssl.sh: #374: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:38:53 UTC 2022 ssl.sh: #375: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:38:54 UTC 2022 ssl.sh: #376: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:38:55 UTC 2022 ssl.sh: #377: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:38:56 UTC 2022 ssl.sh: #378: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:38:57 UTC 2022 ssl.sh: #379: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:38:58 UTC 2022 ssl.sh: #380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:38:59 UTC 2022 ssl.sh: #381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:01 UTC 2022 ssl.sh: #382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:01 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #383: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:02 UTC 2022 ssl.sh: #384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:03 UTC 2022 ssl.sh: #385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:05 UTC 2022 ssl.sh: #386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:06 UTC 2022 ssl.sh: #387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:07 UTC 2022 ssl.sh: #388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:08 UTC 2022 ssl.sh: #389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:09 UTC 2022 ssl.sh: #390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:10 UTC 2022 ssl.sh: #391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:11 UTC 2022 ssl.sh: #392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:12 UTC 2022 ssl.sh: #393: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:13 UTC 2022 ssl.sh: #394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:14 UTC 2022 ssl.sh: #395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:15 UTC 2022 ssl.sh: #396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:16 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #397: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:17 UTC 2022 ssl.sh: #398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:18 UTC 2022 ssl.sh: #399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:19 UTC 2022 ssl.sh: #400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:21 UTC 2022 ssl.sh: #401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:22 UTC 2022 ssl.sh: #402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:23 UTC 2022 ssl.sh: #403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:24 UTC 2022 ssl.sh: #404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:25 UTC 2022 ssl.sh: #405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:26 UTC 2022 ssl.sh: #406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:27 UTC 2022 ssl.sh: #407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:28 UTC 2022 ssl.sh: #408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:29 UTC 2022 ssl.sh: #409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42132 found at Tue Sep 27 23:39:30 UTC 2022 ssl.sh: #410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 42132 at Tue Sep 27 23:39:30 UTC 2022 kill -USR1 42132 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42132 killed at Tue Sep 27 23:39:31 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:39:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:39:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 43410 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43410 found at Tue Sep 27 23:39:31 UTC 2022 selfserv_9223 with PID 43410 started at Tue Sep 27 23:39:31 UTC 2022 trying to kill selfserv_9223 with PID 43410 at Tue Sep 27 23:39:31 UTC 2022 kill -USR1 43410 ./ssl.sh: line 228: 43410 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9223 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 43410 killed at Tue Sep 27 23:39:31 UTC 2022 selfserv_9223 starting at Tue Sep 27 23:39:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:39:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:39:32 UTC 2022 selfserv_9223 with PID 43452 started at Tue Sep 27 23:39:32 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:39:35 UTC 2022 ssl.sh: #411: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:39:36 UTC 2022 ssl.sh: #412: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:39:37 UTC 2022 ssl.sh: #413: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:39:39 UTC 2022 ssl.sh: #414: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:39:40 UTC 2022 ssl.sh: #415: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:39:41 UTC 2022 ssl.sh: #416: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:39:43 UTC 2022 ssl.sh: #417: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:39:44 UTC 2022 ssl.sh: #418: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:39:46 UTC 2022 ssl.sh: #419: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:39:47 UTC 2022 ssl.sh: #420: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:39:48 UTC 2022 ssl.sh: #421: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:39:50 UTC 2022 ssl.sh: #422: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:39:51 UTC 2022 ssl.sh: #423: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:39:53 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #424: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:39:54 UTC 2022 ssl.sh: #425: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:39:55 UTC 2022 ssl.sh: #426: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:39:57 UTC 2022 ssl.sh: #427: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:39:58 UTC 2022 ssl.sh: #428: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:40:00 UTC 2022 ssl.sh: #429: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:40:01 UTC 2022 ssl.sh: #430: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:40:02 UTC 2022 ssl.sh: #431: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:40:04 UTC 2022 ssl.sh: #432: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:40:05 UTC 2022 ssl.sh: #433: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:40:07 UTC 2022 ssl.sh: #434: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:40:08 UTC 2022 ssl.sh: #435: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:40:09 UTC 2022 ssl.sh: #436: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:40:11 UTC 2022 ssl.sh: #437: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:40:12 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #438: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:40:14 UTC 2022 ssl.sh: #439: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:40:15 UTC 2022 ssl.sh: #440: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:40:16 UTC 2022 ssl.sh: #441: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:40:18 UTC 2022 ssl.sh: #442: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:40:19 UTC 2022 ssl.sh: #443: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:40:20 UTC 2022 ssl.sh: #444: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:40:22 UTC 2022 ssl.sh: #445: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:40:23 UTC 2022 ssl.sh: #446: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:40:25 UTC 2022 ssl.sh: #447: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:40:26 UTC 2022 ssl.sh: #448: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:40:27 UTC 2022 ssl.sh: #449: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:40:29 UTC 2022 ssl.sh: #450: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43452 found at Tue Sep 27 23:40:30 UTC 2022 ssl.sh: #451: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 43452 at Tue Sep 27 23:40:30 UTC 2022 kill -USR1 43452 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 43452 killed at Tue Sep 27 23:40:30 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:40:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:40:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:40:31 UTC 2022 selfserv_9223 with PID 44726 started at Tue Sep 27 23:40:31 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:40:34 UTC 2022 ssl.sh: #452: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:40:35 UTC 2022 ssl.sh: #453: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:40:37 UTC 2022 ssl.sh: #454: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:40:38 UTC 2022 ssl.sh: #455: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:40:40 UTC 2022 ssl.sh: #456: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:40:41 UTC 2022 ssl.sh: #457: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:40:42 UTC 2022 ssl.sh: #458: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:40:44 UTC 2022 ssl.sh: #459: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:40:45 UTC 2022 ssl.sh: #460: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:40:47 UTC 2022 ssl.sh: #461: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:40:48 UTC 2022 ssl.sh: #462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:40:50 UTC 2022 ssl.sh: #463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:40:51 UTC 2022 ssl.sh: #464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:40:52 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #465: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:40:54 UTC 2022 ssl.sh: #466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:40:55 UTC 2022 ssl.sh: #467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:40:57 UTC 2022 ssl.sh: #468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:40:58 UTC 2022 ssl.sh: #469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:41:00 UTC 2022 ssl.sh: #470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:41:01 UTC 2022 ssl.sh: #471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:41:03 UTC 2022 ssl.sh: #472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:41:04 UTC 2022 ssl.sh: #473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:41:05 UTC 2022 ssl.sh: #474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:41:07 UTC 2022 ssl.sh: #475: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:41:08 UTC 2022 ssl.sh: #476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:41:10 UTC 2022 ssl.sh: #477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:41:11 UTC 2022 ssl.sh: #478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:41:13 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #479: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:41:14 UTC 2022 ssl.sh: #480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:41:15 UTC 2022 ssl.sh: #481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:41:17 UTC 2022 ssl.sh: #482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:41:18 UTC 2022 ssl.sh: #483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:41:20 UTC 2022 ssl.sh: #484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:41:21 UTC 2022 ssl.sh: #485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:41:23 UTC 2022 ssl.sh: #486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:41:24 UTC 2022 ssl.sh: #487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:41:25 UTC 2022 ssl.sh: #488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:41:27 UTC 2022 ssl.sh: #489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:41:28 UTC 2022 ssl.sh: #490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:41:30 UTC 2022 ssl.sh: #491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44726 found at Tue Sep 27 23:41:31 UTC 2022 ssl.sh: #492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 44726 at Tue Sep 27 23:41:31 UTC 2022 kill -USR1 44726 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 44726 killed at Tue Sep 27 23:41:31 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:41:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:41:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:32 UTC 2022 selfserv_9223 with PID 45999 started at Tue Sep 27 23:41:32 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:34 UTC 2022 ssl.sh: #493: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:35 UTC 2022 ssl.sh: #494: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:36 UTC 2022 ssl.sh: #495: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:36 UTC 2022 ssl.sh: #496: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:37 UTC 2022 ssl.sh: #497: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:38 UTC 2022 ssl.sh: #498: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:39 UTC 2022 ssl.sh: #499: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:40 UTC 2022 ssl.sh: #500: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:40 UTC 2022 ssl.sh: #501: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:41 UTC 2022 ssl.sh: #502: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:42 UTC 2022 ssl.sh: #503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:43 UTC 2022 ssl.sh: #504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:43 UTC 2022 ssl.sh: #505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:45 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #506: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:46 UTC 2022 ssl.sh: #507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:46 UTC 2022 ssl.sh: #508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:47 UTC 2022 ssl.sh: #509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:48 UTC 2022 ssl.sh: #510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:49 UTC 2022 ssl.sh: #511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:49 UTC 2022 ssl.sh: #512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:50 UTC 2022 ssl.sh: #513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:51 UTC 2022 ssl.sh: #514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:52 UTC 2022 ssl.sh: #515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:53 UTC 2022 ssl.sh: #516: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:53 UTC 2022 ssl.sh: #517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:54 UTC 2022 ssl.sh: #518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:55 UTC 2022 ssl.sh: #519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:56 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #520: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:57 UTC 2022 ssl.sh: #521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:58 UTC 2022 ssl.sh: #522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:59 UTC 2022 ssl.sh: #523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:41:59 UTC 2022 ssl.sh: #524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:42:00 UTC 2022 ssl.sh: #525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:42:01 UTC 2022 ssl.sh: #526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:42:02 UTC 2022 ssl.sh: #527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:42:02 UTC 2022 ssl.sh: #528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:42:03 UTC 2022 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:42:04 UTC 2022 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:42:05 UTC 2022 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:42:05 UTC 2022 ssl.sh: #532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45999 found at Tue Sep 27 23:42:06 UTC 2022 ssl.sh: #533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 45999 at Tue Sep 27 23:42:06 UTC 2022 kill -USR1 45999 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45999 killed at Tue Sep 27 23:42:06 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:42:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:42:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:07 UTC 2022 selfserv_9223 with PID 47258 started at Tue Sep 27 23:42:07 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:09 UTC 2022 ssl.sh: #534: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:10 UTC 2022 ssl.sh: #535: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:10 UTC 2022 ssl.sh: #536: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:11 UTC 2022 ssl.sh: #537: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:12 UTC 2022 ssl.sh: #538: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:12 UTC 2022 ssl.sh: #539: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:13 UTC 2022 ssl.sh: #540: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:14 UTC 2022 ssl.sh: #541: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:14 UTC 2022 ssl.sh: #542: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:15 UTC 2022 ssl.sh: #543: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:16 UTC 2022 ssl.sh: #544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:17 UTC 2022 ssl.sh: #545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:17 UTC 2022 ssl.sh: #546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:18 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #547: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:19 UTC 2022 ssl.sh: #548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:19 UTC 2022 ssl.sh: #549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:20 UTC 2022 ssl.sh: #550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:20 UTC 2022 ssl.sh: #551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:21 UTC 2022 ssl.sh: #552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:22 UTC 2022 ssl.sh: #553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:22 UTC 2022 ssl.sh: #554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:23 UTC 2022 ssl.sh: #555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:24 UTC 2022 ssl.sh: #556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:24 UTC 2022 ssl.sh: #557: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:25 UTC 2022 ssl.sh: #558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:26 UTC 2022 ssl.sh: #559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:26 UTC 2022 ssl.sh: #560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:27 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #561: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:28 UTC 2022 ssl.sh: #562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:28 UTC 2022 ssl.sh: #563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:29 UTC 2022 ssl.sh: #564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:30 UTC 2022 ssl.sh: #565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:30 UTC 2022 ssl.sh: #566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:31 UTC 2022 ssl.sh: #567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:32 UTC 2022 ssl.sh: #568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:32 UTC 2022 ssl.sh: #569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:33 UTC 2022 ssl.sh: #570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:34 UTC 2022 ssl.sh: #571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:34 UTC 2022 ssl.sh: #572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:35 UTC 2022 ssl.sh: #573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47258 found at Tue Sep 27 23:42:36 UTC 2022 ssl.sh: #574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 47258 at Tue Sep 27 23:42:36 UTC 2022 kill -USR1 47258 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47258 killed at Tue Sep 27 23:42:36 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:42:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:42:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:36 UTC 2022 selfserv_9223 with PID 48531 started at Tue Sep 27 23:42:36 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:38 UTC 2022 ssl.sh: #575: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:39 UTC 2022 ssl.sh: #576: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:40 UTC 2022 ssl.sh: #577: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:40 UTC 2022 ssl.sh: #578: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:41 UTC 2022 ssl.sh: #579: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:42 UTC 2022 ssl.sh: #580: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:43 UTC 2022 ssl.sh: #581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:43 UTC 2022 ssl.sh: #582: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:44 UTC 2022 ssl.sh: #583: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:45 UTC 2022 ssl.sh: #584: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:46 UTC 2022 ssl.sh: #585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:46 UTC 2022 ssl.sh: #586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:47 UTC 2022 ssl.sh: #587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:48 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #588: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:48 UTC 2022 ssl.sh: #589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:49 UTC 2022 ssl.sh: #590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:50 UTC 2022 ssl.sh: #591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:50 UTC 2022 ssl.sh: #592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:51 UTC 2022 ssl.sh: #593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:52 UTC 2022 ssl.sh: #594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:53 UTC 2022 ssl.sh: #595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:53 UTC 2022 ssl.sh: #596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:54 UTC 2022 ssl.sh: #597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:55 UTC 2022 ssl.sh: #598: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:55 UTC 2022 ssl.sh: #599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:56 UTC 2022 ssl.sh: #600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:57 UTC 2022 ssl.sh: #601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:57 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #602: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:58 UTC 2022 ssl.sh: #603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:42:59 UTC 2022 ssl.sh: #604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:43:00 UTC 2022 ssl.sh: #605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:43:00 UTC 2022 ssl.sh: #606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:43:01 UTC 2022 ssl.sh: #607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:43:02 UTC 2022 ssl.sh: #608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:43:02 UTC 2022 ssl.sh: #609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:43:03 UTC 2022 ssl.sh: #610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:43:04 UTC 2022 ssl.sh: #611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:43:04 UTC 2022 ssl.sh: #612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:43:05 UTC 2022 ssl.sh: #613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:43:06 UTC 2022 ssl.sh: #614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48531 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48531 found at Tue Sep 27 23:43:06 UTC 2022 ssl.sh: #615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 48531 at Tue Sep 27 23:43:06 UTC 2022 kill -USR1 48531 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48531 killed at Tue Sep 27 23:43:07 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:43:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:43:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:07 UTC 2022 selfserv_9223 with PID 1012 started at Tue Sep 27 23:43:07 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:10 UTC 2022 ssl.sh: #616: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:11 UTC 2022 ssl.sh: #617: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:12 UTC 2022 ssl.sh: #618: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:13 UTC 2022 ssl.sh: #619: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:14 UTC 2022 ssl.sh: #620: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:15 UTC 2022 ssl.sh: #621: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:16 UTC 2022 ssl.sh: #622: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:17 UTC 2022 ssl.sh: #623: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:19 UTC 2022 ssl.sh: #624: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:20 UTC 2022 ssl.sh: #625: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:21 UTC 2022 ssl.sh: #626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:22 UTC 2022 ssl.sh: #627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:23 UTC 2022 ssl.sh: #628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:24 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #629: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:25 UTC 2022 ssl.sh: #630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:26 UTC 2022 ssl.sh: #631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:27 UTC 2022 ssl.sh: #632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:28 UTC 2022 ssl.sh: #633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:29 UTC 2022 ssl.sh: #634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:30 UTC 2022 ssl.sh: #635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:31 UTC 2022 ssl.sh: #636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:32 UTC 2022 ssl.sh: #637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:33 UTC 2022 ssl.sh: #638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:35 UTC 2022 ssl.sh: #639: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:36 UTC 2022 ssl.sh: #640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:37 UTC 2022 ssl.sh: #641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:38 UTC 2022 ssl.sh: #642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:39 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #643: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:40 UTC 2022 ssl.sh: #644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:41 UTC 2022 ssl.sh: #645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:42 UTC 2022 ssl.sh: #646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:43 UTC 2022 ssl.sh: #647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:44 UTC 2022 ssl.sh: #648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:45 UTC 2022 ssl.sh: #649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:46 UTC 2022 ssl.sh: #650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:47 UTC 2022 ssl.sh: #651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:48 UTC 2022 ssl.sh: #652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:49 UTC 2022 ssl.sh: #653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:51 UTC 2022 ssl.sh: #654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:52 UTC 2022 ssl.sh: #655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1012 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1012 found at Tue Sep 27 23:43:53 UTC 2022 ssl.sh: #656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 1012 at Tue Sep 27 23:43:53 UTC 2022 kill -USR1 1012 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1012 killed at Tue Sep 27 23:43:53 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:43:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:43:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2381 found at Tue Sep 27 23:43:53 UTC 2022 selfserv_9223 with PID 2381 started at Tue Sep 27 23:43:53 UTC 2022 trying to kill selfserv_9223 with PID 2381 at Tue Sep 27 23:43:53 UTC 2022 kill -USR1 2381 ./ssl.sh: line 228: 2381 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9223 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2381 killed at Tue Sep 27 23:43:54 UTC 2022 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9223 starting at Tue Sep 27 23:43:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:43:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 2426 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2426 found at Tue Sep 27 23:43:54 UTC 2022 selfserv_9223 with PID 2426 started at Tue Sep 27 23:43:54 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #657: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #658: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #659: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #660: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #661: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #662: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #663: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #664: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #665: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #666: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #667: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #668: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #669: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #670: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #671: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #672: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #673: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #674: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #675: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #676: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #677: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #678: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #679: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #680: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #681: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #682: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #683: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #684: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #685: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #686: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #687: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #688: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #689: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #690: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #691: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #692: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #693: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #694: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #695: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #696: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #697: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #698: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #699: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #700: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #701: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #702: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #703: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #704: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #705: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #706: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #707: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 2426 at Tue Sep 27 23:44:14 UTC 2022 kill -USR1 2426 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2426 killed at Tue Sep 27 23:44:14 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Tue Sep 27 23:44:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:44:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 2977 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2977 found at Tue Sep 27 23:44:15 UTC 2022 selfserv_9223 with PID 2977 started at Tue Sep 27 23:44:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #708: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #709: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #710: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #711: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #712: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #713: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #714: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #715: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #716: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #717: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #718: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #719: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #720: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #721: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #722: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #723: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #724: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #725: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #726: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #727: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #728: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #729: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #730: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #731: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #732: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #733: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #734: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #735: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #736: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #737: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #738: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #739: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #740: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #741: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #742: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #743: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #744: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #745: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #746: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #747: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #748: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #749: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #750: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #751: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #752: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #753: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #754: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #755: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #756: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #757: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #758: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #759: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #760: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #761: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #762: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #763: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #764: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #765: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #766: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #767: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #768: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #769: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #770: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #771: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #772: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #773: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #774: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #775: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #776: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #777: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #778: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #779: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #780: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #781: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #782: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #783: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2977 at Tue Sep 27 23:44:47 UTC 2022 kill -USR1 2977 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2977 killed at Tue Sep 27 23:44:47 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9223 starting at Tue Sep 27 23:44:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:44:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3794 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3794 found at Tue Sep 27 23:44:48 UTC 2022 selfserv_9223 with PID 3794 started at Tue Sep 27 23:44:48 UTC 2022 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3794 at Tue Sep 27 23:44:49 UTC 2022 kill -USR1 3794 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3794 killed at Tue Sep 27 23:44:49 UTC 2022 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:44:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:44:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3860 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3860 found at Tue Sep 27 23:44:50 UTC 2022 selfserv_9223 with PID 3860 started at Tue Sep 27 23:44:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3860 at Tue Sep 27 23:44:52 UTC 2022 kill -USR1 3860 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3860 killed at Tue Sep 27 23:44:53 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:44:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:44:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3912 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3912 found at Tue Sep 27 23:44:53 UTC 2022 selfserv_9223 with PID 3912 started at Tue Sep 27 23:44:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3912 at Tue Sep 27 23:44:55 UTC 2022 kill -USR1 3912 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3912 killed at Tue Sep 27 23:44:55 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:44:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:44:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3964 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3964 found at Tue Sep 27 23:44:56 UTC 2022 selfserv_9223 with PID 3964 started at Tue Sep 27 23:44:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #786: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3964 at Tue Sep 27 23:44:59 UTC 2022 kill -USR1 3964 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3964 killed at Tue Sep 27 23:44:59 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:44:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:44:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4016 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4016 found at Tue Sep 27 23:44:59 UTC 2022 selfserv_9223 with PID 4016 started at Tue Sep 27 23:44:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #787: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4016 at Tue Sep 27 23:45:02 UTC 2022 kill -USR1 4016 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4016 killed at Tue Sep 27 23:45:02 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:45:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:45:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4068 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4068 found at Tue Sep 27 23:45:02 UTC 2022 selfserv_9223 with PID 4068 started at Tue Sep 27 23:45:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #788: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4068 at Tue Sep 27 23:45:04 UTC 2022 kill -USR1 4068 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4068 killed at Tue Sep 27 23:45:04 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:45:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:45:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4120 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4120 found at Tue Sep 27 23:45:05 UTC 2022 selfserv_9223 with PID 4120 started at Tue Sep 27 23:45:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #789: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4120 at Tue Sep 27 23:45:08 UTC 2022 kill -USR1 4120 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4120 killed at Tue Sep 27 23:45:08 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:45:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:45:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4172 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4172 found at Tue Sep 27 23:45:08 UTC 2022 selfserv_9223 with PID 4172 started at Tue Sep 27 23:45:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4172 at Tue Sep 27 23:45:11 UTC 2022 kill -USR1 4172 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4172 killed at Tue Sep 27 23:45:11 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:45:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:45:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4224 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4224 found at Tue Sep 27 23:45:11 UTC 2022 selfserv_9223 with PID 4224 started at Tue Sep 27 23:45:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4224 at Tue Sep 27 23:45:14 UTC 2022 kill -USR1 4224 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4224 killed at Tue Sep 27 23:45:14 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:45:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:45:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4276 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4276 found at Tue Sep 27 23:45:14 UTC 2022 selfserv_9223 with PID 4276 started at Tue Sep 27 23:45:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4276 at Tue Sep 27 23:45:16 UTC 2022 kill -USR1 4276 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4276 killed at Tue Sep 27 23:45:17 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:45:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:45:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4328 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4328 found at Tue Sep 27 23:45:17 UTC 2022 selfserv_9223 with PID 4328 started at Tue Sep 27 23:45:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #793: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4328 at Tue Sep 27 23:45:19 UTC 2022 kill -USR1 4328 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4328 killed at Tue Sep 27 23:45:20 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:45:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:45:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4380 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4380 found at Tue Sep 27 23:45:20 UTC 2022 selfserv_9223 with PID 4380 started at Tue Sep 27 23:45:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #794: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4380 at Tue Sep 27 23:45:22 UTC 2022 kill -USR1 4380 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4380 killed at Tue Sep 27 23:45:22 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:45:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:45:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4432 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4432 found at Tue Sep 27 23:45:23 UTC 2022 selfserv_9223 with PID 4432 started at Tue Sep 27 23:45:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4432 at Tue Sep 27 23:45:25 UTC 2022 kill -USR1 4432 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4432 killed at Tue Sep 27 23:45:25 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:45:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:45:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4499 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4499 found at Tue Sep 27 23:45:26 UTC 2022 selfserv_9223 with PID 4499 started at Tue Sep 27 23:45:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4499 at Tue Sep 27 23:45:28 UTC 2022 kill -USR1 4499 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4499 killed at Tue Sep 27 23:45:28 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:45:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:45:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4551 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4551 found at Tue Sep 27 23:45:29 UTC 2022 selfserv_9223 with PID 4551 started at Tue Sep 27 23:45:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4551 at Tue Sep 27 23:45:31 UTC 2022 kill -USR1 4551 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4551 killed at Tue Sep 27 23:45:31 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:45:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:45:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4603 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4603 found at Tue Sep 27 23:45:32 UTC 2022 selfserv_9223 with PID 4603 started at Tue Sep 27 23:45:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4603 at Tue Sep 27 23:45:35 UTC 2022 kill -USR1 4603 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4603 killed at Tue Sep 27 23:45:35 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:45:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:45:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4655 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4655 found at Tue Sep 27 23:45:35 UTC 2022 selfserv_9223 with PID 4655 started at Tue Sep 27 23:45:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #799: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4655 at Tue Sep 27 23:45:38 UTC 2022 kill -USR1 4655 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4655 killed at Tue Sep 27 23:45:38 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:45:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:45:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4707 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4707 found at Tue Sep 27 23:45:39 UTC 2022 selfserv_9223 with PID 4707 started at Tue Sep 27 23:45:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4707 at Tue Sep 27 23:45:41 UTC 2022 kill -USR1 4707 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4707 killed at Tue Sep 27 23:45:41 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:45:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:45:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4759 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4759 found at Tue Sep 27 23:45:41 UTC 2022 selfserv_9223 with PID 4759 started at Tue Sep 27 23:45:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4759 at Tue Sep 27 23:45:44 UTC 2022 kill -USR1 4759 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4759 killed at Tue Sep 27 23:45:44 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:45:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:45:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4811 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4811 found at Tue Sep 27 23:45:45 UTC 2022 selfserv_9223 with PID 4811 started at Tue Sep 27 23:45:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #802: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4811 at Tue Sep 27 23:45:48 UTC 2022 kill -USR1 4811 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4811 killed at Tue Sep 27 23:45:48 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:45:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:45:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4863 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4863 found at Tue Sep 27 23:45:48 UTC 2022 selfserv_9223 with PID 4863 started at Tue Sep 27 23:45:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4863 at Tue Sep 27 23:45:50 UTC 2022 kill -USR1 4863 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4863 killed at Tue Sep 27 23:45:51 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:45:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:45:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4915 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4915 found at Tue Sep 27 23:45:51 UTC 2022 selfserv_9223 with PID 4915 started at Tue Sep 27 23:45:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4915 at Tue Sep 27 23:45:54 UTC 2022 kill -USR1 4915 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4915 killed at Tue Sep 27 23:45:54 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:45:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:45:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4967 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4967 found at Tue Sep 27 23:45:55 UTC 2022 selfserv_9223 with PID 4967 started at Tue Sep 27 23:45:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #805: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4967 at Tue Sep 27 23:45:57 UTC 2022 kill -USR1 4967 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4967 killed at Tue Sep 27 23:45:58 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:45:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:45:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5019 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5019 found at Tue Sep 27 23:45:58 UTC 2022 selfserv_9223 with PID 5019 started at Tue Sep 27 23:45:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #806: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5019 at Tue Sep 27 23:46:00 UTC 2022 kill -USR1 5019 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5019 killed at Tue Sep 27 23:46:00 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:46:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:46:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5071 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5071 found at Tue Sep 27 23:46:01 UTC 2022 selfserv_9223 with PID 5071 started at Tue Sep 27 23:46:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5071 at Tue Sep 27 23:46:04 UTC 2022 kill -USR1 5071 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5071 killed at Tue Sep 27 23:46:04 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:46:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:46:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5124 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5124 found at Tue Sep 27 23:46:04 UTC 2022 selfserv_9223 with PID 5124 started at Tue Sep 27 23:46:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5124 at Tue Sep 27 23:46:07 UTC 2022 kill -USR1 5124 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5124 killed at Tue Sep 27 23:46:07 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:46:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:46:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5176 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5176 found at Tue Sep 27 23:46:08 UTC 2022 selfserv_9223 with PID 5176 started at Tue Sep 27 23:46:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #809: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5176 at Tue Sep 27 23:46:10 UTC 2022 kill -USR1 5176 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5176 killed at Tue Sep 27 23:46:10 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:46:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:46:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5233 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5233 found at Tue Sep 27 23:46:10 UTC 2022 selfserv_9223 with PID 5233 started at Tue Sep 27 23:46:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5233 at Tue Sep 27 23:46:13 UTC 2022 kill -USR1 5233 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5233 killed at Tue Sep 27 23:46:13 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:46:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:46:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5285 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5285 found at Tue Sep 27 23:46:13 UTC 2022 selfserv_9223 with PID 5285 started at Tue Sep 27 23:46:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #811: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5285 at Tue Sep 27 23:46:16 UTC 2022 kill -USR1 5285 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5285 killed at Tue Sep 27 23:46:16 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:46:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:46:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5337 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5337 found at Tue Sep 27 23:46:16 UTC 2022 selfserv_9223 with PID 5337 started at Tue Sep 27 23:46:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #812: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5337 at Tue Sep 27 23:46:18 UTC 2022 kill -USR1 5337 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5337 killed at Tue Sep 27 23:46:19 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:46:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:46:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5389 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5389 found at Tue Sep 27 23:46:19 UTC 2022 selfserv_9223 with PID 5389 started at Tue Sep 27 23:46:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5389 at Tue Sep 27 23:46:21 UTC 2022 kill -USR1 5389 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5389 killed at Tue Sep 27 23:46:22 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:46:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:46:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5441 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5441 found at Tue Sep 27 23:46:22 UTC 2022 selfserv_9223 with PID 5441 started at Tue Sep 27 23:46:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #814: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5441 at Tue Sep 27 23:46:24 UTC 2022 kill -USR1 5441 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5441 killed at Tue Sep 27 23:46:24 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:46:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:46:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5508 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5508 found at Tue Sep 27 23:46:25 UTC 2022 selfserv_9223 with PID 5508 started at Tue Sep 27 23:46:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5508 at Tue Sep 27 23:46:27 UTC 2022 kill -USR1 5508 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5508 killed at Tue Sep 27 23:46:27 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:46:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:46:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5560 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5560 found at Tue Sep 27 23:46:28 UTC 2022 selfserv_9223 with PID 5560 started at Tue Sep 27 23:46:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5560 at Tue Sep 27 23:46:30 UTC 2022 kill -USR1 5560 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5560 killed at Tue Sep 27 23:46:30 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:46:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:46:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5612 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5612 found at Tue Sep 27 23:46:31 UTC 2022 selfserv_9223 with PID 5612 started at Tue Sep 27 23:46:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #817: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5612 at Tue Sep 27 23:46:33 UTC 2022 kill -USR1 5612 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5612 killed at Tue Sep 27 23:46:33 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:46:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:46:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5664 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5664 found at Tue Sep 27 23:46:34 UTC 2022 selfserv_9223 with PID 5664 started at Tue Sep 27 23:46:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #818: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5664 at Tue Sep 27 23:46:36 UTC 2022 kill -USR1 5664 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5664 killed at Tue Sep 27 23:46:36 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:46:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:46:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5717 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5717 found at Tue Sep 27 23:46:37 UTC 2022 selfserv_9223 with PID 5717 started at Tue Sep 27 23:46:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #819: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5717 at Tue Sep 27 23:46:39 UTC 2022 kill -USR1 5717 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5717 killed at Tue Sep 27 23:46:39 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:46:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:46:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5776 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5776 found at Tue Sep 27 23:46:40 UTC 2022 selfserv_9223 with PID 5776 started at Tue Sep 27 23:46:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5776 at Tue Sep 27 23:46:42 UTC 2022 kill -USR1 5776 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5776 killed at Tue Sep 27 23:46:42 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:46:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:46:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5828 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5828 found at Tue Sep 27 23:46:43 UTC 2022 selfserv_9223 with PID 5828 started at Tue Sep 27 23:46:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #821: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5828 at Tue Sep 27 23:46:45 UTC 2022 kill -USR1 5828 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5828 killed at Tue Sep 27 23:46:45 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:46:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:46:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5880 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5880 found at Tue Sep 27 23:46:45 UTC 2022 selfserv_9223 with PID 5880 started at Tue Sep 27 23:46:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #822: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5880 at Tue Sep 27 23:46:47 UTC 2022 kill -USR1 5880 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5880 killed at Tue Sep 27 23:46:48 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:46:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:46:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5932 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5932 found at Tue Sep 27 23:46:48 UTC 2022 selfserv_9223 with PID 5932 started at Tue Sep 27 23:46:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #823: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5932 at Tue Sep 27 23:46:50 UTC 2022 kill -USR1 5932 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5932 killed at Tue Sep 27 23:46:50 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:46:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:46:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5984 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5984 found at Tue Sep 27 23:46:51 UTC 2022 selfserv_9223 with PID 5984 started at Tue Sep 27 23:46:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #824: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5984 at Tue Sep 27 23:46:53 UTC 2022 kill -USR1 5984 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5984 killed at Tue Sep 27 23:46:53 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:46:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:46:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6036 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6036 found at Tue Sep 27 23:46:53 UTC 2022 selfserv_9223 with PID 6036 started at Tue Sep 27 23:46:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6036 at Tue Sep 27 23:46:56 UTC 2022 kill -USR1 6036 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6036 killed at Tue Sep 27 23:46:56 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:46:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:46:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6088 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6088 found at Tue Sep 27 23:46:57 UTC 2022 selfserv_9223 with PID 6088 started at Tue Sep 27 23:46:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #826: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6088 at Tue Sep 27 23:46:59 UTC 2022 kill -USR1 6088 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6088 killed at Tue Sep 27 23:46:59 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:46:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:46:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6140 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6140 found at Tue Sep 27 23:46:59 UTC 2022 selfserv_9223 with PID 6140 started at Tue Sep 27 23:46:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6140 at Tue Sep 27 23:47:02 UTC 2022 kill -USR1 6140 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6140 killed at Tue Sep 27 23:47:02 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:47:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:47:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6192 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6192 found at Tue Sep 27 23:47:02 UTC 2022 selfserv_9223 with PID 6192 started at Tue Sep 27 23:47:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #828: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6192 at Tue Sep 27 23:47:04 UTC 2022 kill -USR1 6192 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6192 killed at Tue Sep 27 23:47:05 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:47:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:47:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6244 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6244 found at Tue Sep 27 23:47:05 UTC 2022 selfserv_9223 with PID 6244 started at Tue Sep 27 23:47:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #829: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6244 at Tue Sep 27 23:47:07 UTC 2022 kill -USR1 6244 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6244 killed at Tue Sep 27 23:47:08 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:47:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:47:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6296 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6296 found at Tue Sep 27 23:47:08 UTC 2022 selfserv_9223 with PID 6296 started at Tue Sep 27 23:47:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #830: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6296 at Tue Sep 27 23:47:10 UTC 2022 kill -USR1 6296 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6296 killed at Tue Sep 27 23:47:10 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:47:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:47:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6348 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6348 found at Tue Sep 27 23:47:11 UTC 2022 selfserv_9223 with PID 6348 started at Tue Sep 27 23:47:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6348 at Tue Sep 27 23:47:13 UTC 2022 kill -USR1 6348 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6348 killed at Tue Sep 27 23:47:13 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:47:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:47:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6400 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6400 found at Tue Sep 27 23:47:14 UTC 2022 selfserv_9223 with PID 6400 started at Tue Sep 27 23:47:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #832: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6400 at Tue Sep 27 23:47:16 UTC 2022 kill -USR1 6400 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6400 killed at Tue Sep 27 23:47:16 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:47:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:47:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6452 found at Tue Sep 27 23:47:16 UTC 2022 selfserv_9223 with PID 6452 started at Tue Sep 27 23:47:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #833: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6452 at Tue Sep 27 23:47:19 UTC 2022 kill -USR1 6452 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6452 killed at Tue Sep 27 23:47:19 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:47:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:47:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6504 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6504 found at Tue Sep 27 23:47:19 UTC 2022 selfserv_9223 with PID 6504 started at Tue Sep 27 23:47:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #834: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6504 at Tue Sep 27 23:47:22 UTC 2022 kill -USR1 6504 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6504 killed at Tue Sep 27 23:47:22 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:47:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:47:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6556 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6556 found at Tue Sep 27 23:47:22 UTC 2022 selfserv_9223 with PID 6556 started at Tue Sep 27 23:47:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #835: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6556 at Tue Sep 27 23:47:24 UTC 2022 kill -USR1 6556 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6556 killed at Tue Sep 27 23:47:25 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:47:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:47:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6625 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6625 found at Tue Sep 27 23:47:25 UTC 2022 selfserv_9223 with PID 6625 started at Tue Sep 27 23:47:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #836: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6625 at Tue Sep 27 23:47:27 UTC 2022 kill -USR1 6625 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6625 killed at Tue Sep 27 23:47:27 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:47:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:47:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6677 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6677 found at Tue Sep 27 23:47:28 UTC 2022 selfserv_9223 with PID 6677 started at Tue Sep 27 23:47:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #837: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6677 at Tue Sep 27 23:47:30 UTC 2022 kill -USR1 6677 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6677 killed at Tue Sep 27 23:47:31 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:47:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:47:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6729 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6729 found at Tue Sep 27 23:47:31 UTC 2022 selfserv_9223 with PID 6729 started at Tue Sep 27 23:47:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #838: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6729 at Tue Sep 27 23:47:33 UTC 2022 kill -USR1 6729 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6729 killed at Tue Sep 27 23:47:33 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:47:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:47:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6781 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6781 found at Tue Sep 27 23:47:34 UTC 2022 selfserv_9223 with PID 6781 started at Tue Sep 27 23:47:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6781 at Tue Sep 27 23:47:36 UTC 2022 kill -USR1 6781 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6781 killed at Tue Sep 27 23:47:37 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:47:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:47:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6833 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6833 found at Tue Sep 27 23:47:37 UTC 2022 selfserv_9223 with PID 6833 started at Tue Sep 27 23:47:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #840: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6833 at Tue Sep 27 23:47:40 UTC 2022 kill -USR1 6833 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6833 killed at Tue Sep 27 23:47:40 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:47:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:47:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6885 found at Tue Sep 27 23:47:41 UTC 2022 selfserv_9223 with PID 6885 started at Tue Sep 27 23:47:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #841: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6885 at Tue Sep 27 23:47:43 UTC 2022 kill -USR1 6885 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6885 killed at Tue Sep 27 23:47:44 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Tue Sep 27 23:47:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:47:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6943 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6943 found at Tue Sep 27 23:47:44 UTC 2022 selfserv_9223 with PID 6943 started at Tue Sep 27 23:47:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #842: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6943 at Tue Sep 27 23:47:46 UTC 2022 kill -USR1 6943 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6943 killed at Tue Sep 27 23:47:46 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Tue Sep 27 23:47:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:47:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7001 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7001 found at Tue Sep 27 23:47:47 UTC 2022 selfserv_9223 with PID 7001 started at Tue Sep 27 23:47:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #843: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7001 at Tue Sep 27 23:47:49 UTC 2022 kill -USR1 7001 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7001 killed at Tue Sep 27 23:47:49 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Tue Sep 27 23:47:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:47:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7059 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7059 found at Tue Sep 27 23:47:50 UTC 2022 selfserv_9223 with PID 7059 started at Tue Sep 27 23:47:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #844: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7059 at Tue Sep 27 23:47:52 UTC 2022 kill -USR1 7059 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7059 killed at Tue Sep 27 23:47:52 UTC 2022 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9223 starting at Tue Sep 27 23:47:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:47:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7117 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7117 found at Tue Sep 27 23:47:52 UTC 2022 selfserv_9223 with PID 7117 started at Tue Sep 27 23:47:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #845: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7117 at Tue Sep 27 23:47:54 UTC 2022 kill -USR1 7117 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7117 killed at Tue Sep 27 23:47:55 UTC 2022 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9223 starting at Tue Sep 27 23:47:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:47:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7175 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7175 found at Tue Sep 27 23:47:55 UTC 2022 selfserv_9223 with PID 7175 started at Tue Sep 27 23:47:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #846: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7175 at Tue Sep 27 23:47:57 UTC 2022 kill -USR1 7175 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7175 killed at Tue Sep 27 23:47:57 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Tue Sep 27 23:47:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:47:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7233 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7233 found at Tue Sep 27 23:47:58 UTC 2022 selfserv_9223 with PID 7233 started at Tue Sep 27 23:47:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #847: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7233 at Tue Sep 27 23:48:00 UTC 2022 kill -USR1 7233 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7233 killed at Tue Sep 27 23:48:00 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Tue Sep 27 23:48:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:48:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7291 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7291 found at Tue Sep 27 23:48:00 UTC 2022 selfserv_9223 with PID 7291 started at Tue Sep 27 23:48:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #848: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7291 at Tue Sep 27 23:48:03 UTC 2022 kill -USR1 7291 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7291 killed at Tue Sep 27 23:48:03 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9223 starting at Tue Sep 27 23:48:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:48:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7349 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7349 found at Tue Sep 27 23:48:03 UTC 2022 selfserv_9223 with PID 7349 started at Tue Sep 27 23:48:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #849: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7349 at Tue Sep 27 23:48:05 UTC 2022 kill -USR1 7349 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7349 killed at Tue Sep 27 23:48:06 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9223 starting at Tue Sep 27 23:48:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:48:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7407 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7407 found at Tue Sep 27 23:48:06 UTC 2022 selfserv_9223 with PID 7407 started at Tue Sep 27 23:48:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #850: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7407 at Tue Sep 27 23:48:08 UTC 2022 kill -USR1 7407 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7407 killed at Tue Sep 27 23:48:08 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Tue Sep 27 23:48:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:48:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7465 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7465 found at Tue Sep 27 23:48:09 UTC 2022 selfserv_9223 with PID 7465 started at Tue Sep 27 23:48:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #851: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7465 at Tue Sep 27 23:48:10 UTC 2022 kill -USR1 7465 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7465 killed at Tue Sep 27 23:48:11 UTC 2022 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9223 starting at Tue Sep 27 23:48:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:48:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7507 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7507 found at Tue Sep 27 23:48:11 UTC 2022 selfserv_9223 with PID 7507 started at Tue Sep 27 23:48:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #784: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7507 at Tue Sep 27 23:48:13 UTC 2022 kill -USR1 7507 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7507 killed at Tue Sep 27 23:48:13 UTC 2022 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9223 starting at Tue Sep 27 23:48:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:48:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7549 found at Tue Sep 27 23:48:14 UTC 2022 selfserv_9223 with PID 7549 started at Tue Sep 27 23:48:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #785: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9223 with PID 7549 at Tue Sep 27 23:48:16 UTC 2022 kill -USR1 7549 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7549 killed at Tue Sep 27 23:48:16 UTC 2022 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9223 starting at Tue Sep 27 23:48:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:48:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7591 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7591 found at Tue Sep 27 23:48:16 UTC 2022 selfserv_9223 with PID 7591 started at Tue Sep 27 23:48:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #786: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 7591 at Tue Sep 27 23:48:19 UTC 2022 kill -USR1 7591 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7591 killed at Tue Sep 27 23:48:19 UTC 2022 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9223 starting at Tue Sep 27 23:48:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:48:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7633 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7633 found at Tue Sep 27 23:48:19 UTC 2022 selfserv_9223 with PID 7633 started at Tue Sep 27 23:48:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #787: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 7633 at Tue Sep 27 23:48:21 UTC 2022 kill -USR1 7633 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7633 killed at Tue Sep 27 23:48:21 UTC 2022 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9223 starting at Tue Sep 27 23:48:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:48:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7675 found at Tue Sep 27 23:48:22 UTC 2022 selfserv_9223 with PID 7675 started at Tue Sep 27 23:48:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #788: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 7675 at Tue Sep 27 23:48:23 UTC 2022 kill -USR1 7675 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7675 killed at Tue Sep 27 23:48:24 UTC 2022 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9223 starting at Tue Sep 27 23:48:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:48:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7717 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7717 found at Tue Sep 27 23:48:24 UTC 2022 selfserv_9223 with PID 7717 started at Tue Sep 27 23:48:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #789: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 7717 at Tue Sep 27 23:48:26 UTC 2022 kill -USR1 7717 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7717 killed at Tue Sep 27 23:48:26 UTC 2022 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9223 starting at Tue Sep 27 23:48:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:48:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7774 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7774 found at Tue Sep 27 23:48:26 UTC 2022 selfserv_9223 with PID 7774 started at Tue Sep 27 23:48:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #790: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 7774 at Tue Sep 27 23:48:28 UTC 2022 kill -USR1 7774 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7774 killed at Tue Sep 27 23:48:28 UTC 2022 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9223 starting at Tue Sep 27 23:48:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:48:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7816 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7816 found at Tue Sep 27 23:48:29 UTC 2022 selfserv_9223 with PID 7816 started at Tue Sep 27 23:48:29 UTC 2022 strsclnt -q -p 9223 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Tue Sep 27 23:48:29 UTC 2022 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Tue Sep 27 23:49:20 UTC 2022 ssl.sh: #791: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9223 with PID 7816 at Tue Sep 27 23:49:20 UTC 2022 kill -USR1 7816 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7816 killed at Tue Sep 27 23:49:20 UTC 2022 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Tue Sep 27 23:49:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:49:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7868 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7868 found at Tue Sep 27 23:49:21 UTC 2022 selfserv_9223 with PID 7868 started at Tue Sep 27 23:49:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7868 at Tue Sep 27 23:49:22 UTC 2022 kill -USR1 7868 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7868 killed at Tue Sep 27 23:49:23 UTC 2022 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:49:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:49:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7910 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7910 found at Tue Sep 27 23:49:23 UTC 2022 selfserv_9223 with PID 7910 started at Tue Sep 27 23:49:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #793: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7910 at Tue Sep 27 23:49:24 UTC 2022 kill -USR1 7910 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7910 killed at Tue Sep 27 23:49:25 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:49:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:49:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7964 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7964 found at Tue Sep 27 23:49:25 UTC 2022 selfserv_9223 with PID 7964 started at Tue Sep 27 23:49:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #794: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 7964 at Tue Sep 27 23:49:26 UTC 2022 kill -USR1 7964 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7964 killed at Tue Sep 27 23:49:26 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:49:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:49:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8003 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8003 found at Tue Sep 27 23:49:27 UTC 2022 selfserv_9223 with PID 8003 started at Tue Sep 27 23:49:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8003 at Tue Sep 27 23:49:28 UTC 2022 kill -USR1 8003 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8003 killed at Tue Sep 27 23:49:28 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:49:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:49:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8042 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8042 found at Tue Sep 27 23:49:29 UTC 2022 selfserv_9223 with PID 8042 started at Tue Sep 27 23:49:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #796: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 8042 at Tue Sep 27 23:49:30 UTC 2022 kill -USR1 8042 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8042 killed at Tue Sep 27 23:49:30 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:49:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:49:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8081 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8081 found at Tue Sep 27 23:49:30 UTC 2022 selfserv_9223 with PID 8081 started at Tue Sep 27 23:49:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8081 at Tue Sep 27 23:49:32 UTC 2022 kill -USR1 8081 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8081 killed at Tue Sep 27 23:49:32 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:49:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:49:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8120 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8120 found at Tue Sep 27 23:49:32 UTC 2022 selfserv_9223 with PID 8120 started at Tue Sep 27 23:49:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8120 at Tue Sep 27 23:49:34 UTC 2022 kill -USR1 8120 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8120 killed at Tue Sep 27 23:49:34 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:49:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:49:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8159 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8159 found at Tue Sep 27 23:49:34 UTC 2022 selfserv_9223 with PID 8159 started at Tue Sep 27 23:49:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8159 at Tue Sep 27 23:49:35 UTC 2022 kill -USR1 8159 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8159 killed at Tue Sep 27 23:49:36 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:49:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:49:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8198 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8198 found at Tue Sep 27 23:49:36 UTC 2022 selfserv_9223 with PID 8198 started at Tue Sep 27 23:49:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #800: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8198 at Tue Sep 27 23:49:37 UTC 2022 kill -USR1 8198 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8198 killed at Tue Sep 27 23:49:37 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:49:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:49:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8237 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8237 found at Tue Sep 27 23:49:38 UTC 2022 selfserv_9223 with PID 8237 started at Tue Sep 27 23:49:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8237 at Tue Sep 27 23:49:39 UTC 2022 kill -USR1 8237 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8237 killed at Tue Sep 27 23:49:39 UTC 2022 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:49:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:49:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8276 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8276 found at Tue Sep 27 23:49:40 UTC 2022 selfserv_9223 with PID 8276 started at Tue Sep 27 23:49:40 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #802: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8276 at Tue Sep 27 23:49:41 UTC 2022 kill -USR1 8276 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8276 killed at Tue Sep 27 23:49:41 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:49:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:49:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8316 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8316 found at Tue Sep 27 23:49:42 UTC 2022 selfserv_9223 with PID 8316 started at Tue Sep 27 23:49:42 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #803: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8316 at Tue Sep 27 23:49:43 UTC 2022 kill -USR1 8316 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8316 killed at Tue Sep 27 23:49:43 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:49:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:49:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8356 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8356 found at Tue Sep 27 23:49:43 UTC 2022 selfserv_9223 with PID 8356 started at Tue Sep 27 23:49:43 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #804: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8356 at Tue Sep 27 23:49:45 UTC 2022 kill -USR1 8356 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8356 killed at Tue Sep 27 23:49:45 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:49:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:49:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8396 found at Tue Sep 27 23:49:45 UTC 2022 selfserv_9223 with PID 8396 started at Tue Sep 27 23:49:45 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #805: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8396 at Tue Sep 27 23:49:47 UTC 2022 kill -USR1 8396 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8396 killed at Tue Sep 27 23:49:47 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:49:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:49:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8436 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8436 found at Tue Sep 27 23:49:47 UTC 2022 selfserv_9223 with PID 8436 started at Tue Sep 27 23:49:47 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #806: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8436 at Tue Sep 27 23:49:48 UTC 2022 kill -USR1 8436 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8436 killed at Tue Sep 27 23:49:49 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:49:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:49:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8476 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8476 found at Tue Sep 27 23:49:49 UTC 2022 selfserv_9223 with PID 8476 started at Tue Sep 27 23:49:49 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #807: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8476 at Tue Sep 27 23:49:50 UTC 2022 kill -USR1 8476 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8476 killed at Tue Sep 27 23:49:50 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:49:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:49:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8516 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8516 found at Tue Sep 27 23:49:51 UTC 2022 selfserv_9223 with PID 8516 started at Tue Sep 27 23:49:51 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #808: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8516 at Tue Sep 27 23:49:52 UTC 2022 kill -USR1 8516 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8516 killed at Tue Sep 27 23:49:52 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:49:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:49:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8556 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8556 found at Tue Sep 27 23:49:53 UTC 2022 selfserv_9223 with PID 8556 started at Tue Sep 27 23:49:53 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #809: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8556 at Tue Sep 27 23:49:54 UTC 2022 kill -USR1 8556 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8556 killed at Tue Sep 27 23:49:54 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:49:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:49:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8596 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8596 found at Tue Sep 27 23:49:55 UTC 2022 selfserv_9223 with PID 8596 started at Tue Sep 27 23:49:55 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #810: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8596 at Tue Sep 27 23:49:56 UTC 2022 kill -USR1 8596 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8596 killed at Tue Sep 27 23:49:56 UTC 2022 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9223 starting at Tue Sep 27 23:49:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:49:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 8636 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8636 found at Tue Sep 27 23:49:56 UTC 2022 selfserv_9223 with PID 8636 started at Tue Sep 27 23:49:56 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #811: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #812: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #813: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #814: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #815: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #816: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #817: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #821: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #822: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #827: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #828: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #833: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #834: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #839: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #840: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #844: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #846: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #849: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #850: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #851: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #852: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #853: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #854: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #855: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #856: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #857: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #858: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #859: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #860: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #861: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 8636 at Tue Sep 27 23:50:19 UTC 2022 kill -USR1 8636 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8636 killed at Tue Sep 27 23:50:19 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Tue Sep 27 23:50:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:50:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 9185 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9185 found at Tue Sep 27 23:50:20 UTC 2022 selfserv_9223 with PID 9185 started at Tue Sep 27 23:50:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #862: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #863: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #864: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #865: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #866: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #867: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #868: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #869: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #870: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #902: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #903: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #908: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #909: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #914: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #915: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #920: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #921: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #923: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #924: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #925: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #926: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #927: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #928: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #929: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #930: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #931: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #932: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #933: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #934: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #935: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #936: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9185 at Tue Sep 27 23:50:53 UTC 2022 kill -USR1 9185 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9185 killed at Tue Sep 27 23:50:54 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:50:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:50:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10011 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10011 found at Tue Sep 27 23:50:54 UTC 2022 selfserv_9223 with PID 10011 started at Tue Sep 27 23:50:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10011 at Tue Sep 27 23:51:00 UTC 2022 kill -USR1 10011 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10011 killed at Tue Sep 27 23:51:00 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:51:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:51:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10063 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10063 found at Tue Sep 27 23:51:01 UTC 2022 selfserv_9223 with PID 10063 started at Tue Sep 27 23:51:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10063 at Tue Sep 27 23:51:06 UTC 2022 kill -USR1 10063 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10063 killed at Tue Sep 27 23:51:07 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:51:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:51:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10115 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10115 found at Tue Sep 27 23:51:07 UTC 2022 selfserv_9223 with PID 10115 started at Tue Sep 27 23:51:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #940: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10115 at Tue Sep 27 23:51:15 UTC 2022 kill -USR1 10115 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10115 killed at Tue Sep 27 23:51:15 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:51:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:51:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10167 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10167 found at Tue Sep 27 23:51:15 UTC 2022 selfserv_9223 with PID 10167 started at Tue Sep 27 23:51:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #941: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10167 at Tue Sep 27 23:51:21 UTC 2022 kill -USR1 10167 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10167 killed at Tue Sep 27 23:51:21 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:51:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:51:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10219 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10219 found at Tue Sep 27 23:51:22 UTC 2022 selfserv_9223 with PID 10219 started at Tue Sep 27 23:51:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #942: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10219 at Tue Sep 27 23:51:27 UTC 2022 kill -USR1 10219 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10219 killed at Tue Sep 27 23:51:28 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:51:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:51:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10286 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10286 found at Tue Sep 27 23:51:28 UTC 2022 selfserv_9223 with PID 10286 started at Tue Sep 27 23:51:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10286 at Tue Sep 27 23:51:36 UTC 2022 kill -USR1 10286 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10286 killed at Tue Sep 27 23:51:36 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:51:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:51:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10338 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10338 found at Tue Sep 27 23:51:36 UTC 2022 selfserv_9223 with PID 10338 started at Tue Sep 27 23:51:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10338 at Tue Sep 27 23:51:42 UTC 2022 kill -USR1 10338 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10338 killed at Tue Sep 27 23:51:42 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:51:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:51:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10390 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10390 found at Tue Sep 27 23:51:43 UTC 2022 selfserv_9223 with PID 10390 started at Tue Sep 27 23:51:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10390 at Tue Sep 27 23:51:49 UTC 2022 kill -USR1 10390 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10390 killed at Tue Sep 27 23:51:49 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:51:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:51:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10444 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10444 found at Tue Sep 27 23:51:49 UTC 2022 selfserv_9223 with PID 10444 started at Tue Sep 27 23:51:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10444 at Tue Sep 27 23:51:57 UTC 2022 kill -USR1 10444 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10444 killed at Tue Sep 27 23:51:57 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:51:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:51:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10496 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10496 found at Tue Sep 27 23:51:57 UTC 2022 selfserv_9223 with PID 10496 started at Tue Sep 27 23:51:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #947: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10496 at Tue Sep 27 23:52:03 UTC 2022 kill -USR1 10496 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10496 killed at Tue Sep 27 23:52:03 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:52:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:52:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10548 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10548 found at Tue Sep 27 23:52:04 UTC 2022 selfserv_9223 with PID 10548 started at Tue Sep 27 23:52:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #948: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10548 at Tue Sep 27 23:52:10 UTC 2022 kill -USR1 10548 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10548 killed at Tue Sep 27 23:52:10 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:52:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:52:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10600 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10600 found at Tue Sep 27 23:52:10 UTC 2022 selfserv_9223 with PID 10600 started at Tue Sep 27 23:52:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10600 at Tue Sep 27 23:52:18 UTC 2022 kill -USR1 10600 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10600 killed at Tue Sep 27 23:52:18 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:52:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:52:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10652 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10652 found at Tue Sep 27 23:52:18 UTC 2022 selfserv_9223 with PID 10652 started at Tue Sep 27 23:52:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10652 at Tue Sep 27 23:52:24 UTC 2022 kill -USR1 10652 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10652 killed at Tue Sep 27 23:52:24 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:52:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:52:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10719 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10719 found at Tue Sep 27 23:52:25 UTC 2022 selfserv_9223 with PID 10719 started at Tue Sep 27 23:52:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10719 at Tue Sep 27 23:52:31 UTC 2022 kill -USR1 10719 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10719 killed at Tue Sep 27 23:52:31 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:52:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:52:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10771 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10771 found at Tue Sep 27 23:52:31 UTC 2022 selfserv_9223 with PID 10771 started at Tue Sep 27 23:52:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10771 at Tue Sep 27 23:52:39 UTC 2022 kill -USR1 10771 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10771 killed at Tue Sep 27 23:52:39 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:52:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:52:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10823 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10823 found at Tue Sep 27 23:52:40 UTC 2022 selfserv_9223 with PID 10823 started at Tue Sep 27 23:52:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #953: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10823 at Tue Sep 27 23:52:46 UTC 2022 kill -USR1 10823 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10823 killed at Tue Sep 27 23:52:46 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:52:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:52:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10875 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10875 found at Tue Sep 27 23:52:46 UTC 2022 selfserv_9223 with PID 10875 started at Tue Sep 27 23:52:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #954: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10875 at Tue Sep 27 23:52:52 UTC 2022 kill -USR1 10875 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10875 killed at Tue Sep 27 23:52:52 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:52:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:52:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10927 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10927 found at Tue Sep 27 23:52:53 UTC 2022 selfserv_9223 with PID 10927 started at Tue Sep 27 23:52:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #955: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10927 at Tue Sep 27 23:53:00 UTC 2022 kill -USR1 10927 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10927 killed at Tue Sep 27 23:53:00 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:53:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:53:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10979 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10979 found at Tue Sep 27 23:53:01 UTC 2022 selfserv_9223 with PID 10979 started at Tue Sep 27 23:53:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #956: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10979 at Tue Sep 27 23:53:07 UTC 2022 kill -USR1 10979 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10979 killed at Tue Sep 27 23:53:07 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:53:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:53:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11031 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11031 found at Tue Sep 27 23:53:07 UTC 2022 selfserv_9223 with PID 11031 started at Tue Sep 27 23:53:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #957: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11031 at Tue Sep 27 23:53:13 UTC 2022 kill -USR1 11031 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11031 killed at Tue Sep 27 23:53:14 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:53:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:53:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11083 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11083 found at Tue Sep 27 23:53:14 UTC 2022 selfserv_9223 with PID 11083 started at Tue Sep 27 23:53:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #958: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11083 at Tue Sep 27 23:53:22 UTC 2022 kill -USR1 11083 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11083 killed at Tue Sep 27 23:53:22 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:53:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:53:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11135 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11135 found at Tue Sep 27 23:53:22 UTC 2022 selfserv_9223 with PID 11135 started at Tue Sep 27 23:53:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #959: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 11135 at Tue Sep 27 23:53:28 UTC 2022 kill -USR1 11135 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11135 killed at Tue Sep 27 23:53:29 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:53:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:53:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11202 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11202 found at Tue Sep 27 23:53:29 UTC 2022 selfserv_9223 with PID 11202 started at Tue Sep 27 23:53:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #960: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 11202 at Tue Sep 27 23:53:35 UTC 2022 kill -USR1 11202 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11202 killed at Tue Sep 27 23:53:35 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:53:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:53:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11254 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11254 found at Tue Sep 27 23:53:35 UTC 2022 selfserv_9223 with PID 11254 started at Tue Sep 27 23:53:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #961: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11254 at Tue Sep 27 23:53:43 UTC 2022 kill -USR1 11254 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11254 killed at Tue Sep 27 23:53:43 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:53:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:53:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11306 found at Tue Sep 27 23:53:44 UTC 2022 selfserv_9223 with PID 11306 started at Tue Sep 27 23:53:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #962: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11306 at Tue Sep 27 23:53:50 UTC 2022 kill -USR1 11306 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11306 killed at Tue Sep 27 23:53:50 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:53:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:53:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11359 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11359 found at Tue Sep 27 23:53:50 UTC 2022 selfserv_9223 with PID 11359 started at Tue Sep 27 23:53:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #963: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11359 at Tue Sep 27 23:53:56 UTC 2022 kill -USR1 11359 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11359 killed at Tue Sep 27 23:53:56 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:53:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:53:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11411 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11411 found at Tue Sep 27 23:53:57 UTC 2022 selfserv_9223 with PID 11411 started at Tue Sep 27 23:53:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #964: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11411 at Tue Sep 27 23:54:04 UTC 2022 kill -USR1 11411 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11411 killed at Tue Sep 27 23:54:05 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:54:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:54:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11463 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11463 found at Tue Sep 27 23:54:05 UTC 2022 selfserv_9223 with PID 11463 started at Tue Sep 27 23:54:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #965: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 11463 at Tue Sep 27 23:54:11 UTC 2022 kill -USR1 11463 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11463 killed at Tue Sep 27 23:54:11 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:54:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:54:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11516 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11516 found at Tue Sep 27 23:54:12 UTC 2022 selfserv_9223 with PID 11516 started at Tue Sep 27 23:54:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #966: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 11516 at Tue Sep 27 23:54:17 UTC 2022 kill -USR1 11516 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11516 killed at Tue Sep 27 23:54:18 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:54:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:54:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11568 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11568 found at Tue Sep 27 23:54:18 UTC 2022 selfserv_9223 with PID 11568 started at Tue Sep 27 23:54:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #967: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11568 at Tue Sep 27 23:54:26 UTC 2022 kill -USR1 11568 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11568 killed at Tue Sep 27 23:54:26 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:54:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:54:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11635 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11635 found at Tue Sep 27 23:54:26 UTC 2022 selfserv_9223 with PID 11635 started at Tue Sep 27 23:54:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #968: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11635 at Tue Sep 27 23:54:34 UTC 2022 kill -USR1 11635 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11635 killed at Tue Sep 27 23:54:34 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:54:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:54:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11687 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11687 found at Tue Sep 27 23:54:34 UTC 2022 selfserv_9223 with PID 11687 started at Tue Sep 27 23:54:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #969: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11687 at Tue Sep 27 23:54:42 UTC 2022 kill -USR1 11687 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11687 killed at Tue Sep 27 23:54:42 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:54:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:54:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11739 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11739 found at Tue Sep 27 23:54:42 UTC 2022 selfserv_9223 with PID 11739 started at Tue Sep 27 23:54:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #970: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11739 at Tue Sep 27 23:54:48 UTC 2022 kill -USR1 11739 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11739 killed at Tue Sep 27 23:54:48 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:54:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:54:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11791 found at Tue Sep 27 23:54:49 UTC 2022 selfserv_9223 with PID 11791 started at Tue Sep 27 23:54:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #971: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 11791 at Tue Sep 27 23:54:55 UTC 2022 kill -USR1 11791 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11791 killed at Tue Sep 27 23:54:55 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:54:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:54:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11843 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11843 found at Tue Sep 27 23:54:55 UTC 2022 selfserv_9223 with PID 11843 started at Tue Sep 27 23:54:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #972: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11843 at Tue Sep 27 23:55:03 UTC 2022 kill -USR1 11843 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11843 killed at Tue Sep 27 23:55:03 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:55:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:55:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11897 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11897 found at Tue Sep 27 23:55:03 UTC 2022 selfserv_9223 with PID 11897 started at Tue Sep 27 23:55:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #973: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11897 at Tue Sep 27 23:55:11 UTC 2022 kill -USR1 11897 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11897 killed at Tue Sep 27 23:55:11 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:55:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:55:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11949 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11949 found at Tue Sep 27 23:55:11 UTC 2022 selfserv_9223 with PID 11949 started at Tue Sep 27 23:55:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #974: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11949 at Tue Sep 27 23:55:17 UTC 2022 kill -USR1 11949 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11949 killed at Tue Sep 27 23:55:17 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:55:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:55:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12001 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12001 found at Tue Sep 27 23:55:18 UTC 2022 selfserv_9223 with PID 12001 started at Tue Sep 27 23:55:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #975: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12001 at Tue Sep 27 23:55:25 UTC 2022 kill -USR1 12001 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12001 killed at Tue Sep 27 23:55:25 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:55:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:55:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12068 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12068 found at Tue Sep 27 23:55:26 UTC 2022 selfserv_9223 with PID 12068 started at Tue Sep 27 23:55:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #976: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12068 at Tue Sep 27 23:55:32 UTC 2022 kill -USR1 12068 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12068 killed at Tue Sep 27 23:55:32 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:55:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:55:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12120 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12120 found at Tue Sep 27 23:55:32 UTC 2022 selfserv_9223 with PID 12120 started at Tue Sep 27 23:55:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #977: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12120 at Tue Sep 27 23:55:39 UTC 2022 kill -USR1 12120 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12120 killed at Tue Sep 27 23:55:40 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:55:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:55:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12172 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12172 found at Tue Sep 27 23:55:40 UTC 2022 selfserv_9223 with PID 12172 started at Tue Sep 27 23:55:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #978: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12172 at Tue Sep 27 23:55:46 UTC 2022 kill -USR1 12172 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12172 killed at Tue Sep 27 23:55:46 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:55:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:55:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12224 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12224 found at Tue Sep 27 23:55:46 UTC 2022 selfserv_9223 with PID 12224 started at Tue Sep 27 23:55:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #979: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12224 at Tue Sep 27 23:55:54 UTC 2022 kill -USR1 12224 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12224 killed at Tue Sep 27 23:55:54 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:55:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:55:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12276 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12276 found at Tue Sep 27 23:55:54 UTC 2022 selfserv_9223 with PID 12276 started at Tue Sep 27 23:55:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #980: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12276 at Tue Sep 27 23:56:00 UTC 2022 kill -USR1 12276 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12276 killed at Tue Sep 27 23:56:00 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:56:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:56:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12328 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12328 found at Tue Sep 27 23:56:01 UTC 2022 selfserv_9223 with PID 12328 started at Tue Sep 27 23:56:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #981: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12328 at Tue Sep 27 23:56:08 UTC 2022 kill -USR1 12328 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12328 killed at Tue Sep 27 23:56:08 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:56:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:56:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12380 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12380 found at Tue Sep 27 23:56:09 UTC 2022 selfserv_9223 with PID 12380 started at Tue Sep 27 23:56:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #982: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12380 at Tue Sep 27 23:56:14 UTC 2022 kill -USR1 12380 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12380 killed at Tue Sep 27 23:56:15 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:56:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:56:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12432 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12432 found at Tue Sep 27 23:56:15 UTC 2022 selfserv_9223 with PID 12432 started at Tue Sep 27 23:56:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #983: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12432 at Tue Sep 27 23:56:22 UTC 2022 kill -USR1 12432 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12432 killed at Tue Sep 27 23:56:23 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:56:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:56:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12484 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12484 found at Tue Sep 27 23:56:23 UTC 2022 selfserv_9223 with PID 12484 started at Tue Sep 27 23:56:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #984: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12484 at Tue Sep 27 23:56:29 UTC 2022 kill -USR1 12484 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12484 killed at Tue Sep 27 23:56:29 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:56:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:56:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12551 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12551 found at Tue Sep 27 23:56:30 UTC 2022 selfserv_9223 with PID 12551 started at Tue Sep 27 23:56:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #985: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12551 at Tue Sep 27 23:56:37 UTC 2022 kill -USR1 12551 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12551 killed at Tue Sep 27 23:56:37 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:56:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:56:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12603 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12603 found at Tue Sep 27 23:56:38 UTC 2022 selfserv_9223 with PID 12603 started at Tue Sep 27 23:56:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #986: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12603 at Tue Sep 27 23:56:43 UTC 2022 kill -USR1 12603 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12603 killed at Tue Sep 27 23:56:44 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:56:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:56:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12655 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12655 found at Tue Sep 27 23:56:44 UTC 2022 selfserv_9223 with PID 12655 started at Tue Sep 27 23:56:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #987: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12655 at Tue Sep 27 23:56:51 UTC 2022 kill -USR1 12655 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12655 killed at Tue Sep 27 23:56:52 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:56:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:56:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12707 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12707 found at Tue Sep 27 23:56:52 UTC 2022 selfserv_9223 with PID 12707 started at Tue Sep 27 23:56:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #988: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12707 at Tue Sep 27 23:56:58 UTC 2022 kill -USR1 12707 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12707 killed at Tue Sep 27 23:56:58 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:56:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:56:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12759 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12759 found at Tue Sep 27 23:56:59 UTC 2022 selfserv_9223 with PID 12759 started at Tue Sep 27 23:56:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #989: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12759 at Tue Sep 27 23:57:06 UTC 2022 kill -USR1 12759 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12759 killed at Tue Sep 27 23:57:06 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:57:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:57:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12811 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12811 found at Tue Sep 27 23:57:07 UTC 2022 selfserv_9223 with PID 12811 started at Tue Sep 27 23:57:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12811 at Tue Sep 27 23:57:13 UTC 2022 kill -USR1 12811 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12811 killed at Tue Sep 27 23:57:13 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:57:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:57:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12863 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12863 found at Tue Sep 27 23:57:13 UTC 2022 selfserv_9223 with PID 12863 started at Tue Sep 27 23:57:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12863 at Tue Sep 27 23:57:20 UTC 2022 kill -USR1 12863 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12863 killed at Tue Sep 27 23:57:21 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:57:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:57:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12915 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12915 found at Tue Sep 27 23:57:21 UTC 2022 selfserv_9223 with PID 12915 started at Tue Sep 27 23:57:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #992: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12915 at Tue Sep 27 23:57:27 UTC 2022 kill -USR1 12915 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12915 killed at Tue Sep 27 23:57:27 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:57:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:57:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12982 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12982 found at Tue Sep 27 23:57:28 UTC 2022 selfserv_9223 with PID 12982 started at Tue Sep 27 23:57:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #993: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12982 at Tue Sep 27 23:57:35 UTC 2022 kill -USR1 12982 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12982 killed at Tue Sep 27 23:57:35 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:57:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:57:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13034 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13034 found at Tue Sep 27 23:57:36 UTC 2022 selfserv_9223 with PID 13034 started at Tue Sep 27 23:57:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #994: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13034 at Tue Sep 27 23:57:43 UTC 2022 kill -USR1 13034 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13034 killed at Tue Sep 27 23:57:43 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Tue Sep 27 23:57:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:57:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13086 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13086 found at Tue Sep 27 23:57:44 UTC 2022 selfserv_9223 with PID 13086 started at Tue Sep 27 23:57:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #995: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13086 at Tue Sep 27 23:57:51 UTC 2022 kill -USR1 13086 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13086 killed at Tue Sep 27 23:57:51 UTC 2022 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Tue Sep 27 23:57:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:57:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13170 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13170 found at Tue Sep 27 23:57:51 UTC 2022 selfserv_9223 with PID 13170 started at Tue Sep 27 23:57:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13170 at Tue Sep 27 23:57:56 UTC 2022 kill -USR1 13170 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13170 killed at Tue Sep 27 23:57:56 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:57:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:57:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13212 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13212 found at Tue Sep 27 23:57:56 UTC 2022 selfserv_9223 with PID 13212 started at Tue Sep 27 23:57:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13212 at Tue Sep 27 23:57:59 UTC 2022 kill -USR1 13212 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13212 killed at Tue Sep 27 23:57:59 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:57:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:57:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13251 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13251 found at Tue Sep 27 23:58:00 UTC 2022 selfserv_9223 with PID 13251 started at Tue Sep 27 23:58:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #940: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 13251 at Tue Sep 27 23:58:02 UTC 2022 kill -USR1 13251 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13251 killed at Tue Sep 27 23:58:02 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:58:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:58:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13290 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13290 found at Tue Sep 27 23:58:03 UTC 2022 selfserv_9223 with PID 13290 started at Tue Sep 27 23:58:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #941: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13290 at Tue Sep 27 23:58:06 UTC 2022 kill -USR1 13290 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13290 killed at Tue Sep 27 23:58:06 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:58:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:58:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13329 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13329 found at Tue Sep 27 23:58:06 UTC 2022 selfserv_9223 with PID 13329 started at Tue Sep 27 23:58:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #942: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 13329 at Tue Sep 27 23:58:09 UTC 2022 kill -USR1 13329 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13329 killed at Tue Sep 27 23:58:09 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:58:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:58:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13368 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13368 found at Tue Sep 27 23:58:10 UTC 2022 selfserv_9223 with PID 13368 started at Tue Sep 27 23:58:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13368 at Tue Sep 27 23:58:12 UTC 2022 kill -USR1 13368 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13368 killed at Tue Sep 27 23:58:12 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:58:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:58:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13407 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13407 found at Tue Sep 27 23:58:13 UTC 2022 selfserv_9223 with PID 13407 started at Tue Sep 27 23:58:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13407 at Tue Sep 27 23:58:16 UTC 2022 kill -USR1 13407 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13407 killed at Tue Sep 27 23:58:16 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:58:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:58:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13446 found at Tue Sep 27 23:58:16 UTC 2022 selfserv_9223 with PID 13446 started at Tue Sep 27 23:58:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13446 at Tue Sep 27 23:58:19 UTC 2022 kill -USR1 13446 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13446 killed at Tue Sep 27 23:58:19 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:58:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:58:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13489 found at Tue Sep 27 23:58:20 UTC 2022 selfserv_9223 with PID 13489 started at Tue Sep 27 23:58:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13489 at Tue Sep 27 23:58:22 UTC 2022 kill -USR1 13489 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13489 killed at Tue Sep 27 23:58:23 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:58:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:58:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13528 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13528 found at Tue Sep 27 23:58:23 UTC 2022 selfserv_9223 with PID 13528 started at Tue Sep 27 23:58:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #947: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13528 at Tue Sep 27 23:58:26 UTC 2022 kill -USR1 13528 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13528 killed at Tue Sep 27 23:58:26 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:58:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:58:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13582 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13582 found at Tue Sep 27 23:58:26 UTC 2022 selfserv_9223 with PID 13582 started at Tue Sep 27 23:58:26 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #948: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13582 at Tue Sep 27 23:58:29 UTC 2022 kill -USR1 13582 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13582 killed at Tue Sep 27 23:58:29 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:58:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:58:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13622 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13622 found at Tue Sep 27 23:58:30 UTC 2022 selfserv_9223 with PID 13622 started at Tue Sep 27 23:58:30 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #949: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 13622 at Tue Sep 27 23:58:32 UTC 2022 kill -USR1 13622 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13622 killed at Tue Sep 27 23:58:33 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:58:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:58:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13663 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13663 found at Tue Sep 27 23:58:33 UTC 2022 selfserv_9223 with PID 13663 started at Tue Sep 27 23:58:33 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #950: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13663 at Tue Sep 27 23:58:36 UTC 2022 kill -USR1 13663 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13663 killed at Tue Sep 27 23:58:36 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:58:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:58:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13703 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13703 found at Tue Sep 27 23:58:36 UTC 2022 selfserv_9223 with PID 13703 started at Tue Sep 27 23:58:36 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #951: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 13703 at Tue Sep 27 23:58:39 UTC 2022 kill -USR1 13703 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13703 killed at Tue Sep 27 23:58:39 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:58:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:58:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13743 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13743 found at Tue Sep 27 23:58:40 UTC 2022 selfserv_9223 with PID 13743 started at Tue Sep 27 23:58:40 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #952: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13743 at Tue Sep 27 23:58:42 UTC 2022 kill -USR1 13743 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13743 killed at Tue Sep 27 23:58:43 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:58:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:58:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13784 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13784 found at Tue Sep 27 23:58:43 UTC 2022 selfserv_9223 with PID 13784 started at Tue Sep 27 23:58:43 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #953: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13784 at Tue Sep 27 23:58:46 UTC 2022 kill -USR1 13784 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13784 killed at Tue Sep 27 23:58:46 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:58:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:58:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13824 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13824 found at Tue Sep 27 23:58:46 UTC 2022 selfserv_9223 with PID 13824 started at Tue Sep 27 23:58:46 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #954: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13824 at Tue Sep 27 23:58:49 UTC 2022 kill -USR1 13824 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13824 killed at Tue Sep 27 23:58:49 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:58:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:58:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13864 found at Tue Sep 27 23:58:50 UTC 2022 selfserv_9223 with PID 13864 started at Tue Sep 27 23:58:50 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #955: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13864 at Tue Sep 27 23:58:52 UTC 2022 kill -USR1 13864 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13864 killed at Tue Sep 27 23:58:53 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Tue Sep 27 23:58:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:58:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13904 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13904 found at Tue Sep 27 23:58:53 UTC 2022 selfserv_9223 with PID 13904 started at Tue Sep 27 23:58:53 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #956: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13904 at Tue Sep 27 23:58:56 UTC 2022 kill -USR1 13904 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13904 killed at Tue Sep 27 23:58:56 UTC 2022 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server -fips true -force FIPS mode enabled. ssl.sh: #957: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server -list ssl.sh: #958: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #959: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/ext_server -fips true -force FIPS mode enabled. ssl.sh: #960: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/ext_server -list ssl.sh: #961: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #962: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9223 starting at Tue Sep 27 23:58:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:58:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 13992 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13992 found at Tue Sep 27 23:58:58 UTC 2022 selfserv_9223 with PID 13992 started at Tue Sep 27 23:58:58 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #963: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #964: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #965: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #966: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #967: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #968: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #969: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #970: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #971: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #972: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #973: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #974: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #975: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #976: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #977: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #978: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #979: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #980: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #981: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #982: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #983: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #984: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #985: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #986: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #987: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #988: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #989: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #990: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #991: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #992: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #993: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #994: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #995: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #996: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #997: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #998: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #999: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1000: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1001: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1002: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1003: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1004: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1005: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1006: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1007: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1008: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1009: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1010: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1011: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1012: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1013: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 13992 at Tue Sep 27 23:59:19 UTC 2022 kill -USR1 13992 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13992 killed at Tue Sep 27 23:59:19 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Tue Sep 27 23:59:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:59:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 14543 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14543 found at Tue Sep 27 23:59:20 UTC 2022 selfserv_9223 with PID 14543 started at Tue Sep 27 23:59:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1014: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1015: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1016: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1017: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1018: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1019: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1020: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1021: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1022: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1023: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1024: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1025: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1026: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1027: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1028: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1029: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1030: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1031: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1032: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1033: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1034: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1035: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1036: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1037: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1038: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1039: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1040: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1041: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1042: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1043: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1044: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1045: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1046: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1047: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1048: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1049: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1050: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1051: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1052: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1053: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1054: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1055: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1056: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1057: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1058: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1059: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1060: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1061: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1062: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1063: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1064: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1065: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1066: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1067: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1068: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1069: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1070: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1071: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1072: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1073: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1074: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1075: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1076: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1077: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1078: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1079: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1080: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1081: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1082: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1083: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1084: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1085: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1086: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1087: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1088: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1089: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14543 at Tue Sep 27 23:59:52 UTC 2022 kill -USR1 14543 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14543 killed at Tue Sep 27 23:59:52 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9223 starting at Tue Sep 27 23:59:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:59:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15358 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15358 found at Tue Sep 27 23:59:53 UTC 2022 selfserv_9223 with PID 15358 started at Tue Sep 27 23:59:53 UTC 2022 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15358 at Tue Sep 27 23:59:54 UTC 2022 kill -USR1 15358 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15358 killed at Tue Sep 27 23:59:55 UTC 2022 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Tue Sep 27 23:59:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:59:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15424 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15424 found at Tue Sep 27 23:59:55 UTC 2022 selfserv_9223 with PID 15424 started at Tue Sep 27 23:59:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15424 at Tue Sep 27 23:59:58 UTC 2022 kill -USR1 15424 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15424 killed at Tue Sep 27 23:59:58 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Tue Sep 27 23:59:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Tue Sep 27 23:59:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15476 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15476 found at Tue Sep 27 23:59:58 UTC 2022 selfserv_9223 with PID 15476 started at Tue Sep 27 23:59:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15476 at Wed Sep 28 00:00:00 UTC 2022 kill -USR1 15476 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15476 killed at Wed Sep 28 00:00:00 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:00:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:00:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15528 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15528 found at Wed Sep 28 00:00:01 UTC 2022 selfserv_9223 with PID 15528 started at Wed Sep 28 00:00:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1092: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15528 at Wed Sep 28 00:00:04 UTC 2022 kill -USR1 15528 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15528 killed at Wed Sep 28 00:00:04 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:00:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:00:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15662 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15662 found at Wed Sep 28 00:00:04 UTC 2022 selfserv_9223 with PID 15662 started at Wed Sep 28 00:00:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1093: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 15662 at Wed Sep 28 00:00:07 UTC 2022 kill -USR1 15662 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15662 killed at Wed Sep 28 00:00:07 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:00:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:00:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15716 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15716 found at Wed Sep 28 00:00:08 UTC 2022 selfserv_9223 with PID 15716 started at Wed Sep 28 00:00:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1094: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 15716 at Wed Sep 28 00:00:10 UTC 2022 kill -USR1 15716 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15716 killed at Wed Sep 28 00:00:10 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:00:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:00:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15768 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15768 found at Wed Sep 28 00:00:10 UTC 2022 selfserv_9223 with PID 15768 started at Wed Sep 28 00:00:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1095: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15768 at Wed Sep 28 00:00:13 UTC 2022 kill -USR1 15768 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15768 killed at Wed Sep 28 00:00:13 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:00:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:00:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15820 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15820 found at Wed Sep 28 00:00:14 UTC 2022 selfserv_9223 with PID 15820 started at Wed Sep 28 00:00:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1096: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15820 at Wed Sep 28 00:00:16 UTC 2022 kill -USR1 15820 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15820 killed at Wed Sep 28 00:00:16 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:00:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:00:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15872 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15872 found at Wed Sep 28 00:00:17 UTC 2022 selfserv_9223 with PID 15872 started at Wed Sep 28 00:00:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15872 at Wed Sep 28 00:00:19 UTC 2022 kill -USR1 15872 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15872 killed at Wed Sep 28 00:00:19 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:00:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:00:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15924 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15924 found at Wed Sep 28 00:00:20 UTC 2022 selfserv_9223 with PID 15924 started at Wed Sep 28 00:00:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15924 at Wed Sep 28 00:00:22 UTC 2022 kill -USR1 15924 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15924 killed at Wed Sep 28 00:00:22 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:00:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:00:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15976 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15976 found at Wed Sep 28 00:00:23 UTC 2022 selfserv_9223 with PID 15976 started at Wed Sep 28 00:00:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1099: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 15976 at Wed Sep 28 00:00:25 UTC 2022 kill -USR1 15976 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15976 killed at Wed Sep 28 00:00:25 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:00:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:00:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16028 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16028 found at Wed Sep 28 00:00:26 UTC 2022 selfserv_9223 with PID 16028 started at Wed Sep 28 00:00:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1100: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 16028 at Wed Sep 28 00:00:28 UTC 2022 kill -USR1 16028 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16028 killed at Wed Sep 28 00:00:28 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:00:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:00:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16096 found at Wed Sep 28 00:00:28 UTC 2022 selfserv_9223 with PID 16096 started at Wed Sep 28 00:00:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16096 at Wed Sep 28 00:00:31 UTC 2022 kill -USR1 16096 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16096 killed at Wed Sep 28 00:00:31 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:00:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:00:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16148 found at Wed Sep 28 00:00:31 UTC 2022 selfserv_9223 with PID 16148 started at Wed Sep 28 00:00:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1102: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16148 at Wed Sep 28 00:00:34 UTC 2022 kill -USR1 16148 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16148 killed at Wed Sep 28 00:00:34 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:00:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:00:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16200 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16200 found at Wed Sep 28 00:00:35 UTC 2022 selfserv_9223 with PID 16200 started at Wed Sep 28 00:00:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16200 at Wed Sep 28 00:00:37 UTC 2022 kill -USR1 16200 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16200 killed at Wed Sep 28 00:00:37 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:00:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:00:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16252 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16252 found at Wed Sep 28 00:00:37 UTC 2022 selfserv_9223 with PID 16252 started at Wed Sep 28 00:00:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16252 at Wed Sep 28 00:00:40 UTC 2022 kill -USR1 16252 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16252 killed at Wed Sep 28 00:00:41 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:00:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:00:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16304 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16304 found at Wed Sep 28 00:00:41 UTC 2022 selfserv_9223 with PID 16304 started at Wed Sep 28 00:00:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1105: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 16304 at Wed Sep 28 00:00:44 UTC 2022 kill -USR1 16304 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16304 killed at Wed Sep 28 00:00:44 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:00:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:00:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16356 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16356 found at Wed Sep 28 00:00:44 UTC 2022 selfserv_9223 with PID 16356 started at Wed Sep 28 00:00:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1106: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 16356 at Wed Sep 28 00:00:47 UTC 2022 kill -USR1 16356 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16356 killed at Wed Sep 28 00:00:47 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:00:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:00:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16408 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16408 found at Wed Sep 28 00:00:47 UTC 2022 selfserv_9223 with PID 16408 started at Wed Sep 28 00:00:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16408 at Wed Sep 28 00:00:50 UTC 2022 kill -USR1 16408 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16408 killed at Wed Sep 28 00:00:50 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:00:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:00:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16460 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16460 found at Wed Sep 28 00:00:51 UTC 2022 selfserv_9223 with PID 16460 started at Wed Sep 28 00:00:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1108: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16460 at Wed Sep 28 00:00:54 UTC 2022 kill -USR1 16460 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16460 killed at Wed Sep 28 00:00:54 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:00:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:00:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16515 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16515 found at Wed Sep 28 00:00:54 UTC 2022 selfserv_9223 with PID 16515 started at Wed Sep 28 00:00:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16515 at Wed Sep 28 00:00:56 UTC 2022 kill -USR1 16515 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16515 killed at Wed Sep 28 00:00:57 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:00:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:00:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16567 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16567 found at Wed Sep 28 00:00:57 UTC 2022 selfserv_9223 with PID 16567 started at Wed Sep 28 00:00:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16567 at Wed Sep 28 00:01:00 UTC 2022 kill -USR1 16567 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16567 killed at Wed Sep 28 00:01:00 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:01:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:01:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16619 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16619 found at Wed Sep 28 00:01:01 UTC 2022 selfserv_9223 with PID 16619 started at Wed Sep 28 00:01:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1111: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 16619 at Wed Sep 28 00:01:03 UTC 2022 kill -USR1 16619 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16619 killed at Wed Sep 28 00:01:04 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:01:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:01:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16689 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16689 found at Wed Sep 28 00:01:04 UTC 2022 selfserv_9223 with PID 16689 started at Wed Sep 28 00:01:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1112: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 16689 at Wed Sep 28 00:01:06 UTC 2022 kill -USR1 16689 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16689 killed at Wed Sep 28 00:01:06 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:01:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:01:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16741 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16741 found at Wed Sep 28 00:01:07 UTC 2022 selfserv_9223 with PID 16741 started at Wed Sep 28 00:01:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16741 at Wed Sep 28 00:01:10 UTC 2022 kill -USR1 16741 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16741 killed at Wed Sep 28 00:01:10 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:01:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:01:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16793 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16793 found at Wed Sep 28 00:01:10 UTC 2022 selfserv_9223 with PID 16793 started at Wed Sep 28 00:01:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1114: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16793 at Wed Sep 28 00:01:13 UTC 2022 kill -USR1 16793 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16793 killed at Wed Sep 28 00:01:13 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:01:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:01:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16845 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16845 found at Wed Sep 28 00:01:14 UTC 2022 selfserv_9223 with PID 16845 started at Wed Sep 28 00:01:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1115: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16845 at Wed Sep 28 00:01:16 UTC 2022 kill -USR1 16845 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16845 killed at Wed Sep 28 00:01:16 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:01:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:01:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16897 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16897 found at Wed Sep 28 00:01:17 UTC 2022 selfserv_9223 with PID 16897 started at Wed Sep 28 00:01:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1116: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 16897 at Wed Sep 28 00:01:19 UTC 2022 kill -USR1 16897 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16897 killed at Wed Sep 28 00:01:19 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:01:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:01:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16950 found at Wed Sep 28 00:01:20 UTC 2022 selfserv_9223 with PID 16950 started at Wed Sep 28 00:01:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1117: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 16950 at Wed Sep 28 00:01:22 UTC 2022 kill -USR1 16950 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16950 killed at Wed Sep 28 00:01:23 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:01:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:01:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17002 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17002 found at Wed Sep 28 00:01:23 UTC 2022 selfserv_9223 with PID 17002 started at Wed Sep 28 00:01:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1118: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 17002 at Wed Sep 28 00:01:25 UTC 2022 kill -USR1 17002 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17002 killed at Wed Sep 28 00:01:25 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:01:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:01:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17054 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17054 found at Wed Sep 28 00:01:26 UTC 2022 selfserv_9223 with PID 17054 started at Wed Sep 28 00:01:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1119: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17054 at Wed Sep 28 00:01:28 UTC 2022 kill -USR1 17054 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17054 killed at Wed Sep 28 00:01:28 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:01:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:01:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17121 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17121 found at Wed Sep 28 00:01:29 UTC 2022 selfserv_9223 with PID 17121 started at Wed Sep 28 00:01:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1120: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17121 at Wed Sep 28 00:01:31 UTC 2022 kill -USR1 17121 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17121 killed at Wed Sep 28 00:01:31 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:01:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:01:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17174 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17174 found at Wed Sep 28 00:01:32 UTC 2022 selfserv_9223 with PID 17174 started at Wed Sep 28 00:01:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1121: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17174 at Wed Sep 28 00:01:34 UTC 2022 kill -USR1 17174 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17174 killed at Wed Sep 28 00:01:34 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:01:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:01:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17231 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17231 found at Wed Sep 28 00:01:35 UTC 2022 selfserv_9223 with PID 17231 started at Wed Sep 28 00:01:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1122: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17231 at Wed Sep 28 00:01:37 UTC 2022 kill -USR1 17231 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17231 killed at Wed Sep 28 00:01:37 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:01:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:01:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17283 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17283 found at Wed Sep 28 00:01:38 UTC 2022 selfserv_9223 with PID 17283 started at Wed Sep 28 00:01:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1123: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 17283 at Wed Sep 28 00:01:40 UTC 2022 kill -USR1 17283 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17283 killed at Wed Sep 28 00:01:40 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:01:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:01:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17336 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17336 found at Wed Sep 28 00:01:41 UTC 2022 selfserv_9223 with PID 17336 started at Wed Sep 28 00:01:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1124: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17336 at Wed Sep 28 00:01:43 UTC 2022 kill -USR1 17336 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17336 killed at Wed Sep 28 00:01:43 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:01:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:01:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17389 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17389 found at Wed Sep 28 00:01:44 UTC 2022 selfserv_9223 with PID 17389 started at Wed Sep 28 00:01:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1125: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17389 at Wed Sep 28 00:01:46 UTC 2022 kill -USR1 17389 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17389 killed at Wed Sep 28 00:01:47 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:01:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:01:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17441 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17441 found at Wed Sep 28 00:01:47 UTC 2022 selfserv_9223 with PID 17441 started at Wed Sep 28 00:01:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1126: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17441 at Wed Sep 28 00:01:49 UTC 2022 kill -USR1 17441 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17441 killed at Wed Sep 28 00:01:49 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:01:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:01:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17493 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17493 found at Wed Sep 28 00:01:50 UTC 2022 selfserv_9223 with PID 17493 started at Wed Sep 28 00:01:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1127: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17493 at Wed Sep 28 00:01:52 UTC 2022 kill -USR1 17493 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17493 killed at Wed Sep 28 00:01:52 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:01:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:01:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17545 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17545 found at Wed Sep 28 00:01:52 UTC 2022 selfserv_9223 with PID 17545 started at Wed Sep 28 00:01:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1128: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 17545 at Wed Sep 28 00:01:54 UTC 2022 kill -USR1 17545 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17545 killed at Wed Sep 28 00:01:55 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:01:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:01:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17597 found at Wed Sep 28 00:01:55 UTC 2022 selfserv_9223 with PID 17597 started at Wed Sep 28 00:01:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1129: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17597 at Wed Sep 28 00:01:57 UTC 2022 kill -USR1 17597 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17597 killed at Wed Sep 28 00:01:57 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:01:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:01:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17650 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17650 found at Wed Sep 28 00:01:58 UTC 2022 selfserv_9223 with PID 17650 started at Wed Sep 28 00:01:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1130: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17650 at Wed Sep 28 00:02:00 UTC 2022 kill -USR1 17650 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17650 killed at Wed Sep 28 00:02:00 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:02:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:02:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17702 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17702 found at Wed Sep 28 00:02:01 UTC 2022 selfserv_9223 with PID 17702 started at Wed Sep 28 00:02:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1131: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17702 at Wed Sep 28 00:02:03 UTC 2022 kill -USR1 17702 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17702 killed at Wed Sep 28 00:02:03 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:02:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:02:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17754 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17754 found at Wed Sep 28 00:02:04 UTC 2022 selfserv_9223 with PID 17754 started at Wed Sep 28 00:02:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1132: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 17754 at Wed Sep 28 00:02:06 UTC 2022 kill -USR1 17754 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17754 killed at Wed Sep 28 00:02:06 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:02:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:02:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17806 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17806 found at Wed Sep 28 00:02:06 UTC 2022 selfserv_9223 with PID 17806 started at Wed Sep 28 00:02:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1133: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17806 at Wed Sep 28 00:02:09 UTC 2022 kill -USR1 17806 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17806 killed at Wed Sep 28 00:02:09 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:02:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:02:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17858 found at Wed Sep 28 00:02:10 UTC 2022 selfserv_9223 with PID 17858 started at Wed Sep 28 00:02:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1134: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17858 at Wed Sep 28 00:02:12 UTC 2022 kill -USR1 17858 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17858 killed at Wed Sep 28 00:02:12 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:02:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:02:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17910 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17910 found at Wed Sep 28 00:02:13 UTC 2022 selfserv_9223 with PID 17910 started at Wed Sep 28 00:02:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1135: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 17910 at Wed Sep 28 00:02:15 UTC 2022 kill -USR1 17910 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17910 killed at Wed Sep 28 00:02:15 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:02:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:02:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17962 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17962 found at Wed Sep 28 00:02:15 UTC 2022 selfserv_9223 with PID 17962 started at Wed Sep 28 00:02:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1136: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 17962 at Wed Sep 28 00:02:18 UTC 2022 kill -USR1 17962 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17962 killed at Wed Sep 28 00:02:18 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:02:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:02:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18014 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18014 found at Wed Sep 28 00:02:18 UTC 2022 selfserv_9223 with PID 18014 started at Wed Sep 28 00:02:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1137: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18014 at Wed Sep 28 00:02:21 UTC 2022 kill -USR1 18014 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18014 killed at Wed Sep 28 00:02:21 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:02:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:02:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18066 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18066 found at Wed Sep 28 00:02:21 UTC 2022 selfserv_9223 with PID 18066 started at Wed Sep 28 00:02:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1138: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18066 at Wed Sep 28 00:02:23 UTC 2022 kill -USR1 18066 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18066 killed at Wed Sep 28 00:02:24 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:02:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:02:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18118 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18118 found at Wed Sep 28 00:02:24 UTC 2022 selfserv_9223 with PID 18118 started at Wed Sep 28 00:02:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1139: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18118 at Wed Sep 28 00:02:26 UTC 2022 kill -USR1 18118 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18118 killed at Wed Sep 28 00:02:27 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:02:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:02:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18185 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18185 found at Wed Sep 28 00:02:27 UTC 2022 selfserv_9223 with PID 18185 started at Wed Sep 28 00:02:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1140: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18185 at Wed Sep 28 00:02:29 UTC 2022 kill -USR1 18185 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18185 killed at Wed Sep 28 00:02:29 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:02:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:02:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18237 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18237 found at Wed Sep 28 00:02:30 UTC 2022 selfserv_9223 with PID 18237 started at Wed Sep 28 00:02:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1141: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18237 at Wed Sep 28 00:02:32 UTC 2022 kill -USR1 18237 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18237 killed at Wed Sep 28 00:02:32 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:02:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:02:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18289 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18289 found at Wed Sep 28 00:02:33 UTC 2022 selfserv_9223 with PID 18289 started at Wed Sep 28 00:02:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1142: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18289 at Wed Sep 28 00:02:35 UTC 2022 kill -USR1 18289 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18289 killed at Wed Sep 28 00:02:35 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:02:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:02:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18341 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18341 found at Wed Sep 28 00:02:35 UTC 2022 selfserv_9223 with PID 18341 started at Wed Sep 28 00:02:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1143: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18341 at Wed Sep 28 00:02:38 UTC 2022 kill -USR1 18341 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18341 killed at Wed Sep 28 00:02:38 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:02:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:02:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18393 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18393 found at Wed Sep 28 00:02:39 UTC 2022 selfserv_9223 with PID 18393 started at Wed Sep 28 00:02:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1144: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18393 at Wed Sep 28 00:02:41 UTC 2022 kill -USR1 18393 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18393 killed at Wed Sep 28 00:02:41 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:02:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:02:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18445 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18445 found at Wed Sep 28 00:02:42 UTC 2022 selfserv_9223 with PID 18445 started at Wed Sep 28 00:02:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1145: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18445 at Wed Sep 28 00:02:45 UTC 2022 kill -USR1 18445 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18445 killed at Wed Sep 28 00:02:45 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:02:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:02:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18497 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18497 found at Wed Sep 28 00:02:45 UTC 2022 selfserv_9223 with PID 18497 started at Wed Sep 28 00:02:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1146: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18497 at Wed Sep 28 00:02:48 UTC 2022 kill -USR1 18497 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18497 killed at Wed Sep 28 00:02:49 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:02:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:02:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18549 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18549 found at Wed Sep 28 00:02:49 UTC 2022 selfserv_9223 with PID 18549 started at Wed Sep 28 00:02:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1147: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18549 at Wed Sep 28 00:02:52 UTC 2022 kill -USR1 18549 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18549 killed at Wed Sep 28 00:02:52 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 00:02:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:02:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18607 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18607 found at Wed Sep 28 00:02:52 UTC 2022 selfserv_9223 with PID 18607 started at Wed Sep 28 00:02:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1148: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18607 at Wed Sep 28 00:02:54 UTC 2022 kill -USR1 18607 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18607 killed at Wed Sep 28 00:02:55 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Wed Sep 28 00:02:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:02:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18665 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18665 found at Wed Sep 28 00:02:55 UTC 2022 selfserv_9223 with PID 18665 started at Wed Sep 28 00:02:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1149: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18665 at Wed Sep 28 00:02:57 UTC 2022 kill -USR1 18665 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18665 killed at Wed Sep 28 00:02:58 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Wed Sep 28 00:02:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:02:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18727 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18727 found at Wed Sep 28 00:02:58 UTC 2022 selfserv_9223 with PID 18727 started at Wed Sep 28 00:02:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1150: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18727 at Wed Sep 28 00:03:00 UTC 2022 kill -USR1 18727 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18727 killed at Wed Sep 28 00:03:00 UTC 2022 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 00:03:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:03:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18786 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18786 found at Wed Sep 28 00:03:01 UTC 2022 selfserv_9223 with PID 18786 started at Wed Sep 28 00:03:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1151: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18786 at Wed Sep 28 00:03:03 UTC 2022 kill -USR1 18786 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18786 killed at Wed Sep 28 00:03:03 UTC 2022 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9223 starting at Wed Sep 28 00:03:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:03:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18844 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18844 found at Wed Sep 28 00:03:03 UTC 2022 selfserv_9223 with PID 18844 started at Wed Sep 28 00:03:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1152: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18844 at Wed Sep 28 00:03:05 UTC 2022 kill -USR1 18844 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18844 killed at Wed Sep 28 00:03:05 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 00:03:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:03:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18902 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18902 found at Wed Sep 28 00:03:06 UTC 2022 selfserv_9223 with PID 18902 started at Wed Sep 28 00:03:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1153: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18902 at Wed Sep 28 00:03:08 UTC 2022 kill -USR1 18902 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18902 killed at Wed Sep 28 00:03:08 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Wed Sep 28 00:03:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:03:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18960 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18960 found at Wed Sep 28 00:03:09 UTC 2022 selfserv_9223 with PID 18960 started at Wed Sep 28 00:03:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1154: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 18960 at Wed Sep 28 00:03:11 UTC 2022 kill -USR1 18960 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18960 killed at Wed Sep 28 00:03:11 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9223 starting at Wed Sep 28 00:03:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:03:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19018 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19018 found at Wed Sep 28 00:03:12 UTC 2022 selfserv_9223 with PID 19018 started at Wed Sep 28 00:03:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1155: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 19018 at Wed Sep 28 00:03:14 UTC 2022 kill -USR1 19018 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19018 killed at Wed Sep 28 00:03:14 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9223 starting at Wed Sep 28 00:03:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:03:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19076 found at Wed Sep 28 00:03:14 UTC 2022 selfserv_9223 with PID 19076 started at Wed Sep 28 00:03:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1156: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 19076 at Wed Sep 28 00:03:17 UTC 2022 kill -USR1 19076 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19076 killed at Wed Sep 28 00:03:17 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Wed Sep 28 00:03:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:03:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19134 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19134 found at Wed Sep 28 00:03:17 UTC 2022 selfserv_9223 with PID 19134 started at Wed Sep 28 00:03:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1157: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 19134 at Wed Sep 28 00:03:19 UTC 2022 kill -USR1 19134 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19134 killed at Wed Sep 28 00:03:19 UTC 2022 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9223 starting at Wed Sep 28 00:03:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:03:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19176 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19176 found at Wed Sep 28 00:03:20 UTC 2022 selfserv_9223 with PID 19176 started at Wed Sep 28 00:03:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1090: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19176 at Wed Sep 28 00:03:22 UTC 2022 kill -USR1 19176 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19176 killed at Wed Sep 28 00:03:22 UTC 2022 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9223 starting at Wed Sep 28 00:03:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:03:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19218 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19218 found at Wed Sep 28 00:03:22 UTC 2022 selfserv_9223 with PID 19218 started at Wed Sep 28 00:03:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1091: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9223 with PID 19218 at Wed Sep 28 00:03:24 UTC 2022 kill -USR1 19218 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19218 killed at Wed Sep 28 00:03:25 UTC 2022 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9223 starting at Wed Sep 28 00:03:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:03:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19260 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19260 found at Wed Sep 28 00:03:25 UTC 2022 selfserv_9223 with PID 19260 started at Wed Sep 28 00:03:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1092: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 19260 at Wed Sep 28 00:03:27 UTC 2022 kill -USR1 19260 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19260 killed at Wed Sep 28 00:03:27 UTC 2022 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9223 starting at Wed Sep 28 00:03:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:03:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19317 found at Wed Sep 28 00:03:28 UTC 2022 selfserv_9223 with PID 19317 started at Wed Sep 28 00:03:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1093: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 19317 at Wed Sep 28 00:03:29 UTC 2022 kill -USR1 19317 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19317 killed at Wed Sep 28 00:03:30 UTC 2022 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9223 starting at Wed Sep 28 00:03:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:03:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19360 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19360 found at Wed Sep 28 00:03:30 UTC 2022 selfserv_9223 with PID 19360 started at Wed Sep 28 00:03:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1094: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 19360 at Wed Sep 28 00:03:32 UTC 2022 kill -USR1 19360 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19360 killed at Wed Sep 28 00:03:32 UTC 2022 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9223 starting at Wed Sep 28 00:03:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:03:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19402 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19402 found at Wed Sep 28 00:03:32 UTC 2022 selfserv_9223 with PID 19402 started at Wed Sep 28 00:03:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1095: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 19402 at Wed Sep 28 00:03:34 UTC 2022 kill -USR1 19402 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19402 killed at Wed Sep 28 00:03:34 UTC 2022 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9223 starting at Wed Sep 28 00:03:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:03:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19444 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19444 found at Wed Sep 28 00:03:35 UTC 2022 selfserv_9223 with PID 19444 started at Wed Sep 28 00:03:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1096: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 19444 at Wed Sep 28 00:03:37 UTC 2022 kill -USR1 19444 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19444 killed at Wed Sep 28 00:03:37 UTC 2022 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9223 starting at Wed Sep 28 00:03:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:03:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19486 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19486 found at Wed Sep 28 00:03:37 UTC 2022 selfserv_9223 with PID 19486 started at Wed Sep 28 00:03:37 UTC 2022 strsclnt -q -p 9223 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Sep 28 00:03:37 UTC 2022 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Sep 28 00:04:28 UTC 2022 ssl.sh: #1097: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9223 with PID 19486 at Wed Sep 28 00:04:28 UTC 2022 kill -USR1 19486 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19486 killed at Wed Sep 28 00:04:28 UTC 2022 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Wed Sep 28 00:04:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:04:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19553 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19553 found at Wed Sep 28 00:04:29 UTC 2022 selfserv_9223 with PID 19553 started at Wed Sep 28 00:04:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19553 at Wed Sep 28 00:04:31 UTC 2022 kill -USR1 19553 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19553 killed at Wed Sep 28 00:04:31 UTC 2022 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:04:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:04:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19595 found at Wed Sep 28 00:04:31 UTC 2022 selfserv_9223 with PID 19595 started at Wed Sep 28 00:04:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1099: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19595 at Wed Sep 28 00:04:33 UTC 2022 kill -USR1 19595 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19595 killed at Wed Sep 28 00:04:33 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:04:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:04:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19634 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19634 found at Wed Sep 28 00:04:33 UTC 2022 selfserv_9223 with PID 19634 started at Wed Sep 28 00:04:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1100: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 19634 at Wed Sep 28 00:04:34 UTC 2022 kill -USR1 19634 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19634 killed at Wed Sep 28 00:04:35 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:04:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:04:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19673 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19673 found at Wed Sep 28 00:04:35 UTC 2022 selfserv_9223 with PID 19673 started at Wed Sep 28 00:04:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19673 at Wed Sep 28 00:04:36 UTC 2022 kill -USR1 19673 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19673 killed at Wed Sep 28 00:04:37 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:04:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:04:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19712 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19712 found at Wed Sep 28 00:04:37 UTC 2022 selfserv_9223 with PID 19712 started at Wed Sep 28 00:04:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1102: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 19712 at Wed Sep 28 00:04:38 UTC 2022 kill -USR1 19712 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19712 killed at Wed Sep 28 00:04:38 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:04:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:04:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19751 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19751 found at Wed Sep 28 00:04:39 UTC 2022 selfserv_9223 with PID 19751 started at Wed Sep 28 00:04:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19751 at Wed Sep 28 00:04:40 UTC 2022 kill -USR1 19751 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19751 killed at Wed Sep 28 00:04:40 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:04:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:04:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19790 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19790 found at Wed Sep 28 00:04:41 UTC 2022 selfserv_9223 with PID 19790 started at Wed Sep 28 00:04:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19790 at Wed Sep 28 00:04:42 UTC 2022 kill -USR1 19790 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19790 killed at Wed Sep 28 00:04:42 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:04:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:04:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19829 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19829 found at Wed Sep 28 00:04:42 UTC 2022 selfserv_9223 with PID 19829 started at Wed Sep 28 00:04:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1105: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19829 at Wed Sep 28 00:04:44 UTC 2022 kill -USR1 19829 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19829 killed at Wed Sep 28 00:04:44 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:04:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:04:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19868 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19868 found at Wed Sep 28 00:04:44 UTC 2022 selfserv_9223 with PID 19868 started at Wed Sep 28 00:04:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1106: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19868 at Wed Sep 28 00:04:46 UTC 2022 kill -USR1 19868 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19868 killed at Wed Sep 28 00:04:46 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:04:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:04:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19907 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19907 found at Wed Sep 28 00:04:46 UTC 2022 selfserv_9223 with PID 19907 started at Wed Sep 28 00:04:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19907 at Wed Sep 28 00:04:48 UTC 2022 kill -USR1 19907 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19907 killed at Wed Sep 28 00:04:48 UTC 2022 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:04:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:04:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19946 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19946 found at Wed Sep 28 00:04:48 UTC 2022 selfserv_9223 with PID 19946 started at Wed Sep 28 00:04:48 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1108: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 19946 at Wed Sep 28 00:04:49 UTC 2022 kill -USR1 19946 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19946 killed at Wed Sep 28 00:04:50 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:04:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:04:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19987 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19987 found at Wed Sep 28 00:04:50 UTC 2022 selfserv_9223 with PID 19987 started at Wed Sep 28 00:04:50 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1109: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 19987 at Wed Sep 28 00:04:51 UTC 2022 kill -USR1 19987 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19987 killed at Wed Sep 28 00:04:51 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:04:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:04:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20027 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20027 found at Wed Sep 28 00:04:52 UTC 2022 selfserv_9223 with PID 20027 started at Wed Sep 28 00:04:52 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1110: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20027 at Wed Sep 28 00:04:53 UTC 2022 kill -USR1 20027 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20027 killed at Wed Sep 28 00:04:53 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:04:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:04:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20067 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20067 found at Wed Sep 28 00:04:54 UTC 2022 selfserv_9223 with PID 20067 started at Wed Sep 28 00:04:54 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1111: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 20067 at Wed Sep 28 00:04:55 UTC 2022 kill -USR1 20067 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20067 killed at Wed Sep 28 00:04:55 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:04:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:04:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20107 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20107 found at Wed Sep 28 00:04:56 UTC 2022 selfserv_9223 with PID 20107 started at Wed Sep 28 00:04:56 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1112: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20107 at Wed Sep 28 00:04:57 UTC 2022 kill -USR1 20107 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20107 killed at Wed Sep 28 00:04:57 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:04:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:04:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20147 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20147 found at Wed Sep 28 00:04:57 UTC 2022 selfserv_9223 with PID 20147 started at Wed Sep 28 00:04:57 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1113: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20147 at Wed Sep 28 00:04:59 UTC 2022 kill -USR1 20147 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20147 killed at Wed Sep 28 00:04:59 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:04:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:04:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20187 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20187 found at Wed Sep 28 00:04:59 UTC 2022 selfserv_9223 with PID 20187 started at Wed Sep 28 00:04:59 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1114: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20187 at Wed Sep 28 00:05:01 UTC 2022 kill -USR1 20187 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20187 killed at Wed Sep 28 00:05:01 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:05:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:05:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20227 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20227 found at Wed Sep 28 00:05:01 UTC 2022 selfserv_9223 with PID 20227 started at Wed Sep 28 00:05:01 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1115: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20227 at Wed Sep 28 00:05:02 UTC 2022 kill -USR1 20227 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20227 killed at Wed Sep 28 00:05:03 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:05:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:05:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20267 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20267 found at Wed Sep 28 00:05:03 UTC 2022 selfserv_9223 with PID 20267 started at Wed Sep 28 00:05:03 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1116: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20267 at Wed Sep 28 00:05:04 UTC 2022 kill -USR1 20267 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20267 killed at Wed Sep 28 00:05:04 UTC 2022 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9223 starting at Wed Sep 28 00:05:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:05:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 20307 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20307 found at Wed Sep 28 00:05:05 UTC 2022 selfserv_9223 with PID 20307 started at Wed Sep 28 00:05:05 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1117: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1118: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1119: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1120: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1121: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1122: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1123: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1124: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1125: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1126: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1127: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1128: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1129: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1130: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1131: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1132: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1133: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1134: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1135: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1136: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1137: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1138: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1139: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1140: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1141: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1142: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1143: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1144: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1145: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1146: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1147: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1148: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1149: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1150: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1151: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1152: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1153: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1154: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1155: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1156: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1157: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1158: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1159: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1160: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1161: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1162: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1163: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1164: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1165: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1166: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1167: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 20307 at Wed Sep 28 00:05:28 UTC 2022 kill -USR1 20307 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20307 killed at Wed Sep 28 00:05:28 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Wed Sep 28 00:05:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:05:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 20873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20873 found at Wed Sep 28 00:05:29 UTC 2022 selfserv_9223 with PID 20873 started at Wed Sep 28 00:05:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1168: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1169: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1170: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1171: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1172: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1173: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1174: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1175: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1176: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1177: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1178: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1179: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1180: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1181: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1182: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1183: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1184: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1185: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1186: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1187: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1188: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1189: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1190: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1191: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1192: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1193: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1194: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1195: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1196: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1197: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1198: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1199: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1200: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1201: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1202: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1203: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1204: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1205: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1206: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1207: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1208: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1209: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1210: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1211: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1212: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1213: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1214: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1215: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1216: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1217: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1218: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1219: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1220: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1221: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1222: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1223: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1224: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1225: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1226: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1227: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1228: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1229: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1230: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1231: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1232: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1233: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1234: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1235: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1236: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1237: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1238: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1239: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1240: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1241: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1242: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1243: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 20873 at Wed Sep 28 00:06:03 UTC 2022 kill -USR1 20873 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20873 killed at Wed Sep 28 00:06:03 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:06:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:06:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21684 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21684 found at Wed Sep 28 00:06:04 UTC 2022 selfserv_9223 with PID 21684 started at Wed Sep 28 00:06:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21684 at Wed Sep 28 00:06:10 UTC 2022 kill -USR1 21684 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21684 killed at Wed Sep 28 00:06:10 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:06:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:06:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21736 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21736 found at Wed Sep 28 00:06:10 UTC 2022 selfserv_9223 with PID 21736 started at Wed Sep 28 00:06:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21736 at Wed Sep 28 00:06:16 UTC 2022 kill -USR1 21736 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21736 killed at Wed Sep 28 00:06:16 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:06:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:06:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21788 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21788 found at Wed Sep 28 00:06:17 UTC 2022 selfserv_9223 with PID 21788 started at Wed Sep 28 00:06:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1246: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21788 at Wed Sep 28 00:06:24 UTC 2022 kill -USR1 21788 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21788 killed at Wed Sep 28 00:06:25 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:06:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:06:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21840 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21840 found at Wed Sep 28 00:06:25 UTC 2022 selfserv_9223 with PID 21840 started at Wed Sep 28 00:06:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1247: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 21840 at Wed Sep 28 00:06:31 UTC 2022 kill -USR1 21840 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21840 killed at Wed Sep 28 00:06:31 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:06:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:06:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21907 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21907 found at Wed Sep 28 00:06:32 UTC 2022 selfserv_9223 with PID 21907 started at Wed Sep 28 00:06:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1248: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 21907 at Wed Sep 28 00:06:37 UTC 2022 kill -USR1 21907 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21907 killed at Wed Sep 28 00:06:38 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:06:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:06:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21959 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21959 found at Wed Sep 28 00:06:38 UTC 2022 selfserv_9223 with PID 21959 started at Wed Sep 28 00:06:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 21959 at Wed Sep 28 00:06:46 UTC 2022 kill -USR1 21959 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21959 killed at Wed Sep 28 00:06:46 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:06:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:06:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22011 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22011 found at Wed Sep 28 00:06:46 UTC 2022 selfserv_9223 with PID 22011 started at Wed Sep 28 00:06:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22011 at Wed Sep 28 00:06:52 UTC 2022 kill -USR1 22011 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22011 killed at Wed Sep 28 00:06:52 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:06:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:06:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22064 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22064 found at Wed Sep 28 00:06:53 UTC 2022 selfserv_9223 with PID 22064 started at Wed Sep 28 00:06:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22064 at Wed Sep 28 00:06:59 UTC 2022 kill -USR1 22064 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22064 killed at Wed Sep 28 00:06:59 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:06:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:06:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22116 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22116 found at Wed Sep 28 00:06:59 UTC 2022 selfserv_9223 with PID 22116 started at Wed Sep 28 00:06:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22116 at Wed Sep 28 00:07:07 UTC 2022 kill -USR1 22116 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22116 killed at Wed Sep 28 00:07:07 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:07:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:07:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22169 found at Wed Sep 28 00:07:07 UTC 2022 selfserv_9223 with PID 22169 started at Wed Sep 28 00:07:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1253: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22169 at Wed Sep 28 00:07:13 UTC 2022 kill -USR1 22169 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22169 killed at Wed Sep 28 00:07:14 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:07:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:07:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22221 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22221 found at Wed Sep 28 00:07:14 UTC 2022 selfserv_9223 with PID 22221 started at Wed Sep 28 00:07:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1254: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22221 at Wed Sep 28 00:07:20 UTC 2022 kill -USR1 22221 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22221 killed at Wed Sep 28 00:07:20 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:07:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:07:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22273 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22273 found at Wed Sep 28 00:07:21 UTC 2022 selfserv_9223 with PID 22273 started at Wed Sep 28 00:07:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1255: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22273 at Wed Sep 28 00:07:28 UTC 2022 kill -USR1 22273 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22273 killed at Wed Sep 28 00:07:28 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:07:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:07:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22340 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22340 found at Wed Sep 28 00:07:29 UTC 2022 selfserv_9223 with PID 22340 started at Wed Sep 28 00:07:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22340 at Wed Sep 28 00:07:35 UTC 2022 kill -USR1 22340 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22340 killed at Wed Sep 28 00:07:35 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:07:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:07:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22392 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22392 found at Wed Sep 28 00:07:35 UTC 2022 selfserv_9223 with PID 22392 started at Wed Sep 28 00:07:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22392 at Wed Sep 28 00:07:41 UTC 2022 kill -USR1 22392 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22392 killed at Wed Sep 28 00:07:42 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:07:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:07:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22444 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22444 found at Wed Sep 28 00:07:42 UTC 2022 selfserv_9223 with PID 22444 started at Wed Sep 28 00:07:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22444 at Wed Sep 28 00:07:50 UTC 2022 kill -USR1 22444 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22444 killed at Wed Sep 28 00:07:50 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:07:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:07:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22496 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22496 found at Wed Sep 28 00:07:50 UTC 2022 selfserv_9223 with PID 22496 started at Wed Sep 28 00:07:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1259: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22496 at Wed Sep 28 00:07:56 UTC 2022 kill -USR1 22496 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22496 killed at Wed Sep 28 00:07:56 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:07:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:07:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22548 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22548 found at Wed Sep 28 00:07:57 UTC 2022 selfserv_9223 with PID 22548 started at Wed Sep 28 00:07:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1260: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22548 at Wed Sep 28 00:08:03 UTC 2022 kill -USR1 22548 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22548 killed at Wed Sep 28 00:08:03 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:08:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:08:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22601 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22601 found at Wed Sep 28 00:08:03 UTC 2022 selfserv_9223 with PID 22601 started at Wed Sep 28 00:08:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1261: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22601 at Wed Sep 28 00:08:11 UTC 2022 kill -USR1 22601 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22601 killed at Wed Sep 28 00:08:11 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:08:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:08:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22656 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22656 found at Wed Sep 28 00:08:12 UTC 2022 selfserv_9223 with PID 22656 started at Wed Sep 28 00:08:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1262: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22656 at Wed Sep 28 00:08:18 UTC 2022 kill -USR1 22656 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22656 killed at Wed Sep 28 00:08:18 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:08:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:08:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22708 found at Wed Sep 28 00:08:18 UTC 2022 selfserv_9223 with PID 22708 started at Wed Sep 28 00:08:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1263: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22708 at Wed Sep 28 00:08:24 UTC 2022 kill -USR1 22708 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22708 killed at Wed Sep 28 00:08:24 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:08:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:08:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22760 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22760 found at Wed Sep 28 00:08:25 UTC 2022 selfserv_9223 with PID 22760 started at Wed Sep 28 00:08:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1264: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22760 at Wed Sep 28 00:08:33 UTC 2022 kill -USR1 22760 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22760 killed at Wed Sep 28 00:08:33 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:08:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:08:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22827 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22827 found at Wed Sep 28 00:08:33 UTC 2022 selfserv_9223 with PID 22827 started at Wed Sep 28 00:08:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1265: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22827 at Wed Sep 28 00:08:39 UTC 2022 kill -USR1 22827 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22827 killed at Wed Sep 28 00:08:39 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:08:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:08:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22879 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22879 found at Wed Sep 28 00:08:40 UTC 2022 selfserv_9223 with PID 22879 started at Wed Sep 28 00:08:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1266: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22879 at Wed Sep 28 00:08:46 UTC 2022 kill -USR1 22879 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22879 killed at Wed Sep 28 00:08:46 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:08:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:08:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22931 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22931 found at Wed Sep 28 00:08:46 UTC 2022 selfserv_9223 with PID 22931 started at Wed Sep 28 00:08:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1267: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22931 at Wed Sep 28 00:08:54 UTC 2022 kill -USR1 22931 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22931 killed at Wed Sep 28 00:08:54 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:08:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:08:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22983 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22983 found at Wed Sep 28 00:08:55 UTC 2022 selfserv_9223 with PID 22983 started at Wed Sep 28 00:08:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1268: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 22983 at Wed Sep 28 00:09:01 UTC 2022 kill -USR1 22983 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22983 killed at Wed Sep 28 00:09:01 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:09:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:09:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23035 found at Wed Sep 28 00:09:01 UTC 2022 selfserv_9223 with PID 23035 started at Wed Sep 28 00:09:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1269: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23035 at Wed Sep 28 00:09:08 UTC 2022 kill -USR1 23035 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23035 killed at Wed Sep 28 00:09:08 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:09:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:09:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23087 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23087 found at Wed Sep 28 00:09:08 UTC 2022 selfserv_9223 with PID 23087 started at Wed Sep 28 00:09:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1270: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23087 at Wed Sep 28 00:09:16 UTC 2022 kill -USR1 23087 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23087 killed at Wed Sep 28 00:09:16 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:09:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:09:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23139 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23139 found at Wed Sep 28 00:09:16 UTC 2022 selfserv_9223 with PID 23139 started at Wed Sep 28 00:09:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1271: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23139 at Wed Sep 28 00:09:23 UTC 2022 kill -USR1 23139 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23139 killed at Wed Sep 28 00:09:23 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:09:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:09:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23191 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23191 found at Wed Sep 28 00:09:23 UTC 2022 selfserv_9223 with PID 23191 started at Wed Sep 28 00:09:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1272: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23191 at Wed Sep 28 00:09:29 UTC 2022 kill -USR1 23191 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23191 killed at Wed Sep 28 00:09:29 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:09:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:09:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23258 found at Wed Sep 28 00:09:30 UTC 2022 selfserv_9223 with PID 23258 started at Wed Sep 28 00:09:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1273: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23258 at Wed Sep 28 00:09:38 UTC 2022 kill -USR1 23258 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23258 killed at Wed Sep 28 00:09:38 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:09:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:09:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23310 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23310 found at Wed Sep 28 00:09:38 UTC 2022 selfserv_9223 with PID 23310 started at Wed Sep 28 00:09:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1274: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23310 at Wed Sep 28 00:09:46 UTC 2022 kill -USR1 23310 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23310 killed at Wed Sep 28 00:09:46 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:09:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:09:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23363 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23363 found at Wed Sep 28 00:09:46 UTC 2022 selfserv_9223 with PID 23363 started at Wed Sep 28 00:09:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1275: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23363 at Wed Sep 28 00:09:54 UTC 2022 kill -USR1 23363 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23363 killed at Wed Sep 28 00:09:54 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:09:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:09:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23415 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23415 found at Wed Sep 28 00:09:54 UTC 2022 selfserv_9223 with PID 23415 started at Wed Sep 28 00:09:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1276: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23415 at Wed Sep 28 00:10:00 UTC 2022 kill -USR1 23415 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23415 killed at Wed Sep 28 00:10:00 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:10:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:10:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23467 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23467 found at Wed Sep 28 00:10:01 UTC 2022 selfserv_9223 with PID 23467 started at Wed Sep 28 00:10:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1277: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23467 at Wed Sep 28 00:10:07 UTC 2022 kill -USR1 23467 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23467 killed at Wed Sep 28 00:10:07 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:10:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:10:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23519 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23519 found at Wed Sep 28 00:10:07 UTC 2022 selfserv_9223 with PID 23519 started at Wed Sep 28 00:10:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1278: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23519 at Wed Sep 28 00:10:15 UTC 2022 kill -USR1 23519 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23519 killed at Wed Sep 28 00:10:15 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:10:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:10:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23571 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23571 found at Wed Sep 28 00:10:15 UTC 2022 selfserv_9223 with PID 23571 started at Wed Sep 28 00:10:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1279: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23571 at Wed Sep 28 00:10:23 UTC 2022 kill -USR1 23571 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23571 killed at Wed Sep 28 00:10:23 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:10:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:10:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23623 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23623 found at Wed Sep 28 00:10:24 UTC 2022 selfserv_9223 with PID 23623 started at Wed Sep 28 00:10:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1280: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23623 at Wed Sep 28 00:10:29 UTC 2022 kill -USR1 23623 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23623 killed at Wed Sep 28 00:10:30 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:10:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:10:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23690 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23690 found at Wed Sep 28 00:10:30 UTC 2022 selfserv_9223 with PID 23690 started at Wed Sep 28 00:10:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1281: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23690 at Wed Sep 28 00:10:37 UTC 2022 kill -USR1 23690 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23690 killed at Wed Sep 28 00:10:38 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:10:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:10:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23742 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23742 found at Wed Sep 28 00:10:38 UTC 2022 selfserv_9223 with PID 23742 started at Wed Sep 28 00:10:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1282: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23742 at Wed Sep 28 00:10:44 UTC 2022 kill -USR1 23742 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23742 killed at Wed Sep 28 00:10:44 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:10:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:10:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23795 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23795 found at Wed Sep 28 00:10:44 UTC 2022 selfserv_9223 with PID 23795 started at Wed Sep 28 00:10:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1283: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23795 at Wed Sep 28 00:10:52 UTC 2022 kill -USR1 23795 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23795 killed at Wed Sep 28 00:10:52 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:10:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:10:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23847 found at Wed Sep 28 00:10:52 UTC 2022 selfserv_9223 with PID 23847 started at Wed Sep 28 00:10:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1284: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23847 at Wed Sep 28 00:10:58 UTC 2022 kill -USR1 23847 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23847 killed at Wed Sep 28 00:10:58 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:10:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:10:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23899 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23899 found at Wed Sep 28 00:10:59 UTC 2022 selfserv_9223 with PID 23899 started at Wed Sep 28 00:10:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1285: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 23899 at Wed Sep 28 00:11:06 UTC 2022 kill -USR1 23899 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23899 killed at Wed Sep 28 00:11:06 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:11:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:11:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23951 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23951 found at Wed Sep 28 00:11:07 UTC 2022 selfserv_9223 with PID 23951 started at Wed Sep 28 00:11:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1286: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23951 at Wed Sep 28 00:11:13 UTC 2022 kill -USR1 23951 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23951 killed at Wed Sep 28 00:11:13 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:11:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:11:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24003 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24003 found at Wed Sep 28 00:11:13 UTC 2022 selfserv_9223 with PID 24003 started at Wed Sep 28 00:11:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1287: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24003 at Wed Sep 28 00:11:21 UTC 2022 kill -USR1 24003 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24003 killed at Wed Sep 28 00:11:21 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:11:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:11:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24055 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24055 found at Wed Sep 28 00:11:21 UTC 2022 selfserv_9223 with PID 24055 started at Wed Sep 28 00:11:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1288: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24055 at Wed Sep 28 00:11:27 UTC 2022 kill -USR1 24055 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24055 killed at Wed Sep 28 00:11:27 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:11:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:11:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24122 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24122 found at Wed Sep 28 00:11:28 UTC 2022 selfserv_9223 with PID 24122 started at Wed Sep 28 00:11:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1289: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24122 at Wed Sep 28 00:11:35 UTC 2022 kill -USR1 24122 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24122 killed at Wed Sep 28 00:11:35 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:11:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:11:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24174 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24174 found at Wed Sep 28 00:11:36 UTC 2022 selfserv_9223 with PID 24174 started at Wed Sep 28 00:11:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1290: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24174 at Wed Sep 28 00:11:42 UTC 2022 kill -USR1 24174 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24174 killed at Wed Sep 28 00:11:42 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:11:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:11:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24226 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24226 found at Wed Sep 28 00:11:42 UTC 2022 selfserv_9223 with PID 24226 started at Wed Sep 28 00:11:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1291: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24226 at Wed Sep 28 00:11:50 UTC 2022 kill -USR1 24226 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24226 killed at Wed Sep 28 00:11:50 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:11:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:11:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24278 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24278 found at Wed Sep 28 00:11:50 UTC 2022 selfserv_9223 with PID 24278 started at Wed Sep 28 00:11:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1292: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24278 at Wed Sep 28 00:11:56 UTC 2022 kill -USR1 24278 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24278 killed at Wed Sep 28 00:11:57 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:11:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:11:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24330 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24330 found at Wed Sep 28 00:11:57 UTC 2022 selfserv_9223 with PID 24330 started at Wed Sep 28 00:11:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1293: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24330 at Wed Sep 28 00:12:04 UTC 2022 kill -USR1 24330 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24330 killed at Wed Sep 28 00:12:05 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:12:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:12:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24382 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24382 found at Wed Sep 28 00:12:05 UTC 2022 selfserv_9223 with PID 24382 started at Wed Sep 28 00:12:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1294: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24382 at Wed Sep 28 00:12:11 UTC 2022 kill -USR1 24382 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24382 killed at Wed Sep 28 00:12:11 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:12:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:12:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24434 found at Wed Sep 28 00:12:12 UTC 2022 selfserv_9223 with PID 24434 started at Wed Sep 28 00:12:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1295: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24434 at Wed Sep 28 00:12:19 UTC 2022 kill -USR1 24434 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24434 killed at Wed Sep 28 00:12:19 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:12:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:12:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24487 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24487 found at Wed Sep 28 00:12:20 UTC 2022 selfserv_9223 with PID 24487 started at Wed Sep 28 00:12:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1296: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24487 at Wed Sep 28 00:12:26 UTC 2022 kill -USR1 24487 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24487 killed at Wed Sep 28 00:12:26 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:12:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:12:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24554 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24554 found at Wed Sep 28 00:12:26 UTC 2022 selfserv_9223 with PID 24554 started at Wed Sep 28 00:12:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1297: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24554 at Wed Sep 28 00:12:34 UTC 2022 kill -USR1 24554 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24554 killed at Wed Sep 28 00:12:34 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:12:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:12:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24606 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24606 found at Wed Sep 28 00:12:35 UTC 2022 selfserv_9223 with PID 24606 started at Wed Sep 28 00:12:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1298: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24606 at Wed Sep 28 00:12:41 UTC 2022 kill -USR1 24606 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24606 killed at Wed Sep 28 00:12:41 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:12:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:12:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24658 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24658 found at Wed Sep 28 00:12:41 UTC 2022 selfserv_9223 with PID 24658 started at Wed Sep 28 00:12:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1299: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24658 at Wed Sep 28 00:12:49 UTC 2022 kill -USR1 24658 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24658 killed at Wed Sep 28 00:12:49 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:12:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:12:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24710 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24710 found at Wed Sep 28 00:12:49 UTC 2022 selfserv_9223 with PID 24710 started at Wed Sep 28 00:12:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1300: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24710 at Wed Sep 28 00:12:57 UTC 2022 kill -USR1 24710 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24710 killed at Wed Sep 28 00:12:57 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:12:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:12:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24762 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24762 found at Wed Sep 28 00:12:57 UTC 2022 selfserv_9223 with PID 24762 started at Wed Sep 28 00:12:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1301: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24762 at Wed Sep 28 00:13:05 UTC 2022 kill -USR1 24762 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24762 killed at Wed Sep 28 00:13:05 UTC 2022 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Wed Sep 28 00:13:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:13:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24844 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24844 found at Wed Sep 28 00:13:05 UTC 2022 selfserv_9223 with PID 24844 started at Wed Sep 28 00:13:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24844 at Wed Sep 28 00:13:09 UTC 2022 kill -USR1 24844 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24844 killed at Wed Sep 28 00:13:10 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:13:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:13:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24886 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24886 found at Wed Sep 28 00:13:10 UTC 2022 selfserv_9223 with PID 24886 started at Wed Sep 28 00:13:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24886 at Wed Sep 28 00:13:13 UTC 2022 kill -USR1 24886 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24886 killed at Wed Sep 28 00:13:13 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:13:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:13:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24925 found at Wed Sep 28 00:13:13 UTC 2022 selfserv_9223 with PID 24925 started at Wed Sep 28 00:13:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1246: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 24925 at Wed Sep 28 00:13:16 UTC 2022 kill -USR1 24925 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24925 killed at Wed Sep 28 00:13:16 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:13:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:13:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24964 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24964 found at Wed Sep 28 00:13:17 UTC 2022 selfserv_9223 with PID 24964 started at Wed Sep 28 00:13:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1247: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 24964 at Wed Sep 28 00:13:19 UTC 2022 kill -USR1 24964 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24964 killed at Wed Sep 28 00:13:20 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:13:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:13:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25003 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25003 found at Wed Sep 28 00:13:20 UTC 2022 selfserv_9223 with PID 25003 started at Wed Sep 28 00:13:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1248: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 25003 at Wed Sep 28 00:13:23 UTC 2022 kill -USR1 25003 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25003 killed at Wed Sep 28 00:13:23 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:13:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:13:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25042 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25042 found at Wed Sep 28 00:13:23 UTC 2022 selfserv_9223 with PID 25042 started at Wed Sep 28 00:13:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25042 at Wed Sep 28 00:13:26 UTC 2022 kill -USR1 25042 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25042 killed at Wed Sep 28 00:13:26 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:13:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:13:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25096 found at Wed Sep 28 00:13:27 UTC 2022 selfserv_9223 with PID 25096 started at Wed Sep 28 00:13:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25096 at Wed Sep 28 00:13:29 UTC 2022 kill -USR1 25096 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25096 killed at Wed Sep 28 00:13:30 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:13:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:13:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25135 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25135 found at Wed Sep 28 00:13:30 UTC 2022 selfserv_9223 with PID 25135 started at Wed Sep 28 00:13:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25135 at Wed Sep 28 00:13:33 UTC 2022 kill -USR1 25135 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25135 killed at Wed Sep 28 00:13:33 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:13:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:13:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25174 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25174 found at Wed Sep 28 00:13:33 UTC 2022 selfserv_9223 with PID 25174 started at Wed Sep 28 00:13:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25174 at Wed Sep 28 00:13:36 UTC 2022 kill -USR1 25174 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25174 killed at Wed Sep 28 00:13:36 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:13:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:13:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25213 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25213 found at Wed Sep 28 00:13:37 UTC 2022 selfserv_9223 with PID 25213 started at Wed Sep 28 00:13:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1253: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25213 at Wed Sep 28 00:13:40 UTC 2022 kill -USR1 25213 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25213 killed at Wed Sep 28 00:13:40 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:13:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:13:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25252 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25252 found at Wed Sep 28 00:13:40 UTC 2022 selfserv_9223 with PID 25252 started at Wed Sep 28 00:13:40 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1254: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25252 at Wed Sep 28 00:13:43 UTC 2022 kill -USR1 25252 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25252 killed at Wed Sep 28 00:13:43 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:13:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:13:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25292 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25292 found at Wed Sep 28 00:13:44 UTC 2022 selfserv_9223 with PID 25292 started at Wed Sep 28 00:13:44 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1255: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25292 at Wed Sep 28 00:13:46 UTC 2022 kill -USR1 25292 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25292 killed at Wed Sep 28 00:13:46 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:13:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:13:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25332 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25332 found at Wed Sep 28 00:13:47 UTC 2022 selfserv_9223 with PID 25332 started at Wed Sep 28 00:13:47 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1256: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25332 at Wed Sep 28 00:13:50 UTC 2022 kill -USR1 25332 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25332 killed at Wed Sep 28 00:13:50 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:13:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:13:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25372 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25372 found at Wed Sep 28 00:13:50 UTC 2022 selfserv_9223 with PID 25372 started at Wed Sep 28 00:13:50 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1257: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25372 at Wed Sep 28 00:13:53 UTC 2022 kill -USR1 25372 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25372 killed at Wed Sep 28 00:13:53 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:13:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:13:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25412 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25412 found at Wed Sep 28 00:13:54 UTC 2022 selfserv_9223 with PID 25412 started at Wed Sep 28 00:13:54 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1258: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25412 at Wed Sep 28 00:13:56 UTC 2022 kill -USR1 25412 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25412 killed at Wed Sep 28 00:13:57 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:13:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:13:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25452 found at Wed Sep 28 00:13:57 UTC 2022 selfserv_9223 with PID 25452 started at Wed Sep 28 00:13:57 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1259: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25452 at Wed Sep 28 00:14:00 UTC 2022 kill -USR1 25452 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25452 killed at Wed Sep 28 00:14:00 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:14:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:14:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25492 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25492 found at Wed Sep 28 00:14:00 UTC 2022 selfserv_9223 with PID 25492 started at Wed Sep 28 00:14:00 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1260: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25492 at Wed Sep 28 00:14:03 UTC 2022 kill -USR1 25492 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25492 killed at Wed Sep 28 00:14:03 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:14:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:14:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25532 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25532 found at Wed Sep 28 00:14:04 UTC 2022 selfserv_9223 with PID 25532 started at Wed Sep 28 00:14:04 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1261: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25532 at Wed Sep 28 00:14:06 UTC 2022 kill -USR1 25532 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25532 killed at Wed Sep 28 00:14:07 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:14:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:14:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25572 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25572 found at Wed Sep 28 00:14:07 UTC 2022 selfserv_9223 with PID 25572 started at Wed Sep 28 00:14:07 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1262: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 25572 at Wed Sep 28 00:14:10 UTC 2022 kill -USR1 25572 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25572 killed at Wed Sep 28 00:14:10 UTC 2022 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server -fips false -force FIPS mode disabled. ssl.sh: #1263: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/server -list ssl.sh: #1264: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1265: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1266: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/ext_server -list ssl.sh: #1267: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1268: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/client -fips true -force FIPS mode enabled. ssl.sh: #1269: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/client -list ssl.sh: #1270: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1271: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1272: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/ext_client -list ssl.sh: #1273: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1274: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9223 starting at Wed Sep 28 00:14:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:14:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 25694 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25694 found at Wed Sep 28 00:14:13 UTC 2022 selfserv_9223 with PID 25694 started at Wed Sep 28 00:14:13 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1275: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1276: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1277: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1278: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1279: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1280: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1281: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1282: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1283: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1284: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1285: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1286: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1287: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1288: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1289: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1290: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1291: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1292: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1293: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1294: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1295: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1296: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1297: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1298: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1299: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1300: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1301: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1302: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1303: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1304: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1305: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1306: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1307: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1308: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1309: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1310: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1311: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1312: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1313: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1314: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1315: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1316: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1317: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1318: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1319: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1320: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1321: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1322: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1323: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1324: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1325: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 25694 at Wed Sep 28 00:14:57 UTC 2022 kill -USR1 25694 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25694 killed at Wed Sep 28 00:14:58 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Wed Sep 28 00:14:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:14:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 26259 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26259 found at Wed Sep 28 00:14:58 UTC 2022 selfserv_9223 with PID 26259 started at Wed Sep 28 00:14:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1326: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1327: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1328: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1329: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1330: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1331: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1332: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1333: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1334: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1335: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1336: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1337: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1338: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1339: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1340: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1341: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1342: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1343: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1344: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1345: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1346: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1347: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1348: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1349: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1350: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1351: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1352: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1353: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1354: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1355: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1356: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1357: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1358: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1359: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1360: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1361: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1362: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1363: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1364: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1365: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1366: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1367: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1368: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1369: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1370: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1371: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1372: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1373: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1374: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 26259 at Wed Sep 28 00:16:11 UTC 2022 kill -USR1 26259 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26259 killed at Wed Sep 28 00:16:11 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9223 starting at Wed Sep 28 00:16:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:16:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27198 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27198 found at Wed Sep 28 00:16:11 UTC 2022 selfserv_9223 with PID 27198 started at Wed Sep 28 00:16:11 UTC 2022 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1402: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1403: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27198 at Wed Sep 28 00:16:14 UTC 2022 kill -USR1 27198 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27198 killed at Wed Sep 28 00:16:14 UTC 2022 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:16:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:16:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27276 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27276 found at Wed Sep 28 00:16:15 UTC 2022 selfserv_9223 with PID 27276 started at Wed Sep 28 00:16:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1402: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27276 at Wed Sep 28 00:16:19 UTC 2022 kill -USR1 27276 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27276 killed at Wed Sep 28 00:16:19 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:16:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:16:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27328 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27328 found at Wed Sep 28 00:16:19 UTC 2022 selfserv_9223 with PID 27328 started at Wed Sep 28 00:16:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1403: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27328 at Wed Sep 28 00:16:44 UTC 2022 kill -USR1 27328 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27328 killed at Wed Sep 28 00:16:44 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:16:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:16:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27396 found at Wed Sep 28 00:16:44 UTC 2022 selfserv_9223 with PID 27396 started at Wed Sep 28 00:16:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1404: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27396 at Wed Sep 28 00:16:48 UTC 2022 kill -USR1 27396 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27396 killed at Wed Sep 28 00:16:48 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:16:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:16:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27460 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27460 found at Wed Sep 28 00:16:48 UTC 2022 selfserv_9223 with PID 27460 started at Wed Sep 28 00:16:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1405: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27460 at Wed Sep 28 00:16:53 UTC 2022 kill -USR1 27460 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27460 killed at Wed Sep 28 00:16:53 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:16:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:16:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27512 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27512 found at Wed Sep 28 00:16:53 UTC 2022 selfserv_9223 with PID 27512 started at Wed Sep 28 00:16:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1406: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27512 at Wed Sep 28 00:17:17 UTC 2022 kill -USR1 27512 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27512 killed at Wed Sep 28 00:17:17 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:17:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:17:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27564 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27564 found at Wed Sep 28 00:17:18 UTC 2022 selfserv_9223 with PID 27564 started at Wed Sep 28 00:17:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1407: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27564 at Wed Sep 28 00:17:20 UTC 2022 kill -USR1 27564 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27564 killed at Wed Sep 28 00:17:21 UTC 2022 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:17:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:17:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27633 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27633 found at Wed Sep 28 00:17:21 UTC 2022 selfserv_9223 with PID 27633 started at Wed Sep 28 00:17:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1408: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27633 at Wed Sep 28 00:17:25 UTC 2022 kill -USR1 27633 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27633 killed at Wed Sep 28 00:17:26 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:17:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:17:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27700 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27700 found at Wed Sep 28 00:17:26 UTC 2022 selfserv_9223 with PID 27700 started at Wed Sep 28 00:17:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1409: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27700 at Wed Sep 28 00:17:50 UTC 2022 kill -USR1 27700 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27700 killed at Wed Sep 28 00:17:51 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:17:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:17:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27752 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27752 found at Wed Sep 28 00:17:51 UTC 2022 selfserv_9223 with PID 27752 started at Wed Sep 28 00:17:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27752 at Wed Sep 28 00:17:55 UTC 2022 kill -USR1 27752 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27752 killed at Wed Sep 28 00:17:55 UTC 2022 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:17:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:17:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27816 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27816 found at Wed Sep 28 00:17:55 UTC 2022 selfserv_9223 with PID 27816 started at Wed Sep 28 00:17:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1411: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27816 at Wed Sep 28 00:18:00 UTC 2022 kill -USR1 27816 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27816 killed at Wed Sep 28 00:18:00 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:18:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:18:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27868 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27868 found at Wed Sep 28 00:18:00 UTC 2022 selfserv_9223 with PID 27868 started at Wed Sep 28 00:18:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27868 at Wed Sep 28 00:18:25 UTC 2022 kill -USR1 27868 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27868 killed at Wed Sep 28 00:18:25 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:18:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:18:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27920 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27920 found at Wed Sep 28 00:18:25 UTC 2022 selfserv_9223 with PID 27920 started at Wed Sep 28 00:18:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 27920 at Wed Sep 28 00:18:29 UTC 2022 kill -USR1 27920 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27920 killed at Wed Sep 28 00:18:29 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:18:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:18:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27999 found at Wed Sep 28 00:18:29 UTC 2022 selfserv_9223 with PID 27999 started at Wed Sep 28 00:18:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1414: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27999 at Wed Sep 28 00:18:34 UTC 2022 kill -USR1 27999 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27999 killed at Wed Sep 28 00:18:34 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:18:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:18:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28051 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28051 found at Wed Sep 28 00:18:34 UTC 2022 selfserv_9223 with PID 28051 started at Wed Sep 28 00:18:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1415: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28051 at Wed Sep 28 00:18:58 UTC 2022 kill -USR1 28051 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28051 killed at Wed Sep 28 00:18:58 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:18:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:18:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28103 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28103 found at Wed Sep 28 00:18:58 UTC 2022 selfserv_9223 with PID 28103 started at Wed Sep 28 00:18:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28103 at Wed Sep 28 00:19:01 UTC 2022 kill -USR1 28103 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28103 killed at Wed Sep 28 00:19:02 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:19:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:19:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28159 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28159 found at Wed Sep 28 00:19:02 UTC 2022 selfserv_9223 with PID 28159 started at Wed Sep 28 00:19:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28159 at Wed Sep 28 00:19:05 UTC 2022 kill -USR1 28159 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28159 killed at Wed Sep 28 00:19:05 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:19:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:19:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28215 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28215 found at Wed Sep 28 00:19:05 UTC 2022 selfserv_9223 with PID 28215 started at Wed Sep 28 00:19:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1418: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28215 at Wed Sep 28 00:19:10 UTC 2022 kill -USR1 28215 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28215 killed at Wed Sep 28 00:19:10 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:19:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:19:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28271 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28271 found at Wed Sep 28 00:19:10 UTC 2022 selfserv_9223 with PID 28271 started at Wed Sep 28 00:19:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28271 at Wed Sep 28 00:19:15 UTC 2022 kill -USR1 28271 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28271 killed at Wed Sep 28 00:19:15 UTC 2022 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:19:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:19:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28331 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28331 found at Wed Sep 28 00:19:15 UTC 2022 selfserv_9223 with PID 28331 started at Wed Sep 28 00:19:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1420: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28331 at Wed Sep 28 00:19:40 UTC 2022 kill -USR1 28331 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28331 killed at Wed Sep 28 00:19:40 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:19:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:19:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28398 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28398 found at Wed Sep 28 00:19:40 UTC 2022 selfserv_9223 with PID 28398 started at Wed Sep 28 00:19:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1421: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28398 at Wed Sep 28 00:19:43 UTC 2022 kill -USR1 28398 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28398 killed at Wed Sep 28 00:19:43 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:19:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:19:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28458 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28458 found at Wed Sep 28 00:19:44 UTC 2022 selfserv_9223 with PID 28458 started at Wed Sep 28 00:19:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1422: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28458 at Wed Sep 28 00:20:07 UTC 2022 kill -USR1 28458 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28458 killed at Wed Sep 28 00:20:07 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:20:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:20:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28511 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28511 found at Wed Sep 28 00:20:08 UTC 2022 selfserv_9223 with PID 28511 started at Wed Sep 28 00:20:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28511 at Wed Sep 28 00:20:11 UTC 2022 kill -USR1 28511 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28511 killed at Wed Sep 28 00:20:11 UTC 2022 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:20:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:20:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28572 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28572 found at Wed Sep 28 00:20:12 UTC 2022 selfserv_9223 with PID 28572 started at Wed Sep 28 00:20:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1424: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28572 at Wed Sep 28 00:20:36 UTC 2022 kill -USR1 28572 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28572 killed at Wed Sep 28 00:20:36 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:20:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:20:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28639 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28639 found at Wed Sep 28 00:20:37 UTC 2022 selfserv_9223 with PID 28639 started at Wed Sep 28 00:20:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28639 at Wed Sep 28 00:20:39 UTC 2022 kill -USR1 28639 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28639 killed at Wed Sep 28 00:20:40 UTC 2022 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:20:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:20:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28699 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28699 found at Wed Sep 28 00:20:40 UTC 2022 selfserv_9223 with PID 28699 started at Wed Sep 28 00:20:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1426: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28699 at Wed Sep 28 00:21:04 UTC 2022 kill -USR1 28699 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28699 killed at Wed Sep 28 00:21:05 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:21:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:21:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28751 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28751 found at Wed Sep 28 00:21:05 UTC 2022 selfserv_9223 with PID 28751 started at Wed Sep 28 00:21:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1427: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28751 at Wed Sep 28 00:21:08 UTC 2022 kill -USR1 28751 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28751 killed at Wed Sep 28 00:21:08 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:21:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:21:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28811 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28811 found at Wed Sep 28 00:21:08 UTC 2022 selfserv_9223 with PID 28811 started at Wed Sep 28 00:21:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1428: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28811 at Wed Sep 28 00:21:32 UTC 2022 kill -USR1 28811 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28811 killed at Wed Sep 28 00:21:32 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:21:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:21:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28878 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28878 found at Wed Sep 28 00:21:32 UTC 2022 selfserv_9223 with PID 28878 started at Wed Sep 28 00:21:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1429: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28878 at Wed Sep 28 00:21:36 UTC 2022 kill -USR1 28878 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28878 killed at Wed Sep 28 00:21:36 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:21:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:21:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28930 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28930 found at Wed Sep 28 00:21:36 UTC 2022 selfserv_9223 with PID 28930 started at Wed Sep 28 00:21:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1430: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28930 at Wed Sep 28 00:21:41 UTC 2022 kill -USR1 28930 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28930 killed at Wed Sep 28 00:21:41 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:21:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:21:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28982 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28982 found at Wed Sep 28 00:21:41 UTC 2022 selfserv_9223 with PID 28982 started at Wed Sep 28 00:21:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1431: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 28982 at Wed Sep 28 00:21:46 UTC 2022 kill -USR1 28982 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28982 killed at Wed Sep 28 00:21:46 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 00:21:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:21:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29040 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29040 found at Wed Sep 28 00:21:46 UTC 2022 selfserv_9223 with PID 29040 started at Wed Sep 28 00:21:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1432: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29040 at Wed Sep 28 00:21:49 UTC 2022 kill -USR1 29040 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29040 killed at Wed Sep 28 00:21:49 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Wed Sep 28 00:21:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:21:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29098 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29098 found at Wed Sep 28 00:21:50 UTC 2022 selfserv_9223 with PID 29098 started at Wed Sep 28 00:21:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1433: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29098 at Wed Sep 28 00:21:53 UTC 2022 kill -USR1 29098 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29098 killed at Wed Sep 28 00:21:53 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Wed Sep 28 00:21:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:21:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29156 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29156 found at Wed Sep 28 00:21:53 UTC 2022 selfserv_9223 with PID 29156 started at Wed Sep 28 00:21:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1434: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29156 at Wed Sep 28 00:21:55 UTC 2022 kill -USR1 29156 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29156 killed at Wed Sep 28 00:21:55 UTC 2022 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 00:21:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:21:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29214 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29214 found at Wed Sep 28 00:21:56 UTC 2022 selfserv_9223 with PID 29214 started at Wed Sep 28 00:21:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1435: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29214 at Wed Sep 28 00:21:58 UTC 2022 kill -USR1 29214 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29214 killed at Wed Sep 28 00:21:59 UTC 2022 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9223 starting at Wed Sep 28 00:21:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:21:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29272 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29272 found at Wed Sep 28 00:21:59 UTC 2022 selfserv_9223 with PID 29272 started at Wed Sep 28 00:21:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1436: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29272 at Wed Sep 28 00:22:01 UTC 2022 kill -USR1 29272 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29272 killed at Wed Sep 28 00:22:02 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 00:22:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:22:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29330 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29330 found at Wed Sep 28 00:22:02 UTC 2022 selfserv_9223 with PID 29330 started at Wed Sep 28 00:22:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1437: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29330 at Wed Sep 28 00:22:05 UTC 2022 kill -USR1 29330 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29330 killed at Wed Sep 28 00:22:05 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Wed Sep 28 00:22:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:22:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29388 found at Wed Sep 28 00:22:05 UTC 2022 selfserv_9223 with PID 29388 started at Wed Sep 28 00:22:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1438: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29388 at Wed Sep 28 00:22:08 UTC 2022 kill -USR1 29388 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29388 killed at Wed Sep 28 00:22:09 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9223 starting at Wed Sep 28 00:22:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:22:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29446 found at Wed Sep 28 00:22:09 UTC 2022 selfserv_9223 with PID 29446 started at Wed Sep 28 00:22:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1439: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29446 at Wed Sep 28 00:22:12 UTC 2022 kill -USR1 29446 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29446 killed at Wed Sep 28 00:22:12 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9223 starting at Wed Sep 28 00:22:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:22:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29504 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29504 found at Wed Sep 28 00:22:12 UTC 2022 selfserv_9223 with PID 29504 started at Wed Sep 28 00:22:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1440: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29504 at Wed Sep 28 00:22:15 UTC 2022 kill -USR1 29504 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29504 killed at Wed Sep 28 00:22:15 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Wed Sep 28 00:22:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:22:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29562 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29562 found at Wed Sep 28 00:22:15 UTC 2022 selfserv_9223 with PID 29562 started at Wed Sep 28 00:22:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1441: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29562 at Wed Sep 28 00:22:17 UTC 2022 kill -USR1 29562 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29562 killed at Wed Sep 28 00:22:17 UTC 2022 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9223 starting at Wed Sep 28 00:22:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:22:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29604 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29604 found at Wed Sep 28 00:22:18 UTC 2022 selfserv_9223 with PID 29604 started at Wed Sep 28 00:22:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1402: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29604 at Wed Sep 28 00:22:20 UTC 2022 kill -USR1 29604 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29604 killed at Wed Sep 28 00:22:21 UTC 2022 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9223 starting at Wed Sep 28 00:22:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:22:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29646 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29646 found at Wed Sep 28 00:22:21 UTC 2022 selfserv_9223 with PID 29646 started at Wed Sep 28 00:22:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1403: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9223 with PID 29646 at Wed Sep 28 00:22:24 UTC 2022 kill -USR1 29646 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29646 killed at Wed Sep 28 00:22:24 UTC 2022 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9223 starting at Wed Sep 28 00:22:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:22:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29688 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29688 found at Wed Sep 28 00:22:24 UTC 2022 selfserv_9223 with PID 29688 started at Wed Sep 28 00:22:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1404: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 29688 at Wed Sep 28 00:22:27 UTC 2022 kill -USR1 29688 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29688 killed at Wed Sep 28 00:22:27 UTC 2022 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9223 starting at Wed Sep 28 00:22:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:22:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29745 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29745 found at Wed Sep 28 00:22:27 UTC 2022 selfserv_9223 with PID 29745 started at Wed Sep 28 00:22:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1405: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 29745 at Wed Sep 28 00:22:30 UTC 2022 kill -USR1 29745 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29745 killed at Wed Sep 28 00:22:30 UTC 2022 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9223 starting at Wed Sep 28 00:22:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:22:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29787 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29787 found at Wed Sep 28 00:22:30 UTC 2022 selfserv_9223 with PID 29787 started at Wed Sep 28 00:22:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1406: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 29787 at Wed Sep 28 00:22:33 UTC 2022 kill -USR1 29787 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29787 killed at Wed Sep 28 00:22:33 UTC 2022 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9223 starting at Wed Sep 28 00:22:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:22:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29829 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29829 found at Wed Sep 28 00:22:33 UTC 2022 selfserv_9223 with PID 29829 started at Wed Sep 28 00:22:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1407: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 29829 at Wed Sep 28 00:22:36 UTC 2022 kill -USR1 29829 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29829 killed at Wed Sep 28 00:22:36 UTC 2022 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9223 starting at Wed Sep 28 00:22:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:22:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29871 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29871 found at Wed Sep 28 00:22:36 UTC 2022 selfserv_9223 with PID 29871 started at Wed Sep 28 00:22:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1408: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 29871 at Wed Sep 28 00:22:39 UTC 2022 kill -USR1 29871 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29871 killed at Wed Sep 28 00:22:39 UTC 2022 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9223 starting at Wed Sep 28 00:22:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:22:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29913 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29913 found at Wed Sep 28 00:22:39 UTC 2022 selfserv_9223 with PID 29913 started at Wed Sep 28 00:22:39 UTC 2022 strsclnt -q -p 9223 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Sep 28 00:22:39 UTC 2022 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Sep 28 00:23:32 UTC 2022 ssl.sh: #1409: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9223 with PID 29913 at Wed Sep 28 00:23:32 UTC 2022 kill -USR1 29913 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29913 killed at Wed Sep 28 00:23:32 UTC 2022 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Wed Sep 28 00:23:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:23:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29979 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29979 found at Wed Sep 28 00:23:32 UTC 2022 selfserv_9223 with PID 29979 started at Wed Sep 28 00:23:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 29979 at Wed Sep 28 00:23:35 UTC 2022 kill -USR1 29979 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29979 killed at Wed Sep 28 00:23:35 UTC 2022 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:23:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:23:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30021 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30021 found at Wed Sep 28 00:23:35 UTC 2022 selfserv_9223 with PID 30021 started at Wed Sep 28 00:23:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1411: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30021 at Wed Sep 28 00:23:37 UTC 2022 kill -USR1 30021 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30021 killed at Wed Sep 28 00:23:37 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:23:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:23:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30060 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30060 found at Wed Sep 28 00:23:38 UTC 2022 selfserv_9223 with PID 30060 started at Wed Sep 28 00:23:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 30060 at Wed Sep 28 00:23:39 UTC 2022 kill -USR1 30060 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30060 killed at Wed Sep 28 00:23:39 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:23:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:23:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30099 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30099 found at Wed Sep 28 00:23:40 UTC 2022 selfserv_9223 with PID 30099 started at Wed Sep 28 00:23:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30099 at Wed Sep 28 00:23:41 UTC 2022 kill -USR1 30099 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30099 killed at Wed Sep 28 00:23:42 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:23:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:23:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 00:23:42 UTC 2022 selfserv_9223 with PID 30138 started at Wed Sep 28 00:23:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1414: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 30138 at Wed Sep 28 00:23:43 UTC 2022 kill -USR1 30138 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30138 killed at Wed Sep 28 00:23:43 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:23:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:23:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30177 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30177 found at Wed Sep 28 00:23:44 UTC 2022 selfserv_9223 with PID 30177 started at Wed Sep 28 00:23:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1415: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30177 at Wed Sep 28 00:23:46 UTC 2022 kill -USR1 30177 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30177 killed at Wed Sep 28 00:23:46 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:23:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:23:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30216 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30216 found at Wed Sep 28 00:23:46 UTC 2022 selfserv_9223 with PID 30216 started at Wed Sep 28 00:23:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30216 at Wed Sep 28 00:23:48 UTC 2022 kill -USR1 30216 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30216 killed at Wed Sep 28 00:23:48 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:23:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:23:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30255 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30255 found at Wed Sep 28 00:23:49 UTC 2022 selfserv_9223 with PID 30255 started at Wed Sep 28 00:23:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30255 at Wed Sep 28 00:23:50 UTC 2022 kill -USR1 30255 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30255 killed at Wed Sep 28 00:23:51 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:23:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:23:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30294 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30294 found at Wed Sep 28 00:23:51 UTC 2022 selfserv_9223 with PID 30294 started at Wed Sep 28 00:23:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1418: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30294 at Wed Sep 28 00:23:53 UTC 2022 kill -USR1 30294 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30294 killed at Wed Sep 28 00:23:53 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:23:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:23:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30333 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30333 found at Wed Sep 28 00:23:53 UTC 2022 selfserv_9223 with PID 30333 started at Wed Sep 28 00:23:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30333 at Wed Sep 28 00:23:55 UTC 2022 kill -USR1 30333 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30333 killed at Wed Sep 28 00:23:55 UTC 2022 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:23:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:23:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30372 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30372 found at Wed Sep 28 00:23:56 UTC 2022 selfserv_9223 with PID 30372 started at Wed Sep 28 00:23:56 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1420: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30372 at Wed Sep 28 00:23:58 UTC 2022 kill -USR1 30372 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30372 killed at Wed Sep 28 00:23:58 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:23:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:23:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30413 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30413 found at Wed Sep 28 00:23:58 UTC 2022 selfserv_9223 with PID 30413 started at Wed Sep 28 00:23:58 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1421: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 30413 at Wed Sep 28 00:23:59 UTC 2022 kill -USR1 30413 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30413 killed at Wed Sep 28 00:24:00 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:24:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:24:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30454 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30454 found at Wed Sep 28 00:24:00 UTC 2022 selfserv_9223 with PID 30454 started at Wed Sep 28 00:24:00 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1422: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30454 at Wed Sep 28 00:24:02 UTC 2022 kill -USR1 30454 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30454 killed at Wed Sep 28 00:24:02 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:24:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:24:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30494 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30494 found at Wed Sep 28 00:24:02 UTC 2022 selfserv_9223 with PID 30494 started at Wed Sep 28 00:24:02 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1423: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 30494 at Wed Sep 28 00:24:04 UTC 2022 kill -USR1 30494 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30494 killed at Wed Sep 28 00:24:04 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:24:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:24:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30534 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30534 found at Wed Sep 28 00:24:04 UTC 2022 selfserv_9223 with PID 30534 started at Wed Sep 28 00:24:04 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1424: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30534 at Wed Sep 28 00:24:06 UTC 2022 kill -USR1 30534 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30534 killed at Wed Sep 28 00:24:06 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:24:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:24:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30574 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30574 found at Wed Sep 28 00:24:07 UTC 2022 selfserv_9223 with PID 30574 started at Wed Sep 28 00:24:07 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1425: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30574 at Wed Sep 28 00:24:08 UTC 2022 kill -USR1 30574 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30574 killed at Wed Sep 28 00:24:09 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:24:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:24:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30614 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30614 found at Wed Sep 28 00:24:09 UTC 2022 selfserv_9223 with PID 30614 started at Wed Sep 28 00:24:09 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1426: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30614 at Wed Sep 28 00:24:11 UTC 2022 kill -USR1 30614 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30614 killed at Wed Sep 28 00:24:11 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:24:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:24:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30654 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30654 found at Wed Sep 28 00:24:11 UTC 2022 selfserv_9223 with PID 30654 started at Wed Sep 28 00:24:11 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1427: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30654 at Wed Sep 28 00:24:13 UTC 2022 kill -USR1 30654 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30654 killed at Wed Sep 28 00:24:13 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:24:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:24:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30695 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30695 found at Wed Sep 28 00:24:14 UTC 2022 selfserv_9223 with PID 30695 started at Wed Sep 28 00:24:14 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1428: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 30695 at Wed Sep 28 00:24:16 UTC 2022 kill -USR1 30695 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30695 killed at Wed Sep 28 00:24:16 UTC 2022 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9223 starting at Wed Sep 28 00:24:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:24:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 30735 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30735 found at Wed Sep 28 00:24:16 UTC 2022 selfserv_9223 with PID 30735 started at Wed Sep 28 00:24:16 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1429: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1430: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1431: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1432: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1433: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1434: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1435: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 30735 at Wed Sep 28 00:24:58 UTC 2022 kill -USR1 30735 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30735 killed at Wed Sep 28 00:24:58 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Wed Sep 28 00:24:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:24:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 31303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31303 found at Wed Sep 28 00:24:59 UTC 2022 selfserv_9223 with PID 31303 started at Wed Sep 28 00:24:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1500: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1501: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1502: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1503: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1504: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1505: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1506: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1507: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1508: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1509: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1510: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1511: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1512: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1513: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1514: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1515: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1516: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1517: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1518: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1519: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1520: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1521: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1522: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1523: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1524: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1525: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1526: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1527: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1528: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 31303 at Wed Sep 28 00:26:05 UTC 2022 kill -USR1 31303 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 31303 killed at Wed Sep 28 00:26:05 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:26:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:26:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32143 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32143 found at Wed Sep 28 00:26:06 UTC 2022 selfserv_9223 with PID 32143 started at Wed Sep 28 00:26:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1556: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 32143 at Wed Sep 28 00:26:17 UTC 2022 kill -USR1 32143 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32143 killed at Wed Sep 28 00:26:17 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:26:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:26:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32195 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32195 found at Wed Sep 28 00:26:18 UTC 2022 selfserv_9223 with PID 32195 started at Wed Sep 28 00:26:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1557: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 32195 at Wed Sep 28 00:26:45 UTC 2022 kill -USR1 32195 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32195 killed at Wed Sep 28 00:26:45 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:26:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:26:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32262 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32262 found at Wed Sep 28 00:26:45 UTC 2022 selfserv_9223 with PID 32262 started at Wed Sep 28 00:26:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1558: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 32262 at Wed Sep 28 00:26:53 UTC 2022 kill -USR1 32262 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32262 killed at Wed Sep 28 00:26:53 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:26:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:26:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32326 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32326 found at Wed Sep 28 00:26:54 UTC 2022 selfserv_9223 with PID 32326 started at Wed Sep 28 00:26:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1559: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 32326 at Wed Sep 28 00:27:05 UTC 2022 kill -USR1 32326 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32326 killed at Wed Sep 28 00:27:05 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:27:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:27:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32378 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32378 found at Wed Sep 28 00:27:06 UTC 2022 selfserv_9223 with PID 32378 started at Wed Sep 28 00:27:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1560: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 32378 at Wed Sep 28 00:27:31 UTC 2022 kill -USR1 32378 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32378 killed at Wed Sep 28 00:27:31 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:27:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:27:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32445 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32445 found at Wed Sep 28 00:27:32 UTC 2022 selfserv_9223 with PID 32445 started at Wed Sep 28 00:27:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 32445 at Wed Sep 28 00:27:39 UTC 2022 kill -USR1 32445 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32445 killed at Wed Sep 28 00:27:40 UTC 2022 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:27:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:27:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32509 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32509 found at Wed Sep 28 00:27:40 UTC 2022 selfserv_9223 with PID 32509 started at Wed Sep 28 00:27:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1562: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 32509 at Wed Sep 28 00:27:52 UTC 2022 kill -USR1 32509 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32509 killed at Wed Sep 28 00:27:52 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:27:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:27:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32561 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32561 found at Wed Sep 28 00:27:52 UTC 2022 selfserv_9223 with PID 32561 started at Wed Sep 28 00:27:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1563: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 32561 at Wed Sep 28 00:28:18 UTC 2022 kill -USR1 32561 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32561 killed at Wed Sep 28 00:28:18 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:28:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:28:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32613 found at Wed Sep 28 00:28:18 UTC 2022 selfserv_9223 with PID 32613 started at Wed Sep 28 00:28:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 32613 at Wed Sep 28 00:28:26 UTC 2022 kill -USR1 32613 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32613 killed at Wed Sep 28 00:28:26 UTC 2022 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:28:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:28:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32679 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32679 found at Wed Sep 28 00:28:27 UTC 2022 selfserv_9223 with PID 32679 started at Wed Sep 28 00:28:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1565: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 32679 at Wed Sep 28 00:28:38 UTC 2022 kill -USR1 32679 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32679 killed at Wed Sep 28 00:28:38 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:28:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:28:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32746 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32746 found at Wed Sep 28 00:28:39 UTC 2022 selfserv_9223 with PID 32746 started at Wed Sep 28 00:28:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1566: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 32746 at Wed Sep 28 00:29:04 UTC 2022 kill -USR1 32746 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32746 killed at Wed Sep 28 00:29:04 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:29:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:29:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32798 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32798 found at Wed Sep 28 00:29:05 UTC 2022 selfserv_9223 with PID 32798 started at Wed Sep 28 00:29:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1567: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 32798 at Wed Sep 28 00:29:13 UTC 2022 kill -USR1 32798 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32798 killed at Wed Sep 28 00:29:13 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:29:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:29:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32862 found at Wed Sep 28 00:29:13 UTC 2022 selfserv_9223 with PID 32862 started at Wed Sep 28 00:29:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1568: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 32862 at Wed Sep 28 00:29:25 UTC 2022 kill -USR1 32862 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32862 killed at Wed Sep 28 00:29:25 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:29:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:29:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32914 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32914 found at Wed Sep 28 00:29:26 UTC 2022 selfserv_9223 with PID 32914 started at Wed Sep 28 00:29:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1569: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 32914 at Wed Sep 28 00:29:49 UTC 2022 kill -USR1 32914 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32914 killed at Wed Sep 28 00:29:49 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:29:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:29:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32981 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32981 found at Wed Sep 28 00:29:50 UTC 2022 selfserv_9223 with PID 32981 started at Wed Sep 28 00:29:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 32981 at Wed Sep 28 00:29:58 UTC 2022 kill -USR1 32981 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32981 killed at Wed Sep 28 00:29:58 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:29:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:29:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33037 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33037 found at Wed Sep 28 00:29:58 UTC 2022 selfserv_9223 with PID 33037 started at Wed Sep 28 00:29:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1571: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33037 at Wed Sep 28 00:30:06 UTC 2022 kill -USR1 33037 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33037 killed at Wed Sep 28 00:30:06 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 00:30:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:30:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33171 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33171 found at Wed Sep 28 00:30:07 UTC 2022 selfserv_9223 with PID 33171 started at Wed Sep 28 00:30:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1572: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 33171 at Wed Sep 28 00:30:18 UTC 2022 kill -USR1 33171 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33171 killed at Wed Sep 28 00:30:18 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:30:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:30:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33228 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33228 found at Wed Sep 28 00:30:19 UTC 2022 selfserv_9223 with PID 33228 started at Wed Sep 28 00:30:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1573: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33228 at Wed Sep 28 00:30:30 UTC 2022 kill -USR1 33228 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33228 killed at Wed Sep 28 00:30:30 UTC 2022 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:30:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:30:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33303 found at Wed Sep 28 00:30:31 UTC 2022 selfserv_9223 with PID 33303 started at Wed Sep 28 00:30:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1574: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 33303 at Wed Sep 28 00:30:58 UTC 2022 kill -USR1 33303 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33303 killed at Wed Sep 28 00:30:58 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:30:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:30:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33355 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33355 found at Wed Sep 28 00:30:59 UTC 2022 selfserv_9223 with PID 33355 started at Wed Sep 28 00:30:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1575: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33355 at Wed Sep 28 00:31:06 UTC 2022 kill -USR1 33355 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33355 killed at Wed Sep 28 00:31:06 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:31:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:31:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33415 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33415 found at Wed Sep 28 00:31:07 UTC 2022 selfserv_9223 with PID 33415 started at Wed Sep 28 00:31:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1576: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 33415 at Wed Sep 28 00:31:32 UTC 2022 kill -USR1 33415 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33415 killed at Wed Sep 28 00:31:32 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:31:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:31:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33483 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33483 found at Wed Sep 28 00:31:33 UTC 2022 selfserv_9223 with PID 33483 started at Wed Sep 28 00:31:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1577: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33483 at Wed Sep 28 00:31:40 UTC 2022 kill -USR1 33483 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33483 killed at Wed Sep 28 00:31:40 UTC 2022 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:31:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:31:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33543 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33543 found at Wed Sep 28 00:31:41 UTC 2022 selfserv_9223 with PID 33543 started at Wed Sep 28 00:31:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1578: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 33543 at Wed Sep 28 00:32:06 UTC 2022 kill -USR1 33543 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33543 killed at Wed Sep 28 00:32:06 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:32:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:32:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33595 found at Wed Sep 28 00:32:07 UTC 2022 selfserv_9223 with PID 33595 started at Wed Sep 28 00:32:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1579: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33595 at Wed Sep 28 00:32:15 UTC 2022 kill -USR1 33595 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33595 killed at Wed Sep 28 00:32:15 UTC 2022 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:32:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:32:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33655 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33655 found at Wed Sep 28 00:32:15 UTC 2022 selfserv_9223 with PID 33655 started at Wed Sep 28 00:32:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1580: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 33655 at Wed Sep 28 00:32:41 UTC 2022 kill -USR1 33655 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33655 killed at Wed Sep 28 00:32:41 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:32:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:32:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33722 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33722 found at Wed Sep 28 00:32:41 UTC 2022 selfserv_9223 with PID 33722 started at Wed Sep 28 00:32:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33722 at Wed Sep 28 00:32:49 UTC 2022 kill -USR1 33722 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33722 killed at Wed Sep 28 00:32:49 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 00:32:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:32:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33782 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33782 found at Wed Sep 28 00:32:50 UTC 2022 selfserv_9223 with PID 33782 started at Wed Sep 28 00:32:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1582: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 33782 at Wed Sep 28 00:33:13 UTC 2022 kill -USR1 33782 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33782 killed at Wed Sep 28 00:33:13 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:33:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:33:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33834 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33834 found at Wed Sep 28 00:33:14 UTC 2022 selfserv_9223 with PID 33834 started at Wed Sep 28 00:33:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1583: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33834 at Wed Sep 28 00:33:22 UTC 2022 kill -USR1 33834 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33834 killed at Wed Sep 28 00:33:22 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:33:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:33:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33886 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33886 found at Wed Sep 28 00:33:22 UTC 2022 selfserv_9223 with PID 33886 started at Wed Sep 28 00:33:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1584: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33886 at Wed Sep 28 00:33:34 UTC 2022 kill -USR1 33886 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33886 killed at Wed Sep 28 00:33:34 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 00:33:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:33:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33953 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33953 found at Wed Sep 28 00:33:34 UTC 2022 selfserv_9223 with PID 33953 started at Wed Sep 28 00:33:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1585: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33953 at Wed Sep 28 00:33:46 UTC 2022 kill -USR1 33953 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33953 killed at Wed Sep 28 00:33:46 UTC 2022 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Wed Sep 28 00:33:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:33:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34035 found at Wed Sep 28 00:33:46 UTC 2022 selfserv_9223 with PID 34035 started at Wed Sep 28 00:33:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1556: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34035 at Wed Sep 28 00:33:51 UTC 2022 kill -USR1 34035 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34035 killed at Wed Sep 28 00:33:51 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:33:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:33:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34077 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34077 found at Wed Sep 28 00:33:51 UTC 2022 selfserv_9223 with PID 34077 started at Wed Sep 28 00:33:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1557: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34077 at Wed Sep 28 00:33:55 UTC 2022 kill -USR1 34077 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34077 killed at Wed Sep 28 00:33:55 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:33:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:33:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34116 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34116 found at Wed Sep 28 00:33:55 UTC 2022 selfserv_9223 with PID 34116 started at Wed Sep 28 00:33:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1558: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 34116 at Wed Sep 28 00:33:58 UTC 2022 kill -USR1 34116 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34116 killed at Wed Sep 28 00:33:58 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:33:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:33:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34155 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34155 found at Wed Sep 28 00:33:58 UTC 2022 selfserv_9223 with PID 34155 started at Wed Sep 28 00:33:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1559: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34155 at Wed Sep 28 00:34:02 UTC 2022 kill -USR1 34155 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34155 killed at Wed Sep 28 00:34:02 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:34:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:34:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34194 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34194 found at Wed Sep 28 00:34:02 UTC 2022 selfserv_9223 with PID 34194 started at Wed Sep 28 00:34:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1560: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 34194 at Wed Sep 28 00:34:05 UTC 2022 kill -USR1 34194 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34194 killed at Wed Sep 28 00:34:05 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:34:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:34:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34233 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34233 found at Wed Sep 28 00:34:06 UTC 2022 selfserv_9223 with PID 34233 started at Wed Sep 28 00:34:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34233 at Wed Sep 28 00:34:09 UTC 2022 kill -USR1 34233 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34233 killed at Wed Sep 28 00:34:09 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:34:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:34:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34272 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34272 found at Wed Sep 28 00:34:09 UTC 2022 selfserv_9223 with PID 34272 started at Wed Sep 28 00:34:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1562: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34272 at Wed Sep 28 00:34:13 UTC 2022 kill -USR1 34272 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34272 killed at Wed Sep 28 00:34:13 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:34:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:34:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34311 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34311 found at Wed Sep 28 00:34:13 UTC 2022 selfserv_9223 with PID 34311 started at Wed Sep 28 00:34:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34311 at Wed Sep 28 00:34:16 UTC 2022 kill -USR1 34311 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34311 killed at Wed Sep 28 00:34:17 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:34:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:34:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34350 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34350 found at Wed Sep 28 00:34:17 UTC 2022 selfserv_9223 with PID 34350 started at Wed Sep 28 00:34:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34350 at Wed Sep 28 00:34:20 UTC 2022 kill -USR1 34350 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34350 killed at Wed Sep 28 00:34:20 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:34:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:34:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34389 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34389 found at Wed Sep 28 00:34:21 UTC 2022 selfserv_9223 with PID 34389 started at Wed Sep 28 00:34:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1565: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34389 at Wed Sep 28 00:34:24 UTC 2022 kill -USR1 34389 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34389 killed at Wed Sep 28 00:34:24 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:34:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:34:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34428 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34428 found at Wed Sep 28 00:34:24 UTC 2022 selfserv_9223 with PID 34428 started at Wed Sep 28 00:34:24 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1566: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34428 at Wed Sep 28 00:34:28 UTC 2022 kill -USR1 34428 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34428 killed at Wed Sep 28 00:34:28 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:34:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:34:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34483 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34483 found at Wed Sep 28 00:34:28 UTC 2022 selfserv_9223 with PID 34483 started at Wed Sep 28 00:34:28 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1567: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 34483 at Wed Sep 28 00:34:31 UTC 2022 kill -USR1 34483 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34483 killed at Wed Sep 28 00:34:31 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:34:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:34:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34523 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34523 found at Wed Sep 28 00:34:32 UTC 2022 selfserv_9223 with PID 34523 started at Wed Sep 28 00:34:32 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1568: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34523 at Wed Sep 28 00:34:35 UTC 2022 kill -USR1 34523 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34523 killed at Wed Sep 28 00:34:35 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:34:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:34:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34563 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34563 found at Wed Sep 28 00:34:35 UTC 2022 selfserv_9223 with PID 34563 started at Wed Sep 28 00:34:35 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1569: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 34563 at Wed Sep 28 00:34:38 UTC 2022 kill -USR1 34563 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34563 killed at Wed Sep 28 00:34:38 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:34:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:34:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34603 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34603 found at Wed Sep 28 00:34:39 UTC 2022 selfserv_9223 with PID 34603 started at Wed Sep 28 00:34:39 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1570: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34603 at Wed Sep 28 00:34:42 UTC 2022 kill -USR1 34603 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34603 killed at Wed Sep 28 00:34:42 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:34:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:34:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34643 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34643 found at Wed Sep 28 00:34:42 UTC 2022 selfserv_9223 with PID 34643 started at Wed Sep 28 00:34:42 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1571: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34643 at Wed Sep 28 00:34:46 UTC 2022 kill -USR1 34643 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34643 killed at Wed Sep 28 00:34:46 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:34:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:34:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34683 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34683 found at Wed Sep 28 00:34:46 UTC 2022 selfserv_9223 with PID 34683 started at Wed Sep 28 00:34:46 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1572: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34683 at Wed Sep 28 00:34:49 UTC 2022 kill -USR1 34683 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34683 killed at Wed Sep 28 00:34:50 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:34:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:34:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34723 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34723 found at Wed Sep 28 00:34:50 UTC 2022 selfserv_9223 with PID 34723 started at Wed Sep 28 00:34:50 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1573: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34723 at Wed Sep 28 00:34:53 UTC 2022 kill -USR1 34723 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34723 killed at Wed Sep 28 00:34:53 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 00:34:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 00:34:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34763 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34763 found at Wed Sep 28 00:34:54 UTC 2022 selfserv_9223 with PID 34763 started at Wed Sep 28 00:34:54 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1574: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34763 at Wed Sep 28 00:34:57 UTC 2022 kill -USR1 34763 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34763 killed at Wed Sep 28 00:34:57 UTC 2022 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/client -fips false -force FIPS mode disabled. ssl.sh: #1575: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/client -list ssl.sh: #1576: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1577: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/ext_client -fips false -force FIPS mode disabled. ssl.sh: #1578: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/ext_client -list ssl.sh: #1579: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1580: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Wed Sep 28 00:34:59 UTC 2022 Running tests for merge TIMESTAMP merge BEGIN: Wed Sep 28 00:34:59 UTC 2022 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/tests.v3.3122 -t Test2 -f ../tests.pw merge.sh: #1: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id dave --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw - merging object Type 0x00000001 id=0x3c751a1d updateID=dave - merging object Type 0xce534353 id=0x24751a1d updateID=dave - merging object Type 0x00000001 id=0x3d720866 updateID=dave - merging object Type 0x00000001 id=0x3c3d7208 updateID=dave - merging object Type 0x00000001 id=0x3f740a1f updateID=dave - merging object Type 0x00000001 id=0x3e720866 updateID=dave - merging object Type 0xce534353 id=0x26720866 updateID=dave - merging object Type 0x00000001 id=0x3c740a1f updateID=dave - merging object Type 0xce534353 id=0x24740a1f updateID=dave - merging object Type 0x00000001 id=0x3f751a1d updateID=dave - merging object Type 0x00000001 id=0x3d2d7208 updateID=dave - merging object Type 0x00000001 id=0x3f783422 updateID=dave - merging object Type 0x00000001 id=0x3f0d7208 updateID=dave - merging object Type 0x00000002 id=0x108a390d updateID=dave - merging object Type 0x00000002 id=0x15deb4fd updateID=dave - merging object Type 0x00000002 id=0x1729a95c updateID=dave - merging object Type 0x00000002 id=0x13e595a9 updateID=dave - merging object Type 0x00000002 id=0x1697bcb7 updateID=dave - merging object Type 0x00000002 id=0x16cb8c2b updateID=dave - merging object Type 0xce534352 id=0x32737e6d updateID=dave - merging object Type 0xce534352 id=0x34101166 updateID=dave - merging object Type 0xce534352 id=0x37170d0c updateID=dave - merging object Type 0xce534352 id=0x346f0b1a updateID=dave - merging object Type 0xce534352 id=0x330a0b05 updateID=dave - merging object Type 0xce534352 id=0x37150d1e updateID=dave - merging object Type 0x00000003 id=0x088a390d updateID=dave - merging object Type 0x00000003 id=0x0ddeb4fd updateID=dave - merging object Type 0x00000003 id=0x0f29a95c updateID=dave - merging object Type 0x00000003 id=0x0be595a9 updateID=dave - merging object Type 0x00000003 id=0x0e97bcb7 updateID=dave - merging object Type 0x00000003 id=0x0ecb8c2b updateID=dave upgrade complete! merge.sh: #2: Merging Dave - PASSED merge.sh: Merging in new user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id server --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw - merging object Type 0x00000001 id=0x3c751a1d updateID=server - merging object Type 0xce534353 id=0x24751a1d updateID=server - merging object Type 0x00000001 id=0x3b720866 updateID=server - merging object Type 0x00000001 id=0x3ceb7208 updateID=server - merging object Type 0x00000001 id=0x39740a1f updateID=server - merging object Type 0x00000001 id=0x38751a1d updateID=server - merging object Type 0x00000001 id=0x3d1a7208 updateID=server - merging object Type 0x00000001 id=0x3ffa7208 updateID=server - merging object Type 0x00000001 id=0x3e720866 updateID=server - merging object Type 0xce534353 id=0x26720866 updateID=server - merging object Type 0x00000001 id=0x3c740a1f updateID=server - merging object Type 0xce534353 id=0x24740a1f updateID=server - merging object Type 0x00000001 id=0x39751a1d updateID=server - merging object Type 0x00000001 id=0x3d1b7208 updateID=server - merging object Type 0x00000001 id=0x3f783422 updateID=server - merging object Type 0x00000001 id=0x3ffb7208 updateID=server - merging object Type 0x00000001 id=0x3a720866 updateID=server - merging object Type 0x00000001 id=0x3cea7208 updateID=server - merging object Type 0x00000001 id=0x38740a1f updateID=server - merging object Type 0x00000002 id=0x15e89207 updateID=server - merging object Type 0x00000002 id=0x14564d5f updateID=server - merging object Type 0x00000002 id=0x101f118b updateID=server - merging object Type 0x00000002 id=0x13e0597a updateID=server - merging object Type 0x00000002 id=0x16cb8c2b updateID=server - merging object Type 0x00000002 id=0x156c17f5 updateID=server - merging object Type 0x00000002 id=0x149b65ee updateID=server - merging object Type 0x00000002 id=0x138dd34a updateID=server - merging object Type 0x00000002 id=0x153f28af updateID=server - merging object Type 0x00000002 id=0x1288da20 updateID=server - merging object Type 0x00000002 id=0x15e1835c updateID=server - merging object Type 0x00000002 id=0x1048ddf4 updateID=server - merging object Type 0xce534351 id=0x2a08664f updateID=server - merging object Type 0xce534351 id=0x29495c6d updateID=server - merging object Type 0xce534352 id=0x330b7f78 updateID=server - merging object Type 0xce534352 id=0x357e737a updateID=server - merging object Type 0xce534352 id=0x330b6865 updateID=server - merging object Type 0xce534352 id=0x37281063 updateID=server - merging object Type 0xce534352 id=0x324f7563 updateID=server - merging object Type 0xce534352 id=0x310b6a65 updateID=server - merging object Type 0xce534352 id=0x32261b0b updateID=server - merging object Type 0xce534352 id=0x3605630d updateID=server - merging object Type 0xce534352 id=0x3362060d updateID=server - merging object Type 0xce534352 id=0x3026190b updateID=server - merging object Type 0xce534352 id=0x32260c16 updateID=server - merging object Type 0xce534352 id=0x34530014 updateID=server - merging object Type 0x00000003 id=0x0de89207 updateID=server - merging object Type 0x00000003 id=0x0c564d5f updateID=server - merging object Type 0x00000003 id=0x081f118b updateID=server - merging object Type 0x00000003 id=0x0be0597a updateID=server - merging object Type 0x00000003 id=0x0ecb8c2b updateID=server - merging object Type 0x00000003 id=0x0d6c17f5 updateID=server - merging object Type 0x00000003 id=0x0c9b65ee updateID=server - merging object Type 0x00000003 id=0x0b8dd34a updateID=server - merging object Type 0x00000003 id=0x0d3f28af updateID=server - merging object Type 0x00000003 id=0x0a88da20 updateID=server - merging object Type 0x00000003 id=0x0de1835c updateID=server - merging object Type 0x00000003 id=0x0848ddf4 updateID=server upgrade complete! merge.sh: #3: Merging server - PASSED merge.sh: Merging in new chain certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id ext_client --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw - merging object Type 0x00000001 id=0x3e3a5f60 updateID=ext_client - merging object Type 0x00000001 id=0x3b54400e updateID=ext_client - merging object Type 0xce534353 id=0x2354400e updateID=ext_client - merging object Type 0x00000001 id=0x3a395e72 updateID=ext_client - merging object Type 0x00000001 id=0x39455c13 updateID=ext_client - merging object Type 0xce534353 id=0x21455c13 updateID=ext_client - merging object Type 0x00000001 id=0x3c475b01 updateID=ext_client - merging object Type 0xce534353 id=0x24475b01 updateID=ext_client - merging object Type 0x00000001 id=0x395e707f updateID=ext_client - merging object Type 0xce534353 id=0x215e707f updateID=ext_client - merging object Type 0x00000001 id=0x3b5e721c updateID=ext_client - merging object Type 0xce534353 id=0x235e721c updateID=ext_client - merging object Type 0x00000001 id=0x3f475a11 updateID=ext_client - merging object Type 0xce534353 id=0x27475a11 updateID=ext_client - merging object Type 0x00000001 id=0x3a385e72 updateID=ext_client - merging object Type 0x00000001 id=0x3d56471c updateID=ext_client - merging object Type 0xce534353 id=0x2556471c updateID=ext_client - merging object Type 0x00000001 id=0x3a3a5e72 updateID=ext_client - merging object Type 0x00000001 id=0x3e3a5e70 updateID=ext_client - merging object Type 0x00000001 id=0x3b54411e updateID=ext_client - merging object Type 0xce534353 id=0x2354411e updateID=ext_client - merging object Type 0x00000001 id=0x3f475b01 updateID=ext_client - merging object Type 0xce534353 id=0x27475b01 updateID=ext_client - merging object Type 0x00000001 id=0x395f607d updateID=ext_client - merging object Type 0xce534353 id=0x215f607d updateID=ext_client - merging object Type 0x00000001 id=0x3a455c13 updateID=ext_client - merging object Type 0xce534353 id=0x22455c13 updateID=ext_client - merging object Type 0x00000001 id=0x3c475a11 updateID=ext_client - merging object Type 0xce534353 id=0x24475a11 updateID=ext_client - merging object Type 0x00000002 id=0x13bc7013 updateID=ext_client - merging object Type 0x00000002 id=0x15b67c55 updateID=ext_client - merging object Type 0x00000002 id=0x11b8becc updateID=ext_client - merging object Type 0x00000002 id=0x1765d72d updateID=ext_client - merging object Type 0x00000002 id=0x13cf0307 updateID=ext_client - merging object Type 0xce534352 id=0x326d6a5a updateID=ext_client - merging object Type 0xce534352 id=0x326d0c2f updateID=ext_client - merging object Type 0xce534352 id=0x361e0b77 updateID=ext_client - merging object Type 0xce534352 id=0x35777039 updateID=ext_client - merging object Type 0xce534352 id=0x33180233 updateID=ext_client - merging object Type 0x00000003 id=0x0bbc7013 updateID=ext_client - merging object Type 0x00000003 id=0x0db67c55 updateID=ext_client - merging object Type 0x00000003 id=0x09b8becc updateID=ext_client - merging object Type 0x00000003 id=0x0f65d72d updateID=ext_client - merging object Type 0x00000003 id=0x0bcf0307 updateID=ext_client upgrade complete! merge.sh: #4: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict1 --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw - merging object Type 0x00000001 id=0x3d720866 updateID=conflict1 - merging object Type 0xce534353 id=0x25720866 updateID=conflict1 - merging object Type 0x00000001 id=0x3e720866 updateID=conflict1 - merging object Type 0x00000001 id=0x3c720866 updateID=conflict1 - merging object Type 0xce534352 id=0x31201570 updateID=conflict1 - merging object Type 0xce534352 id=0x31231570 updateID=conflict1 - merging object Type 0xce534352 id=0x31211570 updateID=conflict1 upgrade complete! merge.sh: #5: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict2 --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw - merging object Type 0x00000001 id=0x3b720866 updateID=conflict2 - merging object Type 0x00000001 id=0x39720866 updateID=conflict2 - merging object Type 0x00000001 id=0x3a720866 updateID=conflict2 - merging object Type 0xce534352 id=0x31261570 updateID=conflict2 - merging object Type 0xce534352 id=0x31241570 updateID=conflict2 - merging object Type 0xce534352 id=0x31271570 updateID=conflict2 upgrade complete! merge.sh: #6: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:18:43 2022 Not After : Mon Sep 27 19:18:43 2027 Subject: "CN=TestUser45,E=TestUser45@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 94:da:68:64:b5:20:a7:e6:fe:56:66:61:07:fd:c3:e2: 5d:65:51:af:3a:62:ac:b9:1b:9e:65:02:1e:ea:44:bf: 67:52:31:6a:73:b7:28:98:0e:d5:1d:b3:91:65:e2:6d: 6b:ce:36:80:de:a6:65:b7:3a:88:28:43:83:bd:ce:8f: 22:3a:c5:09:3e:66:32:3e:36:46:d5:9c:33:ae:d4:06: 44:9f:d4:fd:9a:83:10:40:bd:1f:1e:05:1d:32:a4:70: dd:90:9b:fc:95:80:b2:e6:f8:76:b6:af:db:8e:00:cc: 50:bf:0f:6a:dc:b0:b2:d1:66:24:8a:87:c2:95:5a:8e: 10:3a:2f:d6:73:6b:75:e0:46:8a:54:05:38:8a:0e:04: cf:e3:89:ad:e2:94:39:b3:d0:d8:9e:f5:9d:8e:39:e8: da:c0:19:79:ba:37:6a:d5:bc:8a:06:b3:e6:5f:94:56: 0a:eb:f1:3d:e0:f4:a6:4e:75:f8:c2:81:93:6f:78:b1: 45:4a:e7:4f:ef:5c:15:f3:12:ac:b1:72:b2:d5:17:b5: 97:5b:68:2e:be:95:06:b2:a4:17:51:dc:31:a3:ef:6c: fc:c2:01:94:ef:d6:dc:65:f5:81:0b:35:80:b5:9b:a5: 16:fc:00:9c:95:35:24:70:fc:bf:e0:9e:4e:d7:85:37 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:35:1a:6c:76:45:83:c4:95:80:e7:94:d6:d8:8d:14: 46:93:45:08:f9:28:3d:bb:ad:88:62:04:e6:74:c8:d8: d5:3b:3f:1f:e9:68:2e:86:e8:fd:ce:84:12:f5:fb:4a: f8:94:1e:35:39:2d:c8:fd:93:45:1c:21:54:45:e9:c4: bd:e5:a6:d1:59:c9:3f:b5:e1:93:0f:b6:4a:df:5b:07: a7:3b:8c:1a:db:84:a3:16:23:28:e3:b8:85:10:42:e3: 3c:24:1b:bb:ae:6f:b4:a1:26:c7:ce:3c:19:56:b0:a9: 7c:81:bd:7b:7c:14:62:a6:6c:a7:b3:43:42:5b:34:fe: db:70:ac:93:50:8f:f5:0c:c7:46:32:49:ed:57:4b:c2: ba:41:d5:b9:45:7c:d0:e9:74:9c:97:a7:69:8a:81:e3: e5:d5:c7:43:70:dc:90:d0:13:80:92:42:a3:cb:c8:9c: 44:1b:ee:17:a2:2d:5c:01:c5:f4:6f:d8:db:b9:64:bc: b4:a6:5d:10:2d:f6:7b:79:e3:05:e2:83:55:c6:19:f9: b9:9a:97:d6:e6:e7:b4:1c:f7:07:7c:2d:e0:bb:49:16: 26:57:a7:4c:57:f2:f1:5a:2a:53:8f:3e:1f:00:f7:87: ec:fe:cb:c4:f0:ed:11:d2:d7:65:2f:00:8f:0f:84:ae Fingerprint (SHA-256): 3F:C1:BC:02:CE:93:6E:47:DF:CB:FE:48:38:1D:74:00:B1:B5:45:DE:16:EF:00:7F:35:BD:E9:62:E3:DB:81:CE Fingerprint (SHA1): 4F:AD:9B:66:E4:93:BA:98:2B:08:20:EC:EE:DD:6A:9A:9B:62:C8:16 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #7: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Sep 27 19:18:49 2022 Not After : Mon Sep 27 19:18:49 2027 Subject: "CN=TestUser46,E=TestUser46@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:fc:4c:37:06:09:d7:5c:6b:66:d1:4b:48:22:55:de: fa:82:20:7f:a1:66:5e:5f:66:aa:29:db:e9:65:f9:95: fd:ea:ab:ff:0f:32:95:6a:50:48:64:a2:e3:67:86:93: f7:8d:83:b9:70:0d:5e:7a:49:b1:e3:22:39:2a:f6:48: bf:9c:4b:6f:40:50:f9:04:ce:35:14:7a:fe:6b:b7:b5: 53:42:f3:76:1a:9c:16:68:ef:7b:be:3e:3b:70:c2:8d: 79:1d:4a:2d:9a:11:99:2f:87:de:27:52:4e:2f:2e:c4: 16:02:40:f8:92:14:66:11:ab:c6:1f:da:5f:a8:80:30: 5a:4a:e9:2d:c3:61:dc:1f:ab:d7:bc:f6:6c:79:99:fd: e9:c0:43:c3:ea:9c:8c:5d:77:cc:c8:bb:23:02:a8:00: c4:8c:a0:97:a4:5d:bb:11:b0:d5:c3:80:b9:8f:35:a0: 85:6a:bc:8a:22:0b:11:a0:cc:c1:18:33:af:f4:9f:2f: bc:cc:c7:a1:a4:c4:93:b5:44:56:7d:d3:c2:90:26:9a: 58:da:89:64:00:ca:c3:40:f2:53:c7:7d:6f:e5:1d:fa: d7:e4:b1:12:58:f6:ec:57:e3:e3:ce:b3:36:01:d9:b7: 77:42:ee:fe:93:c7:1e:d6:5b:d3:81:94:70:19:d7:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:e4:3e:af:5d:26:58:b2:c6:7f:c7:f5:29:62:86:c3: 37:2c:cb:1a:0d:92:84:52:4a:15:91:43:b7:23:ce:4f: 18:65:f4:e3:cf:06:2c:8e:a9:9c:8a:cb:d1:07:4c:91: d2:22:c6:23:93:9c:74:1e:dc:73:13:30:91:8f:57:ce: 85:ce:58:1c:23:2b:97:86:7e:35:7d:b0:4f:7e:31:9f: 0a:45:43:c4:93:07:6a:fb:55:82:da:e8:ae:d1:f1:27: 2c:a3:04:2a:7b:fc:dd:59:e7:6f:3b:c3:66:43:1c:3c: 55:48:eb:39:74:08:05:bd:19:2c:c5:d6:98:64:48:e8: 95:43:a4:e5:4f:7c:c3:b2:48:46:cd:01:ef:f1:4d:b8: a3:26:93:81:bc:95:2c:b4:36:48:25:59:40:79:b5:4a: a6:c3:d9:16:63:7b:b9:c3:89:37:82:0f:d6:06:a2:19: 3b:30:03:34:5c:30:68:53:3c:f4:fc:09:13:a5:98:3d: f0:7d:12:ac:9f:c4:6f:d6:c8:4f:99:eb:99:d0:16:0e: 54:26:f0:9b:53:06:50:27:9b:0d:2e:90:56:27:9d:64: 08:28:f3:7a:bf:d7:78:6c:1e:e3:9a:c9:f6:c6:cc:11: 50:81:8b:8e:1d:ca:ef:a7:b1:ae:d9:04:7f:89:86:8c Fingerprint (SHA-256): 56:E6:99:95:CF:AE:A9:D2:60:CA:B0:7F:22:3F:EB:12:E2:20:2B:55:CB:58:94:CB:E2:85:B5:03:62:B0:1F:6D Fingerprint (SHA1): A3:CF:5C:AA:80:98:DD:B4:0A:98:E1:6A:5B:E2:6C:A7:DE:66:6D:68 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #8: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id sdr --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw - merging object Type 0x00000004 id=0x18000000 updateID=sdr upgrade complete! merge.sh: #9: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA-dsa CT,C,C Alice u,u,u Alice-dsamixed u,u,u Alice-ec u,u,u bob@example.com ,, Dave u,u,u eve@example.com ,, bob-ec@example.com ,, Dave-ec u,u,u TestCA CT,C,C TestCA-ec CT,C,C Alice-dsa u,u,u Alice-ecmixed u,u,u TestUser-rsa-pss-interop u,u,u Alice-rsa-pss u,u,u Dave-dsamixed u,u,u Dave-dsa u,u,u Dave-ecmixed u,u,u Dave-rsa-pss u,u,u localhost.localdomain u,u,u localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u localhost-sni.localdomain-dsa u,u,u localhost-sni.localdomain-ecmixed u,u,u localhost-sni.localdomain-rsa-pss u,u,u localhost.localdomain-dsa u,u,u localhost.localdomain-ecmixed u,u,u localhost.localdomain-rsa-pss u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-dsamixed u,u,u localhost-sni.localdomain-ec u,u,u ExtendedSSLUser-dsa u,u,u serverCA-dsa C,C,C ExtendedSSLUser-ecmixed u,u,u clientCA T,C,C chain-1-clientCA-dsa ,, chain-2-clientCA-ec ,, chain-2-clientCA ,, clientCA-ec T,C,C ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-dsamixed u,u,u ExtendedSSLUser-ec u,u,u serverCA-ec C,C,C clientCA-dsa T,C,C chain-2-clientCA-dsa ,, chain-1-clientCA ,, chain-1-clientCA-ec ,, Alice #1 ,, Alice #2 ,, Alice #99 ,, Alice #3 ,, Alice #100 ,, Alice #4 ,, CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/tests.v3.3122 -t Test2 -f ../tests.pw merge.sh: #10: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/upgradedb/tests.v1.3122 -t Test1 -f ../tests.pw merge.sh: #11: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #12: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . This is a test message from Alice to Bob. merge.sh: #13: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #14: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Tue Sep 27 19:19:37 2022 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Tue Sep 27 19:15:22 2022 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Tue Sep 27 19:19:32 2022 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #15: Verifying TestCA CRL - PASSED TEST_MODE=UPGRADE_DB NSS_DEFAULT_DB_TYPE=sql TIMESTAMP merge END: Wed Sep 28 00:35:19 UTC 2022 Running tests for ec TIMESTAMP ec BEGIN: Wed Sep 28 00:35:19 UTC 2022 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Wed Sep 28 00:35:19 UTC 2022 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #1: ec(perf) test - PASSED TIMESTAMP ecperf END: Wed Sep 28 00:35:19 UTC 2022 Running ec tests for ectest TIMESTAMP ectest BEGIN: Wed Sep 28 00:35:19 UTC 2022 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test curve25519 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #1: ec test certutil keygen - curve25519 - PASSED Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #2: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #3: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #5: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #6: pk11 ec tests - PASSED TIMESTAMP ectest END: Wed Sep 28 00:35:22 UTC 2022 TIMESTAMP ec END: Wed Sep 28 00:35:22 UTC 2022 ec.sh: Testing with shared library =============================== Running tests for libpkix TIMESTAMP libpkix BEGIN: Wed Sep 28 00:35:22 UTC 2022 TIMESTAMP libpkix END: Wed Sep 28 00:35:22 UTC 2022 Running tests for cert TIMESTAMP cert BEGIN: Wed Sep 28 00:35:22 UTC 2022 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #79: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/serverCA-dsa.ca.cert cert.sh: #80: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #81: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #82: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/serverCA-ec.ca.cert cert.sh: #83: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #84: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #85: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #86: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #87: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw cert.sh: #88: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #89: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #90: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #91: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #92: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #93: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #94: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #95: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #96: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/serverCA-dsa.ca.cert cert.sh: #97: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #98: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #99: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #101: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #102: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA/serverCA-ec.ca.cert cert.sh: #104: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #105: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #106: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #107: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #108: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #109: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/clientCA-dsa.ca.cert cert.sh: #110: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #111: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #112: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #113: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #114: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/clientCA/clientCA-ec.ca.cert cert.sh: #116: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw cert.sh: #117: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #118: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA.ca.cert cert.sh: #119: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #120: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA-ec.ca.cert cert.sh: #121: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #123: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #126: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #128: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #129: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #130: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #131: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #132: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #133: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #134: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #135: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #136: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #137: Generate RSA-PSS Cert Request for TestUser - PASSED cert.sh: Sign TestUser's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30070 -v 60 -d ../CA -i req -o TestUser-rsa-pss.cert -f ../tests.pw cert.sh: #138: Sign TestUser's RSA-PSS Request - PASSED cert.sh: Import TestUser's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #139: Import TestUser's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #140: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #141: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA.ca.cert cert.sh: #142: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #143: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA-ec.ca.cert cert.sh: #144: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #149: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #152: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #155: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #158: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #160: Generate RSA-PSS Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30100 -v 60 -d ../CA -i req -o localhost.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #161: Sign localhost.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost.localdomain's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #163: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #164: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #165: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #166: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #167: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #168: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #169: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #170: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #171: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #172: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #173: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #174: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #176: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #177: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost-sni.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #178: Generate RSA-PSS Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #179: Sign localhost-sni.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost-sni.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #180: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost-sni.localdomain's RSA-PSS Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #181: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #182: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #183: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating database for strsclnt no login tests =============== cp -r /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/nologin cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -W -d ../nologin -f ../tests.pw -@ ../tests_empty Password changed successfully. cert.sh: #184: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -k ec -q nistp256 -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server Generating key. This may take a few moments... cert.sh: #185: Create orphan key in serverdir - PASSED cert.sh: Delete orphan key -------------------------- certutil -F -f ../tests.pw -k 3552760e59994cee2b8562eb00258c1de8144fd3 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server cert.sh: #186: Delete orphan key - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server Generating key. This may take a few moments... cert.sh: #187: Create orphan key in serverdir - PASSED cert.sh: Create cert request for orphan key -------------------------- certutil -R -f ../tests.pw -k 8746fbbc054c1ed3f626a6157ac03f2ea057ff94 -s CN=orphan -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/orphan.req cert.sh: #188: Create cert request for orphan key - PASSED Certificate Request: Data: Version: 0 (0x0) Subject: "CN=orphan" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:d1:33:f9:ee:b6:22:93:b4:e5:c8:1a:92:2e:60:a1: dc:be:80:43:2a:a3:d2:d3:51:7a:97:45:97:00:4a:09: a3:92:15:b0:8b:3f:3c:83:4c:9e:cc:c0:ba:8a:39:32: 43:13:2a:c6:26:07:f0:ec:31:a1:96:2c:93:d3:40:98: 11:cd:f5:35:4e:a6:08:eb:75:15:a6:b6:88:b4:8f:ba: 01:4b:57:1e:86:d9:bb:2a:c4:34:ad:38:90:c0:d4:5f: a0:de:23:50:b7:3e:83:3e:ba:f5:ef:bf:95:1e:73:21: 3c:e0:70:d0:57:46:f6:0d:5f:03:be:26:1c:34:04:74: ca:6a:10:3d:1b:a2:4e:d5:8c:43:5c:68:8d:66:85:63: ae:25:06:64:8a:0a:b9:ca:2c:18:21:e8:aa:cd:b4:1a: b4:ee:67:66:4f:02:df:16:9d:fb:3d:80:e1:1a:ab:7b: b4:5f:9f:39:c4:6a:a3:e7:7c:8e:7b:d8:fb:b2:1e:ab: 73:6e:8c:e8:ff:42:96:df:8d:26:cb:3f:04:1d:6e:4a: 2c:e3:4c:ba:c5:58:8f:d3:32:3b:32:4a:ff:88:ca:d7: ef:ec:d3:2c:c7:96:a0:51:79:4b:ee:10:f1:60:4d:3f: 9f:22:67:86:87:8c:1d:7e:eb:f5:91:53:e0:9f:8d:a3 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3c:0c:e4:8b:89:6f:84:4b:d5:6f:22:42:30:b5:3d:f9: 3f:31:b6:48:29:d8:1a:0d:75:b0:eb:50:4a:75:37:36: bd:c3:4b:00:07:1c:12:44:9b:9f:05:d9:71:53:31:17: 6f:84:69:42:bc:94:ec:a4:b5:d8:43:2b:fb:4a:35:e1: 97:a0:b0:29:90:8e:4e:e7:b3:2c:c6:4f:85:72:e5:2d: b3:70:aa:28:eb:ca:48:ab:48:de:bd:3a:5b:11:51:f4: b1:fa:c6:80:d3:a6:ff:99:05:1b:2b:8d:95:5d:cf:56: 09:80:ca:33:e3:46:9d:66:28:fd:e9:1f:cc:1d:ad:95: 56:19:ba:ac:92:ae:f3:e1:95:e1:38:4b:15:14:07:27: 8b:0f:33:9e:0d:d9:c0:88:82:c7:e7:77:d3:13:e7:a0: 8e:b8:2f:43:51:7c:e2:cb:60:6f:6e:93:ac:47:d4:f4: 1a:aa:0d:93:aa:c1:71:47:43:ae:73:06:3c:f3:00:55: 97:9d:7d:39:06:3e:87:bf:51:91:55:7a:94:50:b6:ca: fe:85:b7:a0:d7:6e:dd:f3:26:8a:5e:ed:10:18:75:d0: bf:dd:ec:3b:ff:d2:2c:4d:3d:43:bf:24:75:f0:79:7d: 8f:e8:37:9e:13:f7:28:9d:17:2f:ac:45:4c:ab:ae:9c Fingerprint (SHA-256): 9D:86:66:BB:F8:FB:0E:04:4A:DA:24:CF:CF:1A:00:91:B7:1B:43:E5:05:F0:68:B8:62:45:F1:32:DF:DA:0A:37 Fingerprint (SHA1): 2F:E8:B8:E8:13:BF:89:8E:18:EE:C8:A4:9E:C1:76:B9:C1:AD:12:37 cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw cert.sh: #189: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #195: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #198: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #204: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created Importing RSA-PSS server certificate Import Alice's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #209: Generate RSA-PSS Cert Request for Alice - PASSED cert.sh: Sign Alice's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30030 -v 60 -d ../CA -i req -o Alice-rsa-pss.cert -f ../tests.pw cert.sh: #210: Sign Alice's RSA-PSS Request - PASSED cert.sh: Import Alice's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Alice-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #211: Import Alice's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Alice's RSA-PSS Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw cert.sh: #212: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #213: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA.ca.cert cert.sh: #214: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #215: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #216: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #218: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #221: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #224: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #227: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #229: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #230: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #231: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created Importing RSA-PSS server certificate Import Bob's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #232: Generate RSA-PSS Cert Request for Bob - PASSED cert.sh: Sign Bob's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o Bob-rsa-pss.cert -f ../tests.pw cert.sh: #233: Sign Bob's RSA-PSS Request - PASSED cert.sh: Import Bob's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Bob-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #234: Import Bob's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Bob's RSA-PSS Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw cert.sh: #235: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #236: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA.ca.cert cert.sh: #237: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #238: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #239: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #241: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #244: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #247: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #249: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #250: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #251: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #252: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #253: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #254: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created Importing RSA-PSS server certificate Import Dave's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #255: Generate RSA-PSS Cert Request for Dave - PASSED cert.sh: Sign Dave's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o Dave-rsa-pss.cert -f ../tests.pw cert.sh: #256: Sign Dave's RSA-PSS Request - PASSED cert.sh: Import Dave's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Dave-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Import Dave's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Dave's RSA-PSS Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw cert.sh: #258: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA.ca.cert cert.sh: #260: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #261: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #262: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #263: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #264: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #265: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #266: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #267: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #268: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #269: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #270: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #271: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #272: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #273: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #274: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #276: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created Importing RSA-PSS server certificate Import Eve's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #278: Generate RSA-PSS Cert Request for Eve - PASSED cert.sh: Sign Eve's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30060 -v 60 -d ../CA -i req -o Eve-rsa-pss.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #279: Sign Eve's RSA-PSS Request - PASSED cert.sh: Import Eve's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Eve-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import Eve's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Eve's RSA-PSS Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #281: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #282: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #283: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #284: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #285: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #286: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #287: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #288: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw cert.sh: #289: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #290: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #291: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Setting invalid database password in FIPS mode -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw -@ ../tests.fipsbadpw Failed to change password. certutil: Could not set password for the slot: SEC_ERROR_INVALID_PASSWORD: Password entered is invalid. Please pick a different one. cert.sh: #292: Setting invalid database password in FIPS mode - PASSED cert.sh: Attempt to generate a key with exponent of 3 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 3 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #293: Attempt to generate a key with exponent of 3 (too small) - PASSED cert.sh: Attempt to generate a key with exponent of 17 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 17 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #294: Attempt to generate a key with exponent of 17 (too small) - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@example.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #295: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw cert.sh: #296: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #297: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #298: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #299: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #300: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #301: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #302: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #303: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #304: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #305: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #306: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #307: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw cert.sh: #308: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #309: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #310: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #311: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #312: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #313: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #314: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #315: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #316: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #317: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #318: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #319: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #320: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #321: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #322: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #323: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #324: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #325: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #326: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #327: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created Importing RSA-PSS server certificate Import TestExt's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #328: Generate RSA-PSS Cert Request for TestExt - PASSED cert.sh: Sign TestExt's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30090 -v 60 -d ../CA -i req -o TestExt-rsa-pss.cert -f ../tests.pw cert.sh: #329: Sign TestExt's RSA-PSS Request - PASSED cert.sh: Import TestExt's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestExt-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #330: Import TestExt's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestExt's RSA-PSS Cert Created certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:40:c3 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Sep 28 00:41:42 2022 Not After : Wed Dec 28 00:41:42 2022 Subject: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:a8:9d:ce:cd:ea:36:b9:72:2e:0d:53:4d:80:67:52: 65:f2:dd:00:39:49:97:85:28:0f:fa:f3:f7:4c:ec:cf: f7:fd:c9:40:e0:be:0c:74:7f:85:37:ed:96:c4:14:c9: aa:b7:bc:df:44:7d:8e:9c:ea:53:ce:5a:8a:18:be:bf: d3:60:68:20:8e:35:14:f1:b9:20:93:dd:63:5a:22:06: 27:e9:19:fb:6e:13:cb:84:ae:54:6d:73:a4:da:19:a3: c8:5c:3f:29:6e:6c:4d:c2:35:46:e4:85:3e:3f:5c:8b: a8:df:0a:26:e5:a5:e5:56:7c:9e:9b:cd:34:4a:60:93: 10:e1:0c:76:7f:c8:88:6a:c3:84:d0:32:79:c4:a4:ad: 9a:12:df:fc:d2:47:81:88:74:37:7e:38:bc:5c:6d:20: 52:f9:7f:81:33:35:19:0c:fb:47:37:89:aa:a4:6c:09: 28:98:34:2c:e3:c5:fb:44:57:df:a0:16:69:fa:a4:a3: 39:82:48:74:e6:d4:a2:06:bb:1a:f0:4d:4a:44:5d:eb: 20:bb:5c:cd:c2:5f:01:56:25:2e:41:b9:ac:b6:04:14: 85:10:24:c9:3b:9a:2a:fe:76:fb:c3:fe:38:de:5b:ec: 7c:d5:81:88:50:55:d2:3b:01:46:9f:2e:bb:1c:94:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: af:2a:31:67:c2:e1:51:c7:52:54:68:6a:39:f0:4e:2b: 6a:54:18:6c:1f:d6:56:a3:d7:b4:87:54:13:55:d9:86: 35:d1:b7:2c:b6:cb:dd:b3:1f:b6:d4:50:f1:60:56:c8: ef:ec:ec:24:0e:3c:93:fb:d3:24:e6:8f:b6:78:ab:53: 37:0f:ca:50:1a:06:18:2a:df:42:32:33:c2:80:a6:79: e7:96:56:8a:55:51:c9:15:ee:1d:39:e3:ea:7e:17:cc: 51:91:02:06:a1:6b:75:a7:04:35:78:ea:1b:ae:23:51: 81:c3:a8:32:f7:bf:a0:27:c2:04:a3:ba:7b:f5:ab:d7: 31:7a:b3:da:34:65:6a:a5:0e:2a:d4:2d:df:08:64:cb: 90:90:4e:48:70:f3:f2:9d:df:dc:46:be:79:a2:4a:06: 03:04:1e:2c:c6:e8:12:8d:a6:7e:93:a1:52:30:80:02: 44:ef:4e:92:cf:9b:45:3a:09:85:fd:3e:2a:d7:2a:d8: 31:41:6f:d9:38:1b:b4:3e:80:2a:aa:aa:ce:fa:db:01: 15:c0:f1:d3:fc:2a:94:85:f0:ae:f3:13:a6:50:7b:32: df:56:7a:b4:bd:8a:e9:40:6c:1d:d5:56:f3:41:a9:f2: fd:da:bf:c2:dc:25:a9:d9:9d:6f:21:13:08:c3:9d:79 Fingerprint (SHA-256): 90:62:F3:06:89:52:93:D7:1A:FB:8F:44:6E:CF:9E:3E:DF:0E:13:04:A3:AA:77:9D:25:15:E4:46:98:28:07:E8 Fingerprint (SHA1): 0E:3D:96:F0:3A:C0:EF:73:C3:0B:97:24:29:EF:DB:E0:35:82:0A:82 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #331: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:40:ca Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Sep 28 00:41:46 2022 Not After : Wed Dec 28 00:41:46 2022 Subject: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:63:1b:bc:7a:e1:7f:60:fe:3a:07:83:55:0c:a2:3d: 1a:ee:85:4b:e6:d4:ef:32:ad:c2:c1:8e:bc:c2:b7:6c: a3:f5:11:50:5a:98:17:a0:96:1c:8f:49:fa:7f:9e:6f: 44:6e:0b:c5:30:fa:38:de:25:28:dc:45:f7:3a:01:e0: 35:be:c7:4c:f6:5c:5d:0d:f2:ed:cf:7b:ef:4e:64:d4: d9:11:d4:60:22:7a:0d:d2:1b:06:b4:1d:ac:3c:4e:e4: 81:6e:78:99:b5:1d:1e:3b:c7:64:7d:06:aa:3e:7a:5b: f1:c7:fd:f4:f1:10:08:4c:87:78:64:94:8a:9b:a2:b9: 2a:18:5e:61:bf:55:17:7b:86:47:ba:e5:50:96:77:16: fd:f3:8d:5f:28:41:da:64:6a:7c:71:34:c8:f9:c1:fa: e3:90:24:d0:72:6d:35:30:4d:01:70:ee:0e:03:9e:72: 5f:2a:53:33:ff:c2:6b:00:6c:e1:56:e7:d7:34:89:36: 1e:4f:59:69:25:b0:eb:94:cf:e2:6d:22:cc:97:e1:ac: 2d:14:96:92:1f:bd:2a:52:1c:aa:97:ec:8a:3d:1e:f1: ad:51:e9:68:c9:8f:49:72:ce:5d:82:e5:54:78:f4:da: 44:8f:82:55:e5:e5:a2:e3:f7:df:dd:d1:75:9f:d2:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0d:5b:8a:24:f1:4b:ba:0d:f5:72:1c:3e:91:a1:d7:28: ff:c1:47:70:7b:b8:d2:f9:bd:0e:40:13:54:e2:5c:8b: 46:2a:dc:d5:ab:51:82:7c:2a:41:2e:9e:f4:98:47:e2: 89:03:9d:25:c0:f2:b3:5f:10:70:22:a4:da:ba:45:a9: 4e:52:d0:f9:f5:4f:ac:c4:a3:64:4b:97:9b:f3:d2:a3: 3d:0a:0e:8e:73:be:4b:81:08:3e:1c:f3:7b:ff:7d:2a: 0a:b4:38:fb:4c:8c:56:0e:af:8a:5e:69:51:40:91:ac: 04:44:8a:bf:cf:b9:3a:3b:a9:91:07:de:58:cd:3c:68: f5:50:6e:21:db:b5:63:99:29:e7:fb:ff:55:50:93:6c: 7e:7c:77:30:2b:59:d6:e4:e0:a9:fc:77:f1:a3:bb:c7: 44:9a:4a:1c:7e:d1:97:a9:e4:04:4b:a5:ed:d4:23:41: ef:43:79:4f:97:d7:1e:43:19:70:75:cf:66:6e:f6:1f: 9d:2f:99:ba:6c:0e:e4:c2:f9:bf:73:9b:be:dc:76:c0: d9:1e:c3:76:2c:94:51:c9:ae:ef:7b:51:27:78:c3:94: 8c:bd:14:ac:86:c6:9c:93:1e:b1:6e:8d:ea:a3:6e:ad: 68:5b:a7:1f:16:96:56:f2:50:0e:c6:32:cc:c1:6b:30 Fingerprint (SHA-256): 18:DF:60:0A:B5:79:36:1C:E1:58:09:50:8A:87:78:42:9A:01:93:25:2C:F5:91:15:D1:01:15:5D:40:68:99:EF Fingerprint (SHA1): 91:B0:87:73:D5:4C:54:AC:1A:01:7F:7A:19:27:AC:A3:ED:0B:4E:1B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #332: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:40:d1 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Sep 28 00:41:49 2022 Not After : Wed Dec 28 00:41:49 2022 Subject: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:06:09:06:f2:a4:4b:9e:0a:8a:aa:9d:63:d8:a1:5d: 28:b3:35:d6:e6:ff:1c:9b:a9:c9:e5:a8:8c:f8:99:4d: d8:78:5e:65:43:49:f6:a6:fd:90:28:7f:76:66:81:78: a4:61:36:7b:5a:d8:86:a2:86:65:ae:b8:68:d6:4f:d9: a8:68:ad:19:64:8e:a5:6b:82:7a:d6:e2:d6:a7:78:a6: 3a:5d:c1:91:ec:6b:e9:21:b3:74:a8:f3:2f:19:83:d4: 7d:f7:ed:6f:bc:33:fe:e2:8d:d8:ae:d0:06:92:32:bc: 31:d0:e9:b9:f9:1a:e3:c3:02:da:72:c2:e5:27:63:eb: c5:84:20:c0:9c:6f:c0:01:cb:a0:25:98:15:ad:7e:ca: 00:2f:b7:a6:3f:66:22:f9:28:ff:ae:59:74:c8:eb:49: 7a:13:8f:b5:f9:9e:be:90:15:4f:8b:1b:64:ed:36:03: 3e:0e:23:08:5d:5d:06:87:68:2d:31:1d:93:13:67:43: f1:17:9e:d7:0e:80:4a:08:8c:41:60:38:7a:a4:1f:86: a6:35:5e:ff:22:da:71:f4:c5:37:a2:69:f0:f1:08:b9: c2:8d:ca:1b:34:43:13:f6:97:cd:d2:da:47:61:35:35: e6:ab:70:d3:a6:fa:20:59:4c:a3:77:02:10:de:49:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:15:56:c9:a3:22:f1:72:f5:3a:ea:6c:ab:36:5d:9d: 34:29:a6:3f:20:ef:b3:6c:0a:81:e0:34:b9:0e:55:f6: 99:34:21:ed:f5:e6:a2:44:0c:b9:95:9e:24:8b:ab:61: 6f:3c:2a:48:32:be:91:8e:df:a0:48:30:57:42:53:a8: 66:9a:50:f6:9a:45:07:e5:c8:0b:f8:d0:2f:01:95:9c: 5d:24:2e:16:a4:64:25:3b:63:cd:e9:79:57:c7:4b:31: 73:e4:21:d0:ec:df:73:c5:82:05:88:0d:99:4c:0a:e2: b7:71:fa:e7:b6:5c:4e:9d:9d:dc:5a:c6:31:d5:d5:7e: c6:fc:3d:20:ff:90:1e:8f:c1:12:0b:3d:d4:4c:89:99: 25:53:4e:ce:66:a5:b8:9d:6c:30:78:5e:48:e0:26:7e: c3:70:03:8a:d0:09:d1:69:80:c9:7d:0e:22:19:8e:f2: 87:7e:d3:e4:e5:0c:d4:bb:46:91:21:cb:0b:a8:c2:57: 2b:8c:0d:d1:4a:2e:63:cb:40:d8:08:60:9e:75:b0:6a: e0:89:97:68:1e:68:f0:60:95:7a:e5:21:8f:45:b2:1f: d9:a9:42:27:23:a1:28:e1:5c:25:e9:02:25:7e:c1:f5: fc:8c:46:c0:2a:0b:b8:b1:d9:6b:59:91:2e:2d:2b:15 Fingerprint (SHA-256): 66:B7:F8:E6:FB:4C:74:53:5C:9C:CD:D9:72:30:DB:F5:08:64:F9:49:01:EA:80:86:DE:ED:33:F6:7E:E4:06:6D Fingerprint (SHA1): 6B:96:A1:63:1B:E3:A8:19:DA:72:A9:DD:21:A5:CC:C4:B4:EA:51:67 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #333: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:40:d8 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Sep 28 00:41:52 2022 Not After : Wed Dec 28 00:41:52 2022 Subject: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:f4:a5:94:14:a4:3c:4b:c0:36:c4:fa:f8:a5:82:27: 7e:72:6e:16:66:53:50:0c:ea:e0:27:0c:c2:9b:6b:73: 4e:08:38:b8:d2:09:e7:7e:c6:12:9d:6e:3d:75:ed:b2: 73:cc:36:6b:4c:ff:8f:79:cc:92:aa:ae:87:30:0d:e0: d9:d2:d5:b3:c3:4c:04:71:52:f2:0e:36:c4:8a:d6:e5: 05:b5:53:03:50:eb:ae:13:d7:b4:c3:2f:a8:af:d6:5e: 96:82:6e:d3:8b:ea:ae:be:45:3d:e4:21:05:12:bb:6b: c8:a5:f3:68:5d:74:ac:e0:aa:9f:59:47:f5:e8:7f:91: 6b:9d:8d:3c:15:58:1e:a8:89:f4:d9:97:06:fe:46:dc: f6:ec:6b:37:7f:0e:8c:41:3c:8c:26:52:8e:48:ba:9f: 9e:5a:c2:06:0b:d8:74:12:d9:35:cf:d5:c4:72:7d:ab: 4a:89:db:59:ba:99:ae:01:20:17:20:46:3b:49:c9:a7: 49:69:e7:bb:f3:6e:f3:16:50:40:14:4d:0f:08:4f:8a: 4d:18:14:8f:dd:07:61:83:f9:1e:17:3b:5f:fa:28:4e: 18:ed:df:03:38:0c:83:11:b5:32:07:52:00:e9:4b:38: d6:2d:b9:df:45:8d:a9:a1:d6:21:34:0b:41:c1:a1:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:f2:d6:af:d9:42:5a:17:aa:26:5e:cc:b1:53:1c:2f: 02:f3:b5:50:59:43:da:de:12:ea:aa:83:43:f4:ff:ed: 7e:70:c4:10:82:7a:fc:4f:da:1b:1a:cd:bd:15:25:28: 42:8a:95:5a:15:9b:08:c5:00:08:90:be:6d:ec:c6:88: f2:80:df:b1:38:f4:1e:10:13:6c:9f:01:72:c7:a5:05: d7:58:c9:78:2c:e3:2e:ef:f6:a4:41:8f:bc:c8:12:a1: 8d:d1:37:a9:c5:08:cc:6f:d7:02:dd:ae:e3:1a:cd:0c: c0:5f:94:04:02:e1:39:88:8a:5b:e0:2e:23:c4:a3:21: 53:a8:85:c2:32:81:a3:cf:9e:cb:f0:40:44:89:40:79: ec:0e:4f:7b:19:3b:b1:84:67:1c:f1:3a:5a:ad:92:a4: 5e:b7:8a:6b:77:d8:f4:43:81:41:e7:00:37:8a:59:10: a0:08:47:46:08:e1:04:3f:6f:4e:b9:2c:fc:73:92:b9: ac:00:60:ca:3f:ad:fb:79:dc:75:7c:9a:8d:b9:89:c2: ce:eb:29:a8:e0:ec:77:37:29:a7:4e:f8:a0:2e:26:a0: e3:61:48:34:dd:22:ab:0d:de:e3:05:06:8d:d6:1f:08: a8:87:1b:29:ad:93:64:93:0b:44:ab:7c:55:ef:a4:3b Fingerprint (SHA-256): 13:23:80:E4:79:84:00:18:1A:BE:EB:D0:38:8B:78:F9:13:D3:A7:7D:5F:4E:B0:D3:84:DD:D1:DD:64:DE:61:FB Fingerprint (SHA1): CF:FC:02:65:10:B0:C5:55:ED:6D:EB:18:92:CC:8E:4D:E7:65:0A:47 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #334: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:40:dd Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Sep 28 00:41:55 2022 Not After : Wed Dec 28 00:41:55 2022 Subject: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:f3:e9:7d:92:a3:ff:4e:92:10:84:2a:40:b6:ea:7f: d8:8a:00:fa:a8:fb:79:b1:be:0b:27:4e:1d:80:ad:a0: 86:5b:19:c5:36:f9:2a:34:c7:d7:a0:b6:74:2c:e5:84: 7d:93:72:5e:48:72:03:4a:aa:d1:58:31:f0:87:9a:7d: 5d:17:b6:ba:5c:f8:11:51:7d:33:00:c3:31:7f:eb:18: 5e:14:6f:46:f9:cf:20:c2:92:5b:c7:35:e4:89:49:b0: ca:5f:dc:15:cd:eb:c4:50:87:bd:8c:b3:4e:ff:34:48: 07:54:e5:a0:f1:5c:9d:76:74:b1:0c:98:6a:5d:19:2b: 4f:a2:a0:44:c7:01:00:13:50:12:96:69:85:bf:ae:e5: 3f:df:10:fc:76:4e:44:41:40:69:f2:ee:53:7b:f2:6a: 0c:a5:ec:1e:54:5c:00:3c:92:0f:21:3e:86:84:45:c2: 0a:56:09:56:62:ec:e2:c7:f9:9f:e5:86:03:58:50:fa: 75:5d:31:9c:b1:b2:31:0c:af:14:f9:4c:f2:3a:2e:98: 8c:cb:c4:ab:2c:d6:2a:c7:86:4c:02:a7:6f:8a:c6:e2: a2:f2:c5:2b:82:06:38:47:88:d3:3e:53:ca:bd:b1:65: ee:85:88:33:4d:a1:1c:a6:52:db:be:ec:07:69:b6:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:59:a5:3d:84:49:a0:65:7f:87:b8:29:9b:5c:d5:34: 6c:23:aa:1b:2b:3b:fd:12:6a:f3:3b:60:ff:a2:51:89: e9:b2:1a:cd:a8:f7:fe:4d:3a:4b:64:d6:98:1b:e6:92: e0:a8:2e:59:e1:ad:4c:5a:d7:56:16:53:b8:c6:e5:c5: e0:90:73:fd:fa:3c:6d:5a:19:7a:0b:1a:40:e4:0e:b0: a4:69:e3:ff:7f:bf:2e:0f:15:29:da:ed:8d:35:a3:74: 0d:38:3f:2d:7d:6e:8a:64:8e:48:51:74:9b:e8:f1:53: 20:b8:eb:d0:af:b2:9c:be:b3:dc:a2:20:e7:c1:1d:c6: 44:68:59:cd:7f:c1:15:d9:9d:7f:16:96:9d:5e:f7:99: 09:ff:90:34:3d:72:19:16:2d:e3:d5:f3:2d:60:86:d7: ab:a8:b5:f7:38:4b:5f:ce:bb:08:a8:7b:0c:d0:68:f1: 5d:17:4f:47:4d:30:4c:41:02:6d:6d:4c:9d:63:a0:5c: dc:64:67:a6:7d:eb:6d:46:7d:f8:8d:7c:29:0c:ed:34: f5:44:51:f9:ae:d2:19:98:5d:a1:5d:6b:36:b7:71:45: 8e:e1:48:4e:da:ea:cb:6c:8c:c6:1e:db:93:4a:6d:f2: 80:8d:d5:99:8c:d7:25:f3:41:da:05:bf:63:9b:88:a4 Fingerprint (SHA-256): 1F:4C:B0:3E:AA:4B:4E:CE:AA:C1:12:C7:79:76:E2:8D:24:1C:F9:42:0C:37:36:B8:4A:18:B1:5F:ED:B0:21:5B Fingerprint (SHA1): 80:CC:FA:A5:70:6B:D3:95:79:5A:0C:4C:BC:31:A8:A2:D4:5D:82:47 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #335: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:40:e4 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Sep 28 00:41:59 2022 Not After : Wed Dec 28 00:41:59 2022 Subject: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:8c:29:15:9f:1e:62:cc:4c:22:8c:39:29:32:ad:d7: e0:69:bf:cc:a8:b3:a2:91:e9:fe:af:9e:7f:54:f5:32: 55:03:60:65:0d:f1:06:0c:4e:bf:85:5e:c4:d7:6b:fd: b2:b1:f0:9b:d1:97:c3:01:74:ea:6b:7b:6b:43:93:b4: bb:a3:80:ef:01:2b:0f:af:c6:27:4c:e9:6f:9d:80:d3: b8:ce:d6:c6:a7:c9:30:0e:32:03:2c:8d:87:10:4b:ae: 85:99:9a:87:a2:91:32:71:3d:6b:22:d7:87:66:69:cb: 1f:e2:82:d1:12:75:ea:43:5a:43:99:56:f2:6a:11:7d: 8c:5c:46:87:87:c2:05:63:3c:7e:88:28:56:28:a1:da: 11:18:70:45:24:bd:18:27:d3:96:31:3b:42:a5:3b:7e: 18:61:24:84:37:3d:10:0c:7b:96:ba:76:54:9c:91:13: c1:3e:04:90:6d:39:03:2f:e4:cd:56:aa:a8:c0:07:3a: 2d:d1:72:e6:76:85:27:eb:49:73:ea:e6:80:80:15:41: e3:1a:ce:69:aa:ce:31:5b:28:0a:7e:79:13:52:95:d9: dd:17:4e:c3:a8:15:94:a6:28:98:e5:76:4c:1d:3d:13: 7b:f9:df:e1:b0:66:d7:92:42:3a:8c:b9:21:bc:50:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:7a:8b:2a:32:a3:d0:d5:25:6c:76:60:01:95:26:0d: 8d:df:01:88:23:43:ff:3f:d1:d3:d9:9d:f5:74:05:e7: 69:6e:52:a0:74:5e:ac:80:5c:91:37:7f:ca:ce:76:f8: 48:35:65:f2:6c:50:ac:bb:e0:e6:3c:35:36:4a:33:1b: 88:23:12:6e:c4:2e:ea:03:44:ec:bf:e0:d4:39:b2:13: fa:d8:c3:b8:e5:c2:0e:36:93:d7:76:30:48:ce:5c:9a: 7a:b7:94:82:4f:34:72:a6:24:54:dd:d9:3c:d0:c1:78: 4a:e5:bc:c0:d7:80:73:da:56:b9:25:68:ba:4c:3b:96: 8e:75:a0:a5:79:dc:8d:e1:6f:e3:3d:78:f6:f6:11:ea: e8:08:38:a9:76:72:a6:7d:e3:4e:0c:a0:c9:14:da:cd: 1d:8f:ad:b9:23:58:16:6e:8c:d2:25:53:6b:d0:d3:bf: bd:34:3c:d1:ea:21:9f:44:44:91:8f:a8:a1:ec:78:56: 46:9a:14:0a:4e:41:a4:30:d2:e2:f0:e9:1c:9a:c5:cf: 5a:49:17:58:24:66:65:7d:2b:92:f1:05:10:35:55:78: 05:e6:c1:9b:0f:de:d4:9b:12:b7:02:c9:16:0c:9b:fe: ef:a1:0b:8f:85:0c:be:bd:bd:92:8b:f4:bf:d1:e3:3e Fingerprint (SHA-256): 6A:4E:63:2F:64:4D:1A:73:4B:77:B1:A2:E1:77:68:D1:2B:BD:B3:41:A7:7A:A7:80:B2:5B:3E:7D:82:B8:E1:96 Fingerprint (SHA1): C1:70:A5:05:59:A0:BF:7B:EF:96:A9:B0:C2:FE:D6:42:8E:32:67:85 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #336: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:40:ea Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Sep 28 00:42:02 2022 Not After : Wed Dec 28 00:42:02 2022 Subject: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:cf:73:15:e9:23:72:90:0e:10:03:3a:6b:d1:eb:ac: f6:d2:de:1f:da:4d:85:11:81:c3:9e:05:24:50:84:14: 0d:1c:4b:bf:92:c7:aa:f3:ed:9d:f9:bc:ef:03:cb:a0: 0e:b3:58:4f:59:98:2a:25:c5:1f:67:4e:86:5d:a7:7b: 61:7b:b0:69:ff:df:7e:7f:d6:5b:97:94:e1:40:e2:b2: 50:56:69:84:44:ba:4b:e5:36:81:cf:6a:c1:31:70:d3: 34:fd:91:81:83:a3:1a:fd:d5:bf:57:b6:d9:53:4a:c2: 68:34:21:10:b2:83:c8:ce:5e:e5:ef:1e:68:5e:07:de: 46:5b:89:ec:4b:4b:3e:6c:c8:75:bc:0a:86:6a:8d:2b: e9:0c:47:39:34:4a:c9:1f:f7:0c:ac:ab:25:d8:2b:de: f4:49:aa:18:ad:2f:1c:26:5a:a3:0d:c2:ef:ec:e6:09: 86:62:1f:73:03:99:b9:5e:4f:31:a5:25:5f:b5:19:4a: 52:1f:71:0a:2b:f1:bc:35:04:f8:8d:2f:14:19:9c:64: 9c:0f:ca:97:84:c7:7a:30:bb:41:d9:94:6a:9f:0b:a9: a7:4c:a7:48:b3:2e:ef:67:c3:47:25:a6:e4:bd:da:d1: 8b:23:99:ab:41:04:d0:a0:21:64:23:f1:59:4c:28:11 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:fb:09:1b:15:b9:49:a7:60:99:36:e5:a7:5a:0c:40: a1:9a:85:6d:b1:60:60:7e:22:83:20:8c:b2:b3:4c:63: c3:92:96:c1:aa:71:b7:8c:da:7d:4d:28:5a:91:5d:10: ee:3e:47:65:85:0c:7a:5f:b9:42:4b:63:f0:60:1d:07: 2e:c5:a9:c1:42:91:f5:89:69:15:60:40:f0:07:90:75: 5e:8a:5a:19:81:58:8f:5c:9a:83:d7:17:66:58:3d:ce: 1d:aa:88:98:03:95:13:c1:a4:8a:e9:02:9a:db:a2:53: 37:59:c7:8f:3b:1a:b3:a9:18:f3:bc:b9:d6:8c:d0:15: f8:a4:36:8a:06:14:e1:4d:6b:3a:b9:29:f4:19:ea:91: c9:8b:ac:cb:3f:8a:6b:7a:ce:ee:27:89:c4:bf:8e:7b: 2c:ad:47:8a:62:53:cf:97:02:7a:1e:5d:c4:ba:1f:b3: 5e:e8:69:a0:0e:84:1c:e6:22:f2:ab:f9:2a:53:52:66: 5c:34:d4:1b:5b:bb:63:63:f1:79:c8:34:51:32:7c:a9: c2:ce:9e:e9:d3:c3:1e:6a:6f:38:5b:d3:a1:1f:1d:bf: 56:89:2c:8c:23:50:10:38:33:60:33:39:2b:43:56:3d: 56:74:aa:61:a5:fe:68:93:4b:b0:15:3d:94:98:28:dc Fingerprint (SHA-256): 8A:62:A9:B1:8D:2A:F2:B0:80:C9:05:4E:1E:BC:BF:23:EA:A2:C7:03:C9:87:37:31:C6:53:4A:F0:9D:08:46:B0 Fingerprint (SHA1): 5E:3B:1A:7C:A6:C4:88:21:3E:83:2C:4A:FB:03:F3:BB:11:1E:41:27 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #337: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:40:f0 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Sep 28 00:42:05 2022 Not After : Wed Dec 28 00:42:05 2022 Subject: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:7c:55:28:ae:ca:6f:96:85:b5:31:a1:0e:db:48:fe: 71:d2:43:06:6a:b7:49:e4:ad:8b:c8:ce:99:96:00:59: 47:7d:a3:20:da:be:ff:7f:b7:a2:17:c2:88:b1:64:2e: 3d:db:3a:98:d8:ee:e3:05:70:6e:fa:00:97:e4:1d:d7: d4:f3:21:af:00:29:e5:0c:26:75:73:d4:8b:66:99:6d: 3e:e7:05:b9:2b:f4:62:28:2f:62:89:09:b7:ff:ba:d6: 2b:73:9a:b8:2d:cd:01:1b:d3:dc:fc:76:e7:d7:cb:7a: 75:e2:a2:4e:8f:12:39:f9:fd:57:3e:f6:af:f4:ae:df: 0d:2f:57:c8:15:96:8b:cf:3d:bd:06:f9:ae:3c:c8:fc: 31:f6:14:14:e1:4b:27:a9:64:a2:71:b2:c5:e3:9c:b8: d5:68:7f:4d:dd:a9:5c:8e:ab:7a:e9:8d:81:9a:0d:6b: 03:0b:83:09:0b:c2:90:21:31:65:fb:d4:69:6a:a5:16: a9:cc:e2:81:d4:14:a3:3e:d5:48:7b:f6:07:f7:f9:6f: 22:6e:e0:68:b4:59:9b:57:be:57:a9:fa:5f:6c:8d:33: 0d:1d:0d:b3:01:1f:db:eb:1f:29:8e:f1:c1:00:5c:27: b2:73:23:ab:4d:6d:32:57:88:da:55:6f:27:5e:14:0f Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e5:e6:af:20:c3:05:da:e1:a4:22:22:0a:b6:9a:fc:ad: 0b:80:02:f7:fa:8e:79:e5:9f:08:5e:e7:21:8f:31:05: 62:0a:3f:9a:1f:4a:99:a0:32:6c:92:47:b0:73:55:2a: 1d:2d:d2:4d:9e:eb:99:a3:5e:26:51:e1:a3:14:53:1f: c2:94:98:d8:62:3a:e8:fb:64:39:cd:3a:0d:d6:e2:fc: 0c:0a:d4:21:da:3d:e6:a0:dc:c3:de:7f:57:bd:3b:f0: 6b:4c:65:56:d1:18:39:b5:aa:79:da:4f:b9:c7:3f:eb: 33:5b:d9:86:49:2e:10:66:b4:28:96:38:d7:9d:6a:f7: 76:a0:69:07:51:de:ed:bb:ec:32:bc:bf:39:54:71:df: 32:e2:5a:0e:df:6d:9d:f8:44:e9:75:c8:77:c5:44:a5: dd:02:a8:2c:4e:76:06:ca:a4:40:21:97:71:28:c3:e8: 10:cf:01:77:59:87:8f:05:c4:64:91:81:40:e0:4c:e4: f1:00:23:f8:07:2a:64:a8:63:b5:86:c7:a1:8f:2c:ca: 60:d7:a2:10:4a:98:ee:f4:0f:e0:56:61:3c:5f:a6:c1: f7:bf:7a:12:55:30:85:af:7d:b7:bc:aa:01:ab:a6:b8: cd:7b:40:69:86:20:80:9a:21:da:8d:30:5a:f1:5c:40 Fingerprint (SHA-256): 0C:1A:A0:95:1C:9E:7C:CC:5D:3D:37:BB:CB:0A:60:97:BD:64:4D:D1:D2:6F:C4:E4:48:7D:7F:3C:8F:94:F2:D6 Fingerprint (SHA1): 61:C6:53:AA:3F:16:D5:43:71:A1:05:31:04:DB:A5:90:D2:12:2C:C6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #338: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:40:f6 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Sep 28 00:42:09 2022 Not After : Wed Dec 28 00:42:09 2022 Subject: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:0e:ff:c5:be:c0:4d:66:98:de:90:2a:5f:9a:0d:01: dd:35:25:86:a0:ef:60:0b:f2:42:c7:df:ef:84:d3:7e: 61:e9:ed:60:35:c4:68:c9:fc:30:2b:26:dc:4f:44:3a: b9:eb:4b:ca:fd:4b:33:c9:40:f7:db:a1:c3:f7:2e:a0: 1a:45:e8:d0:7c:aa:69:ca:6c:8a:e7:5b:a3:71:da:03: d8:a3:b7:94:9d:bf:af:22:bf:64:0d:23:ef:82:a7:30: 46:4c:5c:e7:7f:a6:9d:92:3c:56:5a:8a:73:af:7d:33: ae:14:a3:d5:67:89:71:b8:1d:90:89:2c:2e:f4:bc:b3: 98:77:03:ba:d2:6e:50:a2:56:a9:d9:a2:52:ba:f8:e6: f7:b4:96:26:9c:41:7c:1f:10:03:3e:be:42:56:40:8d: 03:07:cd:25:c0:61:08:c6:06:6d:ab:57:53:3e:68:86: 0c:67:e3:1f:bf:ca:79:62:8e:6e:d4:b3:de:f3:4e:c1: 1f:2a:f8:65:21:49:94:b3:b9:5e:10:2a:2b:3e:0c:a3: d1:5f:27:83:e7:6c:96:c9:00:a5:26:ba:38:71:40:87: c3:fd:03:a2:57:1a:14:1f:c5:5f:8e:c2:33:85:49:13: 03:6d:43:5b:09:c0:3a:24:d2:cf:46:aa:73:45:cc:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:eb:32:34:a3:15:2b:b6:7f:98:99:ba:61:ab:09:29: ca:c8:36:22:11:66:fa:3c:fe:dc:c2:58:a7:a2:27:f0: a9:db:fb:87:d0:90:a7:73:13:b5:94:43:bf:ff:8c:f6: b9:35:cd:94:2d:ea:82:66:72:59:f9:52:be:b9:39:04: c8:bb:f1:aa:4c:2e:38:cf:1e:17:d5:8d:2b:57:af:cb: 8b:e8:fa:86:1a:3f:9c:02:48:1e:11:93:98:da:d7:eb: 23:7d:43:b8:f6:fc:32:f1:b6:e9:91:5d:70:4d:e3:e3: 96:ed:e7:d6:85:44:7a:9f:b6:64:27:e0:08:89:af:fa: f5:a7:5b:ff:63:db:c9:b5:ac:04:a5:9e:f8:90:0b:ea: 45:68:d1:4e:4d:ba:16:22:a3:1e:b9:b6:dd:0b:d9:09: bb:7b:73:f3:9e:53:10:0e:05:8e:35:82:4d:ba:7f:e7: d7:f2:bb:74:c0:b1:a7:b2:cc:de:1c:14:ec:e6:a4:13: 08:64:21:37:ce:7f:e7:6a:e8:f8:8e:40:61:b3:c5:18: b6:7d:d4:fd:6f:15:1b:05:b1:28:3b:d9:90:2b:83:42: d2:81:cc:dc:9a:a0:9b:96:d8:87:f3:17:09:d5:2a:be: 58:6d:21:82:41:62:5b:fa:0e:60:94:a8:af:ec:5e:b8 Fingerprint (SHA-256): 4C:2E:56:E6:6A:A0:CB:16:C9:75:0B:F2:56:2A:EB:09:59:E7:2F:A6:09:CD:CE:ED:68:BF:35:04:DB:3D:DB:44 Fingerprint (SHA1): 36:AD:C8:A6:5E:1E:7E:92:B9:5A:29:99:7B:38:5C:17:63:FA:0A:74 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #339: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:40:fd Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Wed Sep 28 00:42:12 2022 Not After : Wed Dec 28 00:42:12 2022 Subject: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:3e:9c:74:af:7b:18:25:61:31:98:aa:ce:08:cf:a2: 12:b2:a2:f8:62:8e:d1:81:65:89:a2:03:0e:5e:a4:9d: 45:d1:3a:bd:e9:b7:7f:b8:5a:4a:89:77:db:71:40:78: 1f:8e:72:50:ea:8d:92:7d:96:e4:a3:ec:88:e3:12:61: 8a:b7:a0:95:26:c2:c5:e1:4d:23:17:70:4e:3a:8e:e3: e3:43:c5:9f:36:97:34:89:53:fc:e3:b5:e8:1e:a6:60: 85:3d:a6:7f:bd:cc:10:b7:ce:09:aa:45:53:ac:13:d8: 66:91:11:60:36:86:1e:0f:61:5b:f8:0f:30:53:48:8e: a2:33:34:6a:1a:69:e6:46:07:04:a4:d0:a0:37:75:d9: 4f:31:9b:5c:25:79:a6:c5:c7:be:d3:2f:80:16:5c:c6: 7f:33:f5:f2:d5:a6:a1:d5:fb:7c:5e:d3:66:e1:aa:b5: 6d:b9:c0:df:bf:6b:7d:49:6c:1e:46:e6:25:64:73:f0: b8:67:3d:03:72:a8:28:a4:c7:c6:21:e7:e0:6d:7d:ed: a5:25:5e:98:53:44:10:37:bd:8f:ba:ce:f8:74:87:21: 6e:f9:42:a2:3c:2d:43:6a:be:13:61:f9:c5:c4:07:2e: a4:72:90:5d:8e:5f:16:05:61:68:7e:25:11:05:eb:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:7d:bb:af:99:8a:31:f8:b7:0e:e7:25:ae:51:c0:04: 03:a7:d2:27:40:4d:e9:f4:d2:11:da:c3:3e:53:8a:0d: c2:15:01:05:fe:6b:53:9d:93:c9:72:14:82:cf:c2:ee: 1e:02:62:20:e7:01:01:7e:1d:53:e2:fd:67:4e:3f:c1: cd:02:12:47:8d:ef:c3:4f:18:af:c6:c5:d8:1f:3e:cc: 30:46:bf:ee:3d:8d:8c:d8:3f:0e:2e:80:85:f8:5a:1a: 12:b1:91:58:bf:c2:a2:4b:b8:96:1d:b8:e7:9a:4f:71: 26:7b:5c:78:c0:ea:81:6b:1d:22:87:52:fe:32:b5:66: 77:1c:ac:81:42:13:8e:5a:e9:0a:1d:73:17:3f:5c:ce: a8:7f:a5:51:5f:36:c2:f9:58:39:7d:1e:cd:e0:76:3a: b4:90:d5:5b:5c:ae:73:92:85:c7:4f:ab:30:c5:a8:af: 3c:3a:25:92:1b:5d:32:1b:20:67:3a:df:39:1e:b1:12: d6:e1:44:18:24:be:d2:3c:aa:66:84:c0:e6:53:e8:3d: f2:6b:14:64:ab:79:97:62:00:47:56:a0:93:a4:f6:de: 80:bc:77:55:31:49:61:4e:ea:d5:dc:6d:c6:f8:d7:50: b7:fc:41:22:42:f0:c2:20:50:17:b2:a6:0e:8a:6f:f4 Fingerprint (SHA-256): CC:D7:E7:F8:8A:D5:E8:D9:45:08:53:04:1D:F3:27:1C:B1:4D:0F:C2:75:35:85:DD:6D:8A:A2:3C:60:8B:C8:6E Fingerprint (SHA1): 3F:78:36:89:45:D4:D8:D9:68:A0:67:BB:5A:AD:4C:AE:2E:A6:9A:B0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #340: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:41:04 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Wed Sep 28 00:42:16 2022 Not After : Wed Dec 28 00:42:16 2022 Subject: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:7f:04:ea:a6:09:01:b5:f2:12:64:3d:bf:65:ac:38: 2c:7b:73:76:76:46:cf:a1:9a:b7:e3:12:40:a1:3a:9e: e2:36:f4:94:bd:4e:21:8a:60:49:b5:2c:f5:e7:25:55: 09:6a:48:ac:a5:dc:95:4e:64:87:2d:56:9f:a5:c4:a7: a0:6e:f9:28:61:36:b6:1e:a2:2a:d3:2b:09:61:df:23: f9:22:2a:f0:2c:c3:67:93:a4:85:d9:ce:81:87:66:18: 2b:3e:a8:18:c3:e5:cd:72:34:e0:a0:d9:af:27:04:7e: d7:34:54:c1:23:4f:b2:94:3d:39:8c:13:3d:dc:f9:2a: 9b:71:f9:0c:64:b9:59:80:f7:48:34:e5:d3:fd:0c:b7: 5a:bf:5a:db:15:cc:73:58:da:30:02:38:49:2b:20:94: d4:e1:18:ae:a3:6c:3d:5a:52:4a:b6:38:e5:ea:5f:06: 52:53:28:38:7e:49:04:1e:f1:d3:02:f2:d1:ad:6f:dc: 3d:70:ea:71:24:6d:93:00:79:53:f3:9c:4f:08:e2:8a: 99:1e:ed:c8:4f:bf:f2:29:d7:ea:5c:ce:f8:d8:ed:b4: 0b:23:95:47:f0:50:46:24:f2:ce:10:de:e4:65:3f:7a: 00:1f:3d:49:f9:a2:89:dc:de:af:36:98:c5:c2:c6:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:9c:75:12:83:89:da:57:7c:ab:55:27:15:30:ba:f4: ac:56:1d:6c:25:c0:f2:6e:87:d5:fb:33:54:8d:d3:20: 55:1a:a4:ab:ec:c1:0c:1d:d7:56:77:1c:3c:1d:f5:68: e8:97:ec:65:61:c7:49:52:07:4b:97:8f:5e:3c:67:1d: 42:f6:90:07:f3:47:77:c1:55:17:f5:bc:2c:01:80:35: a0:cc:52:bc:3d:1e:2b:8e:20:82:44:28:35:43:e8:00: 6c:b7:ea:9d:eb:c1:7b:5f:06:9a:93:84:86:5b:86:16: 2a:41:c9:78:87:70:5c:89:52:3b:f8:36:b8:fb:7d:92: bf:2b:a0:80:d8:33:95:b2:fc:ce:68:01:64:80:06:71: c7:85:9b:0a:be:98:53:b8:42:9c:0f:8e:ec:2e:ca:2e: 3b:3c:22:75:b9:9b:f2:94:8f:4a:5b:7a:f7:ca:8f:85: ee:c1:93:d2:9a:d4:7b:dc:58:79:72:91:05:59:f1:f4: 9d:95:cb:59:36:c8:35:c7:ba:19:b1:79:21:55:9a:38: 9d:7a:74:ef:58:de:8a:d1:bb:b5:82:47:21:fb:d8:78: 11:4d:51:f3:46:41:0b:7b:f4:94:2e:18:a0:8d:e5:d2: 83:f0:86:57:85:90:8c:a6:9a:ff:e0:f0:f7:ba:bf:ba Fingerprint (SHA-256): 15:E7:A4:D2:77:FB:55:E7:48:18:B5:F2:34:50:FE:18:74:F3:D3:EA:09:13:A3:3D:75:FB:19:82:DA:AD:10:8B Fingerprint (SHA1): AE:D3:53:3D:57:07:48:B1:58:DB:D4:6B:C8:FD:C2:70:AD:1A:C1:E9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #341: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #342: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #343: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #344: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:41:15 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed Sep 28 00:42:25 2022 Not After : Wed Dec 28 00:42:25 2022 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:8e:1b:a3:fd:b7:6f:14:d6:a9:7a:a2:32:ef:97:4e: 01:19:8b:90:35:7b:8a:b6:1a:b1:40:ea:f4:64:fa:96: d6:09:41:6a:f2:7e:ac:d6:c0:01:0a:59:03:de:ff:23: c3:67:56:d2:c4:25:b2:8d:f1:4d:62:27:50:33:de:5c: f0:77:4b:09:e8:a3:c8:23:30:3e:3f:55:95:1e:ca:6e: 32:93:4e:8e:93:bd:f4:6a:f9:d8:35:f8:12:3a:f0:0f: 87:80:67:ef:f4:db:e0:58:fb:b4:68:bb:8f:b1:d5:90: 0c:8c:bb:9b:e3:d0:4c:5c:ef:58:63:54:1d:04:21:6f: fd:5e:dd:4a:e5:6d:4a:0a:e8:5b:a6:5b:a7:08:b8:e5: 52:e1:3f:07:e2:66:c0:ff:a0:2a:aa:2d:10:68:8a:71: 2e:5b:c7:e8:51:aa:1e:11:8e:f9:29:84:92:35:a0:78: 46:85:60:1c:b9:46:cb:fc:68:cf:55:fe:c8:ac:4d:ef: 80:f7:6f:f9:d8:d6:84:bf:2f:4b:d8:10:d7:22:82:86: b1:85:90:bf:be:e7:2b:96:31:9d:80:fc:e3:38:7b:46: 44:a9:a6:57:8e:49:65:e5:6b:12:a9:2b:ca:9a:e1:4c: 56:9e:52:09:c4:2a:d7:d2:18:cb:b9:73:78:cb:4e:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 75:d7:1b:44:2b:cd:55:69:2e:78:c9:07:1f:9b:c3:e0: fb:0c:e5:5a:03:3e:9b:20:79:1b:93:8b:10:f1:5d:a3: d0:17:3e:1c:3a:6f:6f:6f:a0:8d:25:f6:6a:93:b6:06: 58:b8:f8:0d:98:23:9f:20:bf:65:96:c3:ac:3d:41:28: e5:f3:22:2e:3a:12:50:2b:37:59:48:73:06:f7:6a:80: 27:74:21:b0:a6:74:f3:3d:aa:b5:91:87:69:2c:f2:bd: 6e:ab:d1:5f:ea:1f:f1:95:c4:90:12:56:31:ed:80:00: a8:7d:b3:e4:8b:24:6d:0c:a7:cb:bf:cf:33:c6:e9:87: 55:62:b0:dc:52:43:f6:5b:04:e2:28:04:75:6a:47:65: 77:62:24:34:f4:0e:f3:87:64:e8:0a:58:59:ea:49:a7: 89:86:37:fd:f7:67:ae:fd:f0:58:66:f4:09:13:98:4f: 75:b4:e5:eb:b6:06:65:3c:27:a3:e6:01:2d:f8:0e:38: d0:c4:22:4f:4a:3f:2a:ec:cd:8b:7a:99:c1:c0:a9:7d: c3:20:79:bc:4e:17:fc:51:e8:1f:a2:70:c8:96:00:bc: ac:bf:dc:12:41:6d:51:e4:99:9b:f6:f5:c5:15:96:74: 65:97:95:c9:d7:dc:ae:2a:58:22:5a:0a:11:6f:cd:25 Fingerprint (SHA-256): F6:7D:EB:DD:23:23:75:FF:18:67:66:3F:22:AA:5E:7F:73:B0:65:7B:61:57:A7:12:EF:93:75:44:F5:AF:8E:AA Fingerprint (SHA1): A8:46:9B:C0:A3:6D:8E:68:77:EB:AB:23:DF:76:96:A5:27:6D:09:91 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #345: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der cert.sh: #346: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #347: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #348: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #349: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #350: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #351: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #352: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:41:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed Sep 28 00:42:40 2022 Not After : Wed Dec 28 00:42:40 2022 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:3c:55:de:d4:ed:d3:13:d4:26:3d:71:ff:08:71:b9: 4a:46:5e:0f:7b:72:7b:ec:14:10:cb:97:28:08:72:82: 13:7b:2b:88:ef:29:2e:78:0e:09:61:95:88:05:ca:87: ac:51:72:cb:e3:c1:a3:83:e2:28:02:e8:48:3d:75:11: 8e:d4:c7:ea:3d:42:58:7c:d1:45:2c:d5:cb:11:8b:38: c9:9b:09:58:0f:ad:e1:4e:2e:eb:f1:be:10:0f:fb:77: d1:7c:10:4a:a6:24:1a:90:47:a2:de:7f:52:35:ea:3d: f1:e4:f4:70:33:48:74:e7:45:6f:7b:ee:67:85:97:09: 8c:4a:86:fc:03:6f:13:91:06:79:06:d3:fc:33:3c:25: 40:9c:56:fc:19:80:e1:fa:63:12:f4:d9:6a:b0:4b:a7: 58:66:ea:42:dd:5b:5f:1f:e4:f0:35:57:63:80:5d:c9: 0c:e8:9f:4c:ab:d5:07:01:03:aa:c4:53:de:1f:58:f1: af:e2:d2:e7:04:4d:c2:f8:18:19:6c:39:d8:1c:52:0e: 59:78:7e:37:7c:27:3b:1c:ac:e6:a5:8c:28:53:ad:c1: 48:2d:d8:fe:c5:92:0b:62:ec:1d:08:03:f7:e4:bb:92: df:51:42:3d:1e:a0:eb:2e:c4:2a:9c:00:ba:cd:7a:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:b4:00:77:ab:b0:92:07:27:87:74:06:c4:cb:ee:95: 09:95:f5:5a:73:a4:54:84:d7:ef:be:12:bd:62:86:0d: ea:51:4f:9e:61:09:1f:57:d8:61:e5:24:58:24:a7:80: 6b:be:d6:a6:63:b0:ca:f1:42:39:81:f1:d7:c1:d0:0e: c7:4f:1e:2a:53:a9:2e:77:0f:57:93:e2:c6:de:e4:7e: db:47:62:38:d3:ed:41:4d:9b:65:72:0d:34:a2:2b:c0: 2a:1e:58:2f:d0:e9:dc:62:45:18:bd:c6:31:85:2f:53: e5:47:ac:47:53:9e:ca:36:3e:8d:30:fd:f9:b9:70:ed: e1:16:df:f7:99:8f:9b:b5:88:55:e9:28:f2:01:bc:6e: 36:fc:af:20:54:4f:78:e8:3d:80:28:c7:64:2a:75:98: 29:60:76:5d:34:e6:38:db:54:58:e0:54:73:85:0a:31: 61:84:24:71:7f:e1:b6:97:f5:db:e5:a5:cf:54:0e:0e: 5e:20:8d:75:a9:95:12:f7:79:21:7e:57:be:aa:c0:b1: 6b:d1:76:25:23:bf:d7:00:06:5e:39:78:18:22:0c:63: f2:90:f0:ab:e3:4b:a9:74:0c:43:fc:0a:b5:05:23:6e: 8c:63:40:94:57:b3:d8:ad:62:e0:cd:46:be:42:58:3a Fingerprint (SHA-256): 97:A5:93:9C:1F:7A:00:A7:4E:94:47:99:E8:9A:51:E2:38:1A:E3:83:BC:06:CD:DB:63:6D:5D:12:44:28:8D:3F Fingerprint (SHA1): 9E:37:69:F6:55:5C:29:7C:BF:25:3C:55:00:D7:9D:3D:60:13:BA:0F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #353: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #354: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #355: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw cert.sh: #356: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #357: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #358: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dbpass -o root.cert cert.sh: #359: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #360: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #361: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #362: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #363: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #364: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA.ca.cert cert.sh: #365: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #366: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #367: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #369: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #372: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #375: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #378: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #381: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created Importing RSA-PSS server certificate Import Distrusted's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #383: Generate RSA-PSS Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 32000 -v 60 -d ../CA -i req -o Distrusted-rsa-pss.cert -f ../tests.pw cert.sh: #384: Sign Distrusted's RSA-PSS Request - PASSED cert.sh: Import Distrusted's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Distrusted-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import Distrusted's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Distrusted's RSA-PSS Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #386: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #387: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #388: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #389: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #390: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #391: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #392: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #393: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #394: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #395: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #396: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #397: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #398: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #399: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #400: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #401: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #402: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #403: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #404: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #405: perform selftest - PASSED cert.sh: Initialize Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw cert.sh: #406: Initialize Cert DB - PASSED cert.sh: Import RSA CA Cert -------------------------- certutil -A -n TestCA -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i ../CA/TestCA.ca.cert cert.sh: #407: Import RSA CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert -------------------------- certutil -A -n TestCA-rsa-pss -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss.ca.cert cert.sh: #408: Import RSA-PSS CA Cert - PASSED cert.sh: Verify RSA-PSS CA Cert -------------------------- certutil -V -u L -e -n TestCA-rsa-pss -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #409: Verify RSA-PSS CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert (SHA1) -------------------------- certutil -A -n TestCA-rsa-pss-sha1 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss-sha1.ca.cert cert.sh: #410: Import RSA-PSS CA Cert (SHA1) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -A -n TestCA-bogus-rsa-pss1 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestCA-bogus-rsa-pss1.crt cert.sh: #411: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss1 -u L -e -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #412: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -A -n TestCA-bogus-rsa-pss2 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestCA-bogus-rsa-pss2.crt cert.sh: #413: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss2 -u L -e -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #414: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss1 -------------------------- certutil -s "CN=TestUser-rsa-pss1, E=TestUser-rsa-pss1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #415: Generate Cert Request for TestUser-rsa-pss1 - PASSED cert.sh: Sign TestUser-rsa-pss1's Request -------------------------- certutil -C -c TestCA --pss-sign -m 200 -v 60 -d ../CA -i req -o TestUser-rsa-pss1.cert -f ../tests.pw cert.sh: #416: Sign TestUser-rsa-pss1's Request - PASSED cert.sh: Import TestUser-rsa-pss1's Cert -------------------------- certutil -A -n TestUser-rsa-pss1 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss1.cert cert.sh: #417: Import TestUser-rsa-pss1's Cert - PASSED cert.sh: Verify TestUser-rsa-pss1's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #418: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: #419: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss2 -------------------------- certutil -s "CN=TestUser-rsa-pss2, E=TestUser-rsa-pss2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #420: Generate Cert Request for TestUser-rsa-pss2 - PASSED cert.sh: Sign TestUser-rsa-pss2's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA512 -m 201 -v 60 -d ../CA -i req -o TestUser-rsa-pss2.cert -f ../tests.pw cert.sh: #421: Sign TestUser-rsa-pss2's Request - PASSED cert.sh: Import TestUser-rsa-pss2's Cert -------------------------- certutil -A -n TestUser-rsa-pss2 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss2.cert cert.sh: #422: Import TestUser-rsa-pss2's Cert - PASSED cert.sh: Verify TestUser-rsa-pss2's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss2 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #423: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: #424: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss3 -------------------------- certutil -s "CN=TestUser-rsa-pss3, E=TestUser-rsa-pss3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser-rsa-pss3 - PASSED cert.sh: Sign TestUser-rsa-pss3's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 202 -v 60 -d ../CA -i req -o TestUser-rsa-pss3.cert -f ../tests.pw cert.sh: #426: Sign TestUser-rsa-pss3's Request - PASSED cert.sh: Import TestUser-rsa-pss3's Cert -------------------------- certutil -A -n TestUser-rsa-pss3 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss3.cert cert.sh: #427: Import TestUser-rsa-pss3's Cert - PASSED cert.sh: Verify TestUser-rsa-pss3's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss3 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #428: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: #429: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss4 -------------------------- certutil -s "CN=TestUser-rsa-pss4, E=TestUser-rsa-pss4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #430: Generate Cert Request for TestUser-rsa-pss4 - PASSED cert.sh: Sign TestUser-rsa-pss4's Request -------------------------- certutil -C -c TestCA --pss-sign -m 203 -v 60 -d ../CA -i req -o TestUser-rsa-pss4.cert -f ../tests.pw cert.sh: #431: Sign TestUser-rsa-pss4's Request - PASSED cert.sh: Import TestUser-rsa-pss4's Cert -------------------------- certutil -A -n TestUser-rsa-pss4 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss4.cert cert.sh: #432: Import TestUser-rsa-pss4's Cert - PASSED cert.sh: Verify TestUser-rsa-pss4's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss4 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #433: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: #434: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss5 -------------------------- certutil -s "CN=TestUser-rsa-pss5, E=TestUser-rsa-pss5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #435: Generate Cert Request for TestUser-rsa-pss5 - PASSED cert.sh: Sign TestUser-rsa-pss5's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -m 204 -v 60 -d ../CA -i req -o TestUser-rsa-pss5.cert -f ../tests.pw cert.sh: #436: Sign TestUser-rsa-pss5's Request - PASSED cert.sh: Import TestUser-rsa-pss5's Cert -------------------------- certutil -A -n TestUser-rsa-pss5 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss5.cert cert.sh: #437: Import TestUser-rsa-pss5's Cert - PASSED cert.sh: Verify TestUser-rsa-pss5's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss5 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #438: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: #439: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss6 -------------------------- certutil -s "CN=TestUser-rsa-pss6, E=TestUser-rsa-pss6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser-rsa-pss6 - PASSED cert.sh: Sign TestUser-rsa-pss6's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 205 -v 60 -d ../CA -i req -o TestUser-rsa-pss6.cert -f ../tests.pw cert.sh: #441: Sign TestUser-rsa-pss6's Request - PASSED cert.sh: Import TestUser-rsa-pss6's Cert -------------------------- certutil -A -n TestUser-rsa-pss6 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss6.cert cert.sh: #442: Import TestUser-rsa-pss6's Cert - PASSED cert.sh: Verify TestUser-rsa-pss6's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss6 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #443: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: #444: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss7 -------------------------- certutil -s "CN=TestUser-rsa-pss7, E=TestUser-rsa-pss7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #445: Generate Cert Request for TestUser-rsa-pss7 - PASSED cert.sh: Sign TestUser-rsa-pss7's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA512 -m 206 -v 60 -d ../CA -i req -o TestUser-rsa-pss7.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #446: Sign TestUser-rsa-pss7's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss8 -------------------------- certutil -s "CN=TestUser-rsa-pss8, E=TestUser-rsa-pss8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #447: Generate Cert Request for TestUser-rsa-pss8 - PASSED cert.sh: Sign TestUser-rsa-pss8's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA256 -m 207 -v 60 -d ../CA -i req -o TestUser-rsa-pss8.cert -f ../tests.pw cert.sh: #448: Sign TestUser-rsa-pss8's Request - PASSED cert.sh: Import TestUser-rsa-pss8's Cert -------------------------- certutil -A -n TestUser-rsa-pss8 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss8.cert cert.sh: #449: Import TestUser-rsa-pss8's Cert - PASSED cert.sh: Verify TestUser-rsa-pss8's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss8 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #450: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: #451: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss9 -------------------------- certutil -s "CN=TestUser-rsa-pss9, E=TestUser-rsa-pss9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser-rsa-pss9 - PASSED cert.sh: Sign TestUser-rsa-pss9's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 208 -v 60 -d ../CA -i req -o TestUser-rsa-pss9.cert -f ../tests.pw cert.sh: #453: Sign TestUser-rsa-pss9's Request - PASSED cert.sh: Import TestUser-rsa-pss9's Cert -------------------------- certutil -A -n TestUser-rsa-pss9 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss9.cert cert.sh: #454: Import TestUser-rsa-pss9's Cert - PASSED cert.sh: Verify TestUser-rsa-pss9's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss9 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #455: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: #456: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss10 -------------------------- certutil -s "CN=TestUser-rsa-pss10, E=TestUser-rsa-pss10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #457: Generate Cert Request for TestUser-rsa-pss10 - PASSED cert.sh: Sign TestUser-rsa-pss10's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 -m 209 -v 60 -d ../CA -i req -o TestUser-rsa-pss10.cert -f ../tests.pw cert.sh: #458: Sign TestUser-rsa-pss10's Request - PASSED cert.sh: Import TestUser-rsa-pss10's Cert -------------------------- certutil -A -n TestUser-rsa-pss10 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss10.cert cert.sh: #459: Import TestUser-rsa-pss10's Cert - PASSED cert.sh: Verify TestUser-rsa-pss10's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss10 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #460: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: #461: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss11 -------------------------- certutil -s "CN=TestUser-rsa-pss11, E=TestUser-rsa-pss11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #462: Generate Cert Request for TestUser-rsa-pss11 - PASSED cert.sh: Sign TestUser-rsa-pss11's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 --pss-sign -Z SHA256 -m 210 -v 60 -d ../CA -i req -o TestUser-rsa-pss11.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #463: Sign TestUser-rsa-pss11's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss-policy -------------------------- certutil -s "CN=TestUser-rsa-pss-policy, E=TestUser-rsa-pss-policy@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #464: Generate Cert Request for TestUser-rsa-pss-policy - PASSED cert.sh: Sign TestUser-rsa-pss-policy's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 211 -v 60 -d ../CA -i req -o TestUser-rsa-pss-policy.cert -f ../tests.pw cert.sh: #465: Sign TestUser-rsa-pss-policy's Request - PASSED cert.sh: Import TestUser-rsa-pss-policy's Cert -------------------------- certutil -A -n TestUser-rsa-pss-policy -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss-policy.cert cert.sh: #466: Import TestUser-rsa-pss-policy's Cert - PASSED cert.sh: Verify TestUser-rsa-pss-policy's Cert -------------------------- certutil -V -n TestUser-rsa-pss-policy -u V -V -e -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #467: Verify TestUser-rsa-pss-policy's Cert - PASSED cert.sh: Verify TestUser-rsa-pss-policy's Cert with Policy -------------------------- certutil -V -n TestUser-rsa-pss-policy -u V -V -e -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #468: Verify TestUser-rsa-pss-policy's Cert with Policy - PASSED cert.sh: specify token with PKCS#11 URI cert.sh: List keys in NSS Certificate DB -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> rsa d821c2e35fed774a539ad0c00c2a3322b6c05f10 NSS Certificate DB:localhost.localdomain < 1> dsa 71771ed3d792c338f4246f477321a0f9e19fb403 NSS Certificate DB:localhost.localdomain-dsa < 2> dsa e16452ffcbccf4dc36b0f4952643afb28fe4da47 NSS Certificate DB:localhost.localdomain-dsamixed < 3> ec 6f77080746d96cabe91d324d15cc7e2f4758c479 NSS Certificate DB:localhost.localdomain-ec < 4> ec b1461bdb28de412969d83f8b55dfcd4fcbd754f2 NSS Certificate DB:localhost.localdomain-ecmixed < 5> rsaPss ca75df9632637f07486b5f1b31e55d03e1d449cf TestUser-rsa-pss-interop < 6> rsa 15d5b690365af04c779c9db1c43f464185b718fd NSS Certificate DB:localhost-sni.localdomain < 7> dsa d7e77dac402d4dd43789b617b12d6e8fcd4a993b NSS Certificate DB:localhost-sni.localdomain-dsa < 8> dsa 8a4b3030f877e8918049408d84c163d109238daa NSS Certificate DB:localhost-sni.localdomain-dsamixed < 9> ec 0bac95765cf1c86a94144c8353cfa417373d1319 NSS Certificate DB:localhost-sni.localdomain-ec <10> ec 486636f3234734f94337671b982340b77a823937 NSS Certificate DB:localhost-sni.localdomain-ecmixed <11> rsa 8746fbbc054c1ed3f626a6157ac03f2ea057ff94 (orphan) cert.sh: #469: List keys in NSS Certificate DB - PASSED cert.sh: List keys in NSS Builtin Objects -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects" certutil: no keys found cert.sh: #470: List keys in NSS Builtin Objects - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #471: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #472: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #473: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #474: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #475: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #476: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #477: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #478: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #479: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #480: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #481: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #482: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #483: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #484: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #485: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser40's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #486: Generate RSA-PSS Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o TestUser40-rsa-pss.cert -f ../tests.pw cert.sh: #487: Sign TestUser40's RSA-PSS Request - PASSED cert.sh: Import TestUser40's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser40-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #488: Import TestUser40's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser40's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #489: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #490: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #491: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #492: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #493: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #494: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #495: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #496: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #497: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #498: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #499: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #500: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #501: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #502: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #503: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser41's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #504: Generate RSA-PSS Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30041 -v 60 -d ../CA -i req -o TestUser41-rsa-pss.cert -f ../tests.pw cert.sh: #505: Sign TestUser41's RSA-PSS Request - PASSED cert.sh: Import TestUser41's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser41-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #506: Import TestUser41's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser41's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #507: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #508: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #509: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #510: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #511: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #512: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #513: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #514: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #515: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #516: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #517: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #518: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #519: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #520: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #521: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser42's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #522: Generate RSA-PSS Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30042 -v 60 -d ../CA -i req -o TestUser42-rsa-pss.cert -f ../tests.pw cert.sh: #523: Sign TestUser42's RSA-PSS Request - PASSED cert.sh: Import TestUser42's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser42-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #524: Import TestUser42's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser42's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #525: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #526: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #527: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #528: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #529: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #530: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #531: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #532: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #533: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #534: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #535: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #536: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #537: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #538: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #539: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser43's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #540: Generate RSA-PSS Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30043 -v 60 -d ../CA -i req -o TestUser43-rsa-pss.cert -f ../tests.pw cert.sh: #541: Sign TestUser43's RSA-PSS Request - PASSED cert.sh: Import TestUser43's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser43-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #542: Import TestUser43's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser43's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #543: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #544: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #545: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #546: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #547: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #548: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #549: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #550: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #551: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #552: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #553: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #554: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #555: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #556: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #557: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser44's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #558: Generate RSA-PSS Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30044 -v 60 -d ../CA -i req -o TestUser44-rsa-pss.cert -f ../tests.pw cert.sh: #559: Sign TestUser44's RSA-PSS Request - PASSED cert.sh: Import TestUser44's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser44-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #560: Import TestUser44's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser44's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #561: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #562: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #563: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #564: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #565: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #566: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #567: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #568: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #569: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #570: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #571: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #572: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #573: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #574: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #575: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser45's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #576: Generate RSA-PSS Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30045 -v 60 -d ../CA -i req -o TestUser45-rsa-pss.cert -f ../tests.pw cert.sh: #577: Sign TestUser45's RSA-PSS Request - PASSED cert.sh: Import TestUser45's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser45-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #578: Import TestUser45's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser45's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #579: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #580: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #581: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #582: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #583: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #584: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #585: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #586: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #587: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #588: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #589: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #590: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #591: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #592: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #593: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser46's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #594: Generate RSA-PSS Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30046 -v 60 -d ../CA -i req -o TestUser46-rsa-pss.cert -f ../tests.pw cert.sh: #595: Sign TestUser46's RSA-PSS Request - PASSED cert.sh: Import TestUser46's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser46-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #596: Import TestUser46's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser46's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #597: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #598: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #599: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #600: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #601: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #602: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #603: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #604: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #605: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #606: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #607: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #608: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #609: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #610: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #611: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser47's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #612: Generate RSA-PSS Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30047 -v 60 -d ../CA -i req -o TestUser47-rsa-pss.cert -f ../tests.pw cert.sh: #613: Sign TestUser47's RSA-PSS Request - PASSED cert.sh: Import TestUser47's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser47-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #614: Import TestUser47's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser47's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #615: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #616: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #617: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #618: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #619: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #620: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #621: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #622: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #623: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #624: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #625: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #626: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #627: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #628: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #629: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser48's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #630: Generate RSA-PSS Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30048 -v 60 -d ../CA -i req -o TestUser48-rsa-pss.cert -f ../tests.pw cert.sh: #631: Sign TestUser48's RSA-PSS Request - PASSED cert.sh: Import TestUser48's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser48-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #632: Import TestUser48's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser48's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #633: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #634: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #635: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #636: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #637: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #638: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #639: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #640: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #641: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #642: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #643: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #644: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #645: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #646: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #647: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser49's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #648: Generate RSA-PSS Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30049 -v 60 -d ../CA -i req -o TestUser49-rsa-pss.cert -f ../tests.pw cert.sh: #649: Sign TestUser49's RSA-PSS Request - PASSED cert.sh: Import TestUser49's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser49-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #650: Import TestUser49's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser49's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #651: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #652: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #653: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #654: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #655: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #656: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #657: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #658: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #659: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #660: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #661: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #662: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #663: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #664: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #665: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser50's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #666: Generate RSA-PSS Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o TestUser50-rsa-pss.cert -f ../tests.pw cert.sh: #667: Sign TestUser50's RSA-PSS Request - PASSED cert.sh: Import TestUser50's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser50-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #668: Import TestUser50's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser50's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #669: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #670: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #671: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #672: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #673: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #674: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #675: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #676: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #677: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #678: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #679: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #680: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #681: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #682: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #683: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser51's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #684: Generate RSA-PSS Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30051 -v 60 -d ../CA -i req -o TestUser51-rsa-pss.cert -f ../tests.pw cert.sh: #685: Sign TestUser51's RSA-PSS Request - PASSED cert.sh: Import TestUser51's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser51-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #686: Import TestUser51's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser51's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #687: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #688: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #689: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #690: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #691: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #692: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #693: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #694: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #695: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #696: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #697: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #698: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #699: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #700: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #701: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser52's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #702: Generate RSA-PSS Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30052 -v 60 -d ../CA -i req -o TestUser52-rsa-pss.cert -f ../tests.pw cert.sh: #703: Sign TestUser52's RSA-PSS Request - PASSED cert.sh: Import TestUser52's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser52-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #704: Import TestUser52's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser52's RSA-PSS Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #705: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #706: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #707: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #708: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #709: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #710: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #711: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #712: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #713: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #714: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #715: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #716: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #717: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #718: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #719: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #720: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #721: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Wed Sep 28 00:50:10 UTC 2022 Running tests for dbtests TIMESTAMP dbtests BEGIN: Wed Sep 28 00:50:10 UTC 2022 dbtests.sh: CERT and Key DB Tests =============================== --------------------------------------------------------------- | test opening the database read/write in a nonexisting directory --------------------------------------------------------------- certutil: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #1: Certutil didn't work in a nonexisting dir 255 - PASSED dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtest: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #2: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED --------------------------------------------------------------- | test force opening the database in a nonexisting directory --------------------------------------------------------------- dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtests.sh: #3: Dbtest force succeeded in a nonexisting dir 0 - PASSED --------------------------------------------------------------- | test opening the database readonly in an empty directory --------------------------------------------------------------- tstclnt: unable to open cert database: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #4: Tstclnt didn't work in an empty dir 1 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #5: Dbtest readonly didn't work in an empty dir 46 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir dbtests.sh: #6: Dbtest logout after empty DB Init has key - PASSED dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir dbtests.sh: #7: Dbtest password DB Init maintains needlogin state - PASSED certutil: could not find certificate named "xxxx": SEC_ERROR_INVALID_ARGS: security library: invalid arguments. dbtests.sh: #8: Certutil didn't work in an empty dir 255 - PASSED --------------------------------------------------------------- | test force opening the database readonly in a empty directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/emptydir/key3.db" does not exist. dbtests.sh: #9: Dbtest force readonly succeeded in an empty dir 0 - PASSED --------------------------------------------------------------- | test opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_READ_ONLY: security library: read-only database. dbtests.sh: #10: Dbtest r/w didn't work in an readonly dir 46 - PASSED certutil: could not find certificate named "TestUser": SEC_ERROR_INVALID_ARGS: security library: invalid arguments. dbtests.sh: #11: Certutil didn't work in an readonly dir 255 - PASSED --------------------------------------------------------------- | test opening the database ronly in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtests.sh: #12: Dbtest readonly succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | test force opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtests.sh: #13: Dbtest force succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | ls -l /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir --------------------------------------------------------------- dr-xr-xr-x. 2 mockbuild mockbuild 4096 Sep 28 00:50 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir -r--r-----. 1 mockbuild mockbuild 1227 Sep 28 00:50 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-dsa.cert -r--r-----. 1 mockbuild mockbuild 1427 Sep 28 00:50 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-dsamixed.cert -r--r-----. 1 mockbuild mockbuild 582 Sep 28 00:50 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-ec.cert -r--r-----. 1 mockbuild mockbuild 707 Sep 28 00:50 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-ecmixed.cert -r--r-----. 1 mockbuild mockbuild 881 Sep 28 00:50 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-rsa-pss.cert -r--r-----. 1 mockbuild mockbuild 872 Sep 28 00:50 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/TestUser.cert -r--------. 1 mockbuild mockbuild 244736 Sep 28 00:50 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/cert9.db -r--------. 1 mockbuild mockbuild 152576 Sep 28 00:50 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/key4.db -r--------. 1 mockbuild mockbuild 630 Sep 28 00:50 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/pkcs11.txt -r--r-----. 1 mockbuild mockbuild 728 Sep 28 00:50 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ronlydir/req --------------------------------------------------------------- | test creating a new cert with a conflicting nickname --------------------------------------------------------------- /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/conflictdir certutil: could not add certificate to token or database: SEC_ERROR_ADDING_CERT: Error adding certificate to database. dbtests.sh: #14: Nicknane conflict test, could not import conflict nickname 255 - PASSED --------------------------------------------------------------- | test importing an old cert to a conflicting nickname --------------------------------------------------------------- Certificate: Data: Version: 3 (0x2) Serial Number: 40 (0x28) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:49 2022 Not After : Tue Sep 28 00:39:49 2027 Subject: "CN=Bob,E=Bob@example.com,O=BOGUS NSS,L=Mountain View,ST=Cal ifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:0a:04:bd:47:4e:ea:f1:cf:ac:29:83:cb:0e:f9:81: 85:01:ab:8f:27:a7:c7:17:21:6b:9f:56:f3:a6:aa:b1: ff:08:47:51:fb:74:98:62:56:ee:9b:90:14:5c:e0:d1: 9b:a5:6d:d8:75:98:b5:d1:7c:6e:81:d2:d6:4f:8b:ae: bb:f8:6d:0d:7d:c4:e0:ce:f0:d2:3a:9c:bf:d0:2b:db: 65:92:bd:df:07:51:03:ee:75:49:35:60:23:18:1d:34: 71:97:19:23:7f:d1:11:03:fb:0f:dc:44:28:7e:ff:dc: 0a:9a:77:93:56:fb:93:67:bf:2a:9b:af:f2:6c:3f:ff: f1:98:f6:5c:f1:42:5e:1d:a0:0c:0b:5d:4e:9f:42:84: 2d:58:7b:98:46:72:2e:16:25:8b:da:43:2b:27:b0:e3: a2:0b:58:4b:93:58:53:0d:47:fb:4c:73:d3:ca:24:c4: bf:8d:f7:c9:d4:7e:d2:88:50:aa:e2:7b:89:e5:d0:ca: f2:89:c0:f1:9e:1d:22:f7:0d:7f:58:d1:ca:7c:41:23: b0:14:1e:8f:09:c7:b6:8a:a0:da:a9:5c:2b:e3:e6:41: f6:53:db:26:a7:20:54:c5:2a:35:54:19:75:2c:66:47: de:57:b4:13:47:1a:1e:24:15:88:10:a3:f0:24:a4:6f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:5e:39:bf:32:5b:52:a2:69:3c:21:fd:e9:93:c1:48: 20:78:b8:4c:08:9b:b8:ba:20:92:6d:84:3a:34:70:e5: 55:07:59:4f:51:43:cb:12:04:02:6a:05:5a:67:e6:5b: 8d:d5:9f:4f:45:c6:0a:7c:5e:bc:cd:32:0a:84:37:ad: 86:d9:c4:11:ab:bb:71:e1:26:62:60:2c:bf:b5:64:74: 2d:e9:1f:91:df:68:67:72:d1:fb:5b:69:b9:50:3f:79: 41:8d:62:39:3b:87:51:60:b2:ae:e6:a0:21:e4:d3:33: b2:a2:41:c9:63:d3:56:29:56:40:3f:81:32:e4:b4:a0: 8a:d3:86:e2:a9:38:fc:01:88:fa:c7:da:25:ca:5e:90: e8:8f:14:47:c7:43:ee:c5:cb:90:05:27:d4:a1:4e:3d: d5:38:65:c3:85:b3:eb:05:47:7a:40:2d:05:f5:c1:a1: 3b:a6:c4:40:b8:da:9d:36:c5:d8:14:ac:6f:8d:c0:be: f7:8f:4c:68:55:db:f1:29:54:48:e6:97:bf:5e:f7:d8: b9:bd:6b:a6:da:70:b5:fc:3c:d8:99:0a:58:14:95:21: e9:f3:be:58:91:73:98:98:34:c9:7a:ad:15:40:4b:1d: 67:c7:cf:d3:7a:26:06:6a:76:e1:3d:b1:6c:3e:10:a1 Fingerprint (SHA-256): 87:1E:8E:38:47:AB:EB:AF:5F:E7:F1:CE:C1:56:59:53:81:A8:95:66:18:F5:23:85:06:96:39:07:3E:7B:30:0C Fingerprint (SHA1): 10:14:AE:F1:73:9E:D7:04:6B:60:A0:BB:08:0F:D0:81:18:5B:04:5C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: dbtests.sh: #15: Nickname conflict test-setting nickname conflict was correctly rejected - PASSED Testing RSA PrivateKeyImport *********************** RSA PrivateKeyImport PASSED *********************** Testing DSA PrivateKeyImport *********************** CKA_ID does not match priv key, checking next key DSA PrivateKeyImport PASSED *********************** Testing ECC PrivateKeyImport *********************** CKA_ID does not match priv key, checking next key CKA_ID does not match priv key, checking next key ECC PrivateKeyImport PASSED *********************** pubValue = [128 bytes] { c1, 11, d6, 43, 0b, b5, 22, b1, 8f, 46, 7c, 27, 56, 1f, c8, 6d 0d, bd, e4, e8, 7c, ba, e8, fd, 73, e5, 77, 55, d1, 28, 70, 97 ee, 26, 1e, 08, 5d, 83, 77, 5a, b8, 76, 0b, a3, db, f7, 67, fc 89, bd, f2, 55, 68, 5f, 01, 01, af, 99, 59, 67, 77, c5, a8, d6 a8, bb, 00, 15, 06, 0e, 7a, 1d, 2f, 61, eb, d4, 72, 8c, f7, dc b9, 5f, fe, 31, eb, 1b, 49, bd, eb, 8a, 68, 82, 8d, bf, 36, a1 70, 01, 29, dd, 6e, 6e, 04, 33, df, 93, 96, 83, 59, f2, b3, 39 f0, 90, ec, 19, 3b, 08, bc, 80, 87, fb, fa, c8, 7d, 66, 45, af}; privKey CKA_ID = [20 bytes] { ed, bc, 09, 54, 59, d5, 46, d2, c3, d6, 08, af, dc, 31, 70, 49 ed, 96, 29, 27}; pubKey CKA_ID = [20 bytes] { ed, bc, 09, 54, 59, d5, 46, d2, c3, d6, 08, af, dc, 31, 70, 49 ed, 96, 29, 27}; matching public key found pubValue = [128 bytes] { 09, 60, 89, 33, d8, 7c, f8, 24, e8, 2c, 96, 27, 28, 29, a7, 9d 49, e4, 77, 4d, 46, c9, a2, 71, 1e, ae, b2, 42, 15, 62, 5e, dd 6c, 41, 2b, 48, b0, 3c, b7, 59, 29, 4b, 1c, ec, d8, 09, 67, 32 0b, fa, 60, 5c, 78, c8, 62, bb, bc, 41, 36, 42, 03, c4, 7a, 9e ef, 66, 7a, 84, de, 71, 55, 58, 36, 33, 86, 5c, 41, bb, d8, b8 60, 4d, 55, ff, dc, a8, 57, 3b, bc, 26, c3, 4e, c5, 99, b8, 93 5e, 09, 37, c9, 5e, c1, f7, 8f, fc, 2f, 03, 4f, 0b, 85, fb, 68 05, 89, 4e, 26, 04, bc, 9c, 5d, 13, a2, 19, 5c, aa, 07, 73, cb}; privKey CKA_ID = [20 bytes] { 1d, ba, 66, 57, 3a, 50, 03, 8f, b5, 02, fb, ef, c3, 28, 3c, 2e c7, 95, 47, 8b}; pubKey CKA_ID = [20 bytes] { ed, bc, 09, 54, 59, d5, 46, d2, c3, d6, 08, af, dc, 31, 70, 49 ed, 96, 29, 27}; pubKey CKA_ID = [20 bytes] { 1d, ba, 66, 57, 3a, 50, 03, 8f, b5, 02, fb, ef, c3, 28, 3c, 2e c7, 95, 47, 8b}; matching public key found pubValue = [65 bytes] { 04, ac, f2, 00, 02, f5, aa, d8, ad, d4, 3e, aa, 0a, a2, 73, c6 31, 3b, 6c, 1f, 33, 69, 11, 67, 8d, ed, 75, ec, 93, 8f, 0a, 5c dd, a9, 30, 97, 5d, 12, 98, 89, 58, a2, 3a, 3e, 13, fc, 43, f9 f7, 02, 6e, a8, df, 15, c6, 59, d0, ca, 23, cc, 86, 73, 47, 2a 71}; privKey CKA_ID = [20 bytes] { 74, 45, 05, 9b, e1, 5f, a4, 31, 52, 96, dd, ea, 87, f3, be, 89 3c, df, 07, 3e}; pubKey CKA_ID = [20 bytes] { ed, bc, 09, 54, 59, d5, 46, d2, c3, d6, 08, af, dc, 31, 70, 49 ed, 96, 29, 27}; pubKey CKA_ID = [20 bytes] { 1d, ba, 66, 57, 3a, 50, 03, 8f, b5, 02, fb, ef, c3, 28, 3c, 2e c7, 95, 47, 8b}; pubKey CKA_ID = [20 bytes] { 74, 45, 05, 9b, e1, 5f, a4, 31, 52, 96, dd, ea, 87, f3, be, 89 3c, df, 07, 3e}; matching public key found dbtests.sh: #16: Importing Token Private Key correctly creates the corrresponding Public Key - PASSED /bin/sqlite3 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> rsa edbc095459d546d2c3d608afdc317049ed962927 testKey < 1> dsa 1dba66573a50038fb502fbefc3283c2ec795478b testKey < 2> ec 7445059be15fa4315296ddea87f3be893cdf073e testKey --------------------------------------------------------------- | testing if key corruption is detected in attribute 120 --------------------------------------------------------------- amending sig_key_24fc253b_00000120 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420F8F32BB1019C7EA2A61C561AA309EE63A51672BABF02AE6C0BB0BDB21712F36C02022710020120300A06082A864886F70D0209300A06082A864886F70D020904207DE7100EED7F382CD8BDC2B3D7517C82DEE4BF199EF6AE56424D8633E75D720C to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420F8F32BB1019C7EA2A61C561AA309EE63A51672BABF02AE6C0BB0BDB21712F36C02022710020120300A06082A864886F70D0209300A06082A864886F70D020904207DE7100EED7F382CD8BDC2B3D7517C82DEE4BF199EF6AE56424D8633E75D720D /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/certutil -R -k edbc095459d546d2c3d608afdc317049ed962927 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: Could not get keys from cert edbc095459d546d2c3d608afdc317049ed962927: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. dbtests.sh: #17: Corrupted key attribute 120 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 122 --------------------------------------------------------------- amending sig_key_24fc253b_00000122 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420106BC5D978582D8A5CE7139E58683EADFB3AC13B11775CD1BD5E650F5C8B477002022710020120300A06082A864886F70D0209300A06082A864886F70D0209042081DE42C862397F0D819B3D6ED407D0AEFF00F80FF23BC81B76198F11547F29B5 to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420106BC5D978582D8A5CE7139E58683EADFB3AC13B11775CD1BD5E650F5C8B477002022710020120300A06082A864886F70D0209300A06082A864886F70D0209042081DE42C862397F0D819B3D6ED407D0AEFF00F80FF23BC81B76198F11547F29B6 /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/certutil -R -k edbc095459d546d2c3d608afdc317049ed962927 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: Could not get keys from cert edbc095459d546d2c3d608afdc317049ed962927: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. dbtests.sh: #18: Corrupted key attribute 122 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 123 --------------------------------------------------------------- amending sig_key_24fc253b_00000123 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420A13D93F87E27B86337E158C973005AC9561AFDA02ECDA6F79BA0FCC3E8C2E10E02022710020120300A06082A864886F70D0209300A06082A864886F70D02090420AA43FA0A1A90C6DFC57802FAF6260D3AB363DD72A02FD54A7242796E429BCEE1 to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420A13D93F87E27B86337E158C973005AC9561AFDA02ECDA6F79BA0FCC3E8C2E10E02022710020120300A06082A864886F70D0209300A06082A864886F70D02090420AA43FA0A1A90C6DFC57802FAF6260D3AB363DD72A02FD54A7242796E429BCEE2 /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/certutil -R -k edbc095459d546d2c3d608afdc317049ed962927 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #19: Corrupted key attribute 123 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 124 --------------------------------------------------------------- amending sig_key_24fc253b_00000124 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420F95D3A6703818B16FC885E87E73A40585497F7B9CECB2D33934B4AE3A7DF78D502022710020120300A06082A864886F70D0209300A06082A864886F70D0209042028539B0AB9AFE8308F84F10DF760E5A4D3F235000D25A15368B4BCCF1E933502 to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420F95D3A6703818B16FC885E87E73A40585497F7B9CECB2D33934B4AE3A7DF78D502022710020120300A06082A864886F70D0209300A06082A864886F70D0209042028539B0AB9AFE8308F84F10DF760E5A4D3F235000D25A15368B4BCCF1E933503 /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/certutil -R -k edbc095459d546d2c3d608afdc317049ed962927 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #20: Corrupted key attribute 124 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 125 --------------------------------------------------------------- amending sig_key_24fc253b_00000125 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420A3657D45B3CE388D11EEA38E3BA5721F37A0CB1D5CB14CB4BDFC7C34EF4600EA02022710020120300A06082A864886F70D0209300A06082A864886F70D020904201E359EFB33FFAE4C55E4E945EBA938C4066AAE3A3248CAEE58EF8CF769790CEF to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420A3657D45B3CE388D11EEA38E3BA5721F37A0CB1D5CB14CB4BDFC7C34EF4600EA02022710020120300A06082A864886F70D0209300A06082A864886F70D020904201E359EFB33FFAE4C55E4E945EBA938C4066AAE3A3248CAEE58EF8CF769790CE0 /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/certutil -R -k edbc095459d546d2c3d608afdc317049ed962927 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #21: Corrupted key attribute 125 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 126 --------------------------------------------------------------- amending sig_key_24fc253b_00000126 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420184671DB90C672DB1282F349B5AE872DBBF11A1AAE656E020FC93F9B6D0AF35C02022710020120300A06082A864886F70D0209300A06082A864886F70D0209042076A4D4125658DC9E01697CAD0A3F9EEE7777A98185187E26E549E533169AE64F to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420184671DB90C672DB1282F349B5AE872DBBF11A1AAE656E020FC93F9B6D0AF35C02022710020120300A06082A864886F70D0209300A06082A864886F70D0209042076A4D4125658DC9E01697CAD0A3F9EEE7777A98185187E26E549E533169AE640 /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/certutil -R -k edbc095459d546d2c3d608afdc317049ed962927 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #22: Corrupted key attribute 126 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 127 --------------------------------------------------------------- amending sig_key_24fc253b_00000127 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504201A12AB52919C43ED15DDA062B691444DA341F69A3A2AE5064BCA2C7BD15492BA02022710020120300A06082A864886F70D0209300A06082A864886F70D020904206E677D6511DAADA7D2E3EF354D196DCF912382D0CD145F4D973C4C5CE3189171 to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504201A12AB52919C43ED15DDA062B691444DA341F69A3A2AE5064BCA2C7BD15492BA02022710020120300A06082A864886F70D0209300A06082A864886F70D020904206E677D6511DAADA7D2E3EF354D196DCF912382D0CD145F4D973C4C5CE3189172 /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/certutil -R -k edbc095459d546d2c3d608afdc317049ed962927 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #23: Corrupted key attribute 127 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 128 --------------------------------------------------------------- amending sig_key_24fc253b_00000128 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504204EA6652B566CD99E847BEC241FD7A76816DFF8E7FDAD1AB05D3C036F5A795F6002022710020120300A06082A864886F70D0209300A06082A864886F70D02090420D4C1D38CEC8481A7BBAAB40A4B6BBABBFB1B0C31886A340BA1DA01CF60127991 to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504204EA6652B566CD99E847BEC241FD7A76816DFF8E7FDAD1AB05D3C036F5A795F6002022710020120300A06082A864886F70D0209300A06082A864886F70D02090420D4C1D38CEC8481A7BBAAB40A4B6BBABBFB1B0C31886A340BA1DA01CF60127992 /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/certutil -R -k edbc095459d546d2c3d608afdc317049ed962927 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #24: Corrupted key attribute 128 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 011 --------------------------------------------------------------- amending sig_key_24fc253d_00000011 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504205BF970251538B58A6A8D718882D8B36AD1995726FF0096CECCE1D38E45140F2902022710020120300A06082A864886F70D0209300A06082A864886F70D02090420DFC506B4391A86150A4CF275C2E114BA4664539EABA9666229B1F71B2F2C2E15 to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504205BF970251538B58A6A8D718882D8B36AD1995726FF0096CECCE1D38E45140F2902022710020120300A06082A864886F70D0209300A06082A864886F70D02090420DFC506B4391A86150A4CF275C2E114BA4664539EABA9666229B1F71B2F2C2E16 amending sig_key_24fc253f_00000011 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504200BC84455C851A045E09A41B9194CB5682E2336A2BBB800ABA1DDF81CF32E56B802022710020120300A06082A864886F70D0209300A06082A864886F70D02090420AF22EC30F4E9738F7C0C8D4E41ECDD87891B60233FFC711BE26E7FBDEDA26F30 to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504200BC84455C851A045E09A41B9194CB5682E2336A2BBB800ABA1DDF81CF32E56B802022710020120300A06082A864886F70D0209300A06082A864886F70D02090420AF22EC30F4E9738F7C0C8D4E41ECDD87891B60233FFC711BE26E7FBDEDA26F31 /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/certutil -R -k 7445059be15fa4315296ddea87f3be893cdf073e -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_NO_MEMORY: security library: memory allocation failure. dbtests.sh: #25: Corrupted key attribute 011 correctly disabled key - PASSED --------------------------------------------------------------- | testing for thread starvation while creating keys --------------------------------------------------------------- creating 30 threads - thread 0 starting - thread 1 starting - thread 2 starting - thread 3 starting - thread 4 starting - thread 5 starting - thread 6 starting - thread 7 starting - thread 8 starting - thread 9 starting - thread 10 starting - thread 11 starting - thread 12 starting - thread 13 starting - thread 14 starting - thread 15 starting - thread 16 starting - thread 17 starting - thread 18 starting - thread 19 starting - thread 20 starting - thread 21 starting - thread 22 starting - thread 23 starting - thread 24 starting - thread 25 starting - thread 26 starting - thread 27 starting - thread 28 starting waiting on 30 threads - thread 29 starting * thread 19 ending with 0 failures * thread 26 ending with 0 failures * thread 12 ending with 0 failures * thread 0 ending with 0 failures * thread 3 ending with 0 failures * thread 29 ending with 0 failures * thread 22 ending with 0 failures * thread 4 ending with 0 failures * thread 24 ending with 0 failures * thread 15 ending with 0 failures * thread 5 ending with 0 failures * thread 14 ending with 0 failures * thread 7 ending with 0 failures * thread 1 ending with 0 failures * thread 2 ending with 0 failures * thread 27 ending with 0 failures * thread 9 ending with 0 failures * thread 25 ending with 0 failures * thread 16 ending with 0 failures * thread 17 ending with 0 failures * thread 28 ending with 0 failures * thread 13 ending with 0 failures * thread 23 ending with 0 failures * thread 21 ending with 0 failures * thread 18 ending with 0 failures * thread 8 ending with 0 failures * thread 20 ending with 0 failures * thread 6 ending with 0 failures * thread 10 ending with 0 failures * thread 11 ending with 0 failures 0 failures and 0 errors found dbtests.sh: #26: Successfully completed 7 loops in 30 threads without failure. - PASSED TIMESTAMP dbtests END: Wed Sep 28 00:51:09 UTC 2022 Running tests for tools TIMESTAMP tools BEGIN: Wed Sep 28 00:51:09 UTC 2022 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #1: Exporting with [default:default:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #2: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ba:9a:bb:17:85:ce:c2:3b:d1:fe:9d:e0:3e:c8:65:08 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #3: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5: Exporting Alice's email EC cert & key (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #6: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8a:c1:ef:0a:c0:8b:42:b9:31:7b:02:29:a7:68:d6:e8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Sep 28 00:36:16 2022 Not After : Wed Sep 28 00:36:16 2072 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:2f:77:e9:6d:24:ce:89:62:86:28:33:41:20:a1: 43:50:e3:14:96:8c:9b:90:3f:f2:c3:31:c3:5c:fc:c9: 4f:39:50:36:a1:16:12:b0:8b:bf:68:56:47:12:d0:6d: bc:21:6a:9f:93:7f:d8:46:62:21:49:84:da:4b:fe:75: 2f:2e:ce:00:da:dc:a6:ef:88:da:11:14:95:04:f6:51: c5:13:e1:ff:d9:e6:48:7b:68:65:20:7c:0b:69:1a:2c: 89:fb:6c:f3:a5:c7:97:ce:b1:0d:d7:a8:40:f9:40:7b: f7:e1:fa:a4:c8:9e:7d:9c:1c:01:af:3e:79:bc:24:93: 4e:38:ed:09:36 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:75:cf:11:41:d7:e5:5d:d3:d2:ea: 1c:58:97:eb:6e:df:d6:19:35:57:f2:de:b8:a1:3e:8a: 44:86:81:db:b8:ae:4c:53:d2:51:97:da:21:7e:bd:26: dc:95:63:b1:19:a7:72:a9:6a:af:d0:d6:64:8b:d2:8b: 13:b0:21:f1:89:1d:8c:02:42:01:49:c7:31:ab:15:a6: f6:d4:c8:7b:1f:4c:f6:7b:60:59:69:53:21:e0:37:af: c6:40:d4:d0:f3:61:d5:d0:9e:e5:12:99:df:ec:33:59: 73:fc:1f:de:d1:42:62:6b:59:36:b6:86:4e:c7:42:69: 2a:75:ee:07:5c:6b:dc:20:62:45:35 Fingerprint (SHA-256): 78:86:65:8A:B0:CE:C4:FC:79:68:FA:C1:14:F0:1F:33:2A:F2:5B:67:24:0C:41:F0:0E:1A:D0:11:8C:94:96:8F Fingerprint (SHA1): 61:10:8A:EA:BD:84:9C:D9:FB:DF:0D:64:07:79:4F:44:78:67:D8:38 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Sep 28 00:39:30 2022 Not After : Tue Sep 28 00:39:30 2027 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:f0:32:32:b4:84:f2:39:aa:a0:54:2d:73:9b:f5:e5: 17:87:dd:c2:07:e5:cc:bd:5f:f6:09:31:e0:f6:ee:bb: 70:85:8f:b0:d0:a4:e8:e6:c7:59:60:bf:a4:ab:6b:62: 3a:3f:0f:61:d6:43:21:13:90:c9:87:1b:b6:77:20:fb: da:6b:67:29:fe:3d:d9:40:25:cd:c5:60:4b:5c:78:14: ee:ce:18:16:ba:0c:5f:e3:d5:a7:fe:9e:98:d0:fb:9c: f4 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:db:5b:21:9f:b2:fb:d2:1a:56:b0: e4:e8:de:aa:75:82:d6:49:53:4c:0b:1b:fc:db:10:81: 71:78:47:29:2b:b9:48:13:58:0d:5f:b3:5e:77:01:05: a2:14:83:1d:58:f0:18:49:6e:59:c3:0f:44:22:88:c7: cd:17:f3:55:28:9b:9e:02:42:00:e9:40:75:3e:18:4f: d8:0f:77:8d:d0:b2:e0:e3:54:58:66:a2:e4:89:96:5d: f1:48:c5:f4:ce:79:3c:6b:76:e3:72:23:81:11:ff:14: 71:d4:86:7c:87:3f:ba:01:2d:e8:c9:f0:1d:eb:e4:30: 4a:4a:4e:43:39:2d:b2:4b:3b:b3:e9 Fingerprint (SHA-256): 95:88:5A:6D:BE:DD:59:CF:66:4F:90:87:B9:44:F4:BB:14:D2:88:32:7B:CA:98:75:45:41:79:94:19:1C:0F:76 Fingerprint (SHA1): E5:D0:6D:31:F7:3C:14:09:7C:20:0B:11:25:FB:5E:AA:F2:7E:C1:C2 Friendly Name: Alice-ec tools.sh: #8: Listing Alice's pk12 EC file (pk12util -l) - PASSED tools.sh: Exporting Alice's email EC cert & key with long pw------ pk12util -o Alice-ec-long.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.longpw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9: Exporting Alice's email EC cert & key with long pw (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #10: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key with long pw----- pk12util -i Alice-ec-long.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.longpw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #11: Importing Alice's email EC cert & key with long pw (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file with long pw ------------ pk12util -l Alice-ec-long.p12 -w ../tests.longpw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e6:15:c2:b2:c0:1b:c1:aa:92:ab:68:1a:df:15:a5:a3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Sep 28 00:36:16 2022 Not After : Wed Sep 28 00:36:16 2072 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:2f:77:e9:6d:24:ce:89:62:86:28:33:41:20:a1: 43:50:e3:14:96:8c:9b:90:3f:f2:c3:31:c3:5c:fc:c9: 4f:39:50:36:a1:16:12:b0:8b:bf:68:56:47:12:d0:6d: bc:21:6a:9f:93:7f:d8:46:62:21:49:84:da:4b:fe:75: 2f:2e:ce:00:da:dc:a6:ef:88:da:11:14:95:04:f6:51: c5:13:e1:ff:d9:e6:48:7b:68:65:20:7c:0b:69:1a:2c: 89:fb:6c:f3:a5:c7:97:ce:b1:0d:d7:a8:40:f9:40:7b: f7:e1:fa:a4:c8:9e:7d:9c:1c:01:af:3e:79:bc:24:93: 4e:38:ed:09:36 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:75:cf:11:41:d7:e5:5d:d3:d2:ea: 1c:58:97:eb:6e:df:d6:19:35:57:f2:de:b8:a1:3e:8a: 44:86:81:db:b8:ae:4c:53:d2:51:97:da:21:7e:bd:26: dc:95:63:b1:19:a7:72:a9:6a:af:d0:d6:64:8b:d2:8b: 13:b0:21:f1:89:1d:8c:02:42:01:49:c7:31:ab:15:a6: f6:d4:c8:7b:1f:4c:f6:7b:60:59:69:53:21:e0:37:af: c6:40:d4:d0:f3:61:d5:d0:9e:e5:12:99:df:ec:33:59: 73:fc:1f:de:d1:42:62:6b:59:36:b6:86:4e:c7:42:69: 2a:75:ee:07:5c:6b:dc:20:62:45:35 Fingerprint (SHA-256): 78:86:65:8A:B0:CE:C4:FC:79:68:FA:C1:14:F0:1F:33:2A:F2:5B:67:24:0C:41:F0:0E:1A:D0:11:8C:94:96:8F Fingerprint (SHA1): 61:10:8A:EA:BD:84:9C:D9:FB:DF:0D:64:07:79:4F:44:78:67:D8:38 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Sep 28 00:39:30 2022 Not After : Tue Sep 28 00:39:30 2027 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:f0:32:32:b4:84:f2:39:aa:a0:54:2d:73:9b:f5:e5: 17:87:dd:c2:07:e5:cc:bd:5f:f6:09:31:e0:f6:ee:bb: 70:85:8f:b0:d0:a4:e8:e6:c7:59:60:bf:a4:ab:6b:62: 3a:3f:0f:61:d6:43:21:13:90:c9:87:1b:b6:77:20:fb: da:6b:67:29:fe:3d:d9:40:25:cd:c5:60:4b:5c:78:14: ee:ce:18:16:ba:0c:5f:e3:d5:a7:fe:9e:98:d0:fb:9c: f4 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:db:5b:21:9f:b2:fb:d2:1a:56:b0: e4:e8:de:aa:75:82:d6:49:53:4c:0b:1b:fc:db:10:81: 71:78:47:29:2b:b9:48:13:58:0d:5f:b3:5e:77:01:05: a2:14:83:1d:58:f0:18:49:6e:59:c3:0f:44:22:88:c7: cd:17:f3:55:28:9b:9e:02:42:00:e9:40:75:3e:18:4f: d8:0f:77:8d:d0:b2:e0:e3:54:58:66:a2:e4:89:96:5d: f1:48:c5:f4:ce:79:3c:6b:76:e3:72:23:81:11:ff:14: 71:d4:86:7c:87:3f:ba:01:2d:e8:c9:f0:1d:eb:e4:30: 4a:4a:4e:43:39:2d:b2:4b:3b:b3:e9 Fingerprint (SHA-256): 95:88:5A:6D:BE:DD:59:CF:66:4F:90:87:B9:44:F4:BB:14:D2:88:32:7B:CA:98:75:45:41:79:94:19:1C:0F:76 Fingerprint (SHA1): E5:D0:6D:31:F7:3C:14:09:7C:20:0B:11:25:FB:5E:AA:F2:7E:C1:C2 Friendly Name: Alice-ec tools.sh: #12: Listing Alice's pk12 EC file with long pw (pk12util -l) - PASSED Iteration count=600000 pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #13: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #14: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: da:b4:de:09:7b:e6:1b:61:f5:0a:89:a8:0e:df:25:83 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #15: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #16: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #17: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #18: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 3d:e7:4a:d2:90:9a:10:16:8c:ed:1b:c1:fe:4e:94:00 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #19: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #20: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #21: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #22: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c6:97:3a:77:40:3d:2a:0e:12:a0:18:4b:cc:7c:c2:ec Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #23: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #24: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #25: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #26: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 01:c5:d9:a9:8e:cd:e0:42:fb:03:5c:2c:df:a6:f3:bd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #27: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #28: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #29: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #30: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fd:bb:9a:66:df:37:c4:65:66:22:24:c8:42:03:dd:5a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e2:bc:67:bc:3d:d3:5c:8d:a9:58:62:8c:70:dc: 9e:a8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #31: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #32: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #33: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #34: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 0c:1b:6e:42:e1:4e:2b:2a:d0:c7:4c:64:b9:33:8d:43 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #35: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #36: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #37: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #38: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6b:b0:e9:35:50:db:cb:b3:6c:e0:80:6c:0d:7c:f3:8e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #39: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #40: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #41: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #42: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 54:28:cd:91:47:07:1c:cd:df:32:0a:e3:73:73:6f:c3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #43: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #44: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #45: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #46: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 65:ed:b0:ec:a3:d6:40:ff:19:06:ca:f8:e1:8e:29:4e Iteration Count: 600000 (0x927c0) tools.sh: #47: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #48: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #49: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #50: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: bb:e0:72:79:f8:5c:64:a7:5e:95:7f:e7:40:7d:03:e4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #51: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #52: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #53: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #54: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 66:d7:fa:53:52:0c:82:03:f4:24:11:45:19:47:44:d5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #55: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #56: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #57: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #58: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 3a:27:db:40:55:23:5a:3b:73:eb:69:b9:1b:d7:ea:4a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #59: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #60: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #61: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #62: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 04:d3:f7:66:f0:47:48:48:a7:a9:86:13:81:71:93:41 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #63: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #64: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #65: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #66: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: b8:94:dd:23:b2:08:4c:a2:71:36:67:65:16:78:0e:18 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #67: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #68: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #69: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #70: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7a:2a:7b:a9:e1:f7:27:b3:31:3a:e6:1a:6f:4f:96:3d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:76:46:19:6a:ff:e3:a5:e1:6e:47:ed:b4:69:97: 80:fc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #71: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #72: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #73: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #74: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: a7:30:b2:81:86:56:14:5b:1d:06:db:d3:81:77:4e:89 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #75: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #76: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #77: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #78: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 72:a4:10:1c:d9:04:c4:c8:d1:c2:fe:85:60:0e:83:15 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #79: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #80: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #81: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #82: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 5e:3a:6e:c3:93:a8:b6:00:24:28:6f:cc:91:31:52:17 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #83: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #84: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #85: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #86: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 79:b4:18:d4:6e:56:86:95:0f:69:0d:d6:39:a8:b9:95 Iteration Count: 600000 (0x927c0) tools.sh: #87: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #88: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #89: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #90: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 98:31:2f:d6:f0:3e:b0:00:64:2f:9a:df:36:79:89:2a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #91: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #92: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #93: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #94: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 51:b6:b9:e0:6d:ed:32:b7:99:c0:c2:aa:82:a6:3e:0c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #95: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #96: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #97: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #98: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f7:e6:d8:7e:52:09:1d:53:15:c0:c5:74:3e:cc:53:b0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #99: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #100: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #101: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #102: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c8:d1:0b:75:91:a2:77:03:5f:a1:dd:9c:57:4e:21:8f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:cb:50:c6:12:5c:ea:14:5c:30:67:47:df:a2:c6: c7:42 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #103: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #104: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #105: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #106: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a8:34:ac:2c:d3:b3:61:23:20:ee:84:33:85:b3:61:df Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #107: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #108: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #109: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #110: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 66:88:f9:a5:37:5b:89:cc:25:92:11:f0:27:19:dd:fa Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #111: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #112: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #113: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #114: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 79:c9:c2:71:c9:b2:06:dc:89:ba:96:fa:47:3e:83:36 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #115: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #116: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #117: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #118: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 88:29:57:e1:f8:5e:7b:29:91:79:2a:aa:fc:60:8f:14 Iteration Count: 600000 (0x927c0) tools.sh: #119: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #120: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #121: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #122: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 62:f4:32:5a:ca:f9:28:e2:ba:d9:7c:1b:01:86:04:67 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #123: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #124: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #125: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #126: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 52:06:f4:75:4d:c4:2a:ed:73:04:e6:18:db:f3:eb:46 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #127: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #128: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #129: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #130: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 72:32:8b:82:06:27:d4:69:a9:d2:b9:d6:bb:69:87:54 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #131: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #132: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #133: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #134: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fe:a9:12:f4:6e:05:22:53:32:9d:40:27:37:3e:99:90 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #135: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #136: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #137: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #138: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 03:bd:93:4d:3f:93:8b:80:82:3a:32:6d:8f:4c:01:1a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #139: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #140: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #141: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #142: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 31:2d:25:17:e5:db:be:47:36:52:7d:e4:02:68:a8:d3 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:7e:47:67:bf:65:f6:dc:c6:64:ae:08:6f:9c:25: 37:c3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #143: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #144: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #145: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #146: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: ce:4e:1b:25:03:d6:3e:0f:82:1e:7b:24:71:d4:5f:e6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #147: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #148: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #149: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #150: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 15:76:af:5a:6e:f9:b1:2e:d3:a0:de:16:bc:c6:6f:f5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #151: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #152: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #153: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #154: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: d2:7b:34:25:33:4d:d2:73:c2:9e:df:66:a7:8c:3c:d6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #155: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #156: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #157: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #158: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: b2:01:52:f6:5b:c1:3b:2b:71:9a:ee:ea:f3:36:5b:dd Iteration Count: 600000 (0x927c0) tools.sh: #159: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #160: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #161: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #162: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: c6:71:a2:5b:fe:4d:e4:36:ea:cc:01:c0:ac:7c:3c:5e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #163: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #164: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #165: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #166: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 47:dc:8c:e2:c3:b1:71:5c:a9:2c:3b:3d:68:0a:7c:29 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #167: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #168: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #169: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #170: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 59:95:d7:13:94:3c:31:fc:15:80:63:bb:f7:a2:7f:e8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #171: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #172: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #173: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #174: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d8:46:22:61:e1:c5:42:39:09:96:ca:47:80:18:f3:b5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #175: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #176: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #177: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #178: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 45:ba:e8:7c:68:b5:9f:af:87:99:e0:a9:75:31:08:58 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #179: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #180: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #181: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #182: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e2:06:aa:c1:68:7b:36:d8:fe:43:1d:53:74:76:3b:2d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:c7:70:49:44:0c:24:ae:1a:f7:7e:94:bf:54:02: 7d:7e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #183: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #184: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #185: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #186: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 37:c4:82:18:61:65:a4:b8:e4:9e:37:81:69:d3:0a:17 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #187: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #188: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #189: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #190: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 12:2a:5b:51:e1:bf:f7:b9:33:d7:d5:79:78:5c:5d:5c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #191: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #192: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #193: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #194: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: da:44:f5:00:3f:c5:56:7a:80:d8:11:91:e2:3c:69:09 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #195: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #196: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #197: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #198: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 9e:1b:8b:6c:5e:9b:0f:48:51:1d:1b:69:e3:53:de:69 Iteration Count: 600000 (0x927c0) tools.sh: #199: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #200: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #201: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #202: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: ef:88:f2:ba:9e:e3:30:ec:38:0c:45:fc:12:3c:d8:da Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #203: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #204: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #205: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #206: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 5c:e5:26:81:b0:f5:2d:b9:86:62:02:4d:93:0f:9d:9d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #207: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #208: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #209: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #210: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d8:6d:a5:33:4f:89:20:9b:6e:0c:d6:f1:ce:7a:e5:9b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #211: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #212: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #213: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #214: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1e:11:ec:b0:66:a7:c8:4e:f5:fb:de:2c:ce:5f:73:f5 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:cc:b7:66:90:19:85:e2:c9:d1:ba:f3:6d:e1:40: e4:17 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #215: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #216: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #217: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #218: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c9:20:d0:b8:ba:a5:52:42:12:9a:36:cf:75:65:e0:6e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #219: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #220: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #221: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #222: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 82:07:39:86:20:b3:0b:f3:44:80:8b:9a:96:73:bd:d8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #223: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #224: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #225: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #226: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 20:1f:f7:58:98:f1:d2:f8:fc:03:fa:d0:23:11:9c:2d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #227: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #228: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #229: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #230: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a9:33:7d:9f:f8:e8:d3:10:ec:2f:67:76:3a:9b:10:ee Iteration Count: 600000 (0x927c0) tools.sh: #231: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #232: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #233: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #234: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f8:7b:78:22:6f:23:06:cc:d4:33:91:b2:ad:5d:a3:e7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #235: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #236: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #237: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #238: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 53:06:8c:86:ae:c0:3f:81:a3:90:6d:69:b7:31:a3:4e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #239: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #240: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #241: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #242: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 71:02:25:4d:05:f1:87:1e:78:99:40:cf:70:0d:46:5a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #244: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #245: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #246: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 45:9b:31:5b:1a:8f:b2:41:73:f3:07:0e:aa:32:11:93 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #247: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #248: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #249: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #250: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: cc:9a:03:64:a4:21:58:64:d4:af:18:13:31:20:94:5c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #251: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #252: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #253: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #254: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c9:22:fd:9c:2b:e6:4c:93:b4:28:87:8a:91:c2:6c:c8 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:f1:d9:88:b4:53:df:75:0a:de:1b:82:4b:2b:c3: c1:8e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #256: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #257: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #258: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 45:64:f7:b6:91:b7:e9:b9:fe:36:dc:6c:44:e1:89:e4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #259: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #260: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #261: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #262: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 28:8d:a7:b7:44:b0:0d:fb:4c:82:5c:6b:e9:9e:2b:71 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #263: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #264: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #265: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #266: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 27:b8:d3:01:21:48:cb:9a:cf:a0:57:15:4c:81:14:4e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #267: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #268: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #269: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #270: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: f5:09:b5:e0:f1:82:a4:8d:1b:b8:fc:5e:43:74:ed:28 Iteration Count: 600000 (0x927c0) tools.sh: #271: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #272: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #273: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #274: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: c3:65:c3:c1:5d:d0:34:c5:5c:84:89:6d:75:90:72:3a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #275: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #276: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #277: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #278: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 01:d0:a8:d5:34:47:6a:28:ee:23:69:05:a1:24:1f:06 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #280: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #281: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #282: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 41:8e:4a:83:43:f8:36:ba:ae:84:24:51:e8:6c:71:7d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #283: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #284: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #285: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #286: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 46:55:a1:6e:e9:4a:d7:8c:28:bf:89:5c:cc:19:84:e8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #287: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #288: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #289: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #290: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 5e:ed:63:93:aa:35:40:20:2d:0f:f6:d1:7c:11:4e:04 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #292: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #293: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #294: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 38:03:6f:b3:dd:33:61:35:11:fe:23:4a:42:36:09:90 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:4d:c8:cb:82:b4:29:4d:9c:3c:fb:8d:fa:9b:fb: a1:61 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #295: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #296: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #297: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #298: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 8a:9b:c9:46:49:3b:1f:ba:bc:8e:5c:0c:ab:32:cb:99 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #299: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #300: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #301: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #302: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 54:e9:cf:75:24:65:88:27:f7:be:26:f8:95:a2:a1:bf Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #304: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #305: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #306: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: f4:ca:5e:78:cd:cc:e8:96:af:d7:5a:9a:ad:09:b8:e7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #307: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #308: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #309: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #310: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 4a:07:df:ac:2d:8d:ec:e1:1c:48:d6:21:d4:32:f6:63 Iteration Count: 600000 (0x927c0) tools.sh: #311: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #312: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #313: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #314: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 20:68:a2:d3:59:46:f1:c6:cb:d4:92:f3:b2:c4:7e:2a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #316: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #317: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #318: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c2:e8:37:8a:5a:19:c6:2c:4f:20:07:70:4f:84:9d:8d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #319: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #320: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #321: Exporting with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #322: Verifying p12 file generated with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 8d:96:3b:6b:b1:7d:10:1b:65:fa:c5:08:56:22:b2:f2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #323: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #324: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #325: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #326: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 94:81:45:00:9a:78:62:c9:5e:53:c5:1f:7f:27:99:e4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #328: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #329: Exporting with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #330: Verifying p12 file generated with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 35:15:d6:4f:54:2b:ce:9f:33:51:17:92:57:86:46:99 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #331: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #332: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #333: Exporting with [AES-256-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #334: Verifying p12 file generated with [AES-256-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b1:c7:21:7f:42:c8:25:f6:46:de:38:9b:6b:e6:da:d6 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:1e:77:a3:69:72:83:a9:8d:58:bd:f8:9a:e3:db: a1:ca Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #335: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #336: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #337: Exporting with [RC2-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #338: Verifying p12 file generated with [RC2-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: e2:fc:db:fd:7a:c1:88:b0:0b:97:e2:7f:25:e1:34:2b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #339: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #340: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #341: Exporting with [default:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #342: Verifying p12 file generated with [default:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cf:7f:a8:26:d7:db:22:31:28:b6:02:5e:22:80:37:f9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #343: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #344: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #345: Exporting with [RC2-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #346: Verifying p12 file generated with [RC2-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 7c:f0:fa:b0:e5:11:e6:9b:9d:05:e9:b6:7b:28:e0:08 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #347: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #348: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #349: Exporting with [RC2-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #350: Verifying p12 file generated with [RC2-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 63:bb:71:07:35:49:dd:e0:df:93:d8:9f:b5:3a:e4:cb Iteration Count: 600000 (0x927c0) tools.sh: #351: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #352: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "RC2-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #353: Exporting with [RC2-CBC:RC2-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #354: Verifying p12 file generated with [RC2-CBC:RC2-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 3b:96:b1:a5:42:0c:4d:89:3d:79:d5:63:53:b4:5b:d8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #355: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #356: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #357: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #358: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 46:ea:46:68:28:05:0b:06:30:d1:53:94:83:3b:4a:86 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #359: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #360: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #361: Exporting with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #362: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9f:fa:c0:d6:85:4d:90:01:fa:39:00:ae:b8:8c:3b:2e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #364: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #365: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #366: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 55:fd:88:ca:4e:01:98:e4:f5:59:c8:dd:03:85:6d:dd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #367: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #368: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #369: Exporting with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #370: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: da:e8:78:27:1a:99:f1:be:8e:9d:d0:5e:52:70:e6:61 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #371: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #372: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #373: Exporting with [AES-256-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #374: Verifying p12 file generated with [AES-256-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4c:45:7d:9c:21:32:c6:62:f7:ad:0e:f3:87:a3:3c:8d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:2c:a6:fb:6e:c5:e6:19:72:f4:27:15:06:c7:b4: d7:df Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #376: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #377: Exporting with [DES-EDE3-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #378: Verifying p12 file generated with [DES-EDE3-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 24:b2:2b:73:43:61:aa:d3:bd:11:a5:92:0d:77:f9:96 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #379: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #380: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #381: Exporting with [default:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #382: Verifying p12 file generated with [default:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 92:16:0c:b9:c8:2b:13:ce:aa:f1:fc:cc:7e:94:66:36 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #383: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #384: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #385: Exporting with [DES-EDE3-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #386: Verifying p12 file generated with [DES-EDE3-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f7:10:29:30:23:12:68:64:72:1f:c2:94:bd:5d:22:92 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #387: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #388: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #389: Exporting with [DES-EDE3-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #390: Verifying p12 file generated with [DES-EDE3-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b5:83:14:8a:18:b6:cd:64:c8:d2:7f:d3:04:62:11:dd Iteration Count: 600000 (0x927c0) tools.sh: #391: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #392: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #393: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #394: Verifying p12 file generated with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 87:6f:63:2a:ce:c2:0f:d9:c2:d8:40:7c:eb:a4:ae:54 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #395: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #396: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #397: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #398: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 7c:a1:a1:9f:bc:de:57:7a:ed:6b:3d:5b:76:eb:ba:9d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #399: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #400: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #401: Exporting with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #402: Verifying p12 file generated with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d7:77:84:ff:61:cb:b4:d2:b9:33:32:47:e3:7c:9e:5f Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:64:d2:46:81:b6:89:7f:3d:31:76:3d:5f:a1:4f: c5:f2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #403: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #404: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #405: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #406: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3e:8d:be:da:6c:2e:8e:ff:39:85:24:1f:f0:a4:64:6d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #407: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #408: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #409: Exporting with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #410: Verifying p12 file generated with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 29:dd:55:db:55:0c:0c:61:99:1d:c7:7c:9c:28:12:13 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:bc:9b:98:dd:57:b1:33:f9:8f:a5:10:83:ce:ff: be:94 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #411: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #412: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #413: Exporting with [AES-256-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #414: Verifying p12 file generated with [AES-256-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d8:ef:61:8e:ac:fe:9e:5d:23:51:a9:c5:4a:9f:5f:52 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:31:c5:81:83:0e:0c:ac:2d:62:c3:b2:24:25:27: 39:a1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #415: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #416: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #417: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #418: Verifying p12 file generated with [AES-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7e:d0:97:ac:38:ea:fd:ed:b2:5a:7e:81:5a:0c:08:38 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:5f:69:0f:f0:8f:c2:64:32:96:17:7e:fe:0d:97: 07:17 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #419: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #420: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #421: Exporting with [default:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #422: Verifying p12 file generated with [default:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d2:3e:db:3f:62:38:75:79:41:2b:6a:b9:f6:a2:b6:29 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #423: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #424: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #425: Exporting with [AES-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #426: Verifying p12 file generated with [AES-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9e:d0:33:f1:a8:b8:53:d1:17:03:ab:29:58:d2:cc:dc Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:6d:b2:60:01:b9:e4:1f:4f:db:59:b0:36:4c:e3: d2:06 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #427: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #428: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #429: Exporting with [AES-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #430: Verifying p12 file generated with [AES-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ce:a1:05:59:78:2f:36:53:46:63:ea:0b:b0:7c:e2:85 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: AES-128-CBC Args: 04:10:7b:a3:c7:d3:e2:cf:28:8d:f7:5c:24:81:6b:5f: 5a:3b tools.sh: #431: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #432: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #433: Exporting with [AES-128-CBC:AES-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #434: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2b:d9:ea:87:41:bd:90:46:fe:b7:63:c9:c2:3f:e6:9b Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: AES-128-CBC Args: 04:10:a4:00:88:04:81:bd:46:44:c8:10:64:d8:2c:f4: c5:4a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #435: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #436: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #437: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #438: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 79:56:22:e5:a1:28:82:c0:b0:ec:a2:64:9b:80:2e:2c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #439: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #440: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #441: Exporting with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #442: Verifying p12 file generated with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: de:d6:1d:67:9b:2b:4d:40:71:25:0b:e0:ba:4c:45:4f Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:bc:76:ff:1a:36:23:d5:bf:79:cd:83:42:b2:bd: 60:f3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #443: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #444: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #445: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #446: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9a:80:28:60:7e:68:4f:12:13:2b:9b:cd:13:18:e7:36 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #447: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #448: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #449: Exporting with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #450: Verifying p12 file generated with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7f:71:b8:a9:a7:9b:43:33:de:2a:f6:bf:5c:7d:55:e7 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:4c:b0:12:2c:e7:d3:f6:23:26:cc:b1:66:ee:01: b0:cd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #451: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #452: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #453: Exporting with [AES-256-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #454: Verifying p12 file generated with [AES-256-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 74:54:8d:0a:03:82:f3:58:e3:71:e8:95:f7:ec:b2:aa Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:8d:c6:7f:1b:16:e2:81:c7:08:c7:0b:ce:2e:41: d5:02 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #455: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #456: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #457: Exporting with [AES-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #458: Verifying p12 file generated with [AES-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 47:44:df:df:23:32:4d:0d:44:f6:44:e2:00:9c:d0:02 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:16:78:04:f9:d0:b3:fc:fb:30:d7:4b:ad:a4:84: bf:0c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #459: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #460: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #461: Exporting with [default:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #462: Verifying p12 file generated with [default:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 01:e5:a6:36:41:26:b3:6a:11:34:1d:f3:7b:f3:41:08 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #463: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #464: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #465: Exporting with [AES-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #466: Verifying p12 file generated with [AES-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e6:35:a9:65:d7:90:34:39:9d:64:24:88:22:61:20:dc Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:8f:d0:0e:63:9f:dd:55:3a:6f:e4:ff:d8:f1:5b: f3:99 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #467: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #468: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #469: Exporting with [AES-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #470: Verifying p12 file generated with [AES-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a6:32:42:05:74:fe:5a:3d:be:52:70:6d:c0:7e:80:4a Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: AES-192-CBC Args: 04:10:7a:e0:a1:8a:f3:59:a3:b9:ab:bf:ed:ea:85:b9: cf:91 tools.sh: #471: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #472: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #473: Exporting with [AES-192-CBC:AES-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #474: Verifying p12 file generated with [AES-192-CBC:AES-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d6:65:c1:81:52:39:19:53:c4:7d:39:8d:a9:c7:5d:1d Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: AES-192-CBC Args: 04:10:1e:27:b0:69:5a:5b:01:fb:73:08:e2:94:e2:83: f1:a1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #475: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #476: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #477: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #478: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 79:46:b0:75:c2:bd:a7:94:90:ea:3d:0a:56:39:96:34 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #479: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #480: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #481: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #482: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f0:0b:ca:de:77:4a:ae:fa:1a:8b:cf:a6:b9:4b:32:c6 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:4c:99:59:c4:6d:0b:4f:1a:8f:ac:33:23:f3:ae: 4c:0f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #483: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #484: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #485: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #486: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ce:a7:1d:f0:d2:a4:2b:b3:02:af:d2:0f:6b:8c:18:f2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #487: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #488: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #489: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #490: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 59:11:97:dd:a6:c4:3a:b9:c1:7e:b0:ea:10:2d:07:d3 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:52:cd:03:e2:89:e8:ae:ff:aa:ed:f2:f6:b0:89: 86:df Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #491: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #492: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #493: Exporting with [default:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #494: Verifying p12 file generated with [default:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 61:c1:8d:6b:af:db:3e:e7:74:b7:c1:b7:5f:57:c3:ca Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #495: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #496: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #497: Exporting with [AES-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #498: Verifying p12 file generated with [AES-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 48:e4:84:0d:98:d8:6f:d7:ac:ab:5a:e0:96:1b:3e:a2 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:43:31:c4:7a:83:10:44:55:86:22:fe:41:75:f1: d3:af Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #499: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #500: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #501: Exporting with [AES-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #502: Verifying p12 file generated with [AES-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 23:e8:b5:c0:7e:7f:63:4f:d5:c0:aa:54:ac:f6:c3:37 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:14:6d:11:1b:49:35:ca:bf:b0:25:f7:1a:f6:6d: 9b:61 tools.sh: #503: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #504: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #505: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #506: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6c:9f:ed:01:7f:6c:01:fe:ab:6c:2f:68:25:6a:ba:5d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:bd:89:c5:f0:b2:85:0c:cf:fc:2c:63:39:e6:55: dc:63 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #507: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #508: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #509: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #510: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 27:61:43:62:df:c6:b8:f2:af:c9:9a:36:c1:c6:b2:b0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #511: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #512: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #513: Exporting with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #514: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 62:9d:9e:ef:c4:59:1e:6d:46:2d:ad:69:63:f8:aa:66 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:5d:58:6b:ef:aa:f8:5b:7b:38:da:60:22:e6:77: f6:e9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #515: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #516: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #517: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #518: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6f:e1:62:d7:79:44:57:86:0c:d4:18:61:f6:e0:1b:13 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #519: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #520: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #521: Exporting with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #522: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 81:fa:86:24:79:50:89:87:96:72:fd:7f:14:c3:31:c1 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:20:0c:ef:e9:0c:fb:f3:86:43:8e:09:a5:40:17: a6:d0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #523: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #524: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #525: Exporting with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #526: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 95:af:a8:00:3e:95:81:80:7a:84:82:44:1e:72:41:6a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:dd:4b:8f:3c:3d:af:ff:a3:a0:b2:35:e8:f7:94: ba:37 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #527: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #528: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #529: Exporting with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #530: Verifying p12 file generated with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b8:45:cb:06:77:d4:dd:ef:55:08:d8:9e:21:4f:a2:87 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:e2:62:16:c9:3f:20:56:f4:62:87:1b:e0:43:b7: 05:15 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #531: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #532: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #533: Exporting with [default:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #534: Verifying p12 file generated with [default:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 43:32:45:4f:1f:ad:26:72:72:b1:52:28:6e:9f:c3:04 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #535: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #536: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #537: Exporting with [CAMELLIA-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #538: Verifying p12 file generated with [CAMELLIA-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 31:16:a0:9c:2b:b1:a2:43:39:e1:0c:d6:07:67:b2:a0 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:90:ea:0e:3b:66:99:ab:0f:85:f2:a8:ae:ec:39: 4f:d7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #539: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #540: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #541: Exporting with [CAMELLIA-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #542: Verifying p12 file generated with [CAMELLIA-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d6:7d:ef:36:b9:3d:4b:b3:55:10:2c:3e:f1:15:4d:dc Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-128-CBC Args: 04:10:93:cc:a2:73:64:da:f1:d4:19:1b:28:51:ed:54: 2b:6f tools.sh: #543: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #544: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #545: Exporting with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #546: Verifying p12 file generated with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c3:a3:a9:fc:2a:d4:f8:33:12:b2:1f:de:ac:b1:c7:85 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-128-CBC Args: 04:10:e7:ae:a3:29:6c:3a:7b:c4:91:b1:17:ca:b8:a4: ba:a0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #547: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #548: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #549: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #550: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: cd:25:af:b5:d1:e5:e1:e6:1f:62:49:eb:63:26:e9:d3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #551: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #552: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #553: Exporting with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #554: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d4:f8:a8:d6:be:91:52:2b:78:b6:c2:7e:a3:53:c4:6c Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:b8:f7:f2:8b:53:0f:f0:aa:cc:12:1e:59:ca:cd: 7e:ba Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #555: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #556: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #557: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #558: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3b:43:92:6d:69:17:9f:8d:e4:1e:25:d2:eb:73:cc:07 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #559: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #560: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #561: Exporting with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #562: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2e:3c:62:d0:d8:15:4c:75:e1:8c:3c:08:ec:70:10:ee Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:eb:de:e2:99:61:a5:27:0d:75:41:8f:48:93:f9: f2:4c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #563: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #564: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #565: Exporting with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #566: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b1:0f:15:da:3b:a8:2b:52:08:c6:7f:78:dd:52:e6:c2 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:7e:f4:23:64:4b:29:7a:e9:a8:2c:4a:d4:e2:84: 69:5e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #567: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #568: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #569: Exporting with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #570: Verifying p12 file generated with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 96:8a:c6:7e:f4:cc:8b:b8:70:d2:53:cd:97:32:42:dd Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:40:6a:6b:b3:a9:6a:aa:d6:d0:09:93:a4:1f:3b: 51:59 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #571: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #572: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #573: Exporting with [default:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #574: Verifying p12 file generated with [default:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b9:80:20:75:c2:57:17:b2:21:4d:d5:1d:4f:25:ec:8a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #575: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #576: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #577: Exporting with [CAMELLIA-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #578: Verifying p12 file generated with [CAMELLIA-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c7:00:1b:e1:11:4a:7e:37:bf:e4:c9:4d:bd:08:b9:e0 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:51:98:77:23:c0:92:f3:7d:b4:3d:fa:ac:9d:68: 30:56 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #579: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #580: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #581: Exporting with [CAMELLIA-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #582: Verifying p12 file generated with [CAMELLIA-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0e:22:75:d3:0e:a1:76:26:a0:79:10:af:73:8d:7d:e1 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-192-CBC Args: 04:10:d6:69:ca:ed:b6:30:b2:cd:b9:66:d9:15:b5:11: d7:f2 tools.sh: #583: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #584: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #585: Exporting with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #586: Verifying p12 file generated with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 34:94:ce:16:29:21:e6:e6:23:d7:52:7c:0b:91:13:37 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-192-CBC Args: 04:10:26:57:ca:a7:26:2e:29:77:a8:b0:1f:f9:9e:e2: bb:a7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #587: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #588: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #589: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #590: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3c:6f:35:47:ce:5c:9f:db:5f:b7:d1:c1:a0:80:7e:b8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #591: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #592: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #593: Exporting with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #594: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 70:1f:7a:42:05:fe:79:a5:dc:8a:92:55:56:e5:d1:5e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:67:49:93:a9:6d:14:50:ee:18:4a:be:99:6c:51: 46:32 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #595: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #596: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #597: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #598: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4a:a8:30:2f:0c:71:32:5f:ca:b3:93:55:fc:fe:69:0f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #602: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 71:02:3c:1a:fb:f7:b4:74:d5:a0:49:6b:0c:cc:f0:e8 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:de:a4:70:6b:9b:57:3e:f4:d9:7a:58:3f:08:db: 4a:76 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #603: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #604: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #605: Exporting with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #606: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1c:bc:44:32:53:39:47:27:bc:06:3a:0a:10:c5:a3:ec Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:dc:cb:93:8b:8c:b3:13:ba:e1:2e:47:8f:55:43: ff:34 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #607: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #608: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #609: Exporting with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #610: Verifying p12 file generated with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: af:4e:fa:02:b1:56:ce:44:15:a0:67:1c:7f:d7:cc:43 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:dd:dd:3a:4d:be:25:81:1a:34:f9:7f:a9:c0:82: b1:a9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #611: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [default:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #614: Verifying p12 file generated with [default:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b1:b5:df:8a:98:12:29:d4:06:d1:04:ae:d4:1e:72:47 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #615: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #616: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #617: Exporting with [CAMELLIA-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #618: Verifying p12 file generated with [CAMELLIA-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 47:73:4a:e9:f4:f9:e0:8b:07:1c:e2:e4:80:e0:08:89 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:0e:ae:b0:1e:27:3a:f4:f3:b6:28:c5:f8:5b:ab: 97:c5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #619: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #620: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #621: Exporting with [CAMELLIA-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #622: Verifying p12 file generated with [CAMELLIA-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6c:fb:89:68:64:ed:c4:74:f9:fe:2a:2e:bf:3e:8a:1d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-256-CBC Args: 04:10:8e:1a:0e:91:20:7f:b0:6f:fa:d0:34:21:82:a1: 51:1a tools.sh: #623: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #626: Verifying p12 file generated with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4f:37:c4:a6:f9:f3:55:81:c5:f3:4a:e7:87:bd:e9:cb Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-256-CBC Args: 04:10:a1:f3:00:2a:e4:1f:1a:45:e6:b5:89:6f:a1:6d: 9a:35 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #627: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #628: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #629: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #630: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 18:76:1e:f3:5d:7c:56:f2:41:43:cf:24:fc:f6:ab:6e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #631: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #632: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #633: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #634: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f7:80:c0:a1:e3:a3:b2:0c:3b:6e:c6:42:62:19:a7:0a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #638: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 7c:1d:e5:1a:bb:68:be:c6:73:2d:5e:ce:59:18:66:89 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #639: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #640: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #641: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #642: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 2d:cb:4a:7b:c8:b7:49:13:e8:6b:08:12:0e:bf:10:26 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #643: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #644: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #645: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #646: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e9:28:65:64:13:1c:06:12:e7:c4:25:6d:b4:6b:4d:4e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #647: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #650: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 8f:d5:4e:94:94:3c:3d:cb:dc:b5:1d:24:a8:04:3b:04 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #651: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #652: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #653: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #654: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0b:59:ad:55:66:9f:44:4e:58:0b:12:1f:31:03:cb:09 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #655: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #656: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #657: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #658: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c2:f0:0a:fb:e1:5e:c1:7d:28:0e:a1:6c:59:3d:1e:98 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #662: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d4:aa:60:fa:a5:29:9a:41:95:ba:55:ca:30:5a:75:62 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #663: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #664: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #665: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #666: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cc:bc:92:c6:4c:42:5f:ef:38:c2:58:7d:99:34:79:7a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #667: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #668: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #669: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #670: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 17:60:41:5c:7f:c0:c4:5e:55:d0:ce:67:a3:0e:05:13 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #674: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f5:ea:4f:ea:47:2f:0b:9c:9d:e7:c6:29:95:eb:9e:1c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #675: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #676: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #677: Exporting with [AES-256-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #678: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5a:d5:cf:0c:14:33:64:28:f6:df:68:49:4e:e5:3b:2c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:08:f3:86:f6:a0:1c:b6:fa:0e:63:b0:b9:e5:1e: a0:2a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #679: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #680: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #681: Exporting with [AES-256-CBC:AES-256-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #682: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c0:ee:69:ad:2f:9d:14:7b:cf:45:02:b4:1f:a3:50:31 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:a2:49:b0:4b:c5:81:79:ba:42:c8:62:09:b1:9a: 9f:22 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #683: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [AES-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #686: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1d:47:8b:ef:5e:34:f5:2c:38:5f:b2:dc:80:a6:05:c9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:1c:f4:95:dd:f2:37:50:31:d4:00:18:a8:5b:eb: 07:19 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #687: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #688: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #689: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #690: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f3:bd:0c:14:88:91:fa:ae:1c:81:8e:d2:2d:65:46:ee Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:c6:10:3a:00:4c:d9:98:fe:0d:cb:77:2d:66:af: 80:46 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #691: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #692: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #693: Exporting with [AES-256-CBC:AES-256-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #694: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fb:9d:c2:4f:c7:9a:24:52:da:aa:cb:28:86:38:b6:18 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: AES-256-CBC Args: 04:10:96:b3:91:9f:b9:06:2c:7c:f5:e2:21:42:f9:6c: 7e:56 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [AES-256-CBC:AES-256-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #698: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 05:10:25:98:40:57:7c:62:9b:77:e2:a6:54:8f:75:d4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:88:95:c9:ad:c9:bf:81:02:34:bc:b2:b3:75:eb: 07:b1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #699: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #700: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #701: Exporting with [default:default:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #702: Verifying p12 file generated with [default:default:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 45:8f:d2:64:f4:fd:3c:5e:ee:9a:dd:0d:ec:56:69:fa Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #703: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #704: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #705: Exporting with [default:default:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #706: Verifying p12 file generated with [default:default:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4c:68:0a:d2:91:4d:dd:50:6a:b1:ec:55:29:5d:3b:cf Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #709: Exporting with [default:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #710: Verifying p12 file generated with [default:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ce:8b:72:32:9c:fd:f3:e2:e5:fa:cf:28:4d:1b:ef:c9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #711: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #712: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #713: Exporting with [default:default:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #714: Verifying p12 file generated with [default:default:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 83:2f:c0:c9:f3:fc:1d:c9:07:80:20:18:a4:d7:f2:b1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #715: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #716: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #717: Exporting with [default:default:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #718: Verifying p12 file generated with [default:default:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ea:26:dd:a4:76:5a:97:cc:f3:f0:48:44:e9:b4:8d:18 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #719: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #721: Exporting with [default:default:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #722: Verifying p12 file generated with [default:default:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 79:38:bd:12:cc:9c:41:c1:e6:a0:29:20:b3:f5:b7:89 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:35:25 2022 Not After : Wed Sep 28 00:35:25 2072 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:47:c5:83:9d:70:bf:7a:81:3e:88:c2:ec:ef:79:66: 39:3f:57:df:90:3b:57:65:a6:e3:79:cb:aa:0d:cd:0a: 51:c6:97:4a:3e:ea:54:63:74:f3:5c:26:49:a9:df:89: 5b:e2:4d:78:8c:3f:c8:16:76:8a:d1:4e:99:1a:bd:84: 5a:1a:f4:a9:0f:2c:9d:ef:80:33:37:c2:0d:12:86:dd: 0f:f5:0f:b6:b0:aa:f1:2c:5b:e4:54:6f:ac:09:eb:2f: a3:4f:cd:5b:8e:7e:ab:e2:a4:cb:6b:7a:34:94:ee:90: 4f:5f:1c:b5:5c:5e:77:c0:c0:8d:fd:16:94:2f:ab:92: ca:40:41:43:70:92:99:58:d7:e1:01:73:1a:2d:cd:36: 72:7f:02:5d:7d:56:7f:ca:8d:47:ed:fd:04:46:85:74: a6:7f:c6:da:c7:d7:4d:31:93:28:3b:54:b0:25:db:60: b1:80:55:6a:be:c1:8a:1f:8e:84:bd:6a:42:76:25:95: ec:6a:c9:7d:69:f2:48:a6:f5:4c:84:ee:fc:3f:1c:fb: 57:08:1f:a5:ce:07:65:c9:b0:9a:b3:4b:f2:12:8d:91: 54:25:ef:58:51:06:50:19:d6:dd:87:a5:07:14:99:83: 9a:6c:10:a3:19:64:44:83:d1:42:34:1e:f6:b7:94:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:cc:80:62:2a:d9:5c:77:41:04:43:a5:99:ed:0a:8c: 5f:dc:25:bd:dc:9c:65:b0:05:46:52:a7:dd:7d:6f:ab: 1d:0d:95:26:85:a5:19:eb:b9:47:78:42:76:27:dc:e0: 08:bd:9b:9e:bc:31:8b:42:3a:f9:a2:fe:34:5b:6a:e4: 39:78:9a:78:f6:74:62:18:7c:b5:b5:6a:0b:34:71:f4: 75:28:0c:53:d2:e5:02:dd:20:6e:8a:58:75:cd:90:fe: db:f0:8b:1b:a7:36:ad:3e:15:cd:2c:81:a2:21:e5:ca: a3:f4:79:df:42:94:ca:44:9d:c4:f1:af:b3:42:c3:66: 78:5e:f3:6b:a2:42:b5:cb:29:e6:bf:51:df:59:a5:0a: 77:89:f2:26:36:58:77:73:b6:1b:31:d9:e0:4e:00:b5: 99:80:33:80:0f:87:ff:4d:23:e6:f9:ef:26:18:41:51: 79:9d:c5:bb:63:2f:f3:0e:7e:fa:55:95:c4:1f:66:f6: 0c:16:c3:e1:9f:f6:ba:22:c9:83:56:28:32:0d:41:96: 1e:2b:3a:90:88:3a:4d:d8:1d:28:17:c3:a2:a7:c1:f5: d3:c5:3b:b3:eb:14:49:90:ca:63:cd:df:57:8c:e5:df: 15:2f:68:1b:33:6d:04:76:35:1d:c4:12:ec:28:c2:89 Fingerprint (SHA-256): B3:0E:BF:46:81:12:E3:89:99:B5:FF:61:A9:69:4E:6F:4E:42:76:41:91:E2:75:CE:9C:36:D6:0B:C1:C6:F9:63 Fingerprint (SHA1): 82:9D:59:F3:2E:D1:C7:60:91:5D:30:3F:1B:5F:6D:BB:9D:76:E7:62 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:39:23 2022 Not After : Tue Sep 28 00:39:23 2027 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:e0:ea:87:92:bf:ac:5d:78:78:a3:c8:1e:61:7b:a6: e4:ff:97:62:c5:b0:19:c7:33:67:23:46:62:c7:90:b2: 71:f3:03:22:a5:4f:09:14:83:c0:53:4d:00:7d:57:a7: 1a:95:6a:98:fa:ff:5d:33:a3:45:d1:0c:40:c3:c4:15: 56:aa:ff:d2:5f:3f:d0:49:f5:48:73:f4:ab:3f:af:d3: 94:27:4d:70:c6:3a:00:1f:42:f6:c0:5f:72:cc:0b:20: 00:a8:66:bc:ef:75:76:6c:8d:de:fb:80:cf:d1:be:f5: eb:17:b3:5d:a3:f9:59:9b:f9:a2:58:91:5c:66:db:69: c9:86:d8:2b:06:35:69:f2:13:fa:24:8d:8c:b8:f7:6a: 31:4b:42:92:7a:2c:b6:d4:ba:60:be:24:0b:20:0d:0e: 76:6e:a4:70:f1:64:c7:51:9e:6f:20:89:98:c6:0b:b3: 01:c5:b6:73:8f:d6:84:7c:e7:3f:8d:06:30:8f:57:bd: 53:22:86:7a:d0:05:d6:5c:ea:d1:1d:a1:e9:be:31:20: 55:1a:4e:08:27:cd:43:73:dc:c7:32:eb:33:97:60:ce: a8:f9:67:f7:12:fc:82:e1:f6:12:6c:e8:2b:3d:ee:76: d5:38:67:02:59:17:aa:bb:53:fa:e2:0c:15:fa:ef:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:56:5b:ce:d6:25:e9:bc:75:ac:26:51:23:5b:e2:da: 2a:c0:98:b1:b9:8e:bc:48:30:83:43:77:7d:dc:59:17: c4:7f:2c:7b:91:5b:ef:9a:9f:bb:da:d0:d4:bb:23:8c: 82:b0:36:be:c7:79:15:41:bd:d4:57:8a:d0:7a:09:e7: ca:94:c1:2e:77:4c:c2:2a:29:4a:ff:2d:62:32:a1:6d: e8:ef:e9:76:00:29:50:83:58:b5:25:ca:e3:67:2d:7a: 65:04:64:9e:ba:8c:61:7c:de:f7:a8:21:aa:1c:c5:f4: f8:db:38:a6:4c:75:14:95:3f:a5:ec:ec:7c:80:bb:8e: 1e:34:65:d6:c3:04:fb:d4:93:29:28:ca:bd:f6:87:79: d0:d4:61:c9:b3:4b:6f:93:44:e0:39:2c:58:87:83:06: 8f:db:0a:ee:22:c1:9f:c0:87:9d:78:db:8a:eb:dc:4b: b9:58:6b:41:40:c8:d4:43:0d:ba:a7:f2:b2:e3:39:a1: 8d:b3:b4:3b:a4:91:89:02:a5:97:e1:8c:f3:c1:84:b6: d2:46:51:da:83:df:ca:39:98:9d:11:3d:f8:22:20:dc: d3:d7:77:b9:81:83:6c:46:3e:63:ac:48:a9:00:9d:84: 40:93:38:d0:88:e4:a6:61:c6:eb:2a:64:ee:ab:d6:aa Fingerprint (SHA-256): 1F:03:82:71:8C:5E:D5:80:B0:0F:C1:8A:A4:4B:9E:B8:46:97:6C:89:AE:80:2D:FA:5C:7B:4F:0B:C1:D5:98:91 Fingerprint (SHA1): 75:43:4D:A0:BE:54:E9:00:A0:81:1A:59:85:ED:AB:A7:47:81:C3:73 Friendly Name: Alice tools.sh: #723: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #724: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c none pk12util: Algorithm: "none": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #725: Exporting with [none:default:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C none pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #726: Exporting with [default:none:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #727: Verifying p12 file generated with [default:none:default] - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #728: Exporting with [INVALID_CIPHER:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #729: Exporting with [default:INVALID_CIPHER] (pk12util -o) - PASSED tools.sh: Importing PKCS#12 files created with older NSS -------------- pk12util -i TestOldCA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #730: Importing PKCS#12 file created with NSS 3.21 (PBES2 with BMPString password) - PASSED pk12util -i TestOldAES128CA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #731: Importing PKCS#12 file created with NSS 3.29.5 (PBES2 with incorrect AES-128-CBC algorithm ID) - PASSED tools.sh: Importing RSA-PSS private key from PKCS#12 file -------------- pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #732: Importing RSA-PSS private key from PKCS#12 file - PASSED < 4> rsaPss 26c20b122640e4628a5f4f451bba1be46766fe5b server tools.sh: #733: Listing RSA-PSS private key imported from PKCS#12 file - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #734: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #735: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #736: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #737: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #738: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #739: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #740: Show who signed xpi (signtool -w) - PASSED tools.sh: Test if DB created by modutil -create is initialized WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Generating key. This may take a few moments... tools.sh: #741: Test if DB created by modutil -create is initialized - PASSED TIMESTAMP tools END: Wed Sep 28 01:46:42 UTC 2022 Running tests for fips TIMESTAMP fips BEGIN: Wed Sep 28 01:46:42 UTC 2022 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Internal%20Crypto%20Services;library-version=3.79 slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB uri: pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 2. RootCerts library name: /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Builtin%20Object%20Cryptoki%20Modu;library-version=2.54 slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token uri: pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 ----------------------------------------------------------- FIPS mode enabled. fips.sh: #1: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa dce1fee3cd3da80bcfd68fbc33607d0c70066b20 NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #3: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #4: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #5: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #6: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #7: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #8: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #9: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #11: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #13: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa dce1fee3cd3da80bcfd68fbc33607d0c70066b20 FIPS_PUB_140_Test_Certificate fips.sh: #14: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #15: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #16: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #17: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #18: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa dce1fee3cd3da80bcfd68fbc33607d0c70066b20 FIPS_PUB_140_Test_Certificate fips.sh: #19: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 99. **** **** ALL TESTS PASSED **** fips.sh: #20: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 97. **** **** ALL TESTS PASSED **** fips.sh: #21: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi-testlib.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib64/libsoftokn3.so /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle Changing byte 0x00053dc0 (343488): from 00 (0) to 20 (32) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/fips/mangle dbtest -r -d ../fips fips.sh: #22: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Wed Sep 28 01:47:26 UTC 2022 Running tests for sdr TIMESTAMP sdr BEGIN: Wed Sep 28 01:47:26 UTC 2022 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests.v1.3122 -t "Test1" -f ../tests.pw sdr.sh: #1: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests.v2.3122 -t "The quick brown fox jumped over the lazy dog" -f ../tests.pw sdr.sh: #2: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests.v3.3122 -t "1234567" -f ../tests.pw sdr.sh: #3: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests.v1.3122 -t "Test1" -f ../tests.pw sdr.sh: #4: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests.v2.3122 -t "The quick brown fox jumped over the lazy dog" -f ../tests.pw sdr.sh: #5: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests.v3.3122 -t "1234567" -f ../tests.pw sdr.sh: #6: Decrypt - Value 3 - PASSED sdr.sh: pwdecrypt - 300 Entries time pwdecrypt -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/SDR/combined.3122 -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/SDR/decoded.3122 -l /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/SDR/log.3122 -d . -f ../tests.pw ------------- result ---------------------- Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" 9800 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/SDR/decoded.3122 sdr.sh: #7: pwdecrypt success - PASSED ------------- log ---------------------- 0 /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/SDR/log.3122 sdr.sh: #8: pwdecrypt no error log - PASSED ------------- time ---------------------- real 1.18 user 0.88 sys 0.29 1 seconds TIMESTAMP sdr END: Wed Sep 28 01:47:33 UTC 2022 Running tests for crmf TIMESTAMP crmf BEGIN: Wed Sep 28 01:47:33 UTC 2022 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #1: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #2: CMMF test . - PASSED TIMESTAMP crmf END: Wed Sep 28 01:47:36 UTC 2022 Running tests for smime TIMESTAMP smime BEGIN: Wed Sep 28 01:47:36 UTC 2022 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #1: Create Detached Signature Alice (1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #2: Verifying Alice's Detached Signature (1) . - PASSED smime.sh: Signing Attached Message (1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #3: Create Attached Signature Alice (1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.1 smime.sh: #4: Decode Alice's Attached Signature (1) . - PASSED diff alice.txt alice.data.1 smime.sh: #5: Compare Attached Signed Data and Original (1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #6: Create Detached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #7: Verifying Alice's Detached Signature (ECDSA w/ 1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #8: Create Attached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.1 smime.sh: #9: Decode Alice's Attached Signature (ECDSA w/ 1) . - PASSED diff alice.txt alice-ec.data.1 smime.sh: #10: Compare Attached Signed Data and Original (ECDSA w/ 1) . - PASSED smime.sh: Signing Detached Message {256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #11: Create Detached Signature Alice (256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #12: Verifying Alice's Detached Signature (256) . - PASSED smime.sh: Signing Attached Message (256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #13: Create Attached Signature Alice (256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.256 smime.sh: #14: Decode Alice's Attached Signature (256) . - PASSED diff alice.txt alice.data.256 smime.sh: #15: Compare Attached Signed Data and Original (256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #16: Create Detached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #17: Verifying Alice's Detached Signature (ECDSA w/ 256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #18: Create Attached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.256 smime.sh: #19: Decode Alice's Attached Signature (ECDSA w/ 256) . - PASSED diff alice.txt alice-ec.data.256 smime.sh: #20: Compare Attached Signed Data and Original (ECDSA w/ 256) . - PASSED smime.sh: Signing Detached Message {384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #21: Create Detached Signature Alice (384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #22: Verifying Alice's Detached Signature (384) . - PASSED smime.sh: Signing Attached Message (384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #23: Create Attached Signature Alice (384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.384 smime.sh: #24: Decode Alice's Attached Signature (384) . - PASSED diff alice.txt alice.data.384 smime.sh: #25: Compare Attached Signed Data and Original (384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #26: Create Detached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #27: Verifying Alice's Detached Signature (ECDSA w/ 384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #28: Create Attached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.384 smime.sh: #29: Decode Alice's Attached Signature (ECDSA w/ 384) . - PASSED diff alice.txt alice-ec.data.384 smime.sh: #30: Compare Attached Signed Data and Original (ECDSA w/ 384) . - PASSED smime.sh: Signing Detached Message {512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #31: Create Detached Signature Alice (512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #32: Verifying Alice's Detached Signature (512) . - PASSED smime.sh: Signing Attached Message (512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #33: Create Attached Signature Alice (512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.512 smime.sh: #34: Decode Alice's Attached Signature (512) . - PASSED diff alice.txt alice.data.512 smime.sh: #35: Compare Attached Signed Data and Original (512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #36: Create Detached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #37: Verifying Alice's Detached Signature (ECDSA w/ 512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #38: Create Attached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.512 smime.sh: #39: Decode Alice's Attached Signature (ECDSA w/ 512) . - PASSED diff alice.txt alice-ec.data.512 smime.sh: #40: Compare Attached Signed Data and Original (ECDSA w/ 512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@example.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #41: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #42: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #43: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@example.com,dave@example.com smime.sh: #44: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@example.net smime.sh: #45: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #46: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #47: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #48: Decrypt with a Multiple Email cert . - PASSED smime.sh: #49: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #50: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #51: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@example.com,dave@example.com" \ -d ../alicedir > co.der smime.sh: #52: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #53: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@example.com" > alice.enc smime.sh: #54: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #55: Decode Encrypted-Data . - PASSED smime.sh: #56: Compare Decoded and Original Data . - PASSED pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #57: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice_p7.env -o alice_p7.data smime.sh: #58: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #59: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #60: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #61: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Wed Sep 28 01:50:38 UTC 2022 Running tests for ssl TIMESTAMP ssl BEGIN: Wed Sep 28 01:50:38 UTC 2022 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:50:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:50:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48680 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48680 found at Wed Sep 28 01:50:39 UTC 2022 selfserv_9223 with PID 48680 started at Wed Sep 28 01:50:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48680 at Wed Sep 28 01:50:43 UTC 2022 kill -USR1 48680 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48680 killed at Wed Sep 28 01:50:43 UTC 2022 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:50:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:50:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48732 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48732 found at Wed Sep 28 01:50:44 UTC 2022 selfserv_9223 with PID 48732 started at Wed Sep 28 01:50:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48732 at Wed Sep 28 01:50:48 UTC 2022 kill -USR1 48732 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48732 killed at Wed Sep 28 01:50:49 UTC 2022 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:50:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:50:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48784 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48784 found at Wed Sep 28 01:50:49 UTC 2022 selfserv_9223 with PID 48784 started at Wed Sep 28 01:50:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #3: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48784 at Wed Sep 28 01:50:54 UTC 2022 kill -USR1 48784 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48784 killed at Wed Sep 28 01:50:54 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:50:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:50:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48850 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48850 found at Wed Sep 28 01:50:54 UTC 2022 selfserv_9223 with PID 48850 started at Wed Sep 28 01:50:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #4: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48850 at Wed Sep 28 01:50:58 UTC 2022 kill -USR1 48850 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48850 killed at Wed Sep 28 01:50:59 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:50:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:50:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48902 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48902 found at Wed Sep 28 01:50:59 UTC 2022 selfserv_9223 with PID 48902 started at Wed Sep 28 01:50:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48902 at Wed Sep 28 01:51:03 UTC 2022 kill -USR1 48902 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48902 killed at Wed Sep 28 01:51:03 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:51:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:51:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48954 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48954 found at Wed Sep 28 01:51:04 UTC 2022 selfserv_9223 with PID 48954 started at Wed Sep 28 01:51:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #6: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48954 at Wed Sep 28 01:51:08 UTC 2022 kill -USR1 48954 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48954 killed at Wed Sep 28 01:51:08 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:51:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:51:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 49020 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 49020 found at Wed Sep 28 01:51:09 UTC 2022 selfserv_9223 with PID 49020 started at Wed Sep 28 01:51:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #7: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 49020 at Wed Sep 28 01:51:15 UTC 2022 kill -USR1 49020 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 49020 killed at Wed Sep 28 01:51:15 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:51:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:51:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 49072 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 49072 found at Wed Sep 28 01:51:15 UTC 2022 selfserv_9223 with PID 49072 started at Wed Sep 28 01:51:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 49072 at Wed Sep 28 01:51:22 UTC 2022 kill -USR1 49072 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 49072 killed at Wed Sep 28 01:51:22 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:51:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:51:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 49124 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 49124 found at Wed Sep 28 01:51:22 UTC 2022 selfserv_9223 with PID 49124 started at Wed Sep 28 01:51:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 49124 at Wed Sep 28 01:51:28 UTC 2022 kill -USR1 49124 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 49124 killed at Wed Sep 28 01:51:28 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:51:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:51:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 370 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 370 found at Wed Sep 28 01:51:29 UTC 2022 selfserv_9223 with PID 370 started at Wed Sep 28 01:51:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 370 at Wed Sep 28 01:51:33 UTC 2022 kill -USR1 370 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 370 killed at Wed Sep 28 01:51:34 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:51:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:51:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 422 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 422 found at Wed Sep 28 01:51:34 UTC 2022 selfserv_9223 with PID 422 started at Wed Sep 28 01:51:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #11: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 422 at Wed Sep 28 01:51:39 UTC 2022 kill -USR1 422 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 422 killed at Wed Sep 28 01:51:39 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:51:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:51:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 474 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 474 found at Wed Sep 28 01:51:39 UTC 2022 selfserv_9223 with PID 474 started at Wed Sep 28 01:51:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #12: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 474 at Wed Sep 28 01:51:44 UTC 2022 kill -USR1 474 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 474 killed at Wed Sep 28 01:51:44 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:51:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:51:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 541 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 541 found at Wed Sep 28 01:51:44 UTC 2022 selfserv_9223 with PID 541 started at Wed Sep 28 01:51:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #13: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 541 at Wed Sep 28 01:51:49 UTC 2022 kill -USR1 541 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 541 killed at Wed Sep 28 01:51:49 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:51:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:51:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 610 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 610 found at Wed Sep 28 01:51:49 UTC 2022 selfserv_9223 with PID 610 started at Wed Sep 28 01:51:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #14: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 610 at Wed Sep 28 01:51:53 UTC 2022 kill -USR1 610 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 610 killed at Wed Sep 28 01:51:53 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:51:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:51:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 666 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 666 found at Wed Sep 28 01:51:54 UTC 2022 selfserv_9223 with PID 666 started at Wed Sep 28 01:51:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #15: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 666 at Wed Sep 28 01:51:58 UTC 2022 kill -USR1 666 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 666 killed at Wed Sep 28 01:51:58 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:51:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:51:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 733 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 733 found at Wed Sep 28 01:51:59 UTC 2022 selfserv_9223 with PID 733 started at Wed Sep 28 01:51:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #16: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 733 at Wed Sep 28 01:52:05 UTC 2022 kill -USR1 733 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 733 killed at Wed Sep 28 01:52:05 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:52:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:52:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 789 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 789 found at Wed Sep 28 01:52:05 UTC 2022 selfserv_9223 with PID 789 started at Wed Sep 28 01:52:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #17: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 789 at Wed Sep 28 01:52:12 UTC 2022 kill -USR1 789 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 789 killed at Wed Sep 28 01:52:12 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:52:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:52:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 848 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 848 found at Wed Sep 28 01:52:12 UTC 2022 selfserv_9223 with PID 848 started at Wed Sep 28 01:52:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #18: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 848 at Wed Sep 28 01:52:18 UTC 2022 kill -USR1 848 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 848 killed at Wed Sep 28 01:52:19 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:52:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:52:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 933 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 933 found at Wed Sep 28 01:52:19 UTC 2022 selfserv_9223 with PID 933 started at Wed Sep 28 01:52:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #19: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 933 at Wed Sep 28 01:52:23 UTC 2022 kill -USR1 933 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 933 killed at Wed Sep 28 01:52:24 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:52:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:52:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 990 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 990 found at Wed Sep 28 01:52:24 UTC 2022 selfserv_9223 with PID 990 started at Wed Sep 28 01:52:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #20: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 990 at Wed Sep 28 01:52:29 UTC 2022 kill -USR1 990 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 990 killed at Wed Sep 28 01:52:29 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:52:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:52:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1071 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1071 found at Wed Sep 28 01:52:29 UTC 2022 selfserv_9223 with PID 1071 started at Wed Sep 28 01:52:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #21: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1071 at Wed Sep 28 01:52:34 UTC 2022 kill -USR1 1071 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1071 killed at Wed Sep 28 01:52:34 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:52:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:52:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1143 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1143 found at Wed Sep 28 01:52:34 UTC 2022 selfserv_9223 with PID 1143 started at Wed Sep 28 01:52:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #22: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1143 at Wed Sep 28 01:52:38 UTC 2022 kill -USR1 1143 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1143 killed at Wed Sep 28 01:52:39 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:52:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:52:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1196 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1196 found at Wed Sep 28 01:52:39 UTC 2022 selfserv_9223 with PID 1196 started at Wed Sep 28 01:52:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #23: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1196 at Wed Sep 28 01:52:43 UTC 2022 kill -USR1 1196 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1196 killed at Wed Sep 28 01:52:43 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:52:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:52:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1250 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1250 found at Wed Sep 28 01:52:44 UTC 2022 selfserv_9223 with PID 1250 started at Wed Sep 28 01:52:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #24: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1250 at Wed Sep 28 01:52:48 UTC 2022 kill -USR1 1250 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1250 killed at Wed Sep 28 01:52:48 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:52:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:52:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1334 found at Wed Sep 28 01:52:49 UTC 2022 selfserv_9223 with PID 1334 started at Wed Sep 28 01:52:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #25: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 1334 at Wed Sep 28 01:52:54 UTC 2022 kill -USR1 1334 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1334 killed at Wed Sep 28 01:52:54 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:52:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:52:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1388 found at Wed Sep 28 01:52:55 UTC 2022 selfserv_9223 with PID 1388 started at Wed Sep 28 01:52:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #26: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1388 at Wed Sep 28 01:53:00 UTC 2022 kill -USR1 1388 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1388 killed at Wed Sep 28 01:53:01 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:53:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:53:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1446 found at Wed Sep 28 01:53:01 UTC 2022 selfserv_9223 with PID 1446 started at Wed Sep 28 01:53:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #27: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 1446 at Wed Sep 28 01:53:07 UTC 2022 kill -USR1 1446 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1446 killed at Wed Sep 28 01:53:07 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:53:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:53:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1537 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1537 found at Wed Sep 28 01:53:07 UTC 2022 selfserv_9223 with PID 1537 started at Wed Sep 28 01:53:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #28: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 1537 at Wed Sep 28 01:53:12 UTC 2022 kill -USR1 1537 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1537 killed at Wed Sep 28 01:53:12 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:53:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:53:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1596 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1596 found at Wed Sep 28 01:53:12 UTC 2022 selfserv_9223 with PID 1596 started at Wed Sep 28 01:53:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #29: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 1596 at Wed Sep 28 01:53:17 UTC 2022 kill -USR1 1596 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1596 killed at Wed Sep 28 01:53:17 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:53:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:53:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1648 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1648 found at Wed Sep 28 01:53:17 UTC 2022 selfserv_9223 with PID 1648 started at Wed Sep 28 01:53:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #30: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 1648 at Wed Sep 28 01:53:22 UTC 2022 kill -USR1 1648 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1648 killed at Wed Sep 28 01:53:22 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:53:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:53:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1714 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1714 found at Wed Sep 28 01:53:22 UTC 2022 selfserv_9223 with PID 1714 started at Wed Sep 28 01:53:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #31: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 1714 at Wed Sep 28 01:53:27 UTC 2022 kill -USR1 1714 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1714 killed at Wed Sep 28 01:53:27 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:53:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:53:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1766 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1766 found at Wed Sep 28 01:53:27 UTC 2022 selfserv_9223 with PID 1766 started at Wed Sep 28 01:53:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #32: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 1766 at Wed Sep 28 01:53:31 UTC 2022 kill -USR1 1766 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1766 killed at Wed Sep 28 01:53:31 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:53:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:53:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1839 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1839 found at Wed Sep 28 01:53:32 UTC 2022 selfserv_9223 with PID 1839 started at Wed Sep 28 01:53:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #33: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 1839 at Wed Sep 28 01:53:36 UTC 2022 kill -USR1 1839 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1839 killed at Wed Sep 28 01:53:36 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:53:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:53:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1912 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1912 found at Wed Sep 28 01:53:37 UTC 2022 selfserv_9223 with PID 1912 started at Wed Sep 28 01:53:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #34: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 1912 at Wed Sep 28 01:53:42 UTC 2022 kill -USR1 1912 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1912 killed at Wed Sep 28 01:53:42 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:53:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:53:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1964 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1964 found at Wed Sep 28 01:53:43 UTC 2022 selfserv_9223 with PID 1964 started at Wed Sep 28 01:53:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #35: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1964 at Wed Sep 28 01:53:48 UTC 2022 kill -USR1 1964 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1964 killed at Wed Sep 28 01:53:49 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:53:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:53:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2018 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2018 found at Wed Sep 28 01:53:49 UTC 2022 selfserv_9223 with PID 2018 started at Wed Sep 28 01:53:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #36: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 2018 at Wed Sep 28 01:53:55 UTC 2022 kill -USR1 2018 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2018 killed at Wed Sep 28 01:53:55 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:53:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:53:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2084 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2084 found at Wed Sep 28 01:53:55 UTC 2022 selfserv_9223 with PID 2084 started at Wed Sep 28 01:53:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #37: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2084 at Wed Sep 28 01:54:00 UTC 2022 kill -USR1 2084 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2084 killed at Wed Sep 28 01:54:00 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:54:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:54:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2136 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2136 found at Wed Sep 28 01:54:00 UTC 2022 selfserv_9223 with PID 2136 started at Wed Sep 28 01:54:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #38: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2136 at Wed Sep 28 01:54:05 UTC 2022 kill -USR1 2136 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2136 killed at Wed Sep 28 01:54:05 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:54:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:54:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2188 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2188 found at Wed Sep 28 01:54:06 UTC 2022 selfserv_9223 with PID 2188 started at Wed Sep 28 01:54:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #39: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2188 at Wed Sep 28 01:54:11 UTC 2022 kill -USR1 2188 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2188 killed at Wed Sep 28 01:54:11 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:54:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:54:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2254 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2254 found at Wed Sep 28 01:54:11 UTC 2022 selfserv_9223 with PID 2254 started at Wed Sep 28 01:54:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #40: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2254 at Wed Sep 28 01:54:15 UTC 2022 kill -USR1 2254 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2254 killed at Wed Sep 28 01:54:16 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:54:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:54:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2306 found at Wed Sep 28 01:54:16 UTC 2022 selfserv_9223 with PID 2306 started at Wed Sep 28 01:54:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #41: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2306 at Wed Sep 28 01:54:20 UTC 2022 kill -USR1 2306 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2306 killed at Wed Sep 28 01:54:21 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:54:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:54:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2363 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2363 found at Wed Sep 28 01:54:21 UTC 2022 selfserv_9223 with PID 2363 started at Wed Sep 28 01:54:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #42: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2363 at Wed Sep 28 01:54:25 UTC 2022 kill -USR1 2363 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2363 killed at Wed Sep 28 01:54:25 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:54:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:54:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2429 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2429 found at Wed Sep 28 01:54:26 UTC 2022 selfserv_9223 with PID 2429 started at Wed Sep 28 01:54:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #43: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2429 at Wed Sep 28 01:54:32 UTC 2022 kill -USR1 2429 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2429 killed at Wed Sep 28 01:54:32 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:54:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:54:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2496 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2496 found at Wed Sep 28 01:54:33 UTC 2022 selfserv_9223 with PID 2496 started at Wed Sep 28 01:54:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #44: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2496 at Wed Sep 28 01:54:39 UTC 2022 kill -USR1 2496 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2496 killed at Wed Sep 28 01:54:39 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:54:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:54:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2548 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2548 found at Wed Sep 28 01:54:40 UTC 2022 selfserv_9223 with PID 2548 started at Wed Sep 28 01:54:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #45: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2548 at Wed Sep 28 01:54:46 UTC 2022 kill -USR1 2548 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2548 killed at Wed Sep 28 01:54:46 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:54:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:54:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2614 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2614 found at Wed Sep 28 01:54:47 UTC 2022 selfserv_9223 with PID 2614 started at Wed Sep 28 01:54:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #46: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2614 at Wed Sep 28 01:54:51 UTC 2022 kill -USR1 2614 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2614 killed at Wed Sep 28 01:54:52 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:54:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:54:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2666 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2666 found at Wed Sep 28 01:54:52 UTC 2022 selfserv_9223 with PID 2666 started at Wed Sep 28 01:54:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #47: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2666 at Wed Sep 28 01:54:57 UTC 2022 kill -USR1 2666 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2666 killed at Wed Sep 28 01:54:57 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:54:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:54:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2718 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2718 found at Wed Sep 28 01:54:57 UTC 2022 selfserv_9223 with PID 2718 started at Wed Sep 28 01:54:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #48: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2718 at Wed Sep 28 01:55:02 UTC 2022 kill -USR1 2718 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2718 killed at Wed Sep 28 01:55:02 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:55:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:55:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2784 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2784 found at Wed Sep 28 01:55:03 UTC 2022 selfserv_9223 with PID 2784 started at Wed Sep 28 01:55:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #49: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2784 at Wed Sep 28 01:55:07 UTC 2022 kill -USR1 2784 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2784 killed at Wed Sep 28 01:55:07 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:55:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:55:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2836 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2836 found at Wed Sep 28 01:55:08 UTC 2022 selfserv_9223 with PID 2836 started at Wed Sep 28 01:55:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #50: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2836 at Wed Sep 28 01:55:12 UTC 2022 kill -USR1 2836 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2836 killed at Wed Sep 28 01:55:12 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:55:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:55:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2889 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2889 found at Wed Sep 28 01:55:12 UTC 2022 selfserv_9223 with PID 2889 started at Wed Sep 28 01:55:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #51: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2889 at Wed Sep 28 01:55:17 UTC 2022 kill -USR1 2889 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2889 killed at Wed Sep 28 01:55:17 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:55:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:55:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2955 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2955 found at Wed Sep 28 01:55:17 UTC 2022 selfserv_9223 with PID 2955 started at Wed Sep 28 01:55:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #52: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2955 at Wed Sep 28 01:55:24 UTC 2022 kill -USR1 2955 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2955 killed at Wed Sep 28 01:55:24 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:55:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:55:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3007 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3007 found at Wed Sep 28 01:55:24 UTC 2022 selfserv_9223 with PID 3007 started at Wed Sep 28 01:55:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #53: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3007 at Wed Sep 28 01:55:31 UTC 2022 kill -USR1 3007 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3007 killed at Wed Sep 28 01:55:31 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:55:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:55:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3074 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3074 found at Wed Sep 28 01:55:31 UTC 2022 selfserv_9223 with PID 3074 started at Wed Sep 28 01:55:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #54: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3074 at Wed Sep 28 01:55:38 UTC 2022 kill -USR1 3074 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3074 killed at Wed Sep 28 01:55:38 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:55:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:55:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3142 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3142 found at Wed Sep 28 01:55:38 UTC 2022 selfserv_9223 with PID 3142 started at Wed Sep 28 01:55:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #55: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3142 at Wed Sep 28 01:55:43 UTC 2022 kill -USR1 3142 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3142 killed at Wed Sep 28 01:55:43 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:55:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:55:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3195 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3195 found at Wed Sep 28 01:55:44 UTC 2022 selfserv_9223 with PID 3195 started at Wed Sep 28 01:55:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #56: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3195 at Wed Sep 28 01:55:48 UTC 2022 kill -USR1 3195 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3195 killed at Wed Sep 28 01:55:48 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:55:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:55:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3249 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3249 found at Wed Sep 28 01:55:49 UTC 2022 selfserv_9223 with PID 3249 started at Wed Sep 28 01:55:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #57: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3249 at Wed Sep 28 01:55:54 UTC 2022 kill -USR1 3249 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3249 killed at Wed Sep 28 01:55:54 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:55:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:55:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3315 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3315 found at Wed Sep 28 01:55:54 UTC 2022 selfserv_9223 with PID 3315 started at Wed Sep 28 01:55:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #58: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3315 at Wed Sep 28 01:55:59 UTC 2022 kill -USR1 3315 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3315 killed at Wed Sep 28 01:55:59 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:55:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:55:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3367 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3367 found at Wed Sep 28 01:55:59 UTC 2022 selfserv_9223 with PID 3367 started at Wed Sep 28 01:55:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #59: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3367 at Wed Sep 28 01:56:03 UTC 2022 kill -USR1 3367 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3367 killed at Wed Sep 28 01:56:04 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:56:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:56:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3419 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3419 found at Wed Sep 28 01:56:04 UTC 2022 selfserv_9223 with PID 3419 started at Wed Sep 28 01:56:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #60: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3419 at Wed Sep 28 01:56:08 UTC 2022 kill -USR1 3419 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3419 killed at Wed Sep 28 01:56:09 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:56:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:56:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3485 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3485 found at Wed Sep 28 01:56:09 UTC 2022 selfserv_9223 with PID 3485 started at Wed Sep 28 01:56:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #61: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3485 at Wed Sep 28 01:56:15 UTC 2022 kill -USR1 3485 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3485 killed at Wed Sep 28 01:56:15 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:56:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:56:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3537 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3537 found at Wed Sep 28 01:56:16 UTC 2022 selfserv_9223 with PID 3537 started at Wed Sep 28 01:56:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #62: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3537 at Wed Sep 28 01:56:22 UTC 2022 kill -USR1 3537 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3537 killed at Wed Sep 28 01:56:22 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:56:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:56:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3589 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3589 found at Wed Sep 28 01:56:23 UTC 2022 selfserv_9223 with PID 3589 started at Wed Sep 28 01:56:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #63: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3589 at Wed Sep 28 01:56:29 UTC 2022 kill -USR1 3589 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3589 killed at Wed Sep 28 01:56:29 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:56:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:56:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3670 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3670 found at Wed Sep 28 01:56:30 UTC 2022 selfserv_9223 with PID 3670 started at Wed Sep 28 01:56:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #64: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3670 at Wed Sep 28 01:56:35 UTC 2022 kill -USR1 3670 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3670 killed at Wed Sep 28 01:56:35 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:56:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:56:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3722 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3722 found at Wed Sep 28 01:56:35 UTC 2022 selfserv_9223 with PID 3722 started at Wed Sep 28 01:56:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #65: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3722 at Wed Sep 28 01:56:40 UTC 2022 kill -USR1 3722 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3722 killed at Wed Sep 28 01:56:40 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:56:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:56:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3774 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3774 found at Wed Sep 28 01:56:40 UTC 2022 selfserv_9223 with PID 3774 started at Wed Sep 28 01:56:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #66: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3774 at Wed Sep 28 01:56:45 UTC 2022 kill -USR1 3774 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3774 killed at Wed Sep 28 01:56:45 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:56:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:56:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3840 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3840 found at Wed Sep 28 01:56:46 UTC 2022 selfserv_9223 with PID 3840 started at Wed Sep 28 01:56:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #67: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3840 at Wed Sep 28 01:56:50 UTC 2022 kill -USR1 3840 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3840 killed at Wed Sep 28 01:56:50 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:56:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:56:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3892 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3892 found at Wed Sep 28 01:56:51 UTC 2022 selfserv_9223 with PID 3892 started at Wed Sep 28 01:56:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #68: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3892 at Wed Sep 28 01:56:55 UTC 2022 kill -USR1 3892 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3892 killed at Wed Sep 28 01:56:55 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:56:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:56:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3944 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3944 found at Wed Sep 28 01:56:56 UTC 2022 selfserv_9223 with PID 3944 started at Wed Sep 28 01:56:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #69: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3944 at Wed Sep 28 01:57:00 UTC 2022 kill -USR1 3944 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3944 killed at Wed Sep 28 01:57:00 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:57:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:57:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4010 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4010 found at Wed Sep 28 01:57:00 UTC 2022 selfserv_9223 with PID 4010 started at Wed Sep 28 01:57:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #70: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4010 at Wed Sep 28 01:57:07 UTC 2022 kill -USR1 4010 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4010 killed at Wed Sep 28 01:57:07 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:57:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:57:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4063 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4063 found at Wed Sep 28 01:57:07 UTC 2022 selfserv_9223 with PID 4063 started at Wed Sep 28 01:57:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #71: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4063 at Wed Sep 28 01:57:14 UTC 2022 kill -USR1 4063 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4063 killed at Wed Sep 28 01:57:14 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:57:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:57:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4115 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4115 found at Wed Sep 28 01:57:14 UTC 2022 selfserv_9223 with PID 4115 started at Wed Sep 28 01:57:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #72: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4115 at Wed Sep 28 01:57:21 UTC 2022 kill -USR1 4115 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4115 killed at Wed Sep 28 01:57:21 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:57:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:57:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4181 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4181 found at Wed Sep 28 01:57:21 UTC 2022 selfserv_9223 with PID 4181 started at Wed Sep 28 01:57:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #73: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4181 at Wed Sep 28 01:57:26 UTC 2022 kill -USR1 4181 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4181 killed at Wed Sep 28 01:57:26 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:57:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:57:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4233 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4233 found at Wed Sep 28 01:57:27 UTC 2022 selfserv_9223 with PID 4233 started at Wed Sep 28 01:57:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #74: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4233 at Wed Sep 28 01:57:31 UTC 2022 kill -USR1 4233 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4233 killed at Wed Sep 28 01:57:31 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:57:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:57:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4300 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4300 found at Wed Sep 28 01:57:32 UTC 2022 selfserv_9223 with PID 4300 started at Wed Sep 28 01:57:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #75: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4300 at Wed Sep 28 01:57:36 UTC 2022 kill -USR1 4300 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4300 killed at Wed Sep 28 01:57:37 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:57:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:57:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4366 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4366 found at Wed Sep 28 01:57:37 UTC 2022 selfserv_9223 with PID 4366 started at Wed Sep 28 01:57:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #76: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4366 at Wed Sep 28 01:57:41 UTC 2022 kill -USR1 4366 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4366 killed at Wed Sep 28 01:57:41 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:57:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:57:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4418 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4418 found at Wed Sep 28 01:57:42 UTC 2022 selfserv_9223 with PID 4418 started at Wed Sep 28 01:57:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #77: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4418 at Wed Sep 28 01:57:46 UTC 2022 kill -USR1 4418 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4418 killed at Wed Sep 28 01:57:46 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:57:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:57:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4470 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4470 found at Wed Sep 28 01:57:47 UTC 2022 selfserv_9223 with PID 4470 started at Wed Sep 28 01:57:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #78: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4470 at Wed Sep 28 01:57:51 UTC 2022 kill -USR1 4470 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4470 killed at Wed Sep 28 01:57:51 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:57:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:57:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4536 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4536 found at Wed Sep 28 01:57:51 UTC 2022 selfserv_9223 with PID 4536 started at Wed Sep 28 01:57:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #79: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4536 at Wed Sep 28 01:57:57 UTC 2022 kill -USR1 4536 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4536 killed at Wed Sep 28 01:57:57 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:57:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:57:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4588 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4588 found at Wed Sep 28 01:57:58 UTC 2022 selfserv_9223 with PID 4588 started at Wed Sep 28 01:57:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #80: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4588 at Wed Sep 28 01:58:03 UTC 2022 kill -USR1 4588 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4588 killed at Wed Sep 28 01:58:04 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:58:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:58:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4640 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4640 found at Wed Sep 28 01:58:04 UTC 2022 selfserv_9223 with PID 4640 started at Wed Sep 28 01:58:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #81: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4640 at Wed Sep 28 01:58:10 UTC 2022 kill -USR1 4640 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4640 killed at Wed Sep 28 01:58:10 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:58:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:58:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4706 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4706 found at Wed Sep 28 01:58:10 UTC 2022 selfserv_9223 with PID 4706 started at Wed Sep 28 01:58:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #82: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4706 at Wed Sep 28 01:58:15 UTC 2022 kill -USR1 4706 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4706 killed at Wed Sep 28 01:58:15 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:58:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:58:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4758 found at Wed Sep 28 01:58:15 UTC 2022 selfserv_9223 with PID 4758 started at Wed Sep 28 01:58:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #83: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4758 at Wed Sep 28 01:58:20 UTC 2022 kill -USR1 4758 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4758 killed at Wed Sep 28 01:58:20 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:58:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:58:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4810 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4810 found at Wed Sep 28 01:58:21 UTC 2022 selfserv_9223 with PID 4810 started at Wed Sep 28 01:58:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #84: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4810 at Wed Sep 28 01:58:25 UTC 2022 kill -USR1 4810 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4810 killed at Wed Sep 28 01:58:25 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:58:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:58:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4876 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4876 found at Wed Sep 28 01:58:26 UTC 2022 selfserv_9223 with PID 4876 started at Wed Sep 28 01:58:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #85: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4876 at Wed Sep 28 01:58:30 UTC 2022 kill -USR1 4876 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4876 killed at Wed Sep 28 01:58:30 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:58:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:58:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4943 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4943 found at Wed Sep 28 01:58:31 UTC 2022 selfserv_9223 with PID 4943 started at Wed Sep 28 01:58:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #86: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4943 at Wed Sep 28 01:58:35 UTC 2022 kill -USR1 4943 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4943 killed at Wed Sep 28 01:58:35 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 01:58:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:58:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4995 found at Wed Sep 28 01:58:35 UTC 2022 selfserv_9223 with PID 4995 started at Wed Sep 28 01:58:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #87: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4995 at Wed Sep 28 01:58:40 UTC 2022 kill -USR1 4995 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4995 killed at Wed Sep 28 01:58:40 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:58:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:58:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5061 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5061 found at Wed Sep 28 01:58:40 UTC 2022 selfserv_9223 with PID 5061 started at Wed Sep 28 01:58:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #88: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5061 at Wed Sep 28 01:58:46 UTC 2022 kill -USR1 5061 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5061 killed at Wed Sep 28 01:58:46 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:58:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:58:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5114 found at Wed Sep 28 01:58:47 UTC 2022 selfserv_9223 with PID 5114 started at Wed Sep 28 01:58:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #89: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5114 at Wed Sep 28 01:58:52 UTC 2022 kill -USR1 5114 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5114 killed at Wed Sep 28 01:58:52 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:58:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:58:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5166 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5166 found at Wed Sep 28 01:58:53 UTC 2022 selfserv_9223 with PID 5166 started at Wed Sep 28 01:58:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #90: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5166 at Wed Sep 28 01:58:59 UTC 2022 kill -USR1 5166 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5166 killed at Wed Sep 28 01:58:59 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:58:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:58:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5233 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5233 found at Wed Sep 28 01:58:59 UTC 2022 selfserv_9223 with PID 5233 started at Wed Sep 28 01:58:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #91: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5233 at Wed Sep 28 01:59:05 UTC 2022 kill -USR1 5233 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5233 killed at Wed Sep 28 01:59:05 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:59:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:59:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5285 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5285 found at Wed Sep 28 01:59:05 UTC 2022 selfserv_9223 with PID 5285 started at Wed Sep 28 01:59:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #92: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5285 at Wed Sep 28 01:59:11 UTC 2022 kill -USR1 5285 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5285 killed at Wed Sep 28 01:59:11 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:59:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:59:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5337 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5337 found at Wed Sep 28 01:59:11 UTC 2022 selfserv_9223 with PID 5337 started at Wed Sep 28 01:59:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #93: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5337 at Wed Sep 28 01:59:17 UTC 2022 kill -USR1 5337 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5337 killed at Wed Sep 28 01:59:17 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:59:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:59:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5403 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5403 found at Wed Sep 28 01:59:18 UTC 2022 selfserv_9223 with PID 5403 started at Wed Sep 28 01:59:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #94: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5403 at Wed Sep 28 01:59:23 UTC 2022 kill -USR1 5403 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5403 killed at Wed Sep 28 01:59:23 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:59:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:59:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5455 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5455 found at Wed Sep 28 01:59:24 UTC 2022 selfserv_9223 with PID 5455 started at Wed Sep 28 01:59:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #95: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5455 at Wed Sep 28 01:59:29 UTC 2022 kill -USR1 5455 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5455 killed at Wed Sep 28 01:59:30 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 01:59:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:59:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5522 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5522 found at Wed Sep 28 01:59:30 UTC 2022 selfserv_9223 with PID 5522 started at Wed Sep 28 01:59:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #96: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5522 at Wed Sep 28 01:59:36 UTC 2022 kill -USR1 5522 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5522 killed at Wed Sep 28 01:59:36 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:59:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:59:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5588 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5588 found at Wed Sep 28 01:59:36 UTC 2022 selfserv_9223 with PID 5588 started at Wed Sep 28 01:59:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #97: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5588 at Wed Sep 28 01:59:41 UTC 2022 kill -USR1 5588 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5588 killed at Wed Sep 28 01:59:41 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:59:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:59:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5640 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5640 found at Wed Sep 28 01:59:41 UTC 2022 selfserv_9223 with PID 5640 started at Wed Sep 28 01:59:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #98: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5640 at Wed Sep 28 01:59:46 UTC 2022 kill -USR1 5640 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5640 killed at Wed Sep 28 01:59:46 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:59:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:59:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5692 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5692 found at Wed Sep 28 01:59:46 UTC 2022 selfserv_9223 with PID 5692 started at Wed Sep 28 01:59:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #99: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5692 at Wed Sep 28 01:59:51 UTC 2022 kill -USR1 5692 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5692 killed at Wed Sep 28 01:59:51 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:59:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:59:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5766 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5766 found at Wed Sep 28 01:59:51 UTC 2022 selfserv_9223 with PID 5766 started at Wed Sep 28 01:59:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #100: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5766 at Wed Sep 28 01:59:56 UTC 2022 kill -USR1 5766 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5766 killed at Wed Sep 28 01:59:56 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 01:59:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 01:59:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5818 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5818 found at Wed Sep 28 01:59:56 UTC 2022 selfserv_9223 with PID 5818 started at Wed Sep 28 01:59:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #101: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5818 at Wed Sep 28 02:00:01 UTC 2022 kill -USR1 5818 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5818 killed at Wed Sep 28 02:00:01 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:00:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:00:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5870 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5870 found at Wed Sep 28 02:00:02 UTC 2022 selfserv_9223 with PID 5870 started at Wed Sep 28 02:00:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #102: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5870 at Wed Sep 28 02:00:06 UTC 2022 kill -USR1 5870 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5870 killed at Wed Sep 28 02:00:06 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:00:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:00:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6011 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6011 found at Wed Sep 28 02:00:07 UTC 2022 selfserv_9223 with PID 6011 started at Wed Sep 28 02:00:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #103: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6011 at Wed Sep 28 02:00:12 UTC 2022 kill -USR1 6011 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6011 killed at Wed Sep 28 02:00:12 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:00:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:00:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6063 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6063 found at Wed Sep 28 02:00:13 UTC 2022 selfserv_9223 with PID 6063 started at Wed Sep 28 02:00:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #104: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6063 at Wed Sep 28 02:00:18 UTC 2022 kill -USR1 6063 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6063 killed at Wed Sep 28 02:00:19 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:00:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:00:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6115 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6115 found at Wed Sep 28 02:00:19 UTC 2022 selfserv_9223 with PID 6115 started at Wed Sep 28 02:00:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #105: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6115 at Wed Sep 28 02:00:24 UTC 2022 kill -USR1 6115 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6115 killed at Wed Sep 28 02:00:25 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:00:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:00:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6181 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6181 found at Wed Sep 28 02:00:25 UTC 2022 selfserv_9223 with PID 6181 started at Wed Sep 28 02:00:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #106: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6181 at Wed Sep 28 02:00:31 UTC 2022 kill -USR1 6181 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6181 killed at Wed Sep 28 02:00:31 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:00:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:00:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6248 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6248 found at Wed Sep 28 02:00:32 UTC 2022 selfserv_9223 with PID 6248 started at Wed Sep 28 02:00:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #107: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6248 at Wed Sep 28 02:00:38 UTC 2022 kill -USR1 6248 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6248 killed at Wed Sep 28 02:00:38 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:00:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:00:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6300 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6300 found at Wed Sep 28 02:00:39 UTC 2022 selfserv_9223 with PID 6300 started at Wed Sep 28 02:00:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #108: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6300 at Wed Sep 28 02:00:45 UTC 2022 kill -USR1 6300 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6300 killed at Wed Sep 28 02:00:45 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:00:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:00:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6366 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6366 found at Wed Sep 28 02:00:45 UTC 2022 selfserv_9223 with PID 6366 started at Wed Sep 28 02:00:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #109: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6366 at Wed Sep 28 02:00:50 UTC 2022 kill -USR1 6366 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6366 killed at Wed Sep 28 02:00:50 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:00:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:00:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6418 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6418 found at Wed Sep 28 02:00:50 UTC 2022 selfserv_9223 with PID 6418 started at Wed Sep 28 02:00:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #110: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6418 at Wed Sep 28 02:00:54 UTC 2022 kill -USR1 6418 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6418 killed at Wed Sep 28 02:00:55 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:00:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:00:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6473 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6473 found at Wed Sep 28 02:00:55 UTC 2022 selfserv_9223 with PID 6473 started at Wed Sep 28 02:00:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #111: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6473 at Wed Sep 28 02:00:59 UTC 2022 kill -USR1 6473 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6473 killed at Wed Sep 28 02:00:59 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:00:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:00:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6539 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6539 found at Wed Sep 28 02:01:00 UTC 2022 selfserv_9223 with PID 6539 started at Wed Sep 28 02:01:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #112: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 6539 at Wed Sep 28 02:01:04 UTC 2022 kill -USR1 6539 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6539 killed at Wed Sep 28 02:01:04 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:01:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:01:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6609 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6609 found at Wed Sep 28 02:01:05 UTC 2022 selfserv_9223 with PID 6609 started at Wed Sep 28 02:01:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #113: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6609 at Wed Sep 28 02:01:09 UTC 2022 kill -USR1 6609 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6609 killed at Wed Sep 28 02:01:09 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:01:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:01:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6663 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6663 found at Wed Sep 28 02:01:10 UTC 2022 selfserv_9223 with PID 6663 started at Wed Sep 28 02:01:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #114: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 6663 at Wed Sep 28 02:01:14 UTC 2022 kill -USR1 6663 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6663 killed at Wed Sep 28 02:01:14 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:01:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:01:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6729 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6729 found at Wed Sep 28 02:01:15 UTC 2022 selfserv_9223 with PID 6729 started at Wed Sep 28 02:01:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #115: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 6729 at Wed Sep 28 02:01:19 UTC 2022 kill -USR1 6729 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6729 killed at Wed Sep 28 02:01:19 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:01:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:01:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6781 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6781 found at Wed Sep 28 02:01:20 UTC 2022 selfserv_9223 with PID 6781 started at Wed Sep 28 02:01:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #116: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 6781 at Wed Sep 28 02:01:24 UTC 2022 kill -USR1 6781 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6781 killed at Wed Sep 28 02:01:24 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:01:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:01:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6833 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6833 found at Wed Sep 28 02:01:24 UTC 2022 selfserv_9223 with PID 6833 started at Wed Sep 28 02:01:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #117: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 6833 at Wed Sep 28 02:01:28 UTC 2022 kill -USR1 6833 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6833 killed at Wed Sep 28 02:01:29 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:01:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:01:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6914 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6914 found at Wed Sep 28 02:01:29 UTC 2022 selfserv_9223 with PID 6914 started at Wed Sep 28 02:01:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #118: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 6914 at Wed Sep 28 02:01:33 UTC 2022 kill -USR1 6914 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6914 killed at Wed Sep 28 02:01:34 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:01:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:01:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6966 found at Wed Sep 28 02:01:34 UTC 2022 selfserv_9223 with PID 6966 started at Wed Sep 28 02:01:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #119: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6966 at Wed Sep 28 02:01:38 UTC 2022 kill -USR1 6966 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6966 killed at Wed Sep 28 02:01:39 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:01:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:01:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7018 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7018 found at Wed Sep 28 02:01:39 UTC 2022 selfserv_9223 with PID 7018 started at Wed Sep 28 02:01:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #120: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 7018 at Wed Sep 28 02:01:43 UTC 2022 kill -USR1 7018 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7018 killed at Wed Sep 28 02:01:44 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:01:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:01:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7084 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7084 found at Wed Sep 28 02:01:44 UTC 2022 selfserv_9223 with PID 7084 started at Wed Sep 28 02:01:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #121: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7084 at Wed Sep 28 02:01:48 UTC 2022 kill -USR1 7084 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7084 killed at Wed Sep 28 02:01:48 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:01:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:01:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7136 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7136 found at Wed Sep 28 02:01:49 UTC 2022 selfserv_9223 with PID 7136 started at Wed Sep 28 02:01:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #122: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7136 at Wed Sep 28 02:01:53 UTC 2022 kill -USR1 7136 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7136 killed at Wed Sep 28 02:01:53 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:01:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:01:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7188 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7188 found at Wed Sep 28 02:01:54 UTC 2022 selfserv_9223 with PID 7188 started at Wed Sep 28 02:01:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #123: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7188 at Wed Sep 28 02:01:58 UTC 2022 kill -USR1 7188 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7188 killed at Wed Sep 28 02:01:58 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:01:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:01:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7254 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7254 found at Wed Sep 28 02:01:58 UTC 2022 selfserv_9223 with PID 7254 started at Wed Sep 28 02:01:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #124: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 7254 at Wed Sep 28 02:02:03 UTC 2022 kill -USR1 7254 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7254 killed at Wed Sep 28 02:02:03 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:02:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:02:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7306 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7306 found at Wed Sep 28 02:02:04 UTC 2022 selfserv_9223 with PID 7306 started at Wed Sep 28 02:02:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #125: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7306 at Wed Sep 28 02:02:09 UTC 2022 kill -USR1 7306 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7306 killed at Wed Sep 28 02:02:09 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:02:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:02:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7358 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7358 found at Wed Sep 28 02:02:09 UTC 2022 selfserv_9223 with PID 7358 started at Wed Sep 28 02:02:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #126: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 7358 at Wed Sep 28 02:02:14 UTC 2022 kill -USR1 7358 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7358 killed at Wed Sep 28 02:02:14 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:02:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:02:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7424 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7424 found at Wed Sep 28 02:02:15 UTC 2022 selfserv_9223 with PID 7424 started at Wed Sep 28 02:02:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #127: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 7424 at Wed Sep 28 02:02:19 UTC 2022 kill -USR1 7424 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7424 killed at Wed Sep 28 02:02:19 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:02:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:02:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7476 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7476 found at Wed Sep 28 02:02:19 UTC 2022 selfserv_9223 with PID 7476 started at Wed Sep 28 02:02:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #128: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 7476 at Wed Sep 28 02:02:23 UTC 2022 kill -USR1 7476 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7476 killed at Wed Sep 28 02:02:24 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:02:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:02:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7528 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7528 found at Wed Sep 28 02:02:24 UTC 2022 selfserv_9223 with PID 7528 started at Wed Sep 28 02:02:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #129: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 7528 at Wed Sep 28 02:02:28 UTC 2022 kill -USR1 7528 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7528 killed at Wed Sep 28 02:02:28 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:02:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:02:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7609 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7609 found at Wed Sep 28 02:02:29 UTC 2022 selfserv_9223 with PID 7609 started at Wed Sep 28 02:02:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #130: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 7609 at Wed Sep 28 02:02:34 UTC 2022 kill -USR1 7609 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7609 killed at Wed Sep 28 02:02:34 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:02:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:02:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7661 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7661 found at Wed Sep 28 02:02:34 UTC 2022 selfserv_9223 with PID 7661 started at Wed Sep 28 02:02:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #131: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7661 at Wed Sep 28 02:02:39 UTC 2022 kill -USR1 7661 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7661 killed at Wed Sep 28 02:02:39 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:02:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:02:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7713 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7713 found at Wed Sep 28 02:02:40 UTC 2022 selfserv_9223 with PID 7713 started at Wed Sep 28 02:02:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #132: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 7713 at Wed Sep 28 02:02:45 UTC 2022 kill -USR1 7713 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7713 killed at Wed Sep 28 02:02:45 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:02:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:02:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7779 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7779 found at Wed Sep 28 02:02:45 UTC 2022 selfserv_9223 with PID 7779 started at Wed Sep 28 02:02:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #133: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7779 at Wed Sep 28 02:02:50 UTC 2022 kill -USR1 7779 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7779 killed at Wed Sep 28 02:02:50 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:02:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:02:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7831 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7831 found at Wed Sep 28 02:02:50 UTC 2022 selfserv_9223 with PID 7831 started at Wed Sep 28 02:02:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #134: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7831 at Wed Sep 28 02:02:54 UTC 2022 kill -USR1 7831 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7831 killed at Wed Sep 28 02:02:55 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:02:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:02:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7883 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7883 found at Wed Sep 28 02:02:55 UTC 2022 selfserv_9223 with PID 7883 started at Wed Sep 28 02:02:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #135: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7883 at Wed Sep 28 02:02:59 UTC 2022 kill -USR1 7883 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7883 killed at Wed Sep 28 02:03:00 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:03:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:03:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7949 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7949 found at Wed Sep 28 02:03:00 UTC 2022 selfserv_9223 with PID 7949 started at Wed Sep 28 02:03:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #136: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7949 at Wed Sep 28 02:03:05 UTC 2022 kill -USR1 7949 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7949 killed at Wed Sep 28 02:03:05 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:03:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:03:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8001 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8001 found at Wed Sep 28 02:03:05 UTC 2022 selfserv_9223 with PID 8001 started at Wed Sep 28 02:03:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #137: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8001 at Wed Sep 28 02:03:10 UTC 2022 kill -USR1 8001 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8001 killed at Wed Sep 28 02:03:10 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:03:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:03:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8053 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8053 found at Wed Sep 28 02:03:10 UTC 2022 selfserv_9223 with PID 8053 started at Wed Sep 28 02:03:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #138: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8053 at Wed Sep 28 02:03:15 UTC 2022 kill -USR1 8053 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8053 killed at Wed Sep 28 02:03:15 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:03:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:03:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8119 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8119 found at Wed Sep 28 02:03:16 UTC 2022 selfserv_9223 with PID 8119 started at Wed Sep 28 02:03:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #139: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8119 at Wed Sep 28 02:03:20 UTC 2022 kill -USR1 8119 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8119 killed at Wed Sep 28 02:03:20 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:03:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:03:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8171 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8171 found at Wed Sep 28 02:03:20 UTC 2022 selfserv_9223 with PID 8171 started at Wed Sep 28 02:03:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #140: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8171 at Wed Sep 28 02:03:25 UTC 2022 kill -USR1 8171 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8171 killed at Wed Sep 28 02:03:25 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:03:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:03:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8223 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8223 found at Wed Sep 28 02:03:25 UTC 2022 selfserv_9223 with PID 8223 started at Wed Sep 28 02:03:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #141: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8223 at Wed Sep 28 02:03:30 UTC 2022 kill -USR1 8223 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8223 killed at Wed Sep 28 02:03:30 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:03:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:03:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8304 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8304 found at Wed Sep 28 02:03:30 UTC 2022 selfserv_9223 with PID 8304 started at Wed Sep 28 02:03:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #142: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8304 at Wed Sep 28 02:03:35 UTC 2022 kill -USR1 8304 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8304 killed at Wed Sep 28 02:03:35 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:03:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:03:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8356 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8356 found at Wed Sep 28 02:03:35 UTC 2022 selfserv_9223 with PID 8356 started at Wed Sep 28 02:03:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #143: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8356 at Wed Sep 28 02:03:40 UTC 2022 kill -USR1 8356 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8356 killed at Wed Sep 28 02:03:40 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:03:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:03:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8408 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8408 found at Wed Sep 28 02:03:41 UTC 2022 selfserv_9223 with PID 8408 started at Wed Sep 28 02:03:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #144: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8408 at Wed Sep 28 02:03:45 UTC 2022 kill -USR1 8408 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8408 killed at Wed Sep 28 02:03:45 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:03:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:03:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8474 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8474 found at Wed Sep 28 02:03:46 UTC 2022 selfserv_9223 with PID 8474 started at Wed Sep 28 02:03:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8474 at Wed Sep 28 02:03:50 UTC 2022 kill -USR1 8474 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8474 killed at Wed Sep 28 02:03:50 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:03:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:03:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8526 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8526 found at Wed Sep 28 02:03:51 UTC 2022 selfserv_9223 with PID 8526 started at Wed Sep 28 02:03:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8526 at Wed Sep 28 02:03:55 UTC 2022 kill -USR1 8526 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8526 killed at Wed Sep 28 02:03:55 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:03:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:03:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8578 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8578 found at Wed Sep 28 02:03:56 UTC 2022 selfserv_9223 with PID 8578 started at Wed Sep 28 02:03:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8578 at Wed Sep 28 02:04:00 UTC 2022 kill -USR1 8578 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8578 killed at Wed Sep 28 02:04:00 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:04:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:04:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8644 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8644 found at Wed Sep 28 02:04:00 UTC 2022 selfserv_9223 with PID 8644 started at Wed Sep 28 02:04:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8644 at Wed Sep 28 02:04:05 UTC 2022 kill -USR1 8644 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8644 killed at Wed Sep 28 02:04:05 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:04:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:04:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8696 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8696 found at Wed Sep 28 02:04:06 UTC 2022 selfserv_9223 with PID 8696 started at Wed Sep 28 02:04:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8696 at Wed Sep 28 02:04:10 UTC 2022 kill -USR1 8696 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8696 killed at Wed Sep 28 02:04:10 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:04:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:04:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8748 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8748 found at Wed Sep 28 02:04:11 UTC 2022 selfserv_9223 with PID 8748 started at Wed Sep 28 02:04:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8748 at Wed Sep 28 02:04:15 UTC 2022 kill -USR1 8748 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8748 killed at Wed Sep 28 02:04:16 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:04:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:04:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8814 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8814 found at Wed Sep 28 02:04:16 UTC 2022 selfserv_9223 with PID 8814 started at Wed Sep 28 02:04:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #151: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8814 at Wed Sep 28 02:04:20 UTC 2022 kill -USR1 8814 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8814 killed at Wed Sep 28 02:04:20 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:04:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:04:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8866 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8866 found at Wed Sep 28 02:04:21 UTC 2022 selfserv_9223 with PID 8866 started at Wed Sep 28 02:04:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #152: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8866 at Wed Sep 28 02:04:25 UTC 2022 kill -USR1 8866 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8866 killed at Wed Sep 28 02:04:25 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:04:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:04:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8918 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8918 found at Wed Sep 28 02:04:26 UTC 2022 selfserv_9223 with PID 8918 started at Wed Sep 28 02:04:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #153: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8918 at Wed Sep 28 02:04:30 UTC 2022 kill -USR1 8918 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8918 killed at Wed Sep 28 02:04:30 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:04:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:04:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8999 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8999 found at Wed Sep 28 02:04:31 UTC 2022 selfserv_9223 with PID 8999 started at Wed Sep 28 02:04:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #154: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8999 at Wed Sep 28 02:04:35 UTC 2022 kill -USR1 8999 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8999 killed at Wed Sep 28 02:04:35 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:04:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:04:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9051 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9051 found at Wed Sep 28 02:04:36 UTC 2022 selfserv_9223 with PID 9051 started at Wed Sep 28 02:04:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #155: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9051 at Wed Sep 28 02:04:41 UTC 2022 kill -USR1 9051 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9051 killed at Wed Sep 28 02:04:41 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:04:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:04:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9103 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9103 found at Wed Sep 28 02:04:41 UTC 2022 selfserv_9223 with PID 9103 started at Wed Sep 28 02:04:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #156: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9103 at Wed Sep 28 02:04:46 UTC 2022 kill -USR1 9103 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9103 killed at Wed Sep 28 02:04:46 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:04:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:04:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9169 found at Wed Sep 28 02:04:46 UTC 2022 selfserv_9223 with PID 9169 started at Wed Sep 28 02:04:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #157: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9169 at Wed Sep 28 02:04:51 UTC 2022 kill -USR1 9169 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9169 killed at Wed Sep 28 02:04:51 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:04:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:04:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9222 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9222 found at Wed Sep 28 02:04:51 UTC 2022 selfserv_9223 with PID 9222 started at Wed Sep 28 02:04:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #158: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9222 at Wed Sep 28 02:04:55 UTC 2022 kill -USR1 9222 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9222 killed at Wed Sep 28 02:04:55 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:04:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:04:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9274 found at Wed Sep 28 02:04:56 UTC 2022 selfserv_9223 with PID 9274 started at Wed Sep 28 02:04:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #159: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9274 at Wed Sep 28 02:05:00 UTC 2022 kill -USR1 9274 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9274 killed at Wed Sep 28 02:05:00 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:05:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:05:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9340 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9340 found at Wed Sep 28 02:05:01 UTC 2022 selfserv_9223 with PID 9340 started at Wed Sep 28 02:05:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #160: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9340 at Wed Sep 28 02:05:06 UTC 2022 kill -USR1 9340 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9340 killed at Wed Sep 28 02:05:06 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:05:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:05:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9392 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9392 found at Wed Sep 28 02:05:06 UTC 2022 selfserv_9223 with PID 9392 started at Wed Sep 28 02:05:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #161: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9392 at Wed Sep 28 02:05:11 UTC 2022 kill -USR1 9392 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9392 killed at Wed Sep 28 02:05:11 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:05:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:05:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9444 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9444 found at Wed Sep 28 02:05:12 UTC 2022 selfserv_9223 with PID 9444 started at Wed Sep 28 02:05:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #162: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9444 at Wed Sep 28 02:05:17 UTC 2022 kill -USR1 9444 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9444 killed at Wed Sep 28 02:05:17 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:05:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:05:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9510 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9510 found at Wed Sep 28 02:05:17 UTC 2022 selfserv_9223 with PID 9510 started at Wed Sep 28 02:05:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #163: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9510 at Wed Sep 28 02:05:22 UTC 2022 kill -USR1 9510 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9510 killed at Wed Sep 28 02:05:22 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:05:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:05:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9562 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9562 found at Wed Sep 28 02:05:22 UTC 2022 selfserv_9223 with PID 9562 started at Wed Sep 28 02:05:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #164: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9562 at Wed Sep 28 02:05:26 UTC 2022 kill -USR1 9562 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9562 killed at Wed Sep 28 02:05:27 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:05:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:05:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9614 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9614 found at Wed Sep 28 02:05:27 UTC 2022 selfserv_9223 with PID 9614 started at Wed Sep 28 02:05:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #165: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9614 at Wed Sep 28 02:05:31 UTC 2022 kill -USR1 9614 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9614 killed at Wed Sep 28 02:05:31 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:05:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:05:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9695 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9695 found at Wed Sep 28 02:05:32 UTC 2022 selfserv_9223 with PID 9695 started at Wed Sep 28 02:05:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #166: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9695 at Wed Sep 28 02:05:37 UTC 2022 kill -USR1 9695 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9695 killed at Wed Sep 28 02:05:37 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:05:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:05:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9747 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9747 found at Wed Sep 28 02:05:37 UTC 2022 selfserv_9223 with PID 9747 started at Wed Sep 28 02:05:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #167: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9747 at Wed Sep 28 02:05:42 UTC 2022 kill -USR1 9747 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9747 killed at Wed Sep 28 02:05:43 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:05:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:05:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9799 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9799 found at Wed Sep 28 02:05:43 UTC 2022 selfserv_9223 with PID 9799 started at Wed Sep 28 02:05:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #168: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9799 at Wed Sep 28 02:05:48 UTC 2022 kill -USR1 9799 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9799 killed at Wed Sep 28 02:05:48 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:05:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:05:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9866 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9866 found at Wed Sep 28 02:05:49 UTC 2022 selfserv_9223 with PID 9866 started at Wed Sep 28 02:05:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #169: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9866 at Wed Sep 28 02:05:54 UTC 2022 kill -USR1 9866 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9866 killed at Wed Sep 28 02:05:54 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:05:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:05:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9918 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9918 found at Wed Sep 28 02:05:55 UTC 2022 selfserv_9223 with PID 9918 started at Wed Sep 28 02:05:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #170: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9918 at Wed Sep 28 02:06:00 UTC 2022 kill -USR1 9918 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9918 killed at Wed Sep 28 02:06:01 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:06:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:06:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9970 found at Wed Sep 28 02:06:01 UTC 2022 selfserv_9223 with PID 9970 started at Wed Sep 28 02:06:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #171: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9970 at Wed Sep 28 02:06:06 UTC 2022 kill -USR1 9970 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9970 killed at Wed Sep 28 02:06:07 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:06:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:06:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10036 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10036 found at Wed Sep 28 02:06:07 UTC 2022 selfserv_9223 with PID 10036 started at Wed Sep 28 02:06:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #172: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10036 at Wed Sep 28 02:06:12 UTC 2022 kill -USR1 10036 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10036 killed at Wed Sep 28 02:06:12 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:06:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:06:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10088 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10088 found at Wed Sep 28 02:06:13 UTC 2022 selfserv_9223 with PID 10088 started at Wed Sep 28 02:06:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #173: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10088 at Wed Sep 28 02:06:17 UTC 2022 kill -USR1 10088 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10088 killed at Wed Sep 28 02:06:18 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:06:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:06:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10140 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10140 found at Wed Sep 28 02:06:18 UTC 2022 selfserv_9223 with PID 10140 started at Wed Sep 28 02:06:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #174: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10140 at Wed Sep 28 02:06:23 UTC 2022 kill -USR1 10140 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10140 killed at Wed Sep 28 02:06:23 UTC 2022 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/authin.tl.tmp 0 selfserv_9223 starting at Wed Sep 28 02:06:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:06:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:06:23 UTC 2022 selfserv_9223 with PID 10211 started at Wed Sep 28 02:06:24 UTC 2022 Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:06:30 UTC 2022 ssl.sh: #1: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:06:32 UTC 2022 ssl.sh: #2: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:06:35 UTC 2022 ssl.sh: #3: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:06:38 UTC 2022 ssl.sh: #4: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:06:40 UTC 2022 ssl.sh: #5: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:06:43 UTC 2022 ssl.sh: #6: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:06:46 UTC 2022 ssl.sh: #7: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:06:48 UTC 2022 ssl.sh: #8: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:06:51 UTC 2022 ssl.sh: #9: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:06:53 UTC 2022 ssl.sh: #10: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:06:56 UTC 2022 ssl.sh: #11: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:06:59 UTC 2022 ssl.sh: #12: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:07:01 UTC 2022 ssl.sh: #13: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:07:04 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #14: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:07:07 UTC 2022 ssl.sh: #15: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:07:09 UTC 2022 ssl.sh: #16: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:07:12 UTC 2022 ssl.sh: #17: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:07:15 UTC 2022 ssl.sh: #18: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:07:17 UTC 2022 ssl.sh: #19: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:07:20 UTC 2022 ssl.sh: #20: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:07:22 UTC 2022 ssl.sh: #21: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:07:25 UTC 2022 ssl.sh: #22: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:07:28 UTC 2022 ssl.sh: #23: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:07:30 UTC 2022 ssl.sh: #24: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:07:33 UTC 2022 ssl.sh: #25: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:07:36 UTC 2022 ssl.sh: #26: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:07:38 UTC 2022 ssl.sh: #27: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:07:41 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #28: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:07:43 UTC 2022 ssl.sh: #29: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:07:46 UTC 2022 ssl.sh: #30: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:07:49 UTC 2022 ssl.sh: #31: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:07:51 UTC 2022 ssl.sh: #32: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:07:54 UTC 2022 ssl.sh: #33: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:07:57 UTC 2022 ssl.sh: #34: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:07:59 UTC 2022 ssl.sh: #35: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:08:02 UTC 2022 ssl.sh: #36: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:08:05 UTC 2022 ssl.sh: #37: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:08:07 UTC 2022 ssl.sh: #38: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:08:10 UTC 2022 ssl.sh: #39: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:08:12 UTC 2022 ssl.sh: #40: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10211 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10211 found at Wed Sep 28 02:08:15 UTC 2022 ssl.sh: #41: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 10211 at Wed Sep 28 02:08:15 UTC 2022 kill -USR1 10211 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10211 killed at Wed Sep 28 02:08:15 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:08:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:08:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:08:16 UTC 2022 selfserv_9223 with PID 11501 started at Wed Sep 28 02:08:16 UTC 2022 Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:08:21 UTC 2022 ssl.sh: #42: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:08:23 UTC 2022 ssl.sh: #43: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:08:25 UTC 2022 ssl.sh: #44: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:08:27 UTC 2022 ssl.sh: #45: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:08:29 UTC 2022 ssl.sh: #46: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:08:32 UTC 2022 ssl.sh: #47: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:08:34 UTC 2022 ssl.sh: #48: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:08:36 UTC 2022 ssl.sh: #49: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:08:38 UTC 2022 ssl.sh: #50: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:08:40 UTC 2022 ssl.sh: #51: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:08:42 UTC 2022 ssl.sh: #52: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:08:44 UTC 2022 ssl.sh: #53: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:08:46 UTC 2022 ssl.sh: #54: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:08:49 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #55: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:08:51 UTC 2022 ssl.sh: #56: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:08:53 UTC 2022 ssl.sh: #57: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:08:55 UTC 2022 ssl.sh: #58: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:08:57 UTC 2022 ssl.sh: #59: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:08:59 UTC 2022 ssl.sh: #60: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:09:01 UTC 2022 ssl.sh: #61: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:09:03 UTC 2022 ssl.sh: #62: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:09:05 UTC 2022 ssl.sh: #63: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:09:07 UTC 2022 ssl.sh: #64: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:09:09 UTC 2022 ssl.sh: #65: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:09:11 UTC 2022 ssl.sh: #66: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:09:13 UTC 2022 ssl.sh: #67: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:09:15 UTC 2022 ssl.sh: #68: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:09:18 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #69: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:09:20 UTC 2022 ssl.sh: #70: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:09:22 UTC 2022 ssl.sh: #71: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:09:24 UTC 2022 ssl.sh: #72: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:09:26 UTC 2022 ssl.sh: #73: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:09:28 UTC 2022 ssl.sh: #74: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:09:30 UTC 2022 ssl.sh: #75: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:09:32 UTC 2022 ssl.sh: #76: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:09:34 UTC 2022 ssl.sh: #77: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:09:36 UTC 2022 ssl.sh: #78: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:09:38 UTC 2022 ssl.sh: #79: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:09:40 UTC 2022 ssl.sh: #80: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:09:43 UTC 2022 ssl.sh: #81: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11501 found at Wed Sep 28 02:09:45 UTC 2022 ssl.sh: #82: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 11501 at Wed Sep 28 02:09:45 UTC 2022 kill -USR1 11501 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11501 killed at Wed Sep 28 02:09:45 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:09:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:09:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:09:45 UTC 2022 selfserv_9223 with PID 12791 started at Wed Sep 28 02:09:45 UTC 2022 Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:09:50 UTC 2022 ssl.sh: #83: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:09:51 UTC 2022 ssl.sh: #84: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:09:51 UTC 2022 ssl.sh: #85: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:09:52 UTC 2022 ssl.sh: #86: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:09:53 UTC 2022 ssl.sh: #87: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:09:54 UTC 2022 ssl.sh: #88: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:09:55 UTC 2022 ssl.sh: #89: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:09:56 UTC 2022 ssl.sh: #90: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:09:57 UTC 2022 ssl.sh: #91: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:09:57 UTC 2022 ssl.sh: #92: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:09:58 UTC 2022 ssl.sh: #93: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:09:59 UTC 2022 ssl.sh: #94: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:00 UTC 2022 ssl.sh: #95: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:01 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #96: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:02 UTC 2022 ssl.sh: #97: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:03 UTC 2022 ssl.sh: #98: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:03 UTC 2022 ssl.sh: #99: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:04 UTC 2022 ssl.sh: #100: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:05 UTC 2022 ssl.sh: #101: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:06 UTC 2022 ssl.sh: #102: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:07 UTC 2022 ssl.sh: #103: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:08 UTC 2022 ssl.sh: #104: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:08 UTC 2022 ssl.sh: #105: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:09 UTC 2022 ssl.sh: #106: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:10 UTC 2022 ssl.sh: #107: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:11 UTC 2022 ssl.sh: #108: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:12 UTC 2022 ssl.sh: #109: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:13 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #110: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:14 UTC 2022 ssl.sh: #111: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:14 UTC 2022 ssl.sh: #112: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:15 UTC 2022 ssl.sh: #113: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:16 UTC 2022 ssl.sh: #114: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:17 UTC 2022 ssl.sh: #115: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:18 UTC 2022 ssl.sh: #116: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:19 UTC 2022 ssl.sh: #117: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:19 UTC 2022 ssl.sh: #118: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:20 UTC 2022 ssl.sh: #119: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:21 UTC 2022 ssl.sh: #120: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:22 UTC 2022 ssl.sh: #121: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:23 UTC 2022 ssl.sh: #122: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12791 found at Wed Sep 28 02:10:24 UTC 2022 ssl.sh: #123: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 12791 at Wed Sep 28 02:10:24 UTC 2022 kill -USR1 12791 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12791 killed at Wed Sep 28 02:10:24 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:10:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:10:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:24 UTC 2022 selfserv_9223 with PID 14058 started at Wed Sep 28 02:10:24 UTC 2022 Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:29 UTC 2022 ssl.sh: #124: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:30 UTC 2022 ssl.sh: #125: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:32 UTC 2022 ssl.sh: #126: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:33 UTC 2022 ssl.sh: #127: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:34 UTC 2022 ssl.sh: #128: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:36 UTC 2022 ssl.sh: #129: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:37 UTC 2022 ssl.sh: #130: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:38 UTC 2022 ssl.sh: #131: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:40 UTC 2022 ssl.sh: #132: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:41 UTC 2022 ssl.sh: #133: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:42 UTC 2022 ssl.sh: #134: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:44 UTC 2022 ssl.sh: #135: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:45 UTC 2022 ssl.sh: #136: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:46 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #137: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:47 UTC 2022 ssl.sh: #138: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:48 UTC 2022 ssl.sh: #139: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:50 UTC 2022 ssl.sh: #140: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:51 UTC 2022 ssl.sh: #141: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:52 UTC 2022 ssl.sh: #142: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:54 UTC 2022 ssl.sh: #143: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:55 UTC 2022 ssl.sh: #144: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:56 UTC 2022 ssl.sh: #145: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:57 UTC 2022 ssl.sh: #146: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:10:59 UTC 2022 ssl.sh: #147: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:11:00 UTC 2022 ssl.sh: #148: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:11:01 UTC 2022 ssl.sh: #149: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:11:03 UTC 2022 ssl.sh: #150: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:11:04 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #151: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:11:05 UTC 2022 ssl.sh: #152: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:11:06 UTC 2022 ssl.sh: #153: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:11:07 UTC 2022 ssl.sh: #154: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:11:09 UTC 2022 ssl.sh: #155: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:11:10 UTC 2022 ssl.sh: #156: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:11:11 UTC 2022 ssl.sh: #157: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:11:13 UTC 2022 ssl.sh: #158: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:11:14 UTC 2022 ssl.sh: #159: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:11:15 UTC 2022 ssl.sh: #160: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:11:17 UTC 2022 ssl.sh: #161: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:11:18 UTC 2022 ssl.sh: #162: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:11:19 UTC 2022 ssl.sh: #163: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14058 found at Wed Sep 28 02:11:20 UTC 2022 ssl.sh: #164: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 14058 at Wed Sep 28 02:11:20 UTC 2022 kill -USR1 14058 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14058 killed at Wed Sep 28 02:11:21 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:11:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:11:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15335 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15335 found at Wed Sep 28 02:11:21 UTC 2022 selfserv_9223 with PID 15335 started at Wed Sep 28 02:11:21 UTC 2022 trying to kill selfserv_9223 with PID 15335 at Wed Sep 28 02:11:21 UTC 2022 kill -USR1 15335 ./ssl.sh: line 228: 15335 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9223 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15335 killed at Wed Sep 28 02:11:21 UTC 2022 selfserv_9223 starting at Wed Sep 28 02:11:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:11:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:11:22 UTC 2022 selfserv_9223 with PID 15369 started at Wed Sep 28 02:11:22 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:11:28 UTC 2022 ssl.sh: #165: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:11:31 UTC 2022 ssl.sh: #166: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:11:33 UTC 2022 ssl.sh: #167: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:11:36 UTC 2022 ssl.sh: #168: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:11:39 UTC 2022 ssl.sh: #169: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:11:42 UTC 2022 ssl.sh: #170: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:11:45 UTC 2022 ssl.sh: #171: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:11:47 UTC 2022 ssl.sh: #172: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:11:50 UTC 2022 ssl.sh: #173: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:11:53 UTC 2022 ssl.sh: #174: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:11:56 UTC 2022 ssl.sh: #175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:11:58 UTC 2022 ssl.sh: #176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:12:01 UTC 2022 ssl.sh: #177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:12:04 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #178: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:12:07 UTC 2022 ssl.sh: #179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:12:09 UTC 2022 ssl.sh: #180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:12:12 UTC 2022 ssl.sh: #181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:12:15 UTC 2022 ssl.sh: #182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:12:18 UTC 2022 ssl.sh: #183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:12:20 UTC 2022 ssl.sh: #184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:12:23 UTC 2022 ssl.sh: #185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:12:26 UTC 2022 ssl.sh: #186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:12:29 UTC 2022 ssl.sh: #187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:12:31 UTC 2022 ssl.sh: #188: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:12:34 UTC 2022 ssl.sh: #189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:12:37 UTC 2022 ssl.sh: #190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:12:40 UTC 2022 ssl.sh: #191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:12:43 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #192: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:12:45 UTC 2022 ssl.sh: #193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:12:48 UTC 2022 ssl.sh: #194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:12:51 UTC 2022 ssl.sh: #195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:12:54 UTC 2022 ssl.sh: #196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:12:56 UTC 2022 ssl.sh: #197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:12:59 UTC 2022 ssl.sh: #198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:13:02 UTC 2022 ssl.sh: #199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:13:05 UTC 2022 ssl.sh: #200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:13:07 UTC 2022 ssl.sh: #201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:13:10 UTC 2022 ssl.sh: #202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:13:13 UTC 2022 ssl.sh: #203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:13:16 UTC 2022 ssl.sh: #204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15369 found at Wed Sep 28 02:13:18 UTC 2022 ssl.sh: #205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 15369 at Wed Sep 28 02:13:18 UTC 2022 kill -USR1 15369 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15369 killed at Wed Sep 28 02:13:19 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:13:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:13:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:13:19 UTC 2022 selfserv_9223 with PID 16731 started at Wed Sep 28 02:13:19 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:13:25 UTC 2022 ssl.sh: #206: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:13:28 UTC 2022 ssl.sh: #207: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:13:31 UTC 2022 ssl.sh: #208: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:13:34 UTC 2022 ssl.sh: #209: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:13:37 UTC 2022 ssl.sh: #210: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:13:39 UTC 2022 ssl.sh: #211: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:13:42 UTC 2022 ssl.sh: #212: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:13:45 UTC 2022 ssl.sh: #213: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:13:48 UTC 2022 ssl.sh: #214: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:13:51 UTC 2022 ssl.sh: #215: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:13:53 UTC 2022 ssl.sh: #216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:13:56 UTC 2022 ssl.sh: #217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:13:59 UTC 2022 ssl.sh: #218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:14:02 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #219: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:14:05 UTC 2022 ssl.sh: #220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:14:07 UTC 2022 ssl.sh: #221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:14:10 UTC 2022 ssl.sh: #222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:14:13 UTC 2022 ssl.sh: #223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:14:16 UTC 2022 ssl.sh: #224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:14:19 UTC 2022 ssl.sh: #225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:14:21 UTC 2022 ssl.sh: #226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:14:24 UTC 2022 ssl.sh: #227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:14:27 UTC 2022 ssl.sh: #228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:14:30 UTC 2022 ssl.sh: #229: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:14:33 UTC 2022 ssl.sh: #230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:14:36 UTC 2022 ssl.sh: #231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:14:38 UTC 2022 ssl.sh: #232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:14:41 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #233: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:14:44 UTC 2022 ssl.sh: #234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:14:47 UTC 2022 ssl.sh: #235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:14:49 UTC 2022 ssl.sh: #236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:14:52 UTC 2022 ssl.sh: #237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:14:55 UTC 2022 ssl.sh: #238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:14:58 UTC 2022 ssl.sh: #239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:15:01 UTC 2022 ssl.sh: #240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:15:03 UTC 2022 ssl.sh: #241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:15:06 UTC 2022 ssl.sh: #242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:15:09 UTC 2022 ssl.sh: #243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:15:12 UTC 2022 ssl.sh: #244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:15:15 UTC 2022 ssl.sh: #245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16731 found at Wed Sep 28 02:15:18 UTC 2022 ssl.sh: #246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 16731 at Wed Sep 28 02:15:18 UTC 2022 kill -USR1 16731 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16731 killed at Wed Sep 28 02:15:18 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:15:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:15:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:15:18 UTC 2022 selfserv_9223 with PID 18383 started at Wed Sep 28 02:15:18 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:15:24 UTC 2022 ssl.sh: #247: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:15:26 UTC 2022 ssl.sh: #248: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:15:28 UTC 2022 ssl.sh: #249: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:15:30 UTC 2022 ssl.sh: #250: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:15:32 UTC 2022 ssl.sh: #251: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:15:35 UTC 2022 ssl.sh: #252: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:15:37 UTC 2022 ssl.sh: #253: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:15:39 UTC 2022 ssl.sh: #254: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:15:41 UTC 2022 ssl.sh: #255: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:15:43 UTC 2022 ssl.sh: #256: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:15:45 UTC 2022 ssl.sh: #257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:15:47 UTC 2022 ssl.sh: #258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:15:50 UTC 2022 ssl.sh: #259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:15:52 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #260: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:15:54 UTC 2022 ssl.sh: #261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:15:57 UTC 2022 ssl.sh: #262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:15:59 UTC 2022 ssl.sh: #263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:01 UTC 2022 ssl.sh: #264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:03 UTC 2022 ssl.sh: #265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:05 UTC 2022 ssl.sh: #266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:07 UTC 2022 ssl.sh: #267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:09 UTC 2022 ssl.sh: #268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:12 UTC 2022 ssl.sh: #269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:14 UTC 2022 ssl.sh: #270: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:16 UTC 2022 ssl.sh: #271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:18 UTC 2022 ssl.sh: #272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:20 UTC 2022 ssl.sh: #273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:23 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #274: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:25 UTC 2022 ssl.sh: #275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:27 UTC 2022 ssl.sh: #276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:29 UTC 2022 ssl.sh: #277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:31 UTC 2022 ssl.sh: #278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:34 UTC 2022 ssl.sh: #279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:36 UTC 2022 ssl.sh: #280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:38 UTC 2022 ssl.sh: #281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:40 UTC 2022 ssl.sh: #282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:42 UTC 2022 ssl.sh: #283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:44 UTC 2022 ssl.sh: #284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:46 UTC 2022 ssl.sh: #285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:48 UTC 2022 ssl.sh: #286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18383 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18383 found at Wed Sep 28 02:16:51 UTC 2022 ssl.sh: #287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18383 at Wed Sep 28 02:16:51 UTC 2022 kill -USR1 18383 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18383 killed at Wed Sep 28 02:16:51 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:16:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:16:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:16:51 UTC 2022 selfserv_9223 with PID 19675 started at Wed Sep 28 02:16:51 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:16:56 UTC 2022 ssl.sh: #288: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:16:57 UTC 2022 ssl.sh: #289: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:16:58 UTC 2022 ssl.sh: #290: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:16:59 UTC 2022 ssl.sh: #291: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:00 UTC 2022 ssl.sh: #292: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:01 UTC 2022 ssl.sh: #293: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:02 UTC 2022 ssl.sh: #294: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:03 UTC 2022 ssl.sh: #295: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:04 UTC 2022 ssl.sh: #296: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:05 UTC 2022 ssl.sh: #297: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:06 UTC 2022 ssl.sh: #298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:07 UTC 2022 ssl.sh: #299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:08 UTC 2022 ssl.sh: #300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:09 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #301: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:10 UTC 2022 ssl.sh: #302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:11 UTC 2022 ssl.sh: #303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:12 UTC 2022 ssl.sh: #304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:12 UTC 2022 ssl.sh: #305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:13 UTC 2022 ssl.sh: #306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:14 UTC 2022 ssl.sh: #307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:15 UTC 2022 ssl.sh: #308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:16 UTC 2022 ssl.sh: #309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:17 UTC 2022 ssl.sh: #310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:18 UTC 2022 ssl.sh: #311: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:19 UTC 2022 ssl.sh: #312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:20 UTC 2022 ssl.sh: #313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:21 UTC 2022 ssl.sh: #314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:22 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #315: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:23 UTC 2022 ssl.sh: #316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:24 UTC 2022 ssl.sh: #317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:25 UTC 2022 ssl.sh: #318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:26 UTC 2022 ssl.sh: #319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:27 UTC 2022 ssl.sh: #320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:28 UTC 2022 ssl.sh: #321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:29 UTC 2022 ssl.sh: #322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:30 UTC 2022 ssl.sh: #323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:31 UTC 2022 ssl.sh: #324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:32 UTC 2022 ssl.sh: #325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:33 UTC 2022 ssl.sh: #326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:34 UTC 2022 ssl.sh: #327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19675 found at Wed Sep 28 02:17:35 UTC 2022 ssl.sh: #328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 19675 at Wed Sep 28 02:17:35 UTC 2022 kill -USR1 19675 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19675 killed at Wed Sep 28 02:17:35 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:17:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:17:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:17:35 UTC 2022 selfserv_9223 with PID 20950 started at Wed Sep 28 02:17:35 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:17:40 UTC 2022 ssl.sh: #329: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:17:41 UTC 2022 ssl.sh: #330: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:17:42 UTC 2022 ssl.sh: #331: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:17:43 UTC 2022 ssl.sh: #332: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:17:44 UTC 2022 ssl.sh: #333: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:17:45 UTC 2022 ssl.sh: #334: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:17:46 UTC 2022 ssl.sh: #335: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:17:47 UTC 2022 ssl.sh: #336: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:17:48 UTC 2022 ssl.sh: #337: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:17:49 UTC 2022 ssl.sh: #338: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:17:50 UTC 2022 ssl.sh: #339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:17:51 UTC 2022 ssl.sh: #340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:17:52 UTC 2022 ssl.sh: #341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:17:53 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #342: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:17:54 UTC 2022 ssl.sh: #343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:17:55 UTC 2022 ssl.sh: #344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:17:56 UTC 2022 ssl.sh: #345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:17:57 UTC 2022 ssl.sh: #346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:17:58 UTC 2022 ssl.sh: #347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:17:59 UTC 2022 ssl.sh: #348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:18:00 UTC 2022 ssl.sh: #349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:18:01 UTC 2022 ssl.sh: #350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:18:02 UTC 2022 ssl.sh: #351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:18:03 UTC 2022 ssl.sh: #352: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:18:04 UTC 2022 ssl.sh: #353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:18:06 UTC 2022 ssl.sh: #354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:18:07 UTC 2022 ssl.sh: #355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:18:08 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #356: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:18:09 UTC 2022 ssl.sh: #357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:18:10 UTC 2022 ssl.sh: #358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:18:11 UTC 2022 ssl.sh: #359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:18:12 UTC 2022 ssl.sh: #360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:18:13 UTC 2022 ssl.sh: #361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:18:14 UTC 2022 ssl.sh: #362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:18:15 UTC 2022 ssl.sh: #363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:18:16 UTC 2022 ssl.sh: #364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:18:17 UTC 2022 ssl.sh: #365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:18:18 UTC 2022 ssl.sh: #366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:18:19 UTC 2022 ssl.sh: #367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:18:20 UTC 2022 ssl.sh: #368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20950 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 20950 found at Wed Sep 28 02:18:21 UTC 2022 ssl.sh: #369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 20950 at Wed Sep 28 02:18:21 UTC 2022 kill -USR1 20950 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 20950 killed at Wed Sep 28 02:18:21 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:18:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:18:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:21 UTC 2022 selfserv_9223 with PID 22209 started at Wed Sep 28 02:18:21 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:26 UTC 2022 ssl.sh: #370: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:28 UTC 2022 ssl.sh: #371: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:29 UTC 2022 ssl.sh: #372: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:31 UTC 2022 ssl.sh: #373: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:32 UTC 2022 ssl.sh: #374: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:33 UTC 2022 ssl.sh: #375: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:35 UTC 2022 ssl.sh: #376: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:36 UTC 2022 ssl.sh: #377: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:38 UTC 2022 ssl.sh: #378: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:39 UTC 2022 ssl.sh: #379: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:40 UTC 2022 ssl.sh: #380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:42 UTC 2022 ssl.sh: #381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:43 UTC 2022 ssl.sh: #382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:44 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #383: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:46 UTC 2022 ssl.sh: #384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:47 UTC 2022 ssl.sh: #385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:49 UTC 2022 ssl.sh: #386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:50 UTC 2022 ssl.sh: #387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:51 UTC 2022 ssl.sh: #388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:53 UTC 2022 ssl.sh: #389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:54 UTC 2022 ssl.sh: #390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:56 UTC 2022 ssl.sh: #391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:57 UTC 2022 ssl.sh: #392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:18:58 UTC 2022 ssl.sh: #393: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:19:00 UTC 2022 ssl.sh: #394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:19:01 UTC 2022 ssl.sh: #395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:19:03 UTC 2022 ssl.sh: #396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:19:04 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #397: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:19:05 UTC 2022 ssl.sh: #398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:19:07 UTC 2022 ssl.sh: #399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:19:08 UTC 2022 ssl.sh: #400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:19:09 UTC 2022 ssl.sh: #401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:19:11 UTC 2022 ssl.sh: #402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:19:12 UTC 2022 ssl.sh: #403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:19:14 UTC 2022 ssl.sh: #404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:19:15 UTC 2022 ssl.sh: #405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:19:16 UTC 2022 ssl.sh: #406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:19:18 UTC 2022 ssl.sh: #407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:19:19 UTC 2022 ssl.sh: #408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:19:21 UTC 2022 ssl.sh: #409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22209 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22209 found at Wed Sep 28 02:19:22 UTC 2022 ssl.sh: #410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22209 at Wed Sep 28 02:19:22 UTC 2022 kill -USR1 22209 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22209 killed at Wed Sep 28 02:19:22 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:19:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:19:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23486 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23486 found at Wed Sep 28 02:19:23 UTC 2022 selfserv_9223 with PID 23486 started at Wed Sep 28 02:19:23 UTC 2022 trying to kill selfserv_9223 with PID 23486 at Wed Sep 28 02:19:23 UTC 2022 kill -USR1 23486 ./ssl.sh: line 228: 23486 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9223 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23486 killed at Wed Sep 28 02:19:23 UTC 2022 selfserv_9223 starting at Wed Sep 28 02:19:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:19:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:19:23 UTC 2022 selfserv_9223 with PID 23520 started at Wed Sep 28 02:19:23 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:19:29 UTC 2022 ssl.sh: #411: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:19:32 UTC 2022 ssl.sh: #412: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:19:35 UTC 2022 ssl.sh: #413: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:19:38 UTC 2022 ssl.sh: #414: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:19:41 UTC 2022 ssl.sh: #415: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:19:43 UTC 2022 ssl.sh: #416: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:19:46 UTC 2022 ssl.sh: #417: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:19:49 UTC 2022 ssl.sh: #418: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:19:52 UTC 2022 ssl.sh: #419: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:19:54 UTC 2022 ssl.sh: #420: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:19:57 UTC 2022 ssl.sh: #421: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:20:00 UTC 2022 ssl.sh: #422: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:20:03 UTC 2022 ssl.sh: #423: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:20:05 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #424: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:20:08 UTC 2022 ssl.sh: #425: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:20:11 UTC 2022 ssl.sh: #426: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:20:14 UTC 2022 ssl.sh: #427: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:20:16 UTC 2022 ssl.sh: #428: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:20:19 UTC 2022 ssl.sh: #429: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:20:22 UTC 2022 ssl.sh: #430: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:20:25 UTC 2022 ssl.sh: #431: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:20:27 UTC 2022 ssl.sh: #432: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:20:30 UTC 2022 ssl.sh: #433: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:20:33 UTC 2022 ssl.sh: #434: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:20:36 UTC 2022 ssl.sh: #435: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:20:39 UTC 2022 ssl.sh: #436: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:20:41 UTC 2022 ssl.sh: #437: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:20:44 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #438: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:20:47 UTC 2022 ssl.sh: #439: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:20:50 UTC 2022 ssl.sh: #440: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:20:52 UTC 2022 ssl.sh: #441: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:20:55 UTC 2022 ssl.sh: #442: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:20:58 UTC 2022 ssl.sh: #443: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:21:01 UTC 2022 ssl.sh: #444: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:21:03 UTC 2022 ssl.sh: #445: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:21:06 UTC 2022 ssl.sh: #446: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:21:09 UTC 2022 ssl.sh: #447: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:21:12 UTC 2022 ssl.sh: #448: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:21:14 UTC 2022 ssl.sh: #449: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:21:17 UTC 2022 ssl.sh: #450: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23520 found at Wed Sep 28 02:21:20 UTC 2022 ssl.sh: #451: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23520 at Wed Sep 28 02:21:20 UTC 2022 kill -USR1 23520 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23520 killed at Wed Sep 28 02:21:20 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:21:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:21:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:21:20 UTC 2022 selfserv_9223 with PID 24808 started at Wed Sep 28 02:21:20 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:21:27 UTC 2022 ssl.sh: #452: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:21:30 UTC 2022 ssl.sh: #453: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:21:32 UTC 2022 ssl.sh: #454: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:21:35 UTC 2022 ssl.sh: #455: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:21:38 UTC 2022 ssl.sh: #456: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:21:41 UTC 2022 ssl.sh: #457: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:21:44 UTC 2022 ssl.sh: #458: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:21:46 UTC 2022 ssl.sh: #459: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:21:49 UTC 2022 ssl.sh: #460: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:21:52 UTC 2022 ssl.sh: #461: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:21:55 UTC 2022 ssl.sh: #462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:21:58 UTC 2022 ssl.sh: #463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:22:01 UTC 2022 ssl.sh: #464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:22:03 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #465: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:22:06 UTC 2022 ssl.sh: #466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:22:09 UTC 2022 ssl.sh: #467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:22:12 UTC 2022 ssl.sh: #468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:22:14 UTC 2022 ssl.sh: #469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:22:17 UTC 2022 ssl.sh: #470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:22:20 UTC 2022 ssl.sh: #471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:22:23 UTC 2022 ssl.sh: #472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:22:26 UTC 2022 ssl.sh: #473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:22:28 UTC 2022 ssl.sh: #474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:22:31 UTC 2022 ssl.sh: #475: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:22:34 UTC 2022 ssl.sh: #476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:22:37 UTC 2022 ssl.sh: #477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:22:40 UTC 2022 ssl.sh: #478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:22:42 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #479: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:22:45 UTC 2022 ssl.sh: #480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:22:48 UTC 2022 ssl.sh: #481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:22:51 UTC 2022 ssl.sh: #482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:22:54 UTC 2022 ssl.sh: #483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:22:56 UTC 2022 ssl.sh: #484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:22:59 UTC 2022 ssl.sh: #485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:23:02 UTC 2022 ssl.sh: #486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:23:05 UTC 2022 ssl.sh: #487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:23:08 UTC 2022 ssl.sh: #488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:23:10 UTC 2022 ssl.sh: #489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:23:13 UTC 2022 ssl.sh: #490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:23:16 UTC 2022 ssl.sh: #491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 24808 found at Wed Sep 28 02:23:19 UTC 2022 ssl.sh: #492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 24808 at Wed Sep 28 02:23:19 UTC 2022 kill -USR1 24808 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 24808 killed at Wed Sep 28 02:23:19 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:23:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:23:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:23:19 UTC 2022 selfserv_9223 with PID 26096 started at Wed Sep 28 02:23:19 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:23:25 UTC 2022 ssl.sh: #493: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:23:27 UTC 2022 ssl.sh: #494: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:23:29 UTC 2022 ssl.sh: #495: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:23:32 UTC 2022 ssl.sh: #496: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:23:34 UTC 2022 ssl.sh: #497: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:23:36 UTC 2022 ssl.sh: #498: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:23:38 UTC 2022 ssl.sh: #499: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:23:40 UTC 2022 ssl.sh: #500: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:23:42 UTC 2022 ssl.sh: #501: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:23:44 UTC 2022 ssl.sh: #502: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:23:47 UTC 2022 ssl.sh: #503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:23:49 UTC 2022 ssl.sh: #504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:23:51 UTC 2022 ssl.sh: #505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:23:54 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #506: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:23:56 UTC 2022 ssl.sh: #507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:23:58 UTC 2022 ssl.sh: #508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:00 UTC 2022 ssl.sh: #509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:02 UTC 2022 ssl.sh: #510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:04 UTC 2022 ssl.sh: #511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:06 UTC 2022 ssl.sh: #512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:09 UTC 2022 ssl.sh: #513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:11 UTC 2022 ssl.sh: #514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:13 UTC 2022 ssl.sh: #515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:15 UTC 2022 ssl.sh: #516: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:17 UTC 2022 ssl.sh: #517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:19 UTC 2022 ssl.sh: #518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:22 UTC 2022 ssl.sh: #519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:24 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #520: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:26 UTC 2022 ssl.sh: #521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:29 UTC 2022 ssl.sh: #522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:31 UTC 2022 ssl.sh: #523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:33 UTC 2022 ssl.sh: #524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:35 UTC 2022 ssl.sh: #525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:37 UTC 2022 ssl.sh: #526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:39 UTC 2022 ssl.sh: #527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:41 UTC 2022 ssl.sh: #528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:43 UTC 2022 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:46 UTC 2022 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:48 UTC 2022 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:50 UTC 2022 ssl.sh: #532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26096 found at Wed Sep 28 02:24:52 UTC 2022 ssl.sh: #533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 26096 at Wed Sep 28 02:24:52 UTC 2022 kill -USR1 26096 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26096 killed at Wed Sep 28 02:24:52 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:24:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:24:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:24:53 UTC 2022 selfserv_9223 with PID 27388 started at Wed Sep 28 02:24:53 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:24:57 UTC 2022 ssl.sh: #534: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:24:58 UTC 2022 ssl.sh: #535: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:24:59 UTC 2022 ssl.sh: #536: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:00 UTC 2022 ssl.sh: #537: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:01 UTC 2022 ssl.sh: #538: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:02 UTC 2022 ssl.sh: #539: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:03 UTC 2022 ssl.sh: #540: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:04 UTC 2022 ssl.sh: #541: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:05 UTC 2022 ssl.sh: #542: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:06 UTC 2022 ssl.sh: #543: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:07 UTC 2022 ssl.sh: #544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:08 UTC 2022 ssl.sh: #545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:09 UTC 2022 ssl.sh: #546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:10 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #547: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:11 UTC 2022 ssl.sh: #548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:12 UTC 2022 ssl.sh: #549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:13 UTC 2022 ssl.sh: #550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:14 UTC 2022 ssl.sh: #551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:15 UTC 2022 ssl.sh: #552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:16 UTC 2022 ssl.sh: #553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:17 UTC 2022 ssl.sh: #554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:18 UTC 2022 ssl.sh: #555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:19 UTC 2022 ssl.sh: #556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:20 UTC 2022 ssl.sh: #557: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:21 UTC 2022 ssl.sh: #558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:22 UTC 2022 ssl.sh: #559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:23 UTC 2022 ssl.sh: #560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:24 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #561: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:25 UTC 2022 ssl.sh: #562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:26 UTC 2022 ssl.sh: #563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:27 UTC 2022 ssl.sh: #564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:28 UTC 2022 ssl.sh: #565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:28 UTC 2022 ssl.sh: #566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:29 UTC 2022 ssl.sh: #567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:30 UTC 2022 ssl.sh: #568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:31 UTC 2022 ssl.sh: #569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:32 UTC 2022 ssl.sh: #570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:33 UTC 2022 ssl.sh: #571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:34 UTC 2022 ssl.sh: #572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:35 UTC 2022 ssl.sh: #573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27388 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27388 found at Wed Sep 28 02:25:36 UTC 2022 ssl.sh: #574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27388 at Wed Sep 28 02:25:36 UTC 2022 kill -USR1 27388 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27388 killed at Wed Sep 28 02:25:36 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:25:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:25:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:25:37 UTC 2022 selfserv_9223 with PID 28667 started at Wed Sep 28 02:25:37 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:25:41 UTC 2022 ssl.sh: #575: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:25:42 UTC 2022 ssl.sh: #576: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:25:43 UTC 2022 ssl.sh: #577: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:25:44 UTC 2022 ssl.sh: #578: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:25:45 UTC 2022 ssl.sh: #579: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:25:47 UTC 2022 ssl.sh: #580: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:25:48 UTC 2022 ssl.sh: #581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:25:49 UTC 2022 ssl.sh: #582: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:25:50 UTC 2022 ssl.sh: #583: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:25:51 UTC 2022 ssl.sh: #584: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:25:52 UTC 2022 ssl.sh: #585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:25:53 UTC 2022 ssl.sh: #586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:25:54 UTC 2022 ssl.sh: #587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:25:55 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #588: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:25:56 UTC 2022 ssl.sh: #589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:25:57 UTC 2022 ssl.sh: #590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:25:58 UTC 2022 ssl.sh: #591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:25:59 UTC 2022 ssl.sh: #592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:26:00 UTC 2022 ssl.sh: #593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:26:01 UTC 2022 ssl.sh: #594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:26:02 UTC 2022 ssl.sh: #595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:26:03 UTC 2022 ssl.sh: #596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:26:04 UTC 2022 ssl.sh: #597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:26:05 UTC 2022 ssl.sh: #598: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:26:06 UTC 2022 ssl.sh: #599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:26:07 UTC 2022 ssl.sh: #600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:26:08 UTC 2022 ssl.sh: #601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:26:09 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #602: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:26:10 UTC 2022 ssl.sh: #603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:26:11 UTC 2022 ssl.sh: #604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:26:12 UTC 2022 ssl.sh: #605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:26:13 UTC 2022 ssl.sh: #606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:26:14 UTC 2022 ssl.sh: #607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:26:15 UTC 2022 ssl.sh: #608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:26:16 UTC 2022 ssl.sh: #609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:26:17 UTC 2022 ssl.sh: #610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:26:18 UTC 2022 ssl.sh: #611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:26:19 UTC 2022 ssl.sh: #612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:26:20 UTC 2022 ssl.sh: #613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:26:21 UTC 2022 ssl.sh: #614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28667 found at Wed Sep 28 02:26:22 UTC 2022 ssl.sh: #615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28667 at Wed Sep 28 02:26:22 UTC 2022 kill -USR1 28667 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28667 killed at Wed Sep 28 02:26:22 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:26:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:26:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:23 UTC 2022 selfserv_9223 with PID 29925 started at Wed Sep 28 02:26:23 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:28 UTC 2022 ssl.sh: #616: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:29 UTC 2022 ssl.sh: #617: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:31 UTC 2022 ssl.sh: #618: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:32 UTC 2022 ssl.sh: #619: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:33 UTC 2022 ssl.sh: #620: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:35 UTC 2022 ssl.sh: #621: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:36 UTC 2022 ssl.sh: #622: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:38 UTC 2022 ssl.sh: #623: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:39 UTC 2022 ssl.sh: #624: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:40 UTC 2022 ssl.sh: #625: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:42 UTC 2022 ssl.sh: #626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:43 UTC 2022 ssl.sh: #627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:45 UTC 2022 ssl.sh: #628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:46 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #629: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:47 UTC 2022 ssl.sh: #630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:49 UTC 2022 ssl.sh: #631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:50 UTC 2022 ssl.sh: #632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:51 UTC 2022 ssl.sh: #633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:53 UTC 2022 ssl.sh: #634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:54 UTC 2022 ssl.sh: #635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:56 UTC 2022 ssl.sh: #636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:57 UTC 2022 ssl.sh: #637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:26:58 UTC 2022 ssl.sh: #638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:27:00 UTC 2022 ssl.sh: #639: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:27:01 UTC 2022 ssl.sh: #640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:27:03 UTC 2022 ssl.sh: #641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:27:04 UTC 2022 ssl.sh: #642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:27:05 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #643: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:27:07 UTC 2022 ssl.sh: #644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:27:08 UTC 2022 ssl.sh: #645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:27:09 UTC 2022 ssl.sh: #646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:27:11 UTC 2022 ssl.sh: #647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:27:12 UTC 2022 ssl.sh: #648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:27:14 UTC 2022 ssl.sh: #649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:27:15 UTC 2022 ssl.sh: #650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:27:16 UTC 2022 ssl.sh: #651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:27:18 UTC 2022 ssl.sh: #652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:27:19 UTC 2022 ssl.sh: #653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:27:21 UTC 2022 ssl.sh: #654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:27:22 UTC 2022 ssl.sh: #655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 29925 found at Wed Sep 28 02:27:23 UTC 2022 ssl.sh: #656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 29925 at Wed Sep 28 02:27:23 UTC 2022 kill -USR1 29925 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 29925 killed at Wed Sep 28 02:27:24 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:27:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:27:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31202 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31202 found at Wed Sep 28 02:27:24 UTC 2022 selfserv_9223 with PID 31202 started at Wed Sep 28 02:27:24 UTC 2022 trying to kill selfserv_9223 with PID 31202 at Wed Sep 28 02:27:24 UTC 2022 kill -USR1 31202 ./ssl.sh: line 228: 31202 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9223 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 31202 killed at Wed Sep 28 02:27:24 UTC 2022 ssl.sh: SSL POLICY LISTSUITES - server /client =============================== Saving pkcs11.txt ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #657: listsuites with all cipher disallowed by policy produced a returncode of 1, expected is 1 - PASSED ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #658: listsuites with rsa cipher disallowed by policy produced a returncode of 1, expected is 1 - PASSED ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #659: listsuites with all ciphers enabled by policy but disabled by default produced a returncode of 1, expected is 1 - PASSED ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #660: listsuites with all ciphers enabled by policy but rsa disabled by default produced a returncode of 1, expected is 1 - PASSED ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all flags=policy-lock library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** NSS_SetAlgorithmPolicy failed: Could not change the policy because the policy is now locked. ssl.sh: #661: listsuites with policy locked produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL POLICY SELFSERV - server /client =============================== Saving pkcs11.txt ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: Disallow RSA key exchange explicitly ---- selfserv_9223 starting at Wed Sep 28 02:27:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain -M 3 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:27:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31299 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31299 found at Wed Sep 28 02:27:26 UTC 2022 selfserv_9223 with PID 31299 started at Wed Sep 28 02:27:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #662: Disallow RSA key exchange explicitly produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 31299 at Wed Sep 28 02:27:30 UTC 2022 kill -USR1 31299 SIG_USER: Parent got sig_user, killing children (3). Child 3 exited with exit code 100 Child 2 exited with exit code 100 Child 1 exited with exit code 100 selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 31299 killed at Wed Sep 28 02:27:30 UTC 2022 ssl.sh: SSL POLICY - server /client =============================== Saving pkcs11.txt selfserv_9223 starting at Wed Sep 28 02:27:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:27:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31379 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31379 found at Wed Sep 28 02:27:31 UTC 2022 selfserv_9223 with PID 31379 started at Wed Sep 28 02:27:31 UTC 2022 ssl.sh: running Allowed by Narrow Policy ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #663: Allowed by Narrow Policy produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Allowed by Strict Policy ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1/ssl,ssl-key-exchange:sha256/all-signature:rsa-pkcs/all-signature:rsa/ssl-key-exchange:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #664: Allowed by Strict Policy produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Allow All Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:dsa/all:rsa-pss/all:ecdsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #665: Allow All Explicitly produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disallow All Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #666: Disallow All Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow all signatures with Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all/signature library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #667: Disallow all signatures with Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256 library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #668: Disallow SHA256 Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Certificate signature Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/cert-signature library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #669: Disallow SHA256 Certificate signature Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow All SHA256 signatures Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/signature library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #670: Disallow All SHA256 signatures Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Any SHA256 signature Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/all-signature library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #671: Disallow Any SHA256 signature Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Signatures Implicitly Narrow ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:rsa/ssl-key-exchange:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #672: Disallow SHA256 Signatures Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Signatures Implicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:dsa/all:ecdsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #673: Disallow SHA256 Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=des-ede3-cbc library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #674: Disallow Cipher Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Implicitly Narrow ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #675: Disallow Cipher Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Implicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-verion-max=tls1.2 library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #676: Disallow Cipher Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=hmac-sha1 library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #677: Disallow HMAC Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Implicitly Narrow ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md5:sha256:rsa:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #678: Disallow HMAC Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Signatures Implicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #679: Disallow HMAC Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #680: Disallow Key Exchange Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Implicitly Narrow ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:dh-dss:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #681: Disallow Key Exchange Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Signatures Implicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #682: Disallow Key Exchange Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Exlicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #683: Disallow Version Exlicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Implicitly Narrow ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-ede3-cbc:tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #684: Disallow Version Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Implicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #685: Disallow Version Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow DSA Signatures Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=dsa library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #686: Disallow DSA Signatures Explicitly produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disallow RSA PKCS 1 Signatures Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa-pkcs library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #687: Disallow RSA PKCS 1 Signatures Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disable all by default, application override ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #688: Disable all by default, application override produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disable all by default, prevent application from enabling ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all flags=ssl-lock,policy-lock library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_NO_CIPHERS_SUPPORTED: No cipher suites are present and enabled in this program. ssl.sh: #689: Disable all by default, prevent application from enabling produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disable all by default, lock policy (application can still change the ciphers) ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all flags=policy-lock library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #690: Disable all by default, lock policy (application can still change the ciphers) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Lock in a different ciphersuite that the one the application asks for ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all enable=hmac-sha1:sha256:rsa-pkcs:rsa:aes128-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 flags=ssl-lock library=/builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #691: Lock in a different ciphersuite that the one the application asks for produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 31379 at Wed Sep 28 02:27:44 UTC 2022 kill -USR1 31379 selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 31379 killed at Wed Sep 28 02:27:45 UTC 2022 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9223 starting at Wed Sep 28 02:27:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:27:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 31831 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31831 found at Wed Sep 28 02:27:45 UTC 2022 selfserv_9223 with PID 31831 started at Wed Sep 28 02:27:45 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #663: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #664: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #665: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #666: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #667: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #668: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #669: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #670: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #671: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #672: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #673: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #674: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #675: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #676: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #677: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #678: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #679: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #680: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #681: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #682: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #683: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #684: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #685: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #686: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #687: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #688: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #689: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #690: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #691: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #692: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #693: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #694: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #695: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #696: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #697: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #698: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #699: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #700: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #701: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #702: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #703: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #704: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #705: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #706: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #707: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #708: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #709: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #710: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #711: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #712: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #713: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 31831 at Wed Sep 28 02:28:07 UTC 2022 kill -USR1 31831 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 31831 killed at Wed Sep 28 02:28:08 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Wed Sep 28 02:28:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:28:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32381 found at Wed Sep 28 02:28:08 UTC 2022 selfserv_9223 with PID 32381 started at Wed Sep 28 02:28:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #714: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #715: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #716: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #717: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #718: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #719: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #720: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #721: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #722: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #723: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #724: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #725: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #726: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #727: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #728: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #729: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #730: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #731: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #732: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #733: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #734: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #735: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #736: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #737: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #738: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #739: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #740: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #741: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #742: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #743: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #744: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #745: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #746: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #747: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #748: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #749: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #750: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #751: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #752: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #753: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #754: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #755: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #756: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #757: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #758: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #759: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #760: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #761: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #762: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #763: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #764: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #765: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #766: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #767: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #768: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #769: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #770: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #771: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #772: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #773: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #774: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #775: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #776: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #777: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #778: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #779: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #780: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #781: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #782: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #783: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #784: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #785: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #786: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #787: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #788: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #789: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 32381 at Wed Sep 28 02:28:42 UTC 2022 kill -USR1 32381 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32381 killed at Wed Sep 28 02:28:42 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9223 starting at Wed Sep 28 02:28:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:28:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33200 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33200 found at Wed Sep 28 02:28:43 UTC 2022 selfserv_9223 with PID 33200 started at Wed Sep 28 02:28:43 UTC 2022 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33200 at Wed Sep 28 02:28:46 UTC 2022 kill -USR1 33200 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33200 killed at Wed Sep 28 02:28:46 UTC 2022 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:28:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:28:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33266 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33266 found at Wed Sep 28 02:28:46 UTC 2022 selfserv_9223 with PID 33266 started at Wed Sep 28 02:28:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33266 at Wed Sep 28 02:28:51 UTC 2022 kill -USR1 33266 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33266 killed at Wed Sep 28 02:28:51 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:28:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:28:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33318 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33318 found at Wed Sep 28 02:28:52 UTC 2022 selfserv_9223 with PID 33318 started at Wed Sep 28 02:28:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33318 at Wed Sep 28 02:28:56 UTC 2022 kill -USR1 33318 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33318 killed at Wed Sep 28 02:28:56 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:28:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:28:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33370 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33370 found at Wed Sep 28 02:28:56 UTC 2022 selfserv_9223 with PID 33370 started at Wed Sep 28 02:28:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33370 at Wed Sep 28 02:29:03 UTC 2022 kill -USR1 33370 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33370 killed at Wed Sep 28 02:29:03 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:29:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:29:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33422 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33422 found at Wed Sep 28 02:29:03 UTC 2022 selfserv_9223 with PID 33422 started at Wed Sep 28 02:29:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #793: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 33422 at Wed Sep 28 02:29:08 UTC 2022 kill -USR1 33422 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33422 killed at Wed Sep 28 02:29:08 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:29:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:29:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33474 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33474 found at Wed Sep 28 02:29:08 UTC 2022 selfserv_9223 with PID 33474 started at Wed Sep 28 02:29:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #794: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 33474 at Wed Sep 28 02:29:12 UTC 2022 kill -USR1 33474 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33474 killed at Wed Sep 28 02:29:13 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:29:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:29:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33526 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33526 found at Wed Sep 28 02:29:13 UTC 2022 selfserv_9223 with PID 33526 started at Wed Sep 28 02:29:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33526 at Wed Sep 28 02:29:19 UTC 2022 kill -USR1 33526 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33526 killed at Wed Sep 28 02:29:19 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:29:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:29:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33578 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33578 found at Wed Sep 28 02:29:20 UTC 2022 selfserv_9223 with PID 33578 started at Wed Sep 28 02:29:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33578 at Wed Sep 28 02:29:24 UTC 2022 kill -USR1 33578 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33578 killed at Wed Sep 28 02:29:25 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:29:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:29:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33630 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33630 found at Wed Sep 28 02:29:25 UTC 2022 selfserv_9223 with PID 33630 started at Wed Sep 28 02:29:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33630 at Wed Sep 28 02:29:29 UTC 2022 kill -USR1 33630 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33630 killed at Wed Sep 28 02:29:29 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:29:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:29:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33697 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33697 found at Wed Sep 28 02:29:30 UTC 2022 selfserv_9223 with PID 33697 started at Wed Sep 28 02:29:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33697 at Wed Sep 28 02:29:35 UTC 2022 kill -USR1 33697 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33697 killed at Wed Sep 28 02:29:36 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:29:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:29:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33749 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33749 found at Wed Sep 28 02:29:36 UTC 2022 selfserv_9223 with PID 33749 started at Wed Sep 28 02:29:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #799: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 33749 at Wed Sep 28 02:29:40 UTC 2022 kill -USR1 33749 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33749 killed at Wed Sep 28 02:29:41 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:29:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:29:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33801 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33801 found at Wed Sep 28 02:29:41 UTC 2022 selfserv_9223 with PID 33801 started at Wed Sep 28 02:29:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 33801 at Wed Sep 28 02:29:45 UTC 2022 kill -USR1 33801 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33801 killed at Wed Sep 28 02:29:45 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:29:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:29:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33853 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33853 found at Wed Sep 28 02:29:46 UTC 2022 selfserv_9223 with PID 33853 started at Wed Sep 28 02:29:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33853 at Wed Sep 28 02:29:51 UTC 2022 kill -USR1 33853 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33853 killed at Wed Sep 28 02:29:52 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:29:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:29:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33905 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33905 found at Wed Sep 28 02:29:52 UTC 2022 selfserv_9223 with PID 33905 started at Wed Sep 28 02:29:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #802: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33905 at Wed Sep 28 02:29:57 UTC 2022 kill -USR1 33905 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33905 killed at Wed Sep 28 02:29:57 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:29:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:29:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33957 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33957 found at Wed Sep 28 02:29:57 UTC 2022 selfserv_9223 with PID 33957 started at Wed Sep 28 02:29:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33957 at Wed Sep 28 02:30:02 UTC 2022 kill -USR1 33957 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33957 killed at Wed Sep 28 02:30:02 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:30:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:30:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34086 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34086 found at Wed Sep 28 02:30:02 UTC 2022 selfserv_9223 with PID 34086 started at Wed Sep 28 02:30:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34086 at Wed Sep 28 02:30:09 UTC 2022 kill -USR1 34086 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34086 killed at Wed Sep 28 02:30:09 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:30:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:30:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34138 found at Wed Sep 28 02:30:09 UTC 2022 selfserv_9223 with PID 34138 started at Wed Sep 28 02:30:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #805: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 34138 at Wed Sep 28 02:30:14 UTC 2022 kill -USR1 34138 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34138 killed at Wed Sep 28 02:30:14 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:30:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:30:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34190 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34190 found at Wed Sep 28 02:30:14 UTC 2022 selfserv_9223 with PID 34190 started at Wed Sep 28 02:30:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #806: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 34190 at Wed Sep 28 02:30:19 UTC 2022 kill -USR1 34190 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34190 killed at Wed Sep 28 02:30:19 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:30:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:30:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34242 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34242 found at Wed Sep 28 02:30:19 UTC 2022 selfserv_9223 with PID 34242 started at Wed Sep 28 02:30:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34242 at Wed Sep 28 02:30:26 UTC 2022 kill -USR1 34242 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34242 killed at Wed Sep 28 02:30:26 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:30:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:30:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34294 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34294 found at Wed Sep 28 02:30:26 UTC 2022 selfserv_9223 with PID 34294 started at Wed Sep 28 02:30:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34294 at Wed Sep 28 02:30:31 UTC 2022 kill -USR1 34294 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34294 killed at Wed Sep 28 02:30:31 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:30:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:30:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34361 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34361 found at Wed Sep 28 02:30:32 UTC 2022 selfserv_9223 with PID 34361 started at Wed Sep 28 02:30:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #809: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34361 at Wed Sep 28 02:30:36 UTC 2022 kill -USR1 34361 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34361 killed at Wed Sep 28 02:30:36 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:30:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:30:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34413 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34413 found at Wed Sep 28 02:30:37 UTC 2022 selfserv_9223 with PID 34413 started at Wed Sep 28 02:30:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34413 at Wed Sep 28 02:30:43 UTC 2022 kill -USR1 34413 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34413 killed at Wed Sep 28 02:30:43 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:30:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:30:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34465 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34465 found at Wed Sep 28 02:30:44 UTC 2022 selfserv_9223 with PID 34465 started at Wed Sep 28 02:30:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #811: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 34465 at Wed Sep 28 02:30:48 UTC 2022 kill -USR1 34465 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34465 killed at Wed Sep 28 02:30:48 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:30:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:30:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34517 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34517 found at Wed Sep 28 02:30:49 UTC 2022 selfserv_9223 with PID 34517 started at Wed Sep 28 02:30:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #812: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 34517 at Wed Sep 28 02:30:53 UTC 2022 kill -USR1 34517 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34517 killed at Wed Sep 28 02:30:53 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:30:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:30:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34569 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34569 found at Wed Sep 28 02:30:54 UTC 2022 selfserv_9223 with PID 34569 started at Wed Sep 28 02:30:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34569 at Wed Sep 28 02:31:00 UTC 2022 kill -USR1 34569 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34569 killed at Wed Sep 28 02:31:00 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:31:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:31:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34621 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34621 found at Wed Sep 28 02:31:01 UTC 2022 selfserv_9223 with PID 34621 started at Wed Sep 28 02:31:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #814: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34621 at Wed Sep 28 02:31:05 UTC 2022 kill -USR1 34621 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34621 killed at Wed Sep 28 02:31:05 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:31:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:31:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34673 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34673 found at Wed Sep 28 02:31:06 UTC 2022 selfserv_9223 with PID 34673 started at Wed Sep 28 02:31:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34673 at Wed Sep 28 02:31:10 UTC 2022 kill -USR1 34673 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34673 killed at Wed Sep 28 02:31:10 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:31:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:31:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34725 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34725 found at Wed Sep 28 02:31:11 UTC 2022 selfserv_9223 with PID 34725 started at Wed Sep 28 02:31:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34725 at Wed Sep 28 02:31:16 UTC 2022 kill -USR1 34725 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34725 killed at Wed Sep 28 02:31:17 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:31:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:31:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34777 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34777 found at Wed Sep 28 02:31:17 UTC 2022 selfserv_9223 with PID 34777 started at Wed Sep 28 02:31:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #817: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 34777 at Wed Sep 28 02:31:22 UTC 2022 kill -USR1 34777 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34777 killed at Wed Sep 28 02:31:22 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:31:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:31:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34829 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34829 found at Wed Sep 28 02:31:22 UTC 2022 selfserv_9223 with PID 34829 started at Wed Sep 28 02:31:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #818: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 34829 at Wed Sep 28 02:31:26 UTC 2022 kill -USR1 34829 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34829 killed at Wed Sep 28 02:31:27 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:31:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:31:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34881 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34881 found at Wed Sep 28 02:31:27 UTC 2022 selfserv_9223 with PID 34881 started at Wed Sep 28 02:31:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #819: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34881 at Wed Sep 28 02:31:33 UTC 2022 kill -USR1 34881 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34881 killed at Wed Sep 28 02:31:33 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:31:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:31:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34948 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34948 found at Wed Sep 28 02:31:33 UTC 2022 selfserv_9223 with PID 34948 started at Wed Sep 28 02:31:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34948 at Wed Sep 28 02:31:39 UTC 2022 kill -USR1 34948 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34948 killed at Wed Sep 28 02:31:39 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:31:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:31:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35000 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35000 found at Wed Sep 28 02:31:39 UTC 2022 selfserv_9223 with PID 35000 started at Wed Sep 28 02:31:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #821: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35000 at Wed Sep 28 02:31:45 UTC 2022 kill -USR1 35000 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35000 killed at Wed Sep 28 02:31:45 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:31:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:31:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35052 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35052 found at Wed Sep 28 02:31:46 UTC 2022 selfserv_9223 with PID 35052 started at Wed Sep 28 02:31:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #822: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35052 at Wed Sep 28 02:31:50 UTC 2022 kill -USR1 35052 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35052 killed at Wed Sep 28 02:31:50 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:31:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:31:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35104 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35104 found at Wed Sep 28 02:31:51 UTC 2022 selfserv_9223 with PID 35104 started at Wed Sep 28 02:31:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #823: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 35104 at Wed Sep 28 02:31:55 UTC 2022 kill -USR1 35104 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35104 killed at Wed Sep 28 02:31:55 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:31:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:31:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35156 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35156 found at Wed Sep 28 02:31:56 UTC 2022 selfserv_9223 with PID 35156 started at Wed Sep 28 02:31:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #824: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35156 at Wed Sep 28 02:32:01 UTC 2022 kill -USR1 35156 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35156 killed at Wed Sep 28 02:32:01 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:32:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:32:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35208 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35208 found at Wed Sep 28 02:32:02 UTC 2022 selfserv_9223 with PID 35208 started at Wed Sep 28 02:32:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35208 at Wed Sep 28 02:32:08 UTC 2022 kill -USR1 35208 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35208 killed at Wed Sep 28 02:32:08 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:32:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:32:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35260 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35260 found at Wed Sep 28 02:32:09 UTC 2022 selfserv_9223 with PID 35260 started at Wed Sep 28 02:32:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #826: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35260 at Wed Sep 28 02:32:13 UTC 2022 kill -USR1 35260 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35260 killed at Wed Sep 28 02:32:13 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:32:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:32:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35312 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35312 found at Wed Sep 28 02:32:13 UTC 2022 selfserv_9223 with PID 35312 started at Wed Sep 28 02:32:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35312 at Wed Sep 28 02:32:18 UTC 2022 kill -USR1 35312 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35312 killed at Wed Sep 28 02:32:18 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:32:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:32:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35364 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35364 found at Wed Sep 28 02:32:19 UTC 2022 selfserv_9223 with PID 35364 started at Wed Sep 28 02:32:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #828: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 35364 at Wed Sep 28 02:32:23 UTC 2022 kill -USR1 35364 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35364 killed at Wed Sep 28 02:32:23 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:32:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:32:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35416 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35416 found at Wed Sep 28 02:32:23 UTC 2022 selfserv_9223 with PID 35416 started at Wed Sep 28 02:32:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #829: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35416 at Wed Sep 28 02:32:28 UTC 2022 kill -USR1 35416 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35416 killed at Wed Sep 28 02:32:28 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:32:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:32:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35468 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35468 found at Wed Sep 28 02:32:28 UTC 2022 selfserv_9223 with PID 35468 started at Wed Sep 28 02:32:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #830: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35468 at Wed Sep 28 02:32:32 UTC 2022 kill -USR1 35468 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35468 killed at Wed Sep 28 02:32:33 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:32:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:32:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35535 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35535 found at Wed Sep 28 02:32:33 UTC 2022 selfserv_9223 with PID 35535 started at Wed Sep 28 02:32:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35535 at Wed Sep 28 02:32:38 UTC 2022 kill -USR1 35535 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35535 killed at Wed Sep 28 02:32:38 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:32:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:32:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35587 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35587 found at Wed Sep 28 02:32:39 UTC 2022 selfserv_9223 with PID 35587 started at Wed Sep 28 02:32:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #832: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 35587 at Wed Sep 28 02:32:43 UTC 2022 kill -USR1 35587 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35587 killed at Wed Sep 28 02:32:43 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:32:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:32:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35639 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35639 found at Wed Sep 28 02:32:43 UTC 2022 selfserv_9223 with PID 35639 started at Wed Sep 28 02:32:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #833: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35639 at Wed Sep 28 02:32:48 UTC 2022 kill -USR1 35639 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35639 killed at Wed Sep 28 02:32:48 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:32:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:32:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35691 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35691 found at Wed Sep 28 02:32:49 UTC 2022 selfserv_9223 with PID 35691 started at Wed Sep 28 02:32:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #834: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35691 at Wed Sep 28 02:32:53 UTC 2022 kill -USR1 35691 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35691 killed at Wed Sep 28 02:32:53 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:32:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:32:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35743 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35743 found at Wed Sep 28 02:32:54 UTC 2022 selfserv_9223 with PID 35743 started at Wed Sep 28 02:32:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #835: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35743 at Wed Sep 28 02:32:58 UTC 2022 kill -USR1 35743 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35743 killed at Wed Sep 28 02:32:58 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:32:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:32:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35795 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35795 found at Wed Sep 28 02:32:59 UTC 2022 selfserv_9223 with PID 35795 started at Wed Sep 28 02:32:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #836: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 35795 at Wed Sep 28 02:33:03 UTC 2022 kill -USR1 35795 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35795 killed at Wed Sep 28 02:33:03 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:33:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:33:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35847 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35847 found at Wed Sep 28 02:33:04 UTC 2022 selfserv_9223 with PID 35847 started at Wed Sep 28 02:33:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #837: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35847 at Wed Sep 28 02:33:08 UTC 2022 kill -USR1 35847 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35847 killed at Wed Sep 28 02:33:09 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:33:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:33:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35899 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35899 found at Wed Sep 28 02:33:09 UTC 2022 selfserv_9223 with PID 35899 started at Wed Sep 28 02:33:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #838: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35899 at Wed Sep 28 02:33:13 UTC 2022 kill -USR1 35899 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35899 killed at Wed Sep 28 02:33:13 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:33:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:33:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35951 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35951 found at Wed Sep 28 02:33:14 UTC 2022 selfserv_9223 with PID 35951 started at Wed Sep 28 02:33:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35951 at Wed Sep 28 02:33:18 UTC 2022 kill -USR1 35951 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35951 killed at Wed Sep 28 02:33:19 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:33:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:33:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36004 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36004 found at Wed Sep 28 02:33:19 UTC 2022 selfserv_9223 with PID 36004 started at Wed Sep 28 02:33:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #840: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 36004 at Wed Sep 28 02:33:23 UTC 2022 kill -USR1 36004 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36004 killed at Wed Sep 28 02:33:24 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:33:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:33:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36056 found at Wed Sep 28 02:33:24 UTC 2022 selfserv_9223 with PID 36056 started at Wed Sep 28 02:33:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #841: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 36056 at Wed Sep 28 02:33:29 UTC 2022 kill -USR1 36056 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36056 killed at Wed Sep 28 02:33:29 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:33:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:33:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36108 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36108 found at Wed Sep 28 02:33:29 UTC 2022 selfserv_9223 with PID 36108 started at Wed Sep 28 02:33:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #842: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 36108 at Wed Sep 28 02:33:33 UTC 2022 kill -USR1 36108 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36108 killed at Wed Sep 28 02:33:34 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:33:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:33:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36176 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36176 found at Wed Sep 28 02:33:34 UTC 2022 selfserv_9223 with PID 36176 started at Wed Sep 28 02:33:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #843: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 36176 at Wed Sep 28 02:33:39 UTC 2022 kill -USR1 36176 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36176 killed at Wed Sep 28 02:33:39 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:33:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:33:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36228 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36228 found at Wed Sep 28 02:33:40 UTC 2022 selfserv_9223 with PID 36228 started at Wed Sep 28 02:33:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #844: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 36228 at Wed Sep 28 02:33:44 UTC 2022 kill -USR1 36228 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36228 killed at Wed Sep 28 02:33:44 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:33:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:33:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36281 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36281 found at Wed Sep 28 02:33:44 UTC 2022 selfserv_9223 with PID 36281 started at Wed Sep 28 02:33:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #845: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 36281 at Wed Sep 28 02:33:49 UTC 2022 kill -USR1 36281 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36281 killed at Wed Sep 28 02:33:50 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:33:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:33:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36333 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36333 found at Wed Sep 28 02:33:50 UTC 2022 selfserv_9223 with PID 36333 started at Wed Sep 28 02:33:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #846: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 36333 at Wed Sep 28 02:33:55 UTC 2022 kill -USR1 36333 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36333 killed at Wed Sep 28 02:33:56 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:33:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:33:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36385 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36385 found at Wed Sep 28 02:33:56 UTC 2022 selfserv_9223 with PID 36385 started at Wed Sep 28 02:33:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #847: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 36385 at Wed Sep 28 02:34:01 UTC 2022 kill -USR1 36385 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36385 killed at Wed Sep 28 02:34:01 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 02:34:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:34:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36443 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36443 found at Wed Sep 28 02:34:02 UTC 2022 selfserv_9223 with PID 36443 started at Wed Sep 28 02:34:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #848: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 36443 at Wed Sep 28 02:34:07 UTC 2022 kill -USR1 36443 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36443 killed at Wed Sep 28 02:34:07 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Wed Sep 28 02:34:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:34:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36501 found at Wed Sep 28 02:34:08 UTC 2022 selfserv_9223 with PID 36501 started at Wed Sep 28 02:34:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #849: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 36501 at Wed Sep 28 02:34:15 UTC 2022 kill -USR1 36501 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36501 killed at Wed Sep 28 02:34:15 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Wed Sep 28 02:34:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:34:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36559 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36559 found at Wed Sep 28 02:34:15 UTC 2022 selfserv_9223 with PID 36559 started at Wed Sep 28 02:34:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #850: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 36559 at Wed Sep 28 02:34:19 UTC 2022 kill -USR1 36559 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36559 killed at Wed Sep 28 02:34:19 UTC 2022 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 02:34:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:34:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36617 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36617 found at Wed Sep 28 02:34:20 UTC 2022 selfserv_9223 with PID 36617 started at Wed Sep 28 02:34:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #851: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 36617 at Wed Sep 28 02:34:25 UTC 2022 kill -USR1 36617 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36617 killed at Wed Sep 28 02:34:26 UTC 2022 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9223 starting at Wed Sep 28 02:34:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:34:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36675 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36675 found at Wed Sep 28 02:34:26 UTC 2022 selfserv_9223 with PID 36675 started at Wed Sep 28 02:34:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #852: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 36675 at Wed Sep 28 02:34:30 UTC 2022 kill -USR1 36675 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36675 killed at Wed Sep 28 02:34:30 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 02:34:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:34:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36748 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36748 found at Wed Sep 28 02:34:31 UTC 2022 selfserv_9223 with PID 36748 started at Wed Sep 28 02:34:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #853: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 36748 at Wed Sep 28 02:34:36 UTC 2022 kill -USR1 36748 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36748 killed at Wed Sep 28 02:34:36 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Wed Sep 28 02:34:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:34:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36807 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36807 found at Wed Sep 28 02:34:37 UTC 2022 selfserv_9223 with PID 36807 started at Wed Sep 28 02:34:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #854: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 36807 at Wed Sep 28 02:34:44 UTC 2022 kill -USR1 36807 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36807 killed at Wed Sep 28 02:34:44 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9223 starting at Wed Sep 28 02:34:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:34:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36865 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36865 found at Wed Sep 28 02:34:44 UTC 2022 selfserv_9223 with PID 36865 started at Wed Sep 28 02:34:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #855: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 36865 at Wed Sep 28 02:34:50 UTC 2022 kill -USR1 36865 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36865 killed at Wed Sep 28 02:34:50 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9223 starting at Wed Sep 28 02:34:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:34:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36923 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36923 found at Wed Sep 28 02:34:50 UTC 2022 selfserv_9223 with PID 36923 started at Wed Sep 28 02:34:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #856: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 36923 at Wed Sep 28 02:34:56 UTC 2022 kill -USR1 36923 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36923 killed at Wed Sep 28 02:34:56 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Wed Sep 28 02:34:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:34:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36981 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36981 found at Wed Sep 28 02:34:56 UTC 2022 selfserv_9223 with PID 36981 started at Wed Sep 28 02:34:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #857: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 36981 at Wed Sep 28 02:35:00 UTC 2022 kill -USR1 36981 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36981 killed at Wed Sep 28 02:35:00 UTC 2022 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9223 starting at Wed Sep 28 02:35:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:35:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37024 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37024 found at Wed Sep 28 02:35:01 UTC 2022 selfserv_9223 with PID 37024 started at Wed Sep 28 02:35:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #790: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37024 at Wed Sep 28 02:35:06 UTC 2022 kill -USR1 37024 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37024 killed at Wed Sep 28 02:35:06 UTC 2022 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9223 starting at Wed Sep 28 02:35:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:35:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37079 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37079 found at Wed Sep 28 02:35:07 UTC 2022 selfserv_9223 with PID 37079 started at Wed Sep 28 02:35:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #791: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9223 with PID 37079 at Wed Sep 28 02:35:12 UTC 2022 kill -USR1 37079 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37079 killed at Wed Sep 28 02:35:12 UTC 2022 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9223 starting at Wed Sep 28 02:35:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:35:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37121 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37121 found at Wed Sep 28 02:35:13 UTC 2022 selfserv_9223 with PID 37121 started at Wed Sep 28 02:35:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #792: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 37121 at Wed Sep 28 02:35:18 UTC 2022 kill -USR1 37121 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37121 killed at Wed Sep 28 02:35:18 UTC 2022 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9223 starting at Wed Sep 28 02:35:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:35:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37163 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37163 found at Wed Sep 28 02:35:19 UTC 2022 selfserv_9223 with PID 37163 started at Wed Sep 28 02:35:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #793: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 37163 at Wed Sep 28 02:35:22 UTC 2022 kill -USR1 37163 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37163 killed at Wed Sep 28 02:35:23 UTC 2022 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9223 starting at Wed Sep 28 02:35:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:35:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37205 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37205 found at Wed Sep 28 02:35:23 UTC 2022 selfserv_9223 with PID 37205 started at Wed Sep 28 02:35:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #794: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 37205 at Wed Sep 28 02:35:27 UTC 2022 kill -USR1 37205 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37205 killed at Wed Sep 28 02:35:27 UTC 2022 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9223 starting at Wed Sep 28 02:35:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:35:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37247 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37247 found at Wed Sep 28 02:35:27 UTC 2022 selfserv_9223 with PID 37247 started at Wed Sep 28 02:35:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #795: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 37247 at Wed Sep 28 02:35:31 UTC 2022 kill -USR1 37247 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37247 killed at Wed Sep 28 02:35:31 UTC 2022 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9223 starting at Wed Sep 28 02:35:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:35:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37304 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37304 found at Wed Sep 28 02:35:32 UTC 2022 selfserv_9223 with PID 37304 started at Wed Sep 28 02:35:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #796: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 37304 at Wed Sep 28 02:35:36 UTC 2022 kill -USR1 37304 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37304 killed at Wed Sep 28 02:35:36 UTC 2022 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9223 starting at Wed Sep 28 02:35:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:35:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37346 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37346 found at Wed Sep 28 02:35:36 UTC 2022 selfserv_9223 with PID 37346 started at Wed Sep 28 02:35:36 UTC 2022 strsclnt -q -p 9223 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Sep 28 02:35:36 UTC 2022 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Sep 28 02:36:31 UTC 2022 ssl.sh: #797: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9223 with PID 37346 at Wed Sep 28 02:36:31 UTC 2022 kill -USR1 37346 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37346 killed at Wed Sep 28 02:36:31 UTC 2022 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Wed Sep 28 02:36:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:36:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37412 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37412 found at Wed Sep 28 02:36:31 UTC 2022 selfserv_9223 with PID 37412 started at Wed Sep 28 02:36:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37412 at Wed Sep 28 02:36:35 UTC 2022 kill -USR1 37412 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37412 killed at Wed Sep 28 02:36:35 UTC 2022 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:36:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:36:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37454 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37454 found at Wed Sep 28 02:36:36 UTC 2022 selfserv_9223 with PID 37454 started at Wed Sep 28 02:36:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37454 at Wed Sep 28 02:36:39 UTC 2022 kill -USR1 37454 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37454 killed at Wed Sep 28 02:36:39 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:36:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:36:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37493 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37493 found at Wed Sep 28 02:36:39 UTC 2022 selfserv_9223 with PID 37493 started at Wed Sep 28 02:36:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #800: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 37493 at Wed Sep 28 02:36:42 UTC 2022 kill -USR1 37493 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37493 killed at Wed Sep 28 02:36:42 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:36:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:36:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37532 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37532 found at Wed Sep 28 02:36:43 UTC 2022 selfserv_9223 with PID 37532 started at Wed Sep 28 02:36:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37532 at Wed Sep 28 02:36:45 UTC 2022 kill -USR1 37532 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37532 killed at Wed Sep 28 02:36:46 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:36:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:36:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37571 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37571 found at Wed Sep 28 02:36:46 UTC 2022 selfserv_9223 with PID 37571 started at Wed Sep 28 02:36:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #802: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 37571 at Wed Sep 28 02:36:49 UTC 2022 kill -USR1 37571 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37571 killed at Wed Sep 28 02:36:49 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:36:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:36:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37610 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37610 found at Wed Sep 28 02:36:49 UTC 2022 selfserv_9223 with PID 37610 started at Wed Sep 28 02:36:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37610 at Wed Sep 28 02:36:52 UTC 2022 kill -USR1 37610 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37610 killed at Wed Sep 28 02:36:52 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:36:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:36:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37649 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37649 found at Wed Sep 28 02:36:53 UTC 2022 selfserv_9223 with PID 37649 started at Wed Sep 28 02:36:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37649 at Wed Sep 28 02:36:56 UTC 2022 kill -USR1 37649 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37649 killed at Wed Sep 28 02:36:56 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:36:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:36:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37688 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37688 found at Wed Sep 28 02:36:56 UTC 2022 selfserv_9223 with PID 37688 started at Wed Sep 28 02:36:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #805: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37688 at Wed Sep 28 02:36:59 UTC 2022 kill -USR1 37688 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37688 killed at Wed Sep 28 02:36:59 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:36:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:36:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37727 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37727 found at Wed Sep 28 02:37:00 UTC 2022 selfserv_9223 with PID 37727 started at Wed Sep 28 02:37:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #806: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37727 at Wed Sep 28 02:37:03 UTC 2022 kill -USR1 37727 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37727 killed at Wed Sep 28 02:37:03 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:37:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:37:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37766 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37766 found at Wed Sep 28 02:37:03 UTC 2022 selfserv_9223 with PID 37766 started at Wed Sep 28 02:37:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37766 at Wed Sep 28 02:37:06 UTC 2022 kill -USR1 37766 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37766 killed at Wed Sep 28 02:37:06 UTC 2022 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:37:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:37:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37805 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37805 found at Wed Sep 28 02:37:07 UTC 2022 selfserv_9223 with PID 37805 started at Wed Sep 28 02:37:07 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #808: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37805 at Wed Sep 28 02:37:09 UTC 2022 kill -USR1 37805 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37805 killed at Wed Sep 28 02:37:10 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:37:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:37:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37845 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37845 found at Wed Sep 28 02:37:10 UTC 2022 selfserv_9223 with PID 37845 started at Wed Sep 28 02:37:10 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #809: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 37845 at Wed Sep 28 02:37:13 UTC 2022 kill -USR1 37845 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37845 killed at Wed Sep 28 02:37:13 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:37:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:37:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37885 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37885 found at Wed Sep 28 02:37:13 UTC 2022 selfserv_9223 with PID 37885 started at Wed Sep 28 02:37:13 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #810: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37885 at Wed Sep 28 02:37:16 UTC 2022 kill -USR1 37885 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37885 killed at Wed Sep 28 02:37:16 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:37:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:37:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37925 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37925 found at Wed Sep 28 02:37:17 UTC 2022 selfserv_9223 with PID 37925 started at Wed Sep 28 02:37:17 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #811: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 37925 at Wed Sep 28 02:37:20 UTC 2022 kill -USR1 37925 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37925 killed at Wed Sep 28 02:37:20 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:37:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:37:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37965 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37965 found at Wed Sep 28 02:37:20 UTC 2022 selfserv_9223 with PID 37965 started at Wed Sep 28 02:37:20 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #812: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37965 at Wed Sep 28 02:37:23 UTC 2022 kill -USR1 37965 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37965 killed at Wed Sep 28 02:37:23 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:37:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:37:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38005 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38005 found at Wed Sep 28 02:37:24 UTC 2022 selfserv_9223 with PID 38005 started at Wed Sep 28 02:37:24 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #813: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 38005 at Wed Sep 28 02:37:27 UTC 2022 kill -USR1 38005 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 38005 killed at Wed Sep 28 02:37:27 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:37:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:37:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38045 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38045 found at Wed Sep 28 02:37:27 UTC 2022 selfserv_9223 with PID 38045 started at Wed Sep 28 02:37:27 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #814: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 38045 at Wed Sep 28 02:37:30 UTC 2022 kill -USR1 38045 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 38045 killed at Wed Sep 28 02:37:30 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:37:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:37:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38100 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38100 found at Wed Sep 28 02:37:31 UTC 2022 selfserv_9223 with PID 38100 started at Wed Sep 28 02:37:31 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #815: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 38100 at Wed Sep 28 02:37:33 UTC 2022 kill -USR1 38100 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 38100 killed at Wed Sep 28 02:37:34 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:37:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:37:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 38140 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38140 found at Wed Sep 28 02:37:34 UTC 2022 selfserv_9223 with PID 38140 started at Wed Sep 28 02:37:34 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #816: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 38140 at Wed Sep 28 02:37:37 UTC 2022 kill -USR1 38140 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 38140 killed at Wed Sep 28 02:37:37 UTC 2022 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9223 starting at Wed Sep 28 02:37:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:37:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 38180 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38180 found at Wed Sep 28 02:37:38 UTC 2022 selfserv_9223 with PID 38180 started at Wed Sep 28 02:37:38 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #817: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #821: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #822: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #827: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #828: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #833: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #834: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #839: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #840: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #844: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #846: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #849: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #850: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #851: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #852: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #853: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #854: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #855: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #856: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #857: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #858: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #859: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #860: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #861: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #862: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #863: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #864: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #865: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #866: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #867: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 38180 at Wed Sep 28 02:38:03 UTC 2022 kill -USR1 38180 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 38180 killed at Wed Sep 28 02:38:03 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Wed Sep 28 02:38:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:38:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 38731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38731 found at Wed Sep 28 02:38:04 UTC 2022 selfserv_9223 with PID 38731 started at Wed Sep 28 02:38:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #868: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #869: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #870: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #902: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #903: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #908: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #909: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #914: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #915: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #920: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #921: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #923: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #924: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #925: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #926: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #927: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #928: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #929: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #930: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #931: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #932: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #933: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #934: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #935: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #936: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #938: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #939: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #940: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #941: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #942: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #943: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 38731 at Wed Sep 28 02:38:40 UTC 2022 kill -USR1 38731 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 38731 killed at Wed Sep 28 02:38:41 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:38:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:38:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39559 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39559 found at Wed Sep 28 02:38:41 UTC 2022 selfserv_9223 with PID 39559 started at Wed Sep 28 02:38:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 39559 at Wed Sep 28 02:38:50 UTC 2022 kill -USR1 39559 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39559 killed at Wed Sep 28 02:38:50 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:38:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:38:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39611 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39611 found at Wed Sep 28 02:38:51 UTC 2022 selfserv_9223 with PID 39611 started at Wed Sep 28 02:38:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 39611 at Wed Sep 28 02:38:59 UTC 2022 kill -USR1 39611 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39611 killed at Wed Sep 28 02:39:00 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:39:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:39:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39663 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39663 found at Wed Sep 28 02:39:00 UTC 2022 selfserv_9223 with PID 39663 started at Wed Sep 28 02:39:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 39663 at Wed Sep 28 02:39:12 UTC 2022 kill -USR1 39663 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39663 killed at Wed Sep 28 02:39:12 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:39:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:39:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39715 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39715 found at Wed Sep 28 02:39:13 UTC 2022 selfserv_9223 with PID 39715 started at Wed Sep 28 02:39:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #947: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 39715 at Wed Sep 28 02:39:21 UTC 2022 kill -USR1 39715 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39715 killed at Wed Sep 28 02:39:22 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:39:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:39:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39767 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39767 found at Wed Sep 28 02:39:22 UTC 2022 selfserv_9223 with PID 39767 started at Wed Sep 28 02:39:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #948: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 39767 at Wed Sep 28 02:39:31 UTC 2022 kill -USR1 39767 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39767 killed at Wed Sep 28 02:39:31 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:39:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:39:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39836 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39836 found at Wed Sep 28 02:39:32 UTC 2022 selfserv_9223 with PID 39836 started at Wed Sep 28 02:39:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 39836 at Wed Sep 28 02:39:44 UTC 2022 kill -USR1 39836 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39836 killed at Wed Sep 28 02:39:44 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:39:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:39:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39888 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39888 found at Wed Sep 28 02:39:44 UTC 2022 selfserv_9223 with PID 39888 started at Wed Sep 28 02:39:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 39888 at Wed Sep 28 02:39:53 UTC 2022 kill -USR1 39888 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39888 killed at Wed Sep 28 02:39:53 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:39:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:39:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39940 found at Wed Sep 28 02:39:54 UTC 2022 selfserv_9223 with PID 39940 started at Wed Sep 28 02:39:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 39940 at Wed Sep 28 02:40:03 UTC 2022 kill -USR1 39940 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39940 killed at Wed Sep 28 02:40:03 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:40:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:40:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39992 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39992 found at Wed Sep 28 02:40:03 UTC 2022 selfserv_9223 with PID 39992 started at Wed Sep 28 02:40:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 39992 at Wed Sep 28 02:40:15 UTC 2022 kill -USR1 39992 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39992 killed at Wed Sep 28 02:40:15 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:40:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:40:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40045 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40045 found at Wed Sep 28 02:40:16 UTC 2022 selfserv_9223 with PID 40045 started at Wed Sep 28 02:40:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #953: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 40045 at Wed Sep 28 02:40:25 UTC 2022 kill -USR1 40045 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40045 killed at Wed Sep 28 02:40:25 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:40:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:40:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40097 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40097 found at Wed Sep 28 02:40:25 UTC 2022 selfserv_9223 with PID 40097 started at Wed Sep 28 02:40:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #954: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 40097 at Wed Sep 28 02:40:34 UTC 2022 kill -USR1 40097 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40097 killed at Wed Sep 28 02:40:34 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:40:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:40:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40164 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40164 found at Wed Sep 28 02:40:35 UTC 2022 selfserv_9223 with PID 40164 started at Wed Sep 28 02:40:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #955: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40164 at Wed Sep 28 02:40:47 UTC 2022 kill -USR1 40164 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40164 killed at Wed Sep 28 02:40:47 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:40:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:40:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40216 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40216 found at Wed Sep 28 02:40:47 UTC 2022 selfserv_9223 with PID 40216 started at Wed Sep 28 02:40:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #956: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40216 at Wed Sep 28 02:40:56 UTC 2022 kill -USR1 40216 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40216 killed at Wed Sep 28 02:40:56 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:40:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:40:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40268 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40268 found at Wed Sep 28 02:40:57 UTC 2022 selfserv_9223 with PID 40268 started at Wed Sep 28 02:40:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #957: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40268 at Wed Sep 28 02:41:06 UTC 2022 kill -USR1 40268 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40268 killed at Wed Sep 28 02:41:06 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:41:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:41:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40320 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40320 found at Wed Sep 28 02:41:06 UTC 2022 selfserv_9223 with PID 40320 started at Wed Sep 28 02:41:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #958: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40320 at Wed Sep 28 02:41:19 UTC 2022 kill -USR1 40320 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40320 killed at Wed Sep 28 02:41:19 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:41:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:41:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40372 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40372 found at Wed Sep 28 02:41:19 UTC 2022 selfserv_9223 with PID 40372 started at Wed Sep 28 02:41:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #959: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 40372 at Wed Sep 28 02:41:28 UTC 2022 kill -USR1 40372 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40372 killed at Wed Sep 28 02:41:28 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:41:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:41:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40424 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40424 found at Wed Sep 28 02:41:29 UTC 2022 selfserv_9223 with PID 40424 started at Wed Sep 28 02:41:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #960: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 40424 at Wed Sep 28 02:41:38 UTC 2022 kill -USR1 40424 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40424 killed at Wed Sep 28 02:41:38 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:41:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:41:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40491 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40491 found at Wed Sep 28 02:41:38 UTC 2022 selfserv_9223 with PID 40491 started at Wed Sep 28 02:41:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #961: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40491 at Wed Sep 28 02:41:50 UTC 2022 kill -USR1 40491 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40491 killed at Wed Sep 28 02:41:51 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:41:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:41:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40543 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40543 found at Wed Sep 28 02:41:51 UTC 2022 selfserv_9223 with PID 40543 started at Wed Sep 28 02:41:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #962: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40543 at Wed Sep 28 02:42:00 UTC 2022 kill -USR1 40543 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40543 killed at Wed Sep 28 02:42:00 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:42:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:42:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40595 found at Wed Sep 28 02:42:01 UTC 2022 selfserv_9223 with PID 40595 started at Wed Sep 28 02:42:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #963: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40595 at Wed Sep 28 02:42:10 UTC 2022 kill -USR1 40595 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40595 killed at Wed Sep 28 02:42:10 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:42:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:42:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40647 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40647 found at Wed Sep 28 02:42:10 UTC 2022 selfserv_9223 with PID 40647 started at Wed Sep 28 02:42:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #964: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40647 at Wed Sep 28 02:42:22 UTC 2022 kill -USR1 40647 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40647 killed at Wed Sep 28 02:42:22 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:42:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:42:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40699 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40699 found at Wed Sep 28 02:42:23 UTC 2022 selfserv_9223 with PID 40699 started at Wed Sep 28 02:42:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #965: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 40699 at Wed Sep 28 02:42:32 UTC 2022 kill -USR1 40699 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40699 killed at Wed Sep 28 02:42:32 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:42:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:42:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40766 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40766 found at Wed Sep 28 02:42:33 UTC 2022 selfserv_9223 with PID 40766 started at Wed Sep 28 02:42:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #966: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 40766 at Wed Sep 28 02:42:42 UTC 2022 kill -USR1 40766 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40766 killed at Wed Sep 28 02:42:42 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:42:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:42:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40818 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40818 found at Wed Sep 28 02:42:42 UTC 2022 selfserv_9223 with PID 40818 started at Wed Sep 28 02:42:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #967: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40818 at Wed Sep 28 02:42:54 UTC 2022 kill -USR1 40818 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40818 killed at Wed Sep 28 02:42:54 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:42:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:42:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40871 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40871 found at Wed Sep 28 02:42:55 UTC 2022 selfserv_9223 with PID 40871 started at Wed Sep 28 02:42:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #968: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40871 at Wed Sep 28 02:43:04 UTC 2022 kill -USR1 40871 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40871 killed at Wed Sep 28 02:43:04 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:43:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:43:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40923 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40923 found at Wed Sep 28 02:43:04 UTC 2022 selfserv_9223 with PID 40923 started at Wed Sep 28 02:43:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #969: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40923 at Wed Sep 28 02:43:13 UTC 2022 kill -USR1 40923 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40923 killed at Wed Sep 28 02:43:14 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:43:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:43:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40975 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40975 found at Wed Sep 28 02:43:14 UTC 2022 selfserv_9223 with PID 40975 started at Wed Sep 28 02:43:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #970: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40975 at Wed Sep 28 02:43:26 UTC 2022 kill -USR1 40975 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40975 killed at Wed Sep 28 02:43:26 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:43:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:43:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41027 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41027 found at Wed Sep 28 02:43:27 UTC 2022 selfserv_9223 with PID 41027 started at Wed Sep 28 02:43:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #971: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 41027 at Wed Sep 28 02:43:36 UTC 2022 kill -USR1 41027 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41027 killed at Wed Sep 28 02:43:36 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:43:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:43:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41095 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41095 found at Wed Sep 28 02:43:36 UTC 2022 selfserv_9223 with PID 41095 started at Wed Sep 28 02:43:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #972: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 41095 at Wed Sep 28 02:43:45 UTC 2022 kill -USR1 41095 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41095 killed at Wed Sep 28 02:43:45 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:43:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:43:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41148 found at Wed Sep 28 02:43:46 UTC 2022 selfserv_9223 with PID 41148 started at Wed Sep 28 02:43:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #973: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41148 at Wed Sep 28 02:43:58 UTC 2022 kill -USR1 41148 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41148 killed at Wed Sep 28 02:43:58 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:43:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:43:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41200 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41200 found at Wed Sep 28 02:43:59 UTC 2022 selfserv_9223 with PID 41200 started at Wed Sep 28 02:43:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #974: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41200 at Wed Sep 28 02:44:10 UTC 2022 kill -USR1 41200 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41200 killed at Wed Sep 28 02:44:11 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:44:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:44:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41252 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41252 found at Wed Sep 28 02:44:11 UTC 2022 selfserv_9223 with PID 41252 started at Wed Sep 28 02:44:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #975: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41252 at Wed Sep 28 02:44:23 UTC 2022 kill -USR1 41252 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41252 killed at Wed Sep 28 02:44:23 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:44:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:44:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41304 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41304 found at Wed Sep 28 02:44:24 UTC 2022 selfserv_9223 with PID 41304 started at Wed Sep 28 02:44:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #976: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41304 at Wed Sep 28 02:44:32 UTC 2022 kill -USR1 41304 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41304 killed at Wed Sep 28 02:44:33 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:44:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:44:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41372 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41372 found at Wed Sep 28 02:44:33 UTC 2022 selfserv_9223 with PID 41372 started at Wed Sep 28 02:44:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #977: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 41372 at Wed Sep 28 02:44:42 UTC 2022 kill -USR1 41372 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41372 killed at Wed Sep 28 02:44:42 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:44:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:44:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41424 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41424 found at Wed Sep 28 02:44:42 UTC 2022 selfserv_9223 with PID 41424 started at Wed Sep 28 02:44:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #978: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41424 at Wed Sep 28 02:44:54 UTC 2022 kill -USR1 41424 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41424 killed at Wed Sep 28 02:44:55 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:44:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:44:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41476 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41476 found at Wed Sep 28 02:44:55 UTC 2022 selfserv_9223 with PID 41476 started at Wed Sep 28 02:44:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #979: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41476 at Wed Sep 28 02:45:07 UTC 2022 kill -USR1 41476 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41476 killed at Wed Sep 28 02:45:07 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:45:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:45:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41528 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41528 found at Wed Sep 28 02:45:08 UTC 2022 selfserv_9223 with PID 41528 started at Wed Sep 28 02:45:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #980: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41528 at Wed Sep 28 02:45:17 UTC 2022 kill -USR1 41528 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41528 killed at Wed Sep 28 02:45:17 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:45:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:45:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41580 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41580 found at Wed Sep 28 02:45:17 UTC 2022 selfserv_9223 with PID 41580 started at Wed Sep 28 02:45:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #981: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41580 at Wed Sep 28 02:45:28 UTC 2022 kill -USR1 41580 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41580 killed at Wed Sep 28 02:45:28 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:45:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:45:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41632 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41632 found at Wed Sep 28 02:45:29 UTC 2022 selfserv_9223 with PID 41632 started at Wed Sep 28 02:45:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #982: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 41632 at Wed Sep 28 02:45:37 UTC 2022 kill -USR1 41632 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41632 killed at Wed Sep 28 02:45:38 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:45:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:45:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41699 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41699 found at Wed Sep 28 02:45:38 UTC 2022 selfserv_9223 with PID 41699 started at Wed Sep 28 02:45:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #983: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41699 at Wed Sep 28 02:45:49 UTC 2022 kill -USR1 41699 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41699 killed at Wed Sep 28 02:45:49 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:45:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:45:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41751 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41751 found at Wed Sep 28 02:45:49 UTC 2022 selfserv_9223 with PID 41751 started at Wed Sep 28 02:45:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #984: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41751 at Wed Sep 28 02:45:58 UTC 2022 kill -USR1 41751 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41751 killed at Wed Sep 28 02:45:58 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:45:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:45:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41803 found at Wed Sep 28 02:45:59 UTC 2022 selfserv_9223 with PID 41803 started at Wed Sep 28 02:45:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #985: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41803 at Wed Sep 28 02:46:10 UTC 2022 kill -USR1 41803 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41803 killed at Wed Sep 28 02:46:10 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:46:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:46:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41855 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41855 found at Wed Sep 28 02:46:10 UTC 2022 selfserv_9223 with PID 41855 started at Wed Sep 28 02:46:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #986: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 41855 at Wed Sep 28 02:46:19 UTC 2022 kill -USR1 41855 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41855 killed at Wed Sep 28 02:46:19 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:46:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:46:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41907 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41907 found at Wed Sep 28 02:46:20 UTC 2022 selfserv_9223 with PID 41907 started at Wed Sep 28 02:46:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #987: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41907 at Wed Sep 28 02:46:30 UTC 2022 kill -USR1 41907 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41907 killed at Wed Sep 28 02:46:31 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:46:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:46:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41960 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41960 found at Wed Sep 28 02:46:31 UTC 2022 selfserv_9223 with PID 41960 started at Wed Sep 28 02:46:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #988: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41960 at Wed Sep 28 02:46:40 UTC 2022 kill -USR1 41960 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41960 killed at Wed Sep 28 02:46:40 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:46:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:46:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42036 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42036 found at Wed Sep 28 02:46:41 UTC 2022 selfserv_9223 with PID 42036 started at Wed Sep 28 02:46:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #989: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42036 at Wed Sep 28 02:46:51 UTC 2022 kill -USR1 42036 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42036 killed at Wed Sep 28 02:46:52 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:46:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:46:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42089 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42089 found at Wed Sep 28 02:46:52 UTC 2022 selfserv_9223 with PID 42089 started at Wed Sep 28 02:46:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #990: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 42089 at Wed Sep 28 02:47:01 UTC 2022 kill -USR1 42089 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42089 killed at Wed Sep 28 02:47:01 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:47:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:47:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42141 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42141 found at Wed Sep 28 02:47:02 UTC 2022 selfserv_9223 with PID 42141 started at Wed Sep 28 02:47:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #991: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42141 at Wed Sep 28 02:47:12 UTC 2022 kill -USR1 42141 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42141 killed at Wed Sep 28 02:47:13 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:47:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:47:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42193 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42193 found at Wed Sep 28 02:47:13 UTC 2022 selfserv_9223 with PID 42193 started at Wed Sep 28 02:47:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #992: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42193 at Wed Sep 28 02:47:22 UTC 2022 kill -USR1 42193 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42193 killed at Wed Sep 28 02:47:22 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:47:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:47:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42245 found at Wed Sep 28 02:47:23 UTC 2022 selfserv_9223 with PID 42245 started at Wed Sep 28 02:47:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #993: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42245 at Wed Sep 28 02:47:34 UTC 2022 kill -USR1 42245 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42245 killed at Wed Sep 28 02:47:34 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:47:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:47:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42317 found at Wed Sep 28 02:47:34 UTC 2022 selfserv_9223 with PID 42317 started at Wed Sep 28 02:47:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #994: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 42317 at Wed Sep 28 02:47:43 UTC 2022 kill -USR1 42317 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42317 killed at Wed Sep 28 02:47:43 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:47:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:47:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42369 found at Wed Sep 28 02:47:44 UTC 2022 selfserv_9223 with PID 42369 started at Wed Sep 28 02:47:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #995: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42369 at Wed Sep 28 02:47:55 UTC 2022 kill -USR1 42369 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42369 killed at Wed Sep 28 02:47:55 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:47:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:47:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42421 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42421 found at Wed Sep 28 02:47:55 UTC 2022 selfserv_9223 with PID 42421 started at Wed Sep 28 02:47:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #996: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42421 at Wed Sep 28 02:48:04 UTC 2022 kill -USR1 42421 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42421 killed at Wed Sep 28 02:48:04 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:48:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:48:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42473 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42473 found at Wed Sep 28 02:48:05 UTC 2022 selfserv_9223 with PID 42473 started at Wed Sep 28 02:48:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #997: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42473 at Wed Sep 28 02:48:16 UTC 2022 kill -USR1 42473 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42473 killed at Wed Sep 28 02:48:16 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:48:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:48:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42525 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42525 found at Wed Sep 28 02:48:16 UTC 2022 selfserv_9223 with PID 42525 started at Wed Sep 28 02:48:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #998: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 42525 at Wed Sep 28 02:48:25 UTC 2022 kill -USR1 42525 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42525 killed at Wed Sep 28 02:48:25 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:48:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:48:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42577 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42577 found at Wed Sep 28 02:48:26 UTC 2022 selfserv_9223 with PID 42577 started at Wed Sep 28 02:48:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #999: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42577 at Wed Sep 28 02:48:37 UTC 2022 kill -USR1 42577 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42577 killed at Wed Sep 28 02:48:37 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:48:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:48:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42645 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42645 found at Wed Sep 28 02:48:37 UTC 2022 selfserv_9223 with PID 42645 started at Wed Sep 28 02:48:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1000: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42645 at Wed Sep 28 02:48:48 UTC 2022 kill -USR1 42645 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42645 killed at Wed Sep 28 02:48:48 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:48:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:48:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42699 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42699 found at Wed Sep 28 02:48:49 UTC 2022 selfserv_9223 with PID 42699 started at Wed Sep 28 02:48:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1001: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42699 at Wed Sep 28 02:49:00 UTC 2022 kill -USR1 42699 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42699 killed at Wed Sep 28 02:49:00 UTC 2022 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Wed Sep 28 02:49:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:49:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42782 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42782 found at Wed Sep 28 02:49:00 UTC 2022 selfserv_9223 with PID 42782 started at Wed Sep 28 02:49:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42782 at Wed Sep 28 02:49:07 UTC 2022 kill -USR1 42782 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42782 killed at Wed Sep 28 02:49:07 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:49:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:49:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42825 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42825 found at Wed Sep 28 02:49:08 UTC 2022 selfserv_9223 with PID 42825 started at Wed Sep 28 02:49:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42825 at Wed Sep 28 02:49:13 UTC 2022 kill -USR1 42825 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42825 killed at Wed Sep 28 02:49:13 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:49:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:49:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42864 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42864 found at Wed Sep 28 02:49:13 UTC 2022 selfserv_9223 with PID 42864 started at Wed Sep 28 02:49:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #946: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 42864 at Wed Sep 28 02:49:18 UTC 2022 kill -USR1 42864 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42864 killed at Wed Sep 28 02:49:18 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:49:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:49:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42903 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42903 found at Wed Sep 28 02:49:19 UTC 2022 selfserv_9223 with PID 42903 started at Wed Sep 28 02:49:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #947: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42903 at Wed Sep 28 02:49:24 UTC 2022 kill -USR1 42903 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42903 killed at Wed Sep 28 02:49:24 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:49:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:49:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42942 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42942 found at Wed Sep 28 02:49:24 UTC 2022 selfserv_9223 with PID 42942 started at Wed Sep 28 02:49:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #948: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 42942 at Wed Sep 28 02:49:29 UTC 2022 kill -USR1 42942 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42942 killed at Wed Sep 28 02:49:30 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:49:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:49:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42981 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42981 found at Wed Sep 28 02:49:30 UTC 2022 selfserv_9223 with PID 42981 started at Wed Sep 28 02:49:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42981 at Wed Sep 28 02:49:35 UTC 2022 kill -USR1 42981 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42981 killed at Wed Sep 28 02:49:35 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:49:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:49:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 43035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43035 found at Wed Sep 28 02:49:36 UTC 2022 selfserv_9223 with PID 43035 started at Wed Sep 28 02:49:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 43035 at Wed Sep 28 02:49:40 UTC 2022 kill -USR1 43035 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 43035 killed at Wed Sep 28 02:49:41 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:49:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:49:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 43074 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43074 found at Wed Sep 28 02:49:41 UTC 2022 selfserv_9223 with PID 43074 started at Wed Sep 28 02:49:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 43074 at Wed Sep 28 02:49:46 UTC 2022 kill -USR1 43074 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 43074 killed at Wed Sep 28 02:49:46 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:49:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:49:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 43113 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43113 found at Wed Sep 28 02:49:47 UTC 2022 selfserv_9223 with PID 43113 started at Wed Sep 28 02:49:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 43113 at Wed Sep 28 02:49:52 UTC 2022 kill -USR1 43113 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 43113 killed at Wed Sep 28 02:49:52 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:49:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:49:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 43152 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43152 found at Wed Sep 28 02:49:52 UTC 2022 selfserv_9223 with PID 43152 started at Wed Sep 28 02:49:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #953: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 43152 at Wed Sep 28 02:49:57 UTC 2022 kill -USR1 43152 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 43152 killed at Wed Sep 28 02:49:57 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:49:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:49:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 43191 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43191 found at Wed Sep 28 02:49:58 UTC 2022 selfserv_9223 with PID 43191 started at Wed Sep 28 02:49:58 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #954: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 43191 at Wed Sep 28 02:50:03 UTC 2022 kill -USR1 43191 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 43191 killed at Wed Sep 28 02:50:03 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:50:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:50:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 43231 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43231 found at Wed Sep 28 02:50:03 UTC 2022 selfserv_9223 with PID 43231 started at Wed Sep 28 02:50:03 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #955: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 43231 at Wed Sep 28 02:50:08 UTC 2022 kill -USR1 43231 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 43231 killed at Wed Sep 28 02:50:08 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:50:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:50:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 43271 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43271 found at Wed Sep 28 02:50:09 UTC 2022 selfserv_9223 with PID 43271 started at Wed Sep 28 02:50:09 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #956: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 43271 at Wed Sep 28 02:50:14 UTC 2022 kill -USR1 43271 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 43271 killed at Wed Sep 28 02:50:14 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:50:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:50:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 43311 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43311 found at Wed Sep 28 02:50:14 UTC 2022 selfserv_9223 with PID 43311 started at Wed Sep 28 02:50:14 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #957: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 43311 at Wed Sep 28 02:50:19 UTC 2022 kill -USR1 43311 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 43311 killed at Wed Sep 28 02:50:20 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:50:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:50:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 43351 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43351 found at Wed Sep 28 02:50:20 UTC 2022 selfserv_9223 with PID 43351 started at Wed Sep 28 02:50:20 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #958: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 43351 at Wed Sep 28 02:50:25 UTC 2022 kill -USR1 43351 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 43351 killed at Wed Sep 28 02:50:25 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:50:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:50:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 43391 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43391 found at Wed Sep 28 02:50:26 UTC 2022 selfserv_9223 with PID 43391 started at Wed Sep 28 02:50:26 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #959: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 43391 at Wed Sep 28 02:50:30 UTC 2022 kill -USR1 43391 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 43391 killed at Wed Sep 28 02:50:31 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:50:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:50:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 43431 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43431 found at Wed Sep 28 02:50:31 UTC 2022 selfserv_9223 with PID 43431 started at Wed Sep 28 02:50:31 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #960: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 43431 at Wed Sep 28 02:50:36 UTC 2022 kill -USR1 43431 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 43431 killed at Wed Sep 28 02:50:36 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:50:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:50:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 43486 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43486 found at Wed Sep 28 02:50:37 UTC 2022 selfserv_9223 with PID 43486 started at Wed Sep 28 02:50:37 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #961: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 43486 at Wed Sep 28 02:50:42 UTC 2022 kill -USR1 43486 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 43486 killed at Wed Sep 28 02:50:42 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:50:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:50:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 43526 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43526 found at Wed Sep 28 02:50:42 UTC 2022 selfserv_9223 with PID 43526 started at Wed Sep 28 02:50:42 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #962: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 43526 at Wed Sep 28 02:50:47 UTC 2022 kill -USR1 43526 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 43526 killed at Wed Sep 28 02:50:47 UTC 2022 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -fips true -force FIPS mode enabled. ssl.sh: #963: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -list ssl.sh: #964: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #965: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -fips true -force FIPS mode enabled. ssl.sh: #966: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -list ssl.sh: #967: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #968: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9223 starting at Wed Sep 28 02:50:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:50:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 43611 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43611 found at Wed Sep 28 02:50:49 UTC 2022 selfserv_9223 with PID 43611 started at Wed Sep 28 02:50:49 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #969: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #970: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #971: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #972: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #973: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #974: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #975: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #976: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #977: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #978: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #979: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #980: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #981: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #982: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #983: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #984: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #985: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #986: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #987: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #988: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #989: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #990: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #991: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #992: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #993: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #994: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #995: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #996: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #997: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #998: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #999: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1000: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1001: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1002: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1003: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1004: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1005: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1006: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1007: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1008: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1009: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1010: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1011: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1012: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1013: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1014: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1015: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1016: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1017: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1018: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1019: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 43611 at Wed Sep 28 02:51:12 UTC 2022 kill -USR1 43611 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 43611 killed at Wed Sep 28 02:51:13 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Wed Sep 28 02:51:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:51:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 44160 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44160 found at Wed Sep 28 02:51:13 UTC 2022 selfserv_9223 with PID 44160 started at Wed Sep 28 02:51:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1020: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1021: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1022: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1023: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1024: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1025: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1026: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1027: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1028: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1029: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1030: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1031: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1032: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1033: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1034: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1035: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1036: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1037: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1038: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1039: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1040: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1041: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1042: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1043: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1044: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1045: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1046: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1047: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1048: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1049: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1050: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1051: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1052: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1053: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1054: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1055: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1056: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1057: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1058: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1059: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1060: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1061: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1062: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1063: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1064: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1065: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1066: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1067: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1068: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1069: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1070: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1071: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1072: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1073: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1074: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1075: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1076: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1077: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1078: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1079: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1080: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1081: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1082: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1083: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1084: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1085: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1086: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1087: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1088: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1089: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1090: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1091: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1092: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1093: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1094: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1095: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 44160 at Wed Sep 28 02:51:47 UTC 2022 kill -USR1 44160 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 44160 killed at Wed Sep 28 02:51:48 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9223 starting at Wed Sep 28 02:51:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:51:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 44974 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44974 found at Wed Sep 28 02:51:48 UTC 2022 selfserv_9223 with PID 44974 started at Wed Sep 28 02:51:48 UTC 2022 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1096: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 44974 at Wed Sep 28 02:51:51 UTC 2022 kill -USR1 44974 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 44974 killed at Wed Sep 28 02:51:51 UTC 2022 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:51:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:51:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45040 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45040 found at Wed Sep 28 02:51:52 UTC 2022 selfserv_9223 with PID 45040 started at Wed Sep 28 02:51:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1096: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45040 at Wed Sep 28 02:51:56 UTC 2022 kill -USR1 45040 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45040 killed at Wed Sep 28 02:51:57 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:51:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:51:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45092 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45092 found at Wed Sep 28 02:51:57 UTC 2022 selfserv_9223 with PID 45092 started at Wed Sep 28 02:51:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45092 at Wed Sep 28 02:52:01 UTC 2022 kill -USR1 45092 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45092 killed at Wed Sep 28 02:52:01 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:52:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:52:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45144 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45144 found at Wed Sep 28 02:52:02 UTC 2022 selfserv_9223 with PID 45144 started at Wed Sep 28 02:52:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45144 at Wed Sep 28 02:52:08 UTC 2022 kill -USR1 45144 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45144 killed at Wed Sep 28 02:52:08 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:52:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:52:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45196 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45196 found at Wed Sep 28 02:52:09 UTC 2022 selfserv_9223 with PID 45196 started at Wed Sep 28 02:52:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1099: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 45196 at Wed Sep 28 02:52:13 UTC 2022 kill -USR1 45196 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45196 killed at Wed Sep 28 02:52:13 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:52:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:52:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45248 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45248 found at Wed Sep 28 02:52:14 UTC 2022 selfserv_9223 with PID 45248 started at Wed Sep 28 02:52:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1100: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 45248 at Wed Sep 28 02:52:18 UTC 2022 kill -USR1 45248 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45248 killed at Wed Sep 28 02:52:18 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:52:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:52:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45300 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45300 found at Wed Sep 28 02:52:19 UTC 2022 selfserv_9223 with PID 45300 started at Wed Sep 28 02:52:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45300 at Wed Sep 28 02:52:25 UTC 2022 kill -USR1 45300 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45300 killed at Wed Sep 28 02:52:25 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:52:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:52:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45352 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45352 found at Wed Sep 28 02:52:26 UTC 2022 selfserv_9223 with PID 45352 started at Wed Sep 28 02:52:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1102: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45352 at Wed Sep 28 02:52:30 UTC 2022 kill -USR1 45352 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45352 killed at Wed Sep 28 02:52:30 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:52:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:52:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45404 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45404 found at Wed Sep 28 02:52:31 UTC 2022 selfserv_9223 with PID 45404 started at Wed Sep 28 02:52:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45404 at Wed Sep 28 02:52:35 UTC 2022 kill -USR1 45404 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45404 killed at Wed Sep 28 02:52:35 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:52:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:52:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45471 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45471 found at Wed Sep 28 02:52:36 UTC 2022 selfserv_9223 with PID 45471 started at Wed Sep 28 02:52:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45471 at Wed Sep 28 02:52:41 UTC 2022 kill -USR1 45471 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45471 killed at Wed Sep 28 02:52:41 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:52:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:52:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45523 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45523 found at Wed Sep 28 02:52:42 UTC 2022 selfserv_9223 with PID 45523 started at Wed Sep 28 02:52:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1105: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 45523 at Wed Sep 28 02:52:46 UTC 2022 kill -USR1 45523 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45523 killed at Wed Sep 28 02:52:47 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:52:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:52:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45575 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45575 found at Wed Sep 28 02:52:47 UTC 2022 selfserv_9223 with PID 45575 started at Wed Sep 28 02:52:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1106: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 45575 at Wed Sep 28 02:52:51 UTC 2022 kill -USR1 45575 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45575 killed at Wed Sep 28 02:52:51 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:52:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:52:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45627 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45627 found at Wed Sep 28 02:52:52 UTC 2022 selfserv_9223 with PID 45627 started at Wed Sep 28 02:52:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45627 at Wed Sep 28 02:52:58 UTC 2022 kill -USR1 45627 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45627 killed at Wed Sep 28 02:52:58 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:52:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:52:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45679 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45679 found at Wed Sep 28 02:52:58 UTC 2022 selfserv_9223 with PID 45679 started at Wed Sep 28 02:52:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1108: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45679 at Wed Sep 28 02:53:03 UTC 2022 kill -USR1 45679 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45679 killed at Wed Sep 28 02:53:03 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:53:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:53:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45731 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45731 found at Wed Sep 28 02:53:03 UTC 2022 selfserv_9223 with PID 45731 started at Wed Sep 28 02:53:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45731 at Wed Sep 28 02:53:08 UTC 2022 kill -USR1 45731 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45731 killed at Wed Sep 28 02:53:08 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:53:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:53:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45783 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45783 found at Wed Sep 28 02:53:08 UTC 2022 selfserv_9223 with PID 45783 started at Wed Sep 28 02:53:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45783 at Wed Sep 28 02:53:15 UTC 2022 kill -USR1 45783 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45783 killed at Wed Sep 28 02:53:15 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:53:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:53:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45835 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45835 found at Wed Sep 28 02:53:15 UTC 2022 selfserv_9223 with PID 45835 started at Wed Sep 28 02:53:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1111: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 45835 at Wed Sep 28 02:53:20 UTC 2022 kill -USR1 45835 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45835 killed at Wed Sep 28 02:53:20 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:53:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:53:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45891 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45891 found at Wed Sep 28 02:53:21 UTC 2022 selfserv_9223 with PID 45891 started at Wed Sep 28 02:53:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1112: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 45891 at Wed Sep 28 02:53:25 UTC 2022 kill -USR1 45891 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45891 killed at Wed Sep 28 02:53:25 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:53:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:53:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45943 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45943 found at Wed Sep 28 02:53:26 UTC 2022 selfserv_9223 with PID 45943 started at Wed Sep 28 02:53:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45943 at Wed Sep 28 02:53:32 UTC 2022 kill -USR1 45943 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45943 killed at Wed Sep 28 02:53:32 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:53:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:53:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45995 found at Wed Sep 28 02:53:33 UTC 2022 selfserv_9223 with PID 45995 started at Wed Sep 28 02:53:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1114: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45995 at Wed Sep 28 02:53:37 UTC 2022 kill -USR1 45995 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45995 killed at Wed Sep 28 02:53:38 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:53:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:53:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46062 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46062 found at Wed Sep 28 02:53:38 UTC 2022 selfserv_9223 with PID 46062 started at Wed Sep 28 02:53:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1115: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46062 at Wed Sep 28 02:53:42 UTC 2022 kill -USR1 46062 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46062 killed at Wed Sep 28 02:53:43 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:53:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:53:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46114 found at Wed Sep 28 02:53:43 UTC 2022 selfserv_9223 with PID 46114 started at Wed Sep 28 02:53:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1116: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46114 at Wed Sep 28 02:53:49 UTC 2022 kill -USR1 46114 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46114 killed at Wed Sep 28 02:53:50 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:53:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:53:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46166 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46166 found at Wed Sep 28 02:53:50 UTC 2022 selfserv_9223 with PID 46166 started at Wed Sep 28 02:53:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1117: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 46166 at Wed Sep 28 02:53:55 UTC 2022 kill -USR1 46166 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46166 killed at Wed Sep 28 02:53:55 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:53:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:53:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46219 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46219 found at Wed Sep 28 02:53:55 UTC 2022 selfserv_9223 with PID 46219 started at Wed Sep 28 02:53:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1118: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 46219 at Wed Sep 28 02:54:00 UTC 2022 kill -USR1 46219 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46219 killed at Wed Sep 28 02:54:00 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:54:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:54:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46272 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46272 found at Wed Sep 28 02:54:00 UTC 2022 selfserv_9223 with PID 46272 started at Wed Sep 28 02:54:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1119: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46272 at Wed Sep 28 02:54:07 UTC 2022 kill -USR1 46272 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46272 killed at Wed Sep 28 02:54:07 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:54:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:54:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46324 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46324 found at Wed Sep 28 02:54:07 UTC 2022 selfserv_9223 with PID 46324 started at Wed Sep 28 02:54:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1120: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46324 at Wed Sep 28 02:54:12 UTC 2022 kill -USR1 46324 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46324 killed at Wed Sep 28 02:54:12 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:54:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:54:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46376 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46376 found at Wed Sep 28 02:54:13 UTC 2022 selfserv_9223 with PID 46376 started at Wed Sep 28 02:54:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1121: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46376 at Wed Sep 28 02:54:17 UTC 2022 kill -USR1 46376 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46376 killed at Wed Sep 28 02:54:17 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:54:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:54:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46428 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46428 found at Wed Sep 28 02:54:17 UTC 2022 selfserv_9223 with PID 46428 started at Wed Sep 28 02:54:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1122: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46428 at Wed Sep 28 02:54:23 UTC 2022 kill -USR1 46428 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46428 killed at Wed Sep 28 02:54:23 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:54:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:54:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46480 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46480 found at Wed Sep 28 02:54:24 UTC 2022 selfserv_9223 with PID 46480 started at Wed Sep 28 02:54:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1123: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 46480 at Wed Sep 28 02:54:29 UTC 2022 kill -USR1 46480 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46480 killed at Wed Sep 28 02:54:29 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:54:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:54:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46532 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46532 found at Wed Sep 28 02:54:29 UTC 2022 selfserv_9223 with PID 46532 started at Wed Sep 28 02:54:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1124: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 46532 at Wed Sep 28 02:54:34 UTC 2022 kill -USR1 46532 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46532 killed at Wed Sep 28 02:54:34 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:54:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:54:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46600 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46600 found at Wed Sep 28 02:54:34 UTC 2022 selfserv_9223 with PID 46600 started at Wed Sep 28 02:54:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1125: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46600 at Wed Sep 28 02:54:40 UTC 2022 kill -USR1 46600 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46600 killed at Wed Sep 28 02:54:40 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:54:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:54:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46652 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46652 found at Wed Sep 28 02:54:41 UTC 2022 selfserv_9223 with PID 46652 started at Wed Sep 28 02:54:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1126: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46652 at Wed Sep 28 02:54:46 UTC 2022 kill -USR1 46652 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46652 killed at Wed Sep 28 02:54:46 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:54:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:54:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46704 found at Wed Sep 28 02:54:47 UTC 2022 selfserv_9223 with PID 46704 started at Wed Sep 28 02:54:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1127: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46704 at Wed Sep 28 02:54:52 UTC 2022 kill -USR1 46704 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46704 killed at Wed Sep 28 02:54:53 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:54:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:54:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46756 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46756 found at Wed Sep 28 02:54:53 UTC 2022 selfserv_9223 with PID 46756 started at Wed Sep 28 02:54:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1128: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46756 at Wed Sep 28 02:54:57 UTC 2022 kill -USR1 46756 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46756 killed at Wed Sep 28 02:54:58 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 02:54:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:54:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46809 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46809 found at Wed Sep 28 02:54:58 UTC 2022 selfserv_9223 with PID 46809 started at Wed Sep 28 02:54:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1129: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 46809 at Wed Sep 28 02:55:03 UTC 2022 kill -USR1 46809 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46809 killed at Wed Sep 28 02:55:03 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:55:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:55:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46861 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46861 found at Wed Sep 28 02:55:03 UTC 2022 selfserv_9223 with PID 46861 started at Wed Sep 28 02:55:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1130: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46861 at Wed Sep 28 02:55:09 UTC 2022 kill -USR1 46861 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46861 killed at Wed Sep 28 02:55:09 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:55:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:55:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46913 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46913 found at Wed Sep 28 02:55:09 UTC 2022 selfserv_9223 with PID 46913 started at Wed Sep 28 02:55:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1131: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46913 at Wed Sep 28 02:55:15 UTC 2022 kill -USR1 46913 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46913 killed at Wed Sep 28 02:55:16 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:55:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:55:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46965 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46965 found at Wed Sep 28 02:55:16 UTC 2022 selfserv_9223 with PID 46965 started at Wed Sep 28 02:55:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1132: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46965 at Wed Sep 28 02:55:20 UTC 2022 kill -USR1 46965 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46965 killed at Wed Sep 28 02:55:20 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:55:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:55:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47017 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47017 found at Wed Sep 28 02:55:21 UTC 2022 selfserv_9223 with PID 47017 started at Wed Sep 28 02:55:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1133: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47017 at Wed Sep 28 02:55:25 UTC 2022 kill -USR1 47017 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47017 killed at Wed Sep 28 02:55:26 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:55:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:55:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47070 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47070 found at Wed Sep 28 02:55:26 UTC 2022 selfserv_9223 with PID 47070 started at Wed Sep 28 02:55:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1134: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 47070 at Wed Sep 28 02:55:30 UTC 2022 kill -USR1 47070 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47070 killed at Wed Sep 28 02:55:30 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:55:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:55:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47122 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47122 found at Wed Sep 28 02:55:31 UTC 2022 selfserv_9223 with PID 47122 started at Wed Sep 28 02:55:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1135: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47122 at Wed Sep 28 02:55:35 UTC 2022 kill -USR1 47122 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47122 killed at Wed Sep 28 02:55:35 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:55:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:55:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47189 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47189 found at Wed Sep 28 02:55:36 UTC 2022 selfserv_9223 with PID 47189 started at Wed Sep 28 02:55:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1136: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47189 at Wed Sep 28 02:55:40 UTC 2022 kill -USR1 47189 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47189 killed at Wed Sep 28 02:55:40 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:55:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:55:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47241 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47241 found at Wed Sep 28 02:55:41 UTC 2022 selfserv_9223 with PID 47241 started at Wed Sep 28 02:55:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1137: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47241 at Wed Sep 28 02:55:46 UTC 2022 kill -USR1 47241 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47241 killed at Wed Sep 28 02:55:46 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:55:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:55:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47293 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47293 found at Wed Sep 28 02:55:46 UTC 2022 selfserv_9223 with PID 47293 started at Wed Sep 28 02:55:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1138: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 47293 at Wed Sep 28 02:55:50 UTC 2022 kill -USR1 47293 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47293 killed at Wed Sep 28 02:55:51 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:55:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:55:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47345 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47345 found at Wed Sep 28 02:55:51 UTC 2022 selfserv_9223 with PID 47345 started at Wed Sep 28 02:55:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1139: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47345 at Wed Sep 28 02:55:56 UTC 2022 kill -USR1 47345 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47345 killed at Wed Sep 28 02:55:56 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:55:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:55:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47397 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47397 found at Wed Sep 28 02:55:57 UTC 2022 selfserv_9223 with PID 47397 started at Wed Sep 28 02:55:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1140: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47397 at Wed Sep 28 02:56:01 UTC 2022 kill -USR1 47397 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47397 killed at Wed Sep 28 02:56:01 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:56:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:56:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47449 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47449 found at Wed Sep 28 02:56:02 UTC 2022 selfserv_9223 with PID 47449 started at Wed Sep 28 02:56:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1141: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47449 at Wed Sep 28 02:56:06 UTC 2022 kill -USR1 47449 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47449 killed at Wed Sep 28 02:56:06 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:56:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:56:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47501 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47501 found at Wed Sep 28 02:56:07 UTC 2022 selfserv_9223 with PID 47501 started at Wed Sep 28 02:56:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1142: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 47501 at Wed Sep 28 02:56:11 UTC 2022 kill -USR1 47501 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47501 killed at Wed Sep 28 02:56:11 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:56:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:56:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47553 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47553 found at Wed Sep 28 02:56:12 UTC 2022 selfserv_9223 with PID 47553 started at Wed Sep 28 02:56:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1143: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47553 at Wed Sep 28 02:56:16 UTC 2022 kill -USR1 47553 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47553 killed at Wed Sep 28 02:56:16 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:56:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:56:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47605 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47605 found at Wed Sep 28 02:56:17 UTC 2022 selfserv_9223 with PID 47605 started at Wed Sep 28 02:56:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1144: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47605 at Wed Sep 28 02:56:21 UTC 2022 kill -USR1 47605 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47605 killed at Wed Sep 28 02:56:21 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:56:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:56:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47657 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47657 found at Wed Sep 28 02:56:22 UTC 2022 selfserv_9223 with PID 47657 started at Wed Sep 28 02:56:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47657 at Wed Sep 28 02:56:26 UTC 2022 kill -USR1 47657 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47657 killed at Wed Sep 28 02:56:27 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:56:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:56:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47709 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47709 found at Wed Sep 28 02:56:27 UTC 2022 selfserv_9223 with PID 47709 started at Wed Sep 28 02:56:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1146: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 47709 at Wed Sep 28 02:56:31 UTC 2022 kill -USR1 47709 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47709 killed at Wed Sep 28 02:56:32 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:56:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:56:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47761 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47761 found at Wed Sep 28 02:56:32 UTC 2022 selfserv_9223 with PID 47761 started at Wed Sep 28 02:56:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1147: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47761 at Wed Sep 28 02:56:37 UTC 2022 kill -USR1 47761 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47761 killed at Wed Sep 28 02:56:37 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:56:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:56:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47828 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47828 found at Wed Sep 28 02:56:37 UTC 2022 selfserv_9223 with PID 47828 started at Wed Sep 28 02:56:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1148: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47828 at Wed Sep 28 02:56:42 UTC 2022 kill -USR1 47828 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47828 killed at Wed Sep 28 02:56:42 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:56:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:56:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47880 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47880 found at Wed Sep 28 02:56:42 UTC 2022 selfserv_9223 with PID 47880 started at Wed Sep 28 02:56:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1149: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47880 at Wed Sep 28 02:56:47 UTC 2022 kill -USR1 47880 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47880 killed at Wed Sep 28 02:56:47 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 02:56:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:56:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47932 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47932 found at Wed Sep 28 02:56:48 UTC 2022 selfserv_9223 with PID 47932 started at Wed Sep 28 02:56:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1150: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 47932 at Wed Sep 28 02:56:52 UTC 2022 kill -USR1 47932 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47932 killed at Wed Sep 28 02:56:52 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:56:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:56:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47984 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47984 found at Wed Sep 28 02:56:53 UTC 2022 selfserv_9223 with PID 47984 started at Wed Sep 28 02:56:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1151: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47984 at Wed Sep 28 02:56:58 UTC 2022 kill -USR1 47984 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47984 killed at Wed Sep 28 02:56:58 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:56:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:56:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48036 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48036 found at Wed Sep 28 02:56:59 UTC 2022 selfserv_9223 with PID 48036 started at Wed Sep 28 02:56:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1152: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48036 at Wed Sep 28 02:57:04 UTC 2022 kill -USR1 48036 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48036 killed at Wed Sep 28 02:57:04 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 02:57:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:57:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48088 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48088 found at Wed Sep 28 02:57:05 UTC 2022 selfserv_9223 with PID 48088 started at Wed Sep 28 02:57:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1153: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48088 at Wed Sep 28 02:57:10 UTC 2022 kill -USR1 48088 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48088 killed at Wed Sep 28 02:57:10 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 02:57:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:57:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48146 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48146 found at Wed Sep 28 02:57:10 UTC 2022 selfserv_9223 with PID 48146 started at Wed Sep 28 02:57:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1154: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48146 at Wed Sep 28 02:57:16 UTC 2022 kill -USR1 48146 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48146 killed at Wed Sep 28 02:57:16 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Wed Sep 28 02:57:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:57:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48204 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48204 found at Wed Sep 28 02:57:16 UTC 2022 selfserv_9223 with PID 48204 started at Wed Sep 28 02:57:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1155: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48204 at Wed Sep 28 02:57:23 UTC 2022 kill -USR1 48204 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48204 killed at Wed Sep 28 02:57:24 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Wed Sep 28 02:57:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:57:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48262 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48262 found at Wed Sep 28 02:57:24 UTC 2022 selfserv_9223 with PID 48262 started at Wed Sep 28 02:57:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1156: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 48262 at Wed Sep 28 02:57:28 UTC 2022 kill -USR1 48262 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48262 killed at Wed Sep 28 02:57:28 UTC 2022 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 02:57:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:57:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48320 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48320 found at Wed Sep 28 02:57:28 UTC 2022 selfserv_9223 with PID 48320 started at Wed Sep 28 02:57:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1157: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48320 at Wed Sep 28 02:57:34 UTC 2022 kill -USR1 48320 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48320 killed at Wed Sep 28 02:57:34 UTC 2022 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9223 starting at Wed Sep 28 02:57:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:57:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48393 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48393 found at Wed Sep 28 02:57:35 UTC 2022 selfserv_9223 with PID 48393 started at Wed Sep 28 02:57:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1158: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 48393 at Wed Sep 28 02:57:39 UTC 2022 kill -USR1 48393 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48393 killed at Wed Sep 28 02:57:39 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 02:57:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:57:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48451 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48451 found at Wed Sep 28 02:57:39 UTC 2022 selfserv_9223 with PID 48451 started at Wed Sep 28 02:57:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1159: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48451 at Wed Sep 28 02:57:45 UTC 2022 kill -USR1 48451 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48451 killed at Wed Sep 28 02:57:45 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Wed Sep 28 02:57:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:57:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48509 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48509 found at Wed Sep 28 02:57:46 UTC 2022 selfserv_9223 with PID 48509 started at Wed Sep 28 02:57:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1160: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48509 at Wed Sep 28 02:57:53 UTC 2022 kill -USR1 48509 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48509 killed at Wed Sep 28 02:57:53 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9223 starting at Wed Sep 28 02:57:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:57:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48567 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48567 found at Wed Sep 28 02:57:53 UTC 2022 selfserv_9223 with PID 48567 started at Wed Sep 28 02:57:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1161: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 48567 at Wed Sep 28 02:57:59 UTC 2022 kill -USR1 48567 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48567 killed at Wed Sep 28 02:57:59 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9223 starting at Wed Sep 28 02:57:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:57:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48625 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48625 found at Wed Sep 28 02:57:59 UTC 2022 selfserv_9223 with PID 48625 started at Wed Sep 28 02:57:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1162: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 48625 at Wed Sep 28 02:58:05 UTC 2022 kill -USR1 48625 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48625 killed at Wed Sep 28 02:58:05 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Wed Sep 28 02:58:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:58:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48684 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48684 found at Wed Sep 28 02:58:05 UTC 2022 selfserv_9223 with PID 48684 started at Wed Sep 28 02:58:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1163: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 48684 at Wed Sep 28 02:58:09 UTC 2022 kill -USR1 48684 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48684 killed at Wed Sep 28 02:58:09 UTC 2022 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9223 starting at Wed Sep 28 02:58:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:58:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48726 found at Wed Sep 28 02:58:10 UTC 2022 selfserv_9223 with PID 48726 started at Wed Sep 28 02:58:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1096: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48726 at Wed Sep 28 02:58:15 UTC 2022 kill -USR1 48726 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48726 killed at Wed Sep 28 02:58:15 UTC 2022 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9223 starting at Wed Sep 28 02:58:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:58:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48768 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48768 found at Wed Sep 28 02:58:15 UTC 2022 selfserv_9223 with PID 48768 started at Wed Sep 28 02:58:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1097: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9223 with PID 48768 at Wed Sep 28 02:58:21 UTC 2022 kill -USR1 48768 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48768 killed at Wed Sep 28 02:58:21 UTC 2022 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9223 starting at Wed Sep 28 02:58:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:58:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48810 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48810 found at Wed Sep 28 02:58:21 UTC 2022 selfserv_9223 with PID 48810 started at Wed Sep 28 02:58:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1098: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 48810 at Wed Sep 28 02:58:27 UTC 2022 kill -USR1 48810 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48810 killed at Wed Sep 28 02:58:27 UTC 2022 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9223 starting at Wed Sep 28 02:58:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:58:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48852 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48852 found at Wed Sep 28 02:58:27 UTC 2022 selfserv_9223 with PID 48852 started at Wed Sep 28 02:58:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1099: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 48852 at Wed Sep 28 02:58:31 UTC 2022 kill -USR1 48852 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48852 killed at Wed Sep 28 02:58:31 UTC 2022 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9223 starting at Wed Sep 28 02:58:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:58:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48894 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48894 found at Wed Sep 28 02:58:32 UTC 2022 selfserv_9223 with PID 48894 started at Wed Sep 28 02:58:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1100: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 48894 at Wed Sep 28 02:58:36 UTC 2022 kill -USR1 48894 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48894 killed at Wed Sep 28 02:58:36 UTC 2022 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9223 starting at Wed Sep 28 02:58:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:58:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48951 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48951 found at Wed Sep 28 02:58:36 UTC 2022 selfserv_9223 with PID 48951 started at Wed Sep 28 02:58:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1101: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 48951 at Wed Sep 28 02:58:40 UTC 2022 kill -USR1 48951 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48951 killed at Wed Sep 28 02:58:40 UTC 2022 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9223 starting at Wed Sep 28 02:58:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:58:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48993 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48993 found at Wed Sep 28 02:58:41 UTC 2022 selfserv_9223 with PID 48993 started at Wed Sep 28 02:58:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1102: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 48993 at Wed Sep 28 02:58:45 UTC 2022 kill -USR1 48993 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48993 killed at Wed Sep 28 02:58:45 UTC 2022 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9223 starting at Wed Sep 28 02:58:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:58:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 49035 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 49035 found at Wed Sep 28 02:58:45 UTC 2022 selfserv_9223 with PID 49035 started at Wed Sep 28 02:58:45 UTC 2022 strsclnt -q -p 9223 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Sep 28 02:58:45 UTC 2022 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Sep 28 02:59:39 UTC 2022 ssl.sh: #1103: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9223 with PID 49035 at Wed Sep 28 02:59:39 UTC 2022 kill -USR1 49035 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 49035 killed at Wed Sep 28 02:59:40 UTC 2022 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Wed Sep 28 02:59:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:59:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 49102 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 49102 found at Wed Sep 28 02:59:40 UTC 2022 selfserv_9223 with PID 49102 started at Wed Sep 28 02:59:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 49102 at Wed Sep 28 02:59:44 UTC 2022 kill -USR1 49102 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 49102 killed at Wed Sep 28 02:59:44 UTC 2022 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:59:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:59:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 49144 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 49144 found at Wed Sep 28 02:59:44 UTC 2022 selfserv_9223 with PID 49144 started at Wed Sep 28 02:59:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1105: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 49144 at Wed Sep 28 02:59:47 UTC 2022 kill -USR1 49144 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 49144 killed at Wed Sep 28 02:59:48 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:59:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:59:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 342 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 342 found at Wed Sep 28 02:59:48 UTC 2022 selfserv_9223 with PID 342 started at Wed Sep 28 02:59:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1106: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 342 at Wed Sep 28 02:59:51 UTC 2022 kill -USR1 342 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 342 killed at Wed Sep 28 02:59:51 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:59:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:59:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 387 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 387 found at Wed Sep 28 02:59:51 UTC 2022 selfserv_9223 with PID 387 started at Wed Sep 28 02:59:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 387 at Wed Sep 28 02:59:54 UTC 2022 kill -USR1 387 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 387 killed at Wed Sep 28 02:59:54 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:59:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:59:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 426 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 426 found at Wed Sep 28 02:59:55 UTC 2022 selfserv_9223 with PID 426 started at Wed Sep 28 02:59:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1108: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 426 at Wed Sep 28 02:59:58 UTC 2022 kill -USR1 426 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 426 killed at Wed Sep 28 02:59:58 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 02:59:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 02:59:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 465 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 465 found at Wed Sep 28 02:59:58 UTC 2022 selfserv_9223 with PID 465 started at Wed Sep 28 02:59:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 465 at Wed Sep 28 03:00:01 UTC 2022 kill -USR1 465 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 465 killed at Wed Sep 28 03:00:01 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:00:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:00:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 590 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 590 found at Wed Sep 28 03:00:02 UTC 2022 selfserv_9223 with PID 590 started at Wed Sep 28 03:00:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 590 at Wed Sep 28 03:00:05 UTC 2022 kill -USR1 590 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 590 killed at Wed Sep 28 03:00:05 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:00:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:00:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 641 found at Wed Sep 28 03:00:05 UTC 2022 selfserv_9223 with PID 641 started at Wed Sep 28 03:00:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1111: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 641 at Wed Sep 28 03:00:08 UTC 2022 kill -USR1 641 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 641 killed at Wed Sep 28 03:00:08 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:00:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:00:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 684 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 684 found at Wed Sep 28 03:00:09 UTC 2022 selfserv_9223 with PID 684 started at Wed Sep 28 03:00:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1112: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 684 at Wed Sep 28 03:00:11 UTC 2022 kill -USR1 684 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 684 killed at Wed Sep 28 03:00:12 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:00:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:00:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 723 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 723 found at Wed Sep 28 03:00:12 UTC 2022 selfserv_9223 with PID 723 started at Wed Sep 28 03:00:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 723 at Wed Sep 28 03:00:15 UTC 2022 kill -USR1 723 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 723 killed at Wed Sep 28 03:00:15 UTC 2022 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:00:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:00:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 763 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 763 found at Wed Sep 28 03:00:15 UTC 2022 selfserv_9223 with PID 763 started at Wed Sep 28 03:00:15 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1114: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 763 at Wed Sep 28 03:00:18 UTC 2022 kill -USR1 763 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 763 killed at Wed Sep 28 03:00:18 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:00:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:00:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 806 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 806 found at Wed Sep 28 03:00:19 UTC 2022 selfserv_9223 with PID 806 started at Wed Sep 28 03:00:19 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1115: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 806 at Wed Sep 28 03:00:22 UTC 2022 kill -USR1 806 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 806 killed at Wed Sep 28 03:00:22 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:00:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:00:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 854 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 854 found at Wed Sep 28 03:00:22 UTC 2022 selfserv_9223 with PID 854 started at Wed Sep 28 03:00:22 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1116: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 854 at Wed Sep 28 03:00:25 UTC 2022 kill -USR1 854 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 854 killed at Wed Sep 28 03:00:25 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:00:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:00:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 912 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 912 found at Wed Sep 28 03:00:26 UTC 2022 selfserv_9223 with PID 912 started at Wed Sep 28 03:00:26 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1117: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 912 at Wed Sep 28 03:00:29 UTC 2022 kill -USR1 912 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 912 killed at Wed Sep 28 03:00:29 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:00:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:00:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 952 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 952 found at Wed Sep 28 03:00:29 UTC 2022 selfserv_9223 with PID 952 started at Wed Sep 28 03:00:29 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1118: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 952 at Wed Sep 28 03:00:32 UTC 2022 kill -USR1 952 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 952 killed at Wed Sep 28 03:00:32 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:00:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:00:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 997 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 997 found at Wed Sep 28 03:00:33 UTC 2022 selfserv_9223 with PID 997 started at Wed Sep 28 03:00:33 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1119: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 997 at Wed Sep 28 03:00:35 UTC 2022 kill -USR1 997 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 997 killed at Wed Sep 28 03:00:36 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:00:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:00:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1066 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1066 found at Wed Sep 28 03:00:36 UTC 2022 selfserv_9223 with PID 1066 started at Wed Sep 28 03:00:36 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1120: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1066 at Wed Sep 28 03:00:39 UTC 2022 kill -USR1 1066 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1066 killed at Wed Sep 28 03:00:39 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:00:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:00:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1111 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1111 found at Wed Sep 28 03:00:40 UTC 2022 selfserv_9223 with PID 1111 started at Wed Sep 28 03:00:40 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1121: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1111 at Wed Sep 28 03:00:42 UTC 2022 kill -USR1 1111 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1111 killed at Wed Sep 28 03:00:43 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:00:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:00:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1152 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1152 found at Wed Sep 28 03:00:43 UTC 2022 selfserv_9223 with PID 1152 started at Wed Sep 28 03:00:43 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1122: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1152 at Wed Sep 28 03:00:46 UTC 2022 kill -USR1 1152 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1152 killed at Wed Sep 28 03:00:46 UTC 2022 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9223 starting at Wed Sep 28 03:00:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:00:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 1193 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1193 found at Wed Sep 28 03:00:46 UTC 2022 selfserv_9223 with PID 1193 started at Wed Sep 28 03:00:46 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1123: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1124: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1125: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1126: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1127: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1128: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1129: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1130: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1131: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1132: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1133: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1134: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1135: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1136: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1137: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1138: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1139: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1140: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1141: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1142: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1143: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1144: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1145: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1146: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1147: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1148: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1149: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1150: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1151: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1152: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1153: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1154: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1155: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1156: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1157: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1158: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1159: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1160: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1161: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1162: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1163: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1164: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1165: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1166: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1167: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1168: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1169: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1170: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1171: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1172: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1173: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 1193 at Wed Sep 28 03:01:13 UTC 2022 kill -USR1 1193 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1193 killed at Wed Sep 28 03:01:13 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Wed Sep 28 03:01:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:01:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 1819 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1819 found at Wed Sep 28 03:01:13 UTC 2022 selfserv_9223 with PID 1819 started at Wed Sep 28 03:01:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1174: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1175: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1176: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1177: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1178: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1179: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1180: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1181: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1182: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1183: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1184: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1185: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1186: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1187: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1188: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1189: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1190: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1191: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1192: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1193: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1194: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1195: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1196: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1197: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1198: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1199: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1200: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1201: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1202: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1203: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1204: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1205: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1206: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1207: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1208: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1209: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1210: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1211: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1212: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1213: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1214: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1215: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1216: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1217: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1218: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1219: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1220: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1221: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1222: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1223: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1224: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1225: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1226: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1227: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1228: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1229: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1230: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1231: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1232: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1233: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1234: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1235: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1236: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1237: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1238: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1239: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1240: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1241: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1242: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1243: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1244: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1245: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1246: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1247: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1248: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1249: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1819 at Wed Sep 28 03:01:51 UTC 2022 kill -USR1 1819 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1819 killed at Wed Sep 28 03:01:51 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:01:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:01:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2660 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2660 found at Wed Sep 28 03:01:51 UTC 2022 selfserv_9223 with PID 2660 started at Wed Sep 28 03:01:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2660 at Wed Sep 28 03:02:00 UTC 2022 kill -USR1 2660 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2660 killed at Wed Sep 28 03:02:00 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:02:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:02:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2712 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2712 found at Wed Sep 28 03:02:01 UTC 2022 selfserv_9223 with PID 2712 started at Wed Sep 28 03:02:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2712 at Wed Sep 28 03:02:10 UTC 2022 kill -USR1 2712 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2712 killed at Wed Sep 28 03:02:10 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:02:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:02:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2764 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2764 found at Wed Sep 28 03:02:10 UTC 2022 selfserv_9223 with PID 2764 started at Wed Sep 28 03:02:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2764 at Wed Sep 28 03:02:22 UTC 2022 kill -USR1 2764 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2764 killed at Wed Sep 28 03:02:23 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:02:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:02:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2816 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2816 found at Wed Sep 28 03:02:23 UTC 2022 selfserv_9223 with PID 2816 started at Wed Sep 28 03:02:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1253: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2816 at Wed Sep 28 03:02:32 UTC 2022 kill -USR1 2816 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2816 killed at Wed Sep 28 03:02:32 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:02:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:02:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2868 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2868 found at Wed Sep 28 03:02:33 UTC 2022 selfserv_9223 with PID 2868 started at Wed Sep 28 03:02:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1254: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2868 at Wed Sep 28 03:02:41 UTC 2022 kill -USR1 2868 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2868 killed at Wed Sep 28 03:02:42 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:02:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:02:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2936 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2936 found at Wed Sep 28 03:02:42 UTC 2022 selfserv_9223 with PID 2936 started at Wed Sep 28 03:02:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1255: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2936 at Wed Sep 28 03:02:54 UTC 2022 kill -USR1 2936 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2936 killed at Wed Sep 28 03:02:54 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:02:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:02:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2988 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2988 found at Wed Sep 28 03:02:55 UTC 2022 selfserv_9223 with PID 2988 started at Wed Sep 28 03:02:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2988 at Wed Sep 28 03:03:04 UTC 2022 kill -USR1 2988 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2988 killed at Wed Sep 28 03:03:04 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:03:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:03:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3040 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3040 found at Wed Sep 28 03:03:04 UTC 2022 selfserv_9223 with PID 3040 started at Wed Sep 28 03:03:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3040 at Wed Sep 28 03:03:13 UTC 2022 kill -USR1 3040 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3040 killed at Wed Sep 28 03:03:14 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:03:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:03:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3093 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3093 found at Wed Sep 28 03:03:14 UTC 2022 selfserv_9223 with PID 3093 started at Wed Sep 28 03:03:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3093 at Wed Sep 28 03:03:26 UTC 2022 kill -USR1 3093 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3093 killed at Wed Sep 28 03:03:26 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:03:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:03:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3146 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3146 found at Wed Sep 28 03:03:27 UTC 2022 selfserv_9223 with PID 3146 started at Wed Sep 28 03:03:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1259: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3146 at Wed Sep 28 03:03:36 UTC 2022 kill -USR1 3146 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3146 killed at Wed Sep 28 03:03:36 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:03:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:03:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3214 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3214 found at Wed Sep 28 03:03:36 UTC 2022 selfserv_9223 with PID 3214 started at Wed Sep 28 03:03:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1260: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3214 at Wed Sep 28 03:03:45 UTC 2022 kill -USR1 3214 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3214 killed at Wed Sep 28 03:03:45 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:03:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:03:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3268 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3268 found at Wed Sep 28 03:03:46 UTC 2022 selfserv_9223 with PID 3268 started at Wed Sep 28 03:03:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1261: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3268 at Wed Sep 28 03:03:58 UTC 2022 kill -USR1 3268 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3268 killed at Wed Sep 28 03:03:58 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:03:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:03:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3320 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3320 found at Wed Sep 28 03:03:58 UTC 2022 selfserv_9223 with PID 3320 started at Wed Sep 28 03:03:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1262: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3320 at Wed Sep 28 03:04:07 UTC 2022 kill -USR1 3320 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3320 killed at Wed Sep 28 03:04:08 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:04:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:04:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3373 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3373 found at Wed Sep 28 03:04:08 UTC 2022 selfserv_9223 with PID 3373 started at Wed Sep 28 03:04:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1263: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3373 at Wed Sep 28 03:04:17 UTC 2022 kill -USR1 3373 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3373 killed at Wed Sep 28 03:04:17 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:04:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:04:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3425 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3425 found at Wed Sep 28 03:04:18 UTC 2022 selfserv_9223 with PID 3425 started at Wed Sep 28 03:04:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1264: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3425 at Wed Sep 28 03:04:30 UTC 2022 kill -USR1 3425 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3425 killed at Wed Sep 28 03:04:30 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:04:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:04:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3477 found at Wed Sep 28 03:04:30 UTC 2022 selfserv_9223 with PID 3477 started at Wed Sep 28 03:04:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1265: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3477 at Wed Sep 28 03:04:39 UTC 2022 kill -USR1 3477 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3477 killed at Wed Sep 28 03:04:40 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:04:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:04:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3544 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3544 found at Wed Sep 28 03:04:40 UTC 2022 selfserv_9223 with PID 3544 started at Wed Sep 28 03:04:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1266: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3544 at Wed Sep 28 03:04:49 UTC 2022 kill -USR1 3544 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3544 killed at Wed Sep 28 03:04:49 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:04:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:04:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3596 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3596 found at Wed Sep 28 03:04:50 UTC 2022 selfserv_9223 with PID 3596 started at Wed Sep 28 03:04:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1267: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3596 at Wed Sep 28 03:05:02 UTC 2022 kill -USR1 3596 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3596 killed at Wed Sep 28 03:05:02 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:05:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:05:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3648 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3648 found at Wed Sep 28 03:05:02 UTC 2022 selfserv_9223 with PID 3648 started at Wed Sep 28 03:05:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1268: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3648 at Wed Sep 28 03:05:11 UTC 2022 kill -USR1 3648 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3648 killed at Wed Sep 28 03:05:12 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:05:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:05:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3700 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3700 found at Wed Sep 28 03:05:12 UTC 2022 selfserv_9223 with PID 3700 started at Wed Sep 28 03:05:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1269: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3700 at Wed Sep 28 03:05:21 UTC 2022 kill -USR1 3700 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3700 killed at Wed Sep 28 03:05:21 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:05:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:05:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3752 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3752 found at Wed Sep 28 03:05:22 UTC 2022 selfserv_9223 with PID 3752 started at Wed Sep 28 03:05:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1270: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3752 at Wed Sep 28 03:05:34 UTC 2022 kill -USR1 3752 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3752 killed at Wed Sep 28 03:05:34 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:05:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:05:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3819 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3819 found at Wed Sep 28 03:05:34 UTC 2022 selfserv_9223 with PID 3819 started at Wed Sep 28 03:05:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1271: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3819 at Wed Sep 28 03:05:44 UTC 2022 kill -USR1 3819 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3819 killed at Wed Sep 28 03:05:44 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:05:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:05:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3871 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3871 found at Wed Sep 28 03:05:44 UTC 2022 selfserv_9223 with PID 3871 started at Wed Sep 28 03:05:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1272: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3871 at Wed Sep 28 03:05:53 UTC 2022 kill -USR1 3871 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3871 killed at Wed Sep 28 03:05:53 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:05:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:05:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3923 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3923 found at Wed Sep 28 03:05:54 UTC 2022 selfserv_9223 with PID 3923 started at Wed Sep 28 03:05:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1273: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3923 at Wed Sep 28 03:06:06 UTC 2022 kill -USR1 3923 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3923 killed at Wed Sep 28 03:06:06 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:06:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:06:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3975 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3975 found at Wed Sep 28 03:06:07 UTC 2022 selfserv_9223 with PID 3975 started at Wed Sep 28 03:06:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1274: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3975 at Wed Sep 28 03:06:16 UTC 2022 kill -USR1 3975 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3975 killed at Wed Sep 28 03:06:16 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:06:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:06:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4028 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4028 found at Wed Sep 28 03:06:16 UTC 2022 selfserv_9223 with PID 4028 started at Wed Sep 28 03:06:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1275: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4028 at Wed Sep 28 03:06:25 UTC 2022 kill -USR1 4028 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4028 killed at Wed Sep 28 03:06:26 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:06:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:06:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4080 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4080 found at Wed Sep 28 03:06:26 UTC 2022 selfserv_9223 with PID 4080 started at Wed Sep 28 03:06:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1276: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4080 at Wed Sep 28 03:06:38 UTC 2022 kill -USR1 4080 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4080 killed at Wed Sep 28 03:06:38 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:06:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:06:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4147 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4147 found at Wed Sep 28 03:06:39 UTC 2022 selfserv_9223 with PID 4147 started at Wed Sep 28 03:06:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1277: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4147 at Wed Sep 28 03:06:48 UTC 2022 kill -USR1 4147 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4147 killed at Wed Sep 28 03:06:48 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:06:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:06:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4199 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4199 found at Wed Sep 28 03:06:49 UTC 2022 selfserv_9223 with PID 4199 started at Wed Sep 28 03:06:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1278: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4199 at Wed Sep 28 03:06:58 UTC 2022 kill -USR1 4199 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4199 killed at Wed Sep 28 03:06:58 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:06:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:06:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4251 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4251 found at Wed Sep 28 03:06:58 UTC 2022 selfserv_9223 with PID 4251 started at Wed Sep 28 03:06:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1279: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4251 at Wed Sep 28 03:07:11 UTC 2022 kill -USR1 4251 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4251 killed at Wed Sep 28 03:07:11 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:07:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:07:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4303 found at Wed Sep 28 03:07:11 UTC 2022 selfserv_9223 with PID 4303 started at Wed Sep 28 03:07:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1280: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4303 at Wed Sep 28 03:07:23 UTC 2022 kill -USR1 4303 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4303 killed at Wed Sep 28 03:07:23 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:07:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:07:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4355 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4355 found at Wed Sep 28 03:07:24 UTC 2022 selfserv_9223 with PID 4355 started at Wed Sep 28 03:07:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1281: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4355 at Wed Sep 28 03:07:36 UTC 2022 kill -USR1 4355 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4355 killed at Wed Sep 28 03:07:36 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:07:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:07:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4422 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4422 found at Wed Sep 28 03:07:36 UTC 2022 selfserv_9223 with PID 4422 started at Wed Sep 28 03:07:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1282: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4422 at Wed Sep 28 03:07:45 UTC 2022 kill -USR1 4422 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4422 killed at Wed Sep 28 03:07:45 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:07:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:07:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4474 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4474 found at Wed Sep 28 03:07:46 UTC 2022 selfserv_9223 with PID 4474 started at Wed Sep 28 03:07:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1283: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4474 at Wed Sep 28 03:07:55 UTC 2022 kill -USR1 4474 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4474 killed at Wed Sep 28 03:07:55 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:07:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:07:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4526 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4526 found at Wed Sep 28 03:07:55 UTC 2022 selfserv_9223 with PID 4526 started at Wed Sep 28 03:07:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1284: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4526 at Wed Sep 28 03:08:07 UTC 2022 kill -USR1 4526 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4526 killed at Wed Sep 28 03:08:07 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:08:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:08:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4578 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4578 found at Wed Sep 28 03:08:08 UTC 2022 selfserv_9223 with PID 4578 started at Wed Sep 28 03:08:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1285: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4578 at Wed Sep 28 03:08:20 UTC 2022 kill -USR1 4578 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4578 killed at Wed Sep 28 03:08:20 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:08:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:08:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4630 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4630 found at Wed Sep 28 03:08:21 UTC 2022 selfserv_9223 with PID 4630 started at Wed Sep 28 03:08:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1286: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4630 at Wed Sep 28 03:08:30 UTC 2022 kill -USR1 4630 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4630 killed at Wed Sep 28 03:08:30 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:08:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:08:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4682 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4682 found at Wed Sep 28 03:08:30 UTC 2022 selfserv_9223 with PID 4682 started at Wed Sep 28 03:08:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1287: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4682 at Wed Sep 28 03:08:41 UTC 2022 kill -USR1 4682 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4682 killed at Wed Sep 28 03:08:41 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:08:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:08:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4749 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4749 found at Wed Sep 28 03:08:42 UTC 2022 selfserv_9223 with PID 4749 started at Wed Sep 28 03:08:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1288: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4749 at Wed Sep 28 03:08:50 UTC 2022 kill -USR1 4749 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4749 killed at Wed Sep 28 03:08:51 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:08:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:08:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4801 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4801 found at Wed Sep 28 03:08:51 UTC 2022 selfserv_9223 with PID 4801 started at Wed Sep 28 03:08:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1289: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4801 at Wed Sep 28 03:09:02 UTC 2022 kill -USR1 4801 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4801 killed at Wed Sep 28 03:09:02 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:09:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:09:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4853 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4853 found at Wed Sep 28 03:09:02 UTC 2022 selfserv_9223 with PID 4853 started at Wed Sep 28 03:09:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1290: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4853 at Wed Sep 28 03:09:11 UTC 2022 kill -USR1 4853 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4853 killed at Wed Sep 28 03:09:12 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:09:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:09:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4905 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4905 found at Wed Sep 28 03:09:12 UTC 2022 selfserv_9223 with PID 4905 started at Wed Sep 28 03:09:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1291: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4905 at Wed Sep 28 03:09:23 UTC 2022 kill -USR1 4905 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4905 killed at Wed Sep 28 03:09:23 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:09:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:09:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4958 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4958 found at Wed Sep 28 03:09:23 UTC 2022 selfserv_9223 with PID 4958 started at Wed Sep 28 03:09:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1292: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4958 at Wed Sep 28 03:09:32 UTC 2022 kill -USR1 4958 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4958 killed at Wed Sep 28 03:09:33 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:09:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:09:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5010 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5010 found at Wed Sep 28 03:09:33 UTC 2022 selfserv_9223 with PID 5010 started at Wed Sep 28 03:09:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1293: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5010 at Wed Sep 28 03:09:44 UTC 2022 kill -USR1 5010 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5010 killed at Wed Sep 28 03:09:44 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:09:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:09:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5077 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5077 found at Wed Sep 28 03:09:44 UTC 2022 selfserv_9223 with PID 5077 started at Wed Sep 28 03:09:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1294: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5077 at Wed Sep 28 03:09:53 UTC 2022 kill -USR1 5077 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5077 killed at Wed Sep 28 03:09:54 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:09:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:09:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5130 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5130 found at Wed Sep 28 03:09:54 UTC 2022 selfserv_9223 with PID 5130 started at Wed Sep 28 03:09:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1295: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5130 at Wed Sep 28 03:10:05 UTC 2022 kill -USR1 5130 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5130 killed at Wed Sep 28 03:10:05 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:10:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:10:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5182 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5182 found at Wed Sep 28 03:10:06 UTC 2022 selfserv_9223 with PID 5182 started at Wed Sep 28 03:10:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1296: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5182 at Wed Sep 28 03:10:15 UTC 2022 kill -USR1 5182 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5182 killed at Wed Sep 28 03:10:15 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:10:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:10:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5235 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5235 found at Wed Sep 28 03:10:15 UTC 2022 selfserv_9223 with PID 5235 started at Wed Sep 28 03:10:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1297: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5235 at Wed Sep 28 03:10:26 UTC 2022 kill -USR1 5235 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5235 killed at Wed Sep 28 03:10:26 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:10:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:10:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5287 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5287 found at Wed Sep 28 03:10:27 UTC 2022 selfserv_9223 with PID 5287 started at Wed Sep 28 03:10:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1298: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5287 at Wed Sep 28 03:10:36 UTC 2022 kill -USR1 5287 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5287 killed at Wed Sep 28 03:10:36 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:10:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:10:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5354 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5354 found at Wed Sep 28 03:10:36 UTC 2022 selfserv_9223 with PID 5354 started at Wed Sep 28 03:10:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1299: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5354 at Wed Sep 28 03:10:47 UTC 2022 kill -USR1 5354 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5354 killed at Wed Sep 28 03:10:47 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:10:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:10:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5406 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5406 found at Wed Sep 28 03:10:48 UTC 2022 selfserv_9223 with PID 5406 started at Wed Sep 28 03:10:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1300: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5406 at Wed Sep 28 03:10:57 UTC 2022 kill -USR1 5406 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5406 killed at Wed Sep 28 03:10:57 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:10:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:10:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5458 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5458 found at Wed Sep 28 03:10:58 UTC 2022 selfserv_9223 with PID 5458 started at Wed Sep 28 03:10:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1301: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5458 at Wed Sep 28 03:11:08 UTC 2022 kill -USR1 5458 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5458 killed at Wed Sep 28 03:11:09 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:11:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:11:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5510 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5510 found at Wed Sep 28 03:11:09 UTC 2022 selfserv_9223 with PID 5510 started at Wed Sep 28 03:11:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1302: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5510 at Wed Sep 28 03:11:18 UTC 2022 kill -USR1 5510 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5510 killed at Wed Sep 28 03:11:18 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:11:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:11:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5562 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5562 found at Wed Sep 28 03:11:19 UTC 2022 selfserv_9223 with PID 5562 started at Wed Sep 28 03:11:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1303: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5562 at Wed Sep 28 03:11:30 UTC 2022 kill -USR1 5562 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5562 killed at Wed Sep 28 03:11:30 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:11:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:11:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5614 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5614 found at Wed Sep 28 03:11:30 UTC 2022 selfserv_9223 with PID 5614 started at Wed Sep 28 03:11:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1304: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5614 at Wed Sep 28 03:11:39 UTC 2022 kill -USR1 5614 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5614 killed at Wed Sep 28 03:11:40 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:11:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:11:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5681 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5681 found at Wed Sep 28 03:11:40 UTC 2022 selfserv_9223 with PID 5681 started at Wed Sep 28 03:11:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1305: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5681 at Wed Sep 28 03:11:51 UTC 2022 kill -USR1 5681 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5681 killed at Wed Sep 28 03:11:51 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:11:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:11:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5741 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5741 found at Wed Sep 28 03:11:52 UTC 2022 selfserv_9223 with PID 5741 started at Wed Sep 28 03:11:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1306: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5741 at Wed Sep 28 03:12:03 UTC 2022 kill -USR1 5741 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5741 killed at Wed Sep 28 03:12:03 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:12:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:12:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5793 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5793 found at Wed Sep 28 03:12:03 UTC 2022 selfserv_9223 with PID 5793 started at Wed Sep 28 03:12:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1307: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5793 at Wed Sep 28 03:12:14 UTC 2022 kill -USR1 5793 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5793 killed at Wed Sep 28 03:12:14 UTC 2022 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Wed Sep 28 03:12:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:12:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5875 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5875 found at Wed Sep 28 03:12:15 UTC 2022 selfserv_9223 with PID 5875 started at Wed Sep 28 03:12:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5875 at Wed Sep 28 03:12:22 UTC 2022 kill -USR1 5875 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5875 killed at Wed Sep 28 03:12:22 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:12:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:12:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5917 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5917 found at Wed Sep 28 03:12:22 UTC 2022 selfserv_9223 with PID 5917 started at Wed Sep 28 03:12:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5917 at Wed Sep 28 03:12:27 UTC 2022 kill -USR1 5917 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5917 killed at Wed Sep 28 03:12:27 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:12:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:12:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5957 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5957 found at Wed Sep 28 03:12:28 UTC 2022 selfserv_9223 with PID 5957 started at Wed Sep 28 03:12:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1252: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 5957 at Wed Sep 28 03:12:33 UTC 2022 kill -USR1 5957 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5957 killed at Wed Sep 28 03:12:33 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:12:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:12:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5997 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5997 found at Wed Sep 28 03:12:33 UTC 2022 selfserv_9223 with PID 5997 started at Wed Sep 28 03:12:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1253: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5997 at Wed Sep 28 03:12:38 UTC 2022 kill -USR1 5997 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5997 killed at Wed Sep 28 03:12:39 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:12:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:12:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6051 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6051 found at Wed Sep 28 03:12:39 UTC 2022 selfserv_9223 with PID 6051 started at Wed Sep 28 03:12:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1254: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 6051 at Wed Sep 28 03:12:44 UTC 2022 kill -USR1 6051 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6051 killed at Wed Sep 28 03:12:44 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:12:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:12:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6090 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6090 found at Wed Sep 28 03:12:45 UTC 2022 selfserv_9223 with PID 6090 started at Wed Sep 28 03:12:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1255: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6090 at Wed Sep 28 03:12:50 UTC 2022 kill -USR1 6090 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6090 killed at Wed Sep 28 03:12:50 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:12:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:12:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6129 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6129 found at Wed Sep 28 03:12:50 UTC 2022 selfserv_9223 with PID 6129 started at Wed Sep 28 03:12:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6129 at Wed Sep 28 03:12:55 UTC 2022 kill -USR1 6129 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6129 killed at Wed Sep 28 03:12:55 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:12:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:12:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6168 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6168 found at Wed Sep 28 03:12:56 UTC 2022 selfserv_9223 with PID 6168 started at Wed Sep 28 03:12:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6168 at Wed Sep 28 03:13:01 UTC 2022 kill -USR1 6168 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6168 killed at Wed Sep 28 03:13:01 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:13:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:13:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6207 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6207 found at Wed Sep 28 03:13:01 UTC 2022 selfserv_9223 with PID 6207 started at Wed Sep 28 03:13:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6207 at Wed Sep 28 03:13:06 UTC 2022 kill -USR1 6207 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6207 killed at Wed Sep 28 03:13:06 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:13:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:13:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6246 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6246 found at Wed Sep 28 03:13:07 UTC 2022 selfserv_9223 with PID 6246 started at Wed Sep 28 03:13:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1259: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6246 at Wed Sep 28 03:13:12 UTC 2022 kill -USR1 6246 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6246 killed at Wed Sep 28 03:13:12 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:13:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:13:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6285 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6285 found at Wed Sep 28 03:13:12 UTC 2022 selfserv_9223 with PID 6285 started at Wed Sep 28 03:13:12 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1260: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6285 at Wed Sep 28 03:13:17 UTC 2022 kill -USR1 6285 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6285 killed at Wed Sep 28 03:13:18 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:13:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:13:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6325 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6325 found at Wed Sep 28 03:13:18 UTC 2022 selfserv_9223 with PID 6325 started at Wed Sep 28 03:13:18 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1261: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6325 at Wed Sep 28 03:13:23 UTC 2022 kill -USR1 6325 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6325 killed at Wed Sep 28 03:13:23 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:13:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:13:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6365 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6365 found at Wed Sep 28 03:13:24 UTC 2022 selfserv_9223 with PID 6365 started at Wed Sep 28 03:13:24 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1262: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6365 at Wed Sep 28 03:13:29 UTC 2022 kill -USR1 6365 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6365 killed at Wed Sep 28 03:13:29 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:13:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:13:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6405 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6405 found at Wed Sep 28 03:13:29 UTC 2022 selfserv_9223 with PID 6405 started at Wed Sep 28 03:13:29 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1263: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6405 at Wed Sep 28 03:13:34 UTC 2022 kill -USR1 6405 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6405 killed at Wed Sep 28 03:13:34 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:13:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:13:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6445 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6445 found at Wed Sep 28 03:13:35 UTC 2022 selfserv_9223 with PID 6445 started at Wed Sep 28 03:13:35 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1264: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6445 at Wed Sep 28 03:13:40 UTC 2022 kill -USR1 6445 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6445 killed at Wed Sep 28 03:13:40 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:13:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:13:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6500 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6500 found at Wed Sep 28 03:13:40 UTC 2022 selfserv_9223 with PID 6500 started at Wed Sep 28 03:13:40 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1265: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6500 at Wed Sep 28 03:13:45 UTC 2022 kill -USR1 6500 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6500 killed at Wed Sep 28 03:13:45 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:13:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:13:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6540 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6540 found at Wed Sep 28 03:13:46 UTC 2022 selfserv_9223 with PID 6540 started at Wed Sep 28 03:13:46 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1266: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6540 at Wed Sep 28 03:13:51 UTC 2022 kill -USR1 6540 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6540 killed at Wed Sep 28 03:13:51 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:13:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:13:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6581 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6581 found at Wed Sep 28 03:13:51 UTC 2022 selfserv_9223 with PID 6581 started at Wed Sep 28 03:13:51 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1267: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6581 at Wed Sep 28 03:13:56 UTC 2022 kill -USR1 6581 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6581 killed at Wed Sep 28 03:13:57 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:13:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:13:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6623 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6623 found at Wed Sep 28 03:13:57 UTC 2022 selfserv_9223 with PID 6623 started at Wed Sep 28 03:13:57 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1268: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6623 at Wed Sep 28 03:14:02 UTC 2022 kill -USR1 6623 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6623 killed at Wed Sep 28 03:14:02 UTC 2022 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -fips false -force FIPS mode disabled. ssl.sh: #1269: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/server -list ssl.sh: #1270: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1271: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1272: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_server -list ssl.sh: #1273: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1274: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -fips true -force FIPS mode enabled. ssl.sh: #1275: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -list ssl.sh: #1276: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1277: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1278: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -list ssl.sh: #1279: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1280: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9223 starting at Wed Sep 28 03:14:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:14:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 6745 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6745 found at Wed Sep 28 03:14:06 UTC 2022 selfserv_9223 with PID 6745 started at Wed Sep 28 03:14:06 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1281: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1282: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1283: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1284: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1285: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1286: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1287: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1288: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1289: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1290: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1291: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1292: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1293: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1294: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1295: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1296: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1297: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1298: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1299: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1300: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1301: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1302: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1303: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1304: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1305: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1306: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1307: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1308: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1309: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1310: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1311: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1312: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1313: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1314: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1315: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1316: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1317: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1318: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1319: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1320: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1321: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1322: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1323: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1324: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1325: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1326: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1327: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1328: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1329: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1330: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1331: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 6745 at Wed Sep 28 03:14:57 UTC 2022 kill -USR1 6745 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6745 killed at Wed Sep 28 03:14:57 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Wed Sep 28 03:14:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:14:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 7310 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7310 found at Wed Sep 28 03:14:58 UTC 2022 selfserv_9223 with PID 7310 started at Wed Sep 28 03:14:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1332: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1333: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1334: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1335: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1336: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1337: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1338: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1339: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1340: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1341: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1342: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1343: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1344: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1345: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1346: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1347: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1348: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1349: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1350: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1351: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1352: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1353: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1354: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1355: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1356: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1357: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1358: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1359: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1360: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1361: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1362: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1363: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1364: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1365: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1366: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1367: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1368: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1369: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1370: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1371: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1372: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1373: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1374: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1402: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1403: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1404: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1405: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1406: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1407: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7310 at Wed Sep 28 03:16:20 UTC 2022 kill -USR1 7310 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7310 killed at Wed Sep 28 03:16:20 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9223 starting at Wed Sep 28 03:16:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:16:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8269 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8269 found at Wed Sep 28 03:16:21 UTC 2022 selfserv_9223 with PID 8269 started at Wed Sep 28 03:16:21 UTC 2022 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1408: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1409: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8269 at Wed Sep 28 03:16:25 UTC 2022 kill -USR1 8269 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8269 killed at Wed Sep 28 03:16:25 UTC 2022 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:16:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:16:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8347 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8347 found at Wed Sep 28 03:16:26 UTC 2022 selfserv_9223 with PID 8347 started at Wed Sep 28 03:16:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1408: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8347 at Wed Sep 28 03:16:32 UTC 2022 kill -USR1 8347 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8347 killed at Wed Sep 28 03:16:32 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:16:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:16:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8399 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8399 found at Wed Sep 28 03:16:33 UTC 2022 selfserv_9223 with PID 8399 started at Wed Sep 28 03:16:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1409: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8399 at Wed Sep 28 03:16:57 UTC 2022 kill -USR1 8399 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8399 killed at Wed Sep 28 03:16:57 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:16:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:16:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8466 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8466 found at Wed Sep 28 03:16:58 UTC 2022 selfserv_9223 with PID 8466 started at Wed Sep 28 03:16:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8466 at Wed Sep 28 03:17:04 UTC 2022 kill -USR1 8466 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8466 killed at Wed Sep 28 03:17:05 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:17:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:17:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8530 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8530 found at Wed Sep 28 03:17:05 UTC 2022 selfserv_9223 with PID 8530 started at Wed Sep 28 03:17:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1411: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8530 at Wed Sep 28 03:17:11 UTC 2022 kill -USR1 8530 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8530 killed at Wed Sep 28 03:17:12 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:17:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:17:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8582 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8582 found at Wed Sep 28 03:17:12 UTC 2022 selfserv_9223 with PID 8582 started at Wed Sep 28 03:17:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1412: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8582 at Wed Sep 28 03:17:36 UTC 2022 kill -USR1 8582 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8582 killed at Wed Sep 28 03:17:36 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:17:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:17:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8649 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8649 found at Wed Sep 28 03:17:36 UTC 2022 selfserv_9223 with PID 8649 started at Wed Sep 28 03:17:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8649 at Wed Sep 28 03:17:42 UTC 2022 kill -USR1 8649 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8649 killed at Wed Sep 28 03:17:43 UTC 2022 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:17:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:17:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8713 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8713 found at Wed Sep 28 03:17:43 UTC 2022 selfserv_9223 with PID 8713 started at Wed Sep 28 03:17:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1414: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8713 at Wed Sep 28 03:17:49 UTC 2022 kill -USR1 8713 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8713 killed at Wed Sep 28 03:17:50 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:17:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:17:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8765 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8765 found at Wed Sep 28 03:17:50 UTC 2022 selfserv_9223 with PID 8765 started at Wed Sep 28 03:17:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1415: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8765 at Wed Sep 28 03:18:15 UTC 2022 kill -USR1 8765 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8765 killed at Wed Sep 28 03:18:15 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:18:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:18:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8817 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8817 found at Wed Sep 28 03:18:15 UTC 2022 selfserv_9223 with PID 8817 started at Wed Sep 28 03:18:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8817 at Wed Sep 28 03:18:22 UTC 2022 kill -USR1 8817 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8817 killed at Wed Sep 28 03:18:22 UTC 2022 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:18:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:18:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8881 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8881 found at Wed Sep 28 03:18:23 UTC 2022 selfserv_9223 with PID 8881 started at Wed Sep 28 03:18:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1417: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8881 at Wed Sep 28 03:18:29 UTC 2022 kill -USR1 8881 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8881 killed at Wed Sep 28 03:18:29 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:18:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:18:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8933 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8933 found at Wed Sep 28 03:18:30 UTC 2022 selfserv_9223 with PID 8933 started at Wed Sep 28 03:18:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1418: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8933 at Wed Sep 28 03:18:54 UTC 2022 kill -USR1 8933 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8933 killed at Wed Sep 28 03:18:54 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:18:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:18:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9000 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9000 found at Wed Sep 28 03:18:55 UTC 2022 selfserv_9223 with PID 9000 started at Wed Sep 28 03:18:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9000 at Wed Sep 28 03:19:01 UTC 2022 kill -USR1 9000 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9000 killed at Wed Sep 28 03:19:02 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:19:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:19:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9064 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9064 found at Wed Sep 28 03:19:02 UTC 2022 selfserv_9223 with PID 9064 started at Wed Sep 28 03:19:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1420: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9064 at Wed Sep 28 03:19:09 UTC 2022 kill -USR1 9064 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9064 killed at Wed Sep 28 03:19:09 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:19:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:19:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9116 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9116 found at Wed Sep 28 03:19:09 UTC 2022 selfserv_9223 with PID 9116 started at Wed Sep 28 03:19:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1421: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9116 at Wed Sep 28 03:19:33 UTC 2022 kill -USR1 9116 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9116 killed at Wed Sep 28 03:19:33 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:19:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:19:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9168 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9168 found at Wed Sep 28 03:19:33 UTC 2022 selfserv_9223 with PID 9168 started at Wed Sep 28 03:19:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1422: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9168 at Wed Sep 28 03:19:40 UTC 2022 kill -USR1 9168 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9168 killed at Wed Sep 28 03:19:40 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:19:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:19:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9239 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9239 found at Wed Sep 28 03:19:40 UTC 2022 selfserv_9223 with PID 9239 started at Wed Sep 28 03:19:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9239 at Wed Sep 28 03:19:46 UTC 2022 kill -USR1 9239 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9239 killed at Wed Sep 28 03:19:46 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:19:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:19:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9295 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9295 found at Wed Sep 28 03:19:47 UTC 2022 selfserv_9223 with PID 9295 started at Wed Sep 28 03:19:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1424: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9295 at Wed Sep 28 03:19:53 UTC 2022 kill -USR1 9295 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9295 killed at Wed Sep 28 03:19:53 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:19:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:19:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9351 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9351 found at Wed Sep 28 03:19:54 UTC 2022 selfserv_9223 with PID 9351 started at Wed Sep 28 03:19:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9351 at Wed Sep 28 03:20:01 UTC 2022 kill -USR1 9351 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9351 killed at Wed Sep 28 03:20:02 UTC 2022 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:20:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:20:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9412 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9412 found at Wed Sep 28 03:20:02 UTC 2022 selfserv_9223 with PID 9412 started at Wed Sep 28 03:20:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1426: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9412 at Wed Sep 28 03:20:27 UTC 2022 kill -USR1 9412 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9412 killed at Wed Sep 28 03:20:27 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:20:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:20:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9464 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9464 found at Wed Sep 28 03:20:27 UTC 2022 selfserv_9223 with PID 9464 started at Wed Sep 28 03:20:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1427: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9464 at Wed Sep 28 03:20:32 UTC 2022 kill -USR1 9464 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9464 killed at Wed Sep 28 03:20:32 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:20:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:20:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9524 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9524 found at Wed Sep 28 03:20:33 UTC 2022 selfserv_9223 with PID 9524 started at Wed Sep 28 03:20:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1428: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9524 at Wed Sep 28 03:20:56 UTC 2022 kill -USR1 9524 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9524 killed at Wed Sep 28 03:20:56 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:20:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:20:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9591 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9591 found at Wed Sep 28 03:20:57 UTC 2022 selfserv_9223 with PID 9591 started at Wed Sep 28 03:20:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1429: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9591 at Wed Sep 28 03:21:02 UTC 2022 kill -USR1 9591 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9591 killed at Wed Sep 28 03:21:02 UTC 2022 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:21:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:21:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9651 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9651 found at Wed Sep 28 03:21:03 UTC 2022 selfserv_9223 with PID 9651 started at Wed Sep 28 03:21:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1430: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9651 at Wed Sep 28 03:21:27 UTC 2022 kill -USR1 9651 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9651 killed at Wed Sep 28 03:21:28 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:21:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:21:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9703 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9703 found at Wed Sep 28 03:21:28 UTC 2022 selfserv_9223 with PID 9703 started at Wed Sep 28 03:21:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1431: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9703 at Wed Sep 28 03:21:33 UTC 2022 kill -USR1 9703 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9703 killed at Wed Sep 28 03:21:33 UTC 2022 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:21:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:21:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9763 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9763 found at Wed Sep 28 03:21:34 UTC 2022 selfserv_9223 with PID 9763 started at Wed Sep 28 03:21:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1432: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9763 at Wed Sep 28 03:21:58 UTC 2022 kill -USR1 9763 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9763 killed at Wed Sep 28 03:21:58 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:21:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:21:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9830 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9830 found at Wed Sep 28 03:21:59 UTC 2022 selfserv_9223 with PID 9830 started at Wed Sep 28 03:21:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1433: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9830 at Wed Sep 28 03:22:04 UTC 2022 kill -USR1 9830 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9830 killed at Wed Sep 28 03:22:04 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:22:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:22:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9891 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9891 found at Wed Sep 28 03:22:04 UTC 2022 selfserv_9223 with PID 9891 started at Wed Sep 28 03:22:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1434: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9891 at Wed Sep 28 03:22:28 UTC 2022 kill -USR1 9891 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9891 killed at Wed Sep 28 03:22:28 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:22:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:22:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9943 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9943 found at Wed Sep 28 03:22:28 UTC 2022 selfserv_9223 with PID 9943 started at Wed Sep 28 03:22:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1435: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9943 at Wed Sep 28 03:22:34 UTC 2022 kill -USR1 9943 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9943 killed at Wed Sep 28 03:22:34 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:22:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:22:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10010 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10010 found at Wed Sep 28 03:22:35 UTC 2022 selfserv_9223 with PID 10010 started at Wed Sep 28 03:22:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1436: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10010 at Wed Sep 28 03:22:41 UTC 2022 kill -USR1 10010 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10010 killed at Wed Sep 28 03:22:41 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:22:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:22:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10062 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10062 found at Wed Sep 28 03:22:42 UTC 2022 selfserv_9223 with PID 10062 started at Wed Sep 28 03:22:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1437: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10062 at Wed Sep 28 03:22:48 UTC 2022 kill -USR1 10062 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10062 killed at Wed Sep 28 03:22:49 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 03:22:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:22:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10120 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10120 found at Wed Sep 28 03:22:49 UTC 2022 selfserv_9223 with PID 10120 started at Wed Sep 28 03:22:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1438: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10120 at Wed Sep 28 03:22:55 UTC 2022 kill -USR1 10120 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10120 killed at Wed Sep 28 03:22:55 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Wed Sep 28 03:22:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:22:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10178 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10178 found at Wed Sep 28 03:22:56 UTC 2022 selfserv_9223 with PID 10178 started at Wed Sep 28 03:22:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1439: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10178 at Wed Sep 28 03:23:03 UTC 2022 kill -USR1 10178 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10178 killed at Wed Sep 28 03:23:03 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Wed Sep 28 03:23:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:23:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10236 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10236 found at Wed Sep 28 03:23:04 UTC 2022 selfserv_9223 with PID 10236 started at Wed Sep 28 03:23:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1440: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10236 at Wed Sep 28 03:23:07 UTC 2022 kill -USR1 10236 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10236 killed at Wed Sep 28 03:23:08 UTC 2022 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 03:23:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:23:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10294 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10294 found at Wed Sep 28 03:23:08 UTC 2022 selfserv_9223 with PID 10294 started at Wed Sep 28 03:23:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1441: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10294 at Wed Sep 28 03:23:14 UTC 2022 kill -USR1 10294 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10294 killed at Wed Sep 28 03:23:14 UTC 2022 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9223 starting at Wed Sep 28 03:23:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:23:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10352 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10352 found at Wed Sep 28 03:23:15 UTC 2022 selfserv_9223 with PID 10352 started at Wed Sep 28 03:23:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1442: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10352 at Wed Sep 28 03:23:19 UTC 2022 kill -USR1 10352 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10352 killed at Wed Sep 28 03:23:19 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 03:23:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:23:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10410 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10410 found at Wed Sep 28 03:23:20 UTC 2022 selfserv_9223 with PID 10410 started at Wed Sep 28 03:23:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1443: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10410 at Wed Sep 28 03:23:26 UTC 2022 kill -USR1 10410 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10410 killed at Wed Sep 28 03:23:26 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Wed Sep 28 03:23:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:23:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10469 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10469 found at Wed Sep 28 03:23:26 UTC 2022 selfserv_9223 with PID 10469 started at Wed Sep 28 03:23:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1444: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10469 at Wed Sep 28 03:23:34 UTC 2022 kill -USR1 10469 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10469 killed at Wed Sep 28 03:23:34 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9223 starting at Wed Sep 28 03:23:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:23:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10542 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10542 found at Wed Sep 28 03:23:34 UTC 2022 selfserv_9223 with PID 10542 started at Wed Sep 28 03:23:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1445: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10542 at Wed Sep 28 03:23:40 UTC 2022 kill -USR1 10542 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10542 killed at Wed Sep 28 03:23:40 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9223 starting at Wed Sep 28 03:23:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:23:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10600 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10600 found at Wed Sep 28 03:23:41 UTC 2022 selfserv_9223 with PID 10600 started at Wed Sep 28 03:23:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1446: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10600 at Wed Sep 28 03:23:47 UTC 2022 kill -USR1 10600 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10600 killed at Wed Sep 28 03:23:47 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Wed Sep 28 03:23:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:23:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10658 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10658 found at Wed Sep 28 03:23:47 UTC 2022 selfserv_9223 with PID 10658 started at Wed Sep 28 03:23:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1447: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10658 at Wed Sep 28 03:23:51 UTC 2022 kill -USR1 10658 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10658 killed at Wed Sep 28 03:23:51 UTC 2022 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9223 starting at Wed Sep 28 03:23:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:23:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10701 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10701 found at Wed Sep 28 03:23:52 UTC 2022 selfserv_9223 with PID 10701 started at Wed Sep 28 03:23:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1408: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10701 at Wed Sep 28 03:23:58 UTC 2022 kill -USR1 10701 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10701 killed at Wed Sep 28 03:23:58 UTC 2022 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9223 starting at Wed Sep 28 03:23:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:23:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10743 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10743 found at Wed Sep 28 03:23:58 UTC 2022 selfserv_9223 with PID 10743 started at Wed Sep 28 03:23:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1409: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9223 with PID 10743 at Wed Sep 28 03:24:04 UTC 2022 kill -USR1 10743 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10743 killed at Wed Sep 28 03:24:04 UTC 2022 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9223 starting at Wed Sep 28 03:24:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:24:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10785 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10785 found at Wed Sep 28 03:24:05 UTC 2022 selfserv_9223 with PID 10785 started at Wed Sep 28 03:24:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1410: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 10785 at Wed Sep 28 03:24:11 UTC 2022 kill -USR1 10785 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10785 killed at Wed Sep 28 03:24:11 UTC 2022 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9223 starting at Wed Sep 28 03:24:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:24:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10827 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10827 found at Wed Sep 28 03:24:11 UTC 2022 selfserv_9223 with PID 10827 started at Wed Sep 28 03:24:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1411: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 10827 at Wed Sep 28 03:24:16 UTC 2022 kill -USR1 10827 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10827 killed at Wed Sep 28 03:24:16 UTC 2022 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9223 starting at Wed Sep 28 03:24:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:24:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10869 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10869 found at Wed Sep 28 03:24:16 UTC 2022 selfserv_9223 with PID 10869 started at Wed Sep 28 03:24:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1412: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 10869 at Wed Sep 28 03:24:20 UTC 2022 kill -USR1 10869 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10869 killed at Wed Sep 28 03:24:21 UTC 2022 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9223 starting at Wed Sep 28 03:24:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:24:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10911 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10911 found at Wed Sep 28 03:24:21 UTC 2022 selfserv_9223 with PID 10911 started at Wed Sep 28 03:24:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1413: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 10911 at Wed Sep 28 03:24:25 UTC 2022 kill -USR1 10911 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10911 killed at Wed Sep 28 03:24:26 UTC 2022 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9223 starting at Wed Sep 28 03:24:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:24:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10953 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10953 found at Wed Sep 28 03:24:26 UTC 2022 selfserv_9223 with PID 10953 started at Wed Sep 28 03:24:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1414: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 10953 at Wed Sep 28 03:24:30 UTC 2022 kill -USR1 10953 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10953 killed at Wed Sep 28 03:24:31 UTC 2022 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9223 starting at Wed Sep 28 03:24:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:24:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10995 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10995 found at Wed Sep 28 03:24:31 UTC 2022 selfserv_9223 with PID 10995 started at Wed Sep 28 03:24:31 UTC 2022 strsclnt -q -p 9223 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Sep 28 03:24:31 UTC 2022 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Sep 28 03:25:27 UTC 2022 ssl.sh: #1415: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9223 with PID 10995 at Wed Sep 28 03:25:27 UTC 2022 kill -USR1 10995 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10995 killed at Wed Sep 28 03:25:27 UTC 2022 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Wed Sep 28 03:25:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:25:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11061 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11061 found at Wed Sep 28 03:25:27 UTC 2022 selfserv_9223 with PID 11061 started at Wed Sep 28 03:25:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11061 at Wed Sep 28 03:25:32 UTC 2022 kill -USR1 11061 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11061 killed at Wed Sep 28 03:25:32 UTC 2022 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:25:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:25:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11103 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11103 found at Wed Sep 28 03:25:32 UTC 2022 selfserv_9223 with PID 11103 started at Wed Sep 28 03:25:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11103 at Wed Sep 28 03:25:36 UTC 2022 kill -USR1 11103 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11103 killed at Wed Sep 28 03:25:36 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:25:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:25:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11157 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11157 found at Wed Sep 28 03:25:36 UTC 2022 selfserv_9223 with PID 11157 started at Wed Sep 28 03:25:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1418: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 11157 at Wed Sep 28 03:25:39 UTC 2022 kill -USR1 11157 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11157 killed at Wed Sep 28 03:25:39 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:25:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:25:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11196 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11196 found at Wed Sep 28 03:25:40 UTC 2022 selfserv_9223 with PID 11196 started at Wed Sep 28 03:25:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11196 at Wed Sep 28 03:25:43 UTC 2022 kill -USR1 11196 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11196 killed at Wed Sep 28 03:25:43 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:25:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:25:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11235 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11235 found at Wed Sep 28 03:25:44 UTC 2022 selfserv_9223 with PID 11235 started at Wed Sep 28 03:25:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1420: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 11235 at Wed Sep 28 03:25:47 UTC 2022 kill -USR1 11235 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11235 killed at Wed Sep 28 03:25:47 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:25:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:25:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11274 found at Wed Sep 28 03:25:47 UTC 2022 selfserv_9223 with PID 11274 started at Wed Sep 28 03:25:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1421: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11274 at Wed Sep 28 03:25:50 UTC 2022 kill -USR1 11274 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11274 killed at Wed Sep 28 03:25:51 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:25:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:25:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11313 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11313 found at Wed Sep 28 03:25:51 UTC 2022 selfserv_9223 with PID 11313 started at Wed Sep 28 03:25:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1422: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11313 at Wed Sep 28 03:25:54 UTC 2022 kill -USR1 11313 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11313 killed at Wed Sep 28 03:25:55 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:25:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:25:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11353 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11353 found at Wed Sep 28 03:25:55 UTC 2022 selfserv_9223 with PID 11353 started at Wed Sep 28 03:25:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11353 at Wed Sep 28 03:25:58 UTC 2022 kill -USR1 11353 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11353 killed at Wed Sep 28 03:25:59 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:25:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:25:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11392 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11392 found at Wed Sep 28 03:25:59 UTC 2022 selfserv_9223 with PID 11392 started at Wed Sep 28 03:25:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1424: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11392 at Wed Sep 28 03:26:02 UTC 2022 kill -USR1 11392 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11392 killed at Wed Sep 28 03:26:03 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:26:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:26:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11431 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11431 found at Wed Sep 28 03:26:03 UTC 2022 selfserv_9223 with PID 11431 started at Wed Sep 28 03:26:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11431 at Wed Sep 28 03:26:06 UTC 2022 kill -USR1 11431 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11431 killed at Wed Sep 28 03:26:07 UTC 2022 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:26:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:26:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11470 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11470 found at Wed Sep 28 03:26:07 UTC 2022 selfserv_9223 with PID 11470 started at Wed Sep 28 03:26:07 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1426: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11470 at Wed Sep 28 03:26:10 UTC 2022 kill -USR1 11470 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11470 killed at Wed Sep 28 03:26:11 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:26:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:26:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11510 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11510 found at Wed Sep 28 03:26:11 UTC 2022 selfserv_9223 with PID 11510 started at Wed Sep 28 03:26:11 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1427: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 11510 at Wed Sep 28 03:26:14 UTC 2022 kill -USR1 11510 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11510 killed at Wed Sep 28 03:26:14 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:26:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:26:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11550 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11550 found at Wed Sep 28 03:26:14 UTC 2022 selfserv_9223 with PID 11550 started at Wed Sep 28 03:26:14 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1428: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11550 at Wed Sep 28 03:26:18 UTC 2022 kill -USR1 11550 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11550 killed at Wed Sep 28 03:26:18 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:26:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:26:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11590 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11590 found at Wed Sep 28 03:26:18 UTC 2022 selfserv_9223 with PID 11590 started at Wed Sep 28 03:26:18 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1429: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 11590 at Wed Sep 28 03:26:21 UTC 2022 kill -USR1 11590 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11590 killed at Wed Sep 28 03:26:21 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:26:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:26:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11630 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11630 found at Wed Sep 28 03:26:22 UTC 2022 selfserv_9223 with PID 11630 started at Wed Sep 28 03:26:22 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1430: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11630 at Wed Sep 28 03:26:25 UTC 2022 kill -USR1 11630 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11630 killed at Wed Sep 28 03:26:25 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:26:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:26:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11670 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11670 found at Wed Sep 28 03:26:26 UTC 2022 selfserv_9223 with PID 11670 started at Wed Sep 28 03:26:26 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1431: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11670 at Wed Sep 28 03:26:29 UTC 2022 kill -USR1 11670 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11670 killed at Wed Sep 28 03:26:29 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:26:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:26:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11710 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11710 found at Wed Sep 28 03:26:30 UTC 2022 selfserv_9223 with PID 11710 started at Wed Sep 28 03:26:30 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1432: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11710 at Wed Sep 28 03:26:33 UTC 2022 kill -USR1 11710 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11710 killed at Wed Sep 28 03:26:33 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:26:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:26:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11750 found at Wed Sep 28 03:26:34 UTC 2022 selfserv_9223 with PID 11750 started at Wed Sep 28 03:26:34 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1433: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11750 at Wed Sep 28 03:26:37 UTC 2022 kill -USR1 11750 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11750 killed at Wed Sep 28 03:26:37 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:26:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:26:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11805 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11805 found at Wed Sep 28 03:26:38 UTC 2022 selfserv_9223 with PID 11805 started at Wed Sep 28 03:26:38 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1434: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11805 at Wed Sep 28 03:26:41 UTC 2022 kill -USR1 11805 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11805 killed at Wed Sep 28 03:26:41 UTC 2022 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9223 starting at Wed Sep 28 03:26:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:26:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 11845 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11845 found at Wed Sep 28 03:26:42 UTC 2022 selfserv_9223 with PID 11845 started at Wed Sep 28 03:26:42 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1435: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 11845 at Wed Sep 28 03:27:36 UTC 2022 kill -USR1 11845 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11845 killed at Wed Sep 28 03:27:36 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Wed Sep 28 03:27:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:27:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: exiting with return code 0 kill -0 12411 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12411 found at Wed Sep 28 03:27:37 UTC 2022 selfserv_9223 with PID 12411 started at Wed Sep 28 03:27:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1500: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1501: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1502: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1503: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1504: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1505: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1506: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1507: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1508: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1509: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1510: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1511: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1512: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1513: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1514: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1515: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1516: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1517: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1518: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1519: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1520: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1521: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1522: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1523: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1524: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1525: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1526: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1527: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1528: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1556: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1557: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1558: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1559: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1560: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1561: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12411 at Wed Sep 28 03:29:02 UTC 2022 kill -USR1 12411 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12411 killed at Wed Sep 28 03:29:02 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:29:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:29:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13249 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13249 found at Wed Sep 28 03:29:03 UTC 2022 selfserv_9223 with PID 13249 started at Wed Sep 28 03:29:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1562: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 13249 at Wed Sep 28 03:29:18 UTC 2022 kill -USR1 13249 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13249 killed at Wed Sep 28 03:29:18 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:29:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:29:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13301 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13301 found at Wed Sep 28 03:29:19 UTC 2022 selfserv_9223 with PID 13301 started at Wed Sep 28 03:29:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1563: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 13301 at Wed Sep 28 03:29:46 UTC 2022 kill -USR1 13301 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13301 killed at Wed Sep 28 03:29:46 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:29:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:29:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13368 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13368 found at Wed Sep 28 03:29:47 UTC 2022 selfserv_9223 with PID 13368 started at Wed Sep 28 03:29:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13368 at Wed Sep 28 03:29:59 UTC 2022 kill -USR1 13368 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13368 killed at Wed Sep 28 03:29:59 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:29:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:29:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13432 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13432 found at Wed Sep 28 03:30:00 UTC 2022 selfserv_9223 with PID 13432 started at Wed Sep 28 03:30:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1565: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 13432 at Wed Sep 28 03:30:15 UTC 2022 kill -USR1 13432 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13432 killed at Wed Sep 28 03:30:15 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:30:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:30:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13560 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13560 found at Wed Sep 28 03:30:15 UTC 2022 selfserv_9223 with PID 13560 started at Wed Sep 28 03:30:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1566: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 13560 at Wed Sep 28 03:30:41 UTC 2022 kill -USR1 13560 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13560 killed at Wed Sep 28 03:30:41 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:30:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:30:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13627 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13627 found at Wed Sep 28 03:30:41 UTC 2022 selfserv_9223 with PID 13627 started at Wed Sep 28 03:30:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1567: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13627 at Wed Sep 28 03:30:54 UTC 2022 kill -USR1 13627 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13627 killed at Wed Sep 28 03:30:54 UTC 2022 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:30:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:30:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13692 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13692 found at Wed Sep 28 03:30:54 UTC 2022 selfserv_9223 with PID 13692 started at Wed Sep 28 03:30:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1568: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 13692 at Wed Sep 28 03:31:10 UTC 2022 kill -USR1 13692 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13692 killed at Wed Sep 28 03:31:10 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:31:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:31:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13744 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13744 found at Wed Sep 28 03:31:10 UTC 2022 selfserv_9223 with PID 13744 started at Wed Sep 28 03:31:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1569: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 13744 at Wed Sep 28 03:31:36 UTC 2022 kill -USR1 13744 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13744 killed at Wed Sep 28 03:31:36 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:31:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:31:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13812 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13812 found at Wed Sep 28 03:31:36 UTC 2022 selfserv_9223 with PID 13812 started at Wed Sep 28 03:31:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13812 at Wed Sep 28 03:31:49 UTC 2022 kill -USR1 13812 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13812 killed at Wed Sep 28 03:31:49 UTC 2022 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:31:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:31:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13876 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13876 found at Wed Sep 28 03:31:50 UTC 2022 selfserv_9223 with PID 13876 started at Wed Sep 28 03:31:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1571: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 13876 at Wed Sep 28 03:32:05 UTC 2022 kill -USR1 13876 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13876 killed at Wed Sep 28 03:32:05 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:32:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:32:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13931 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13931 found at Wed Sep 28 03:32:06 UTC 2022 selfserv_9223 with PID 13931 started at Wed Sep 28 03:32:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1572: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 13931 at Wed Sep 28 03:32:31 UTC 2022 kill -USR1 13931 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13931 killed at Wed Sep 28 03:32:31 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:32:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:32:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13983 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13983 found at Wed Sep 28 03:32:32 UTC 2022 selfserv_9223 with PID 13983 started at Wed Sep 28 03:32:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1573: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13983 at Wed Sep 28 03:32:44 UTC 2022 kill -USR1 13983 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13983 killed at Wed Sep 28 03:32:44 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:32:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:32:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14063 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14063 found at Wed Sep 28 03:32:45 UTC 2022 selfserv_9223 with PID 14063 started at Wed Sep 28 03:32:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1574: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 14063 at Wed Sep 28 03:33:00 UTC 2022 kill -USR1 14063 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14063 killed at Wed Sep 28 03:33:00 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:33:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:33:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14115 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14115 found at Wed Sep 28 03:33:01 UTC 2022 selfserv_9223 with PID 14115 started at Wed Sep 28 03:33:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1575: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 14115 at Wed Sep 28 03:33:24 UTC 2022 kill -USR1 14115 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14115 killed at Wed Sep 28 03:33:25 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:33:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:33:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14167 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14167 found at Wed Sep 28 03:33:25 UTC 2022 selfserv_9223 with PID 14167 started at Wed Sep 28 03:33:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1576: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14167 at Wed Sep 28 03:33:38 UTC 2022 kill -USR1 14167 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14167 killed at Wed Sep 28 03:33:38 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:33:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:33:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14238 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14238 found at Wed Sep 28 03:33:38 UTC 2022 selfserv_9223 with PID 14238 started at Wed Sep 28 03:33:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1577: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14238 at Wed Sep 28 03:33:50 UTC 2022 kill -USR1 14238 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14238 killed at Wed Sep 28 03:33:51 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 03:33:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:33:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14294 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14294 found at Wed Sep 28 03:33:51 UTC 2022 selfserv_9223 with PID 14294 started at Wed Sep 28 03:33:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1578: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 14294 at Wed Sep 28 03:34:06 UTC 2022 kill -USR1 14294 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14294 killed at Wed Sep 28 03:34:07 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:34:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:34:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14350 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14350 found at Wed Sep 28 03:34:07 UTC 2022 selfserv_9223 with PID 14350 started at Wed Sep 28 03:34:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1579: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14350 at Wed Sep 28 03:34:24 UTC 2022 kill -USR1 14350 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14350 killed at Wed Sep 28 03:34:24 UTC 2022 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:34:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:34:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14410 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14410 found at Wed Sep 28 03:34:24 UTC 2022 selfserv_9223 with PID 14410 started at Wed Sep 28 03:34:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1580: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 14410 at Wed Sep 28 03:34:52 UTC 2022 kill -USR1 14410 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14410 killed at Wed Sep 28 03:34:52 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:34:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:34:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14478 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14478 found at Wed Sep 28 03:34:52 UTC 2022 selfserv_9223 with PID 14478 started at Wed Sep 28 03:34:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1581: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14478 at Wed Sep 28 03:35:03 UTC 2022 kill -USR1 14478 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14478 killed at Wed Sep 28 03:35:04 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:35:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:35:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14538 found at Wed Sep 28 03:35:04 UTC 2022 selfserv_9223 with PID 14538 started at Wed Sep 28 03:35:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1582: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 14538 at Wed Sep 28 03:35:29 UTC 2022 kill -USR1 14538 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14538 killed at Wed Sep 28 03:35:29 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:35:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:35:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14590 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14590 found at Wed Sep 28 03:35:30 UTC 2022 selfserv_9223 with PID 14590 started at Wed Sep 28 03:35:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1583: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14590 at Wed Sep 28 03:35:41 UTC 2022 kill -USR1 14590 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14590 killed at Wed Sep 28 03:35:41 UTC 2022 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:35:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:35:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14666 found at Wed Sep 28 03:35:42 UTC 2022 selfserv_9223 with PID 14666 started at Wed Sep 28 03:35:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1584: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 14666 at Wed Sep 28 03:36:07 UTC 2022 kill -USR1 14666 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14666 killed at Wed Sep 28 03:36:07 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:36:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:36:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14718 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14718 found at Wed Sep 28 03:36:08 UTC 2022 selfserv_9223 with PID 14718 started at Wed Sep 28 03:36:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1585: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14718 at Wed Sep 28 03:36:19 UTC 2022 kill -USR1 14718 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14718 killed at Wed Sep 28 03:36:19 UTC 2022 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:36:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:36:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14778 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14778 found at Wed Sep 28 03:36:20 UTC 2022 selfserv_9223 with PID 14778 started at Wed Sep 28 03:36:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1586: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 14778 at Wed Sep 28 03:36:45 UTC 2022 kill -USR1 14778 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14778 killed at Wed Sep 28 03:36:45 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:36:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:36:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14845 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14845 found at Wed Sep 28 03:36:46 UTC 2022 selfserv_9223 with PID 14845 started at Wed Sep 28 03:36:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14845 at Wed Sep 28 03:36:57 UTC 2022 kill -USR1 14845 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14845 killed at Wed Sep 28 03:36:57 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 03:36:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:36:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14905 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14905 found at Wed Sep 28 03:36:58 UTC 2022 selfserv_9223 with PID 14905 started at Wed Sep 28 03:36:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1588: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 14905 at Wed Sep 28 03:37:21 UTC 2022 kill -USR1 14905 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14905 killed at Wed Sep 28 03:37:21 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:37:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:37:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14957 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14957 found at Wed Sep 28 03:37:22 UTC 2022 selfserv_9223 with PID 14957 started at Wed Sep 28 03:37:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1589: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14957 at Wed Sep 28 03:37:33 UTC 2022 kill -USR1 14957 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14957 killed at Wed Sep 28 03:37:33 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:37:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:37:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15009 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15009 found at Wed Sep 28 03:37:34 UTC 2022 selfserv_9223 with PID 15009 started at Wed Sep 28 03:37:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1590: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15009 at Wed Sep 28 03:37:49 UTC 2022 kill -USR1 15009 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15009 killed at Wed Sep 28 03:37:49 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 03:37:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:37:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15076 found at Wed Sep 28 03:37:50 UTC 2022 selfserv_9223 with PID 15076 started at Wed Sep 28 03:37:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1591: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15076 at Wed Sep 28 03:38:05 UTC 2022 kill -USR1 15076 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15076 killed at Wed Sep 28 03:38:06 UTC 2022 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Wed Sep 28 03:38:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:38:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15159 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15159 found at Wed Sep 28 03:38:06 UTC 2022 selfserv_9223 with PID 15159 started at Wed Sep 28 03:38:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1562: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15159 at Wed Sep 28 03:38:14 UTC 2022 kill -USR1 15159 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15159 killed at Wed Sep 28 03:38:14 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:38:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:38:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15201 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15201 found at Wed Sep 28 03:38:14 UTC 2022 selfserv_9223 with PID 15201 started at Wed Sep 28 03:38:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15201 at Wed Sep 28 03:38:20 UTC 2022 kill -USR1 15201 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15201 killed at Wed Sep 28 03:38:20 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:38:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:38:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15240 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15240 found at Wed Sep 28 03:38:20 UTC 2022 selfserv_9223 with PID 15240 started at Wed Sep 28 03:38:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1564: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 15240 at Wed Sep 28 03:38:25 UTC 2022 kill -USR1 15240 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15240 killed at Wed Sep 28 03:38:25 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:38:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:38:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15279 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15279 found at Wed Sep 28 03:38:26 UTC 2022 selfserv_9223 with PID 15279 started at Wed Sep 28 03:38:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1565: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15279 at Wed Sep 28 03:38:31 UTC 2022 kill -USR1 15279 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15279 killed at Wed Sep 28 03:38:31 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:38:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:38:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15318 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15318 found at Wed Sep 28 03:38:32 UTC 2022 selfserv_9223 with PID 15318 started at Wed Sep 28 03:38:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1566: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 15318 at Wed Sep 28 03:38:37 UTC 2022 kill -USR1 15318 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15318 killed at Wed Sep 28 03:38:37 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:38:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:38:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15372 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15372 found at Wed Sep 28 03:38:37 UTC 2022 selfserv_9223 with PID 15372 started at Wed Sep 28 03:38:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1567: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15372 at Wed Sep 28 03:38:43 UTC 2022 kill -USR1 15372 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15372 killed at Wed Sep 28 03:38:43 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:38:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:38:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15411 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15411 found at Wed Sep 28 03:38:43 UTC 2022 selfserv_9223 with PID 15411 started at Wed Sep 28 03:38:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1568: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15411 at Wed Sep 28 03:38:49 UTC 2022 kill -USR1 15411 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15411 killed at Wed Sep 28 03:38:49 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:38:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:38:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15450 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15450 found at Wed Sep 28 03:38:50 UTC 2022 selfserv_9223 with PID 15450 started at Wed Sep 28 03:38:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1569: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15450 at Wed Sep 28 03:38:55 UTC 2022 kill -USR1 15450 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15450 killed at Wed Sep 28 03:38:55 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:38:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:38:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15489 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15489 found at Wed Sep 28 03:38:56 UTC 2022 selfserv_9223 with PID 15489 started at Wed Sep 28 03:38:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15489 at Wed Sep 28 03:39:01 UTC 2022 kill -USR1 15489 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15489 killed at Wed Sep 28 03:39:01 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:39:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:39:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15528 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15528 found at Wed Sep 28 03:39:02 UTC 2022 selfserv_9223 with PID 15528 started at Wed Sep 28 03:39:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1571: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15528 at Wed Sep 28 03:39:07 UTC 2022 kill -USR1 15528 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15528 killed at Wed Sep 28 03:39:07 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:39:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:39:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15567 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15567 found at Wed Sep 28 03:39:08 UTC 2022 selfserv_9223 with PID 15567 started at Wed Sep 28 03:39:08 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1572: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15567 at Wed Sep 28 03:39:13 UTC 2022 kill -USR1 15567 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15567 killed at Wed Sep 28 03:39:14 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:39:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:39:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15610 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15610 found at Wed Sep 28 03:39:14 UTC 2022 selfserv_9223 with PID 15610 started at Wed Sep 28 03:39:14 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1573: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 15610 at Wed Sep 28 03:39:19 UTC 2022 kill -USR1 15610 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15610 killed at Wed Sep 28 03:39:19 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:39:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:39:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15653 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15653 found at Wed Sep 28 03:39:19 UTC 2022 selfserv_9223 with PID 15653 started at Wed Sep 28 03:39:19 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1574: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15653 at Wed Sep 28 03:39:25 UTC 2022 kill -USR1 15653 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15653 killed at Wed Sep 28 03:39:25 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:39:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:39:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15694 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15694 found at Wed Sep 28 03:39:26 UTC 2022 selfserv_9223 with PID 15694 started at Wed Sep 28 03:39:26 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1575: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 15694 at Wed Sep 28 03:39:30 UTC 2022 kill -USR1 15694 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15694 killed at Wed Sep 28 03:39:31 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:39:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:39:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15734 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15734 found at Wed Sep 28 03:39:31 UTC 2022 selfserv_9223 with PID 15734 started at Wed Sep 28 03:39:31 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1576: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15734 at Wed Sep 28 03:39:37 UTC 2022 kill -USR1 15734 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15734 killed at Wed Sep 28 03:39:37 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:39:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:39:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15790 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15790 found at Wed Sep 28 03:39:37 UTC 2022 selfserv_9223 with PID 15790 started at Wed Sep 28 03:39:37 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1577: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15790 at Wed Sep 28 03:39:43 UTC 2022 kill -USR1 15790 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15790 killed at Wed Sep 28 03:39:43 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:39:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:39:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15830 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15830 found at Wed Sep 28 03:39:43 UTC 2022 selfserv_9223 with PID 15830 started at Wed Sep 28 03:39:43 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1578: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15830 at Wed Sep 28 03:39:49 UTC 2022 kill -USR1 15830 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15830 killed at Wed Sep 28 03:39:49 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:39:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:39:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15870 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15870 found at Wed Sep 28 03:39:49 UTC 2022 selfserv_9223 with PID 15870 started at Wed Sep 28 03:39:49 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1579: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15870 at Wed Sep 28 03:39:55 UTC 2022 kill -USR1 15870 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15870 killed at Wed Sep 28 03:39:55 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 03:39:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 03:39:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 15910 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 15910 found at Wed Sep 28 03:39:55 UTC 2022 selfserv_9223 with PID 15910 started at Wed Sep 28 03:39:55 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1580: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 15910 at Wed Sep 28 03:40:01 UTC 2022 kill -USR1 15910 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 15910 killed at Wed Sep 28 03:40:01 UTC 2022 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -fips false -force FIPS mode disabled. ssl.sh: #1581: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/client -list ssl.sh: #1582: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1583: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -fips false -force FIPS mode disabled. ssl.sh: #1584: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/ext_client -list ssl.sh: #1585: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1586: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Wed Sep 28 03:40:03 UTC 2022 Running tests for ocsp TIMESTAMP ocsp BEGIN: Wed Sep 28 03:40:03 UTC 2022 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Wed Sep 28 03:40:03 UTC 2022 Running tests for merge TIMESTAMP merge BEGIN: Wed Sep 28 03:40:03 UTC 2022 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests.v3.3122 -t Test2 -f ../tests.pw merge.sh: #1: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #2: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #3: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #4: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #6: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:47:03 2022 Not After : Tue Sep 28 00:47:03 2027 Subject: "CN=TestUser45,E=TestUser45@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:ca:ef:28:3d:fc:46:ae:f5:58:09:66:b8:8b:3c:d1: fc:9f:d4:12:31:a0:cf:72:7c:ec:0f:57:9c:60:bf:84: fe:d2:9d:72:77:79:f2:de:99:8c:ed:de:ad:4f:3a:2d: 19:2d:19:cf:d0:9c:a3:c3:88:d5:4f:c1:92:3c:5e:d2: e0:7f:32:58:a5:1c:9b:29:85:2d:33:65:09:be:61:04: ca:3f:74:0a:f3:88:6f:c3:e7:00:9e:a6:2c:62:b9:a6: e5:a7:d7:24:23:46:16:89:b7:4b:89:76:48:e5:e5:79: 71:44:6c:10:4d:46:86:68:b0:2d:d0:11:5c:fb:0c:e4: 2d:0b:29:d9:90:28:1f:eb:70:f5:5a:bf:0b:65:b5:84: ec:79:10:91:ac:e1:83:bf:37:59:ec:fe:4d:9c:58:b4: bf:0f:33:ac:03:09:03:11:7c:e6:2f:4d:a0:ac:2e:61: 5c:10:14:df:6b:77:87:f0:11:2d:fc:99:9d:9c:65:66: ee:1f:79:55:7b:8f:d5:7d:10:10:e3:ac:c7:1d:d7:ad: 33:c2:63:fe:99:36:43:5c:73:10:50:86:bf:10:a9:10: 27:3d:9d:a8:ae:f9:62:d6:42:f8:4f:5d:cc:ed:b6:85: 01:d3:ad:4a:2a:48:50:08:2e:cc:c7:b7:0f:86:ea:fb Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:70:fd:3c:ef:54:18:98:9e:ab:c1:b7:30:27:84:ad: bd:39:45:ad:54:f3:a1:2c:4b:ec:f1:1b:0d:14:17:6b: d2:cb:bf:6f:68:df:fe:92:fa:50:38:3b:11:2e:dd:08: 9b:26:6a:47:53:3f:09:d5:3c:b8:78:9b:83:f7:d8:3d: 3c:c1:f3:19:d4:85:2e:3c:81:9d:91:cd:86:b2:4d:4c: 4d:9c:be:e5:c9:c1:87:29:67:15:dc:86:c7:98:7f:2c: 20:e5:08:45:c7:20:5a:81:8a:a3:13:f3:92:63:df:39: 6c:23:e5:2f:f1:62:8e:8e:be:66:35:93:35:54:94:3c: 44:71:a0:c0:83:31:6b:38:b6:cb:c3:65:c7:41:9b:34: 64:be:de:ed:e3:a4:9a:e3:77:89:9a:56:92:cc:6e:86: b5:6f:e4:82:57:58:89:19:41:6f:4e:b0:9c:c1:38:c8: e8:d3:1e:7c:21:c7:a7:a6:4b:99:9d:7c:a2:49:5e:fc: 54:21:88:f2:95:b8:28:4b:bf:2c:7a:a6:4d:48:b6:4c: 45:c4:32:f8:b0:52:05:61:fb:f5:04:70:da:36:a5:3e: 38:72:96:f8:cc:29:ff:db:b4:89:45:55:0a:1b:bc:91: 84:a5:76:7d:e9:8d:6b:8c:14:86:1f:77:12:61:40:62 Fingerprint (SHA-256): CB:DB:95:3A:92:71:A3:6C:7F:9B:E1:42:B6:DE:D0:2B:A7:4E:3B:8A:A0:00:02:61:B0:2B:F2:1F:0D:A4:79:4C Fingerprint (SHA1): CE:E6:B3:D5:95:6E:C1:DA:C6:26:7F:47:AF:C0:7B:F5:D2:1B:D2:98 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #7: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Sep 28 00:47:23 2022 Not After : Tue Sep 28 00:47:23 2027 Subject: "CN=TestUser46,E=TestUser46@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:fc:27:d9:2e:9a:18:dc:22:93:03:40:c7:04:76:4d: be:81:2e:41:2e:8d:9a:75:00:f7:5d:51:b7:2b:22:9c: 2b:86:fe:dd:30:6d:91:ae:40:f9:58:25:da:dc:22:aa: 55:e1:c9:a0:41:0b:8c:9a:0c:a2:e2:e1:d5:43:31:26: 36:b7:18:7b:69:1d:f5:2c:e6:c2:36:dc:39:ff:5e:85: 82:5f:7b:d7:40:af:87:f2:36:8a:19:ee:5d:cd:82:b0: 10:d7:42:e6:c3:dc:8a:9e:10:c2:d9:3b:21:70:aa:85: 49:17:67:6d:b1:f3:4c:e4:a4:77:d7:61:e2:b2:49:79: 1e:dd:be:7a:4d:48:e3:1b:2b:76:be:ce:c4:4b:79:77: c7:3f:4f:f2:8a:c0:de:be:0a:81:28:e9:88:2b:af:52: 8a:38:c1:ff:a4:e8:83:c1:a4:3d:14:cf:ad:0f:27:4a: 81:c6:11:c2:cb:5f:ce:7d:6b:29:ca:9f:f2:b9:91:6c: 14:fd:f6:74:ef:19:94:43:28:ee:04:fa:91:ad:34:e6: 2d:15:c5:7d:db:bf:98:2a:7d:6d:57:a8:d9:c1:b8:70: bc:05:4d:53:93:d9:5c:76:a8:7c:d2:9a:ba:b3:71:30: 28:1c:54:34:8a:2c:4c:f5:f6:2a:db:9b:af:91:0e:75 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:48:f8:b0:03:6d:ad:46:f4:04:2d:03:0d:fa:64:a4: 3f:7b:fd:5e:ef:cd:1d:10:2a:69:4e:ff:cd:eb:e6:7a: d5:a8:92:e0:2b:8b:2c:e4:18:90:8e:14:22:ab:4a:ab: a5:1d:d6:52:f8:42:45:f8:1f:9a:df:5c:f6:8b:dd:bb: bd:82:41:1e:37:6d:27:8b:b3:87:0d:29:0d:df:56:6d: 9e:16:b7:75:4e:4f:7c:47:d6:9f:8c:58:20:93:83:09: 3c:4f:81:02:41:fc:91:bb:27:d4:c9:7e:f8:90:b2:52: a1:d1:fa:55:66:b7:67:ec:2a:ed:5d:58:52:43:3d:bc: b5:95:1c:90:04:e0:b2:69:67:12:75:65:85:b9:0f:bb: d9:f5:c4:0e:fd:cf:a1:09:c3:26:dc:13:62:59:54:37: 22:2e:5c:5e:47:d6:31:7f:06:17:ac:34:d9:c1:44:db: a4:64:c1:b6:35:69:24:75:3b:00:9e:b8:5c:d0:13:ed: ae:53:37:25:bc:06:a3:f7:1d:4d:83:e7:da:67:cd:f1: 4c:38:57:f9:76:ae:2c:82:6d:ec:27:9e:bc:75:8e:8a: 7e:b7:78:08:25:1d:7c:c5:a0:0d:2e:ac:0d:cc:5d:96: 15:2b:ca:30:87:05:00:7d:59:c0:04:18:42:81:c2:d2 Fingerprint (SHA-256): 7F:5B:00:B8:4C:1C:FC:66:89:F5:E5:60:CE:80:95:8B:F5:95:B2:EB:A7:0C:4E:D5:16:18:81:94:A7:52:EF:64 Fingerprint (SHA1): AA:65:DF:58:23:95:BD:4C:C6:35:6F:1D:24:FA:0B:21:38:09:67:F1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #8: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #9: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA CT,C,C TestCA-dsa CT,C,C TestCA-ec CT,C,C Alice u,u,u Alice-dsa u,u,u Alice-dsamixed u,u,u Alice-ec u,u,u Alice-ecmixed u,u,u TestUser-rsa-pss-interop u,u,u Alice-rsa-pss u,u,u bob@example.com ,, Dave u,u,u eve@example.com ,, bob-ec@example.com ,, Dave-ec u,u,u Dave-dsa u,u,u Dave-dsamixed u,u,u Dave-ecmixed u,u,u Dave-rsa-pss u,u,u localhost.localdomain u,u,u localhost.localdomain-dsa u,u,u localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u localhost.localdomain-ecmixed u,u,u localhost.localdomain-rsa-pss u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-dsa u,u,u localhost-sni.localdomain-dsamixed u,u,u localhost-sni.localdomain-ec u,u,u localhost-sni.localdomain-ecmixed u,u,u localhost-sni.localdomain-rsa-pss u,u,u ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-dsa u,u,u serverCA-dsa C,C,C ExtendedSSLUser-dsamixed u,u,u ExtendedSSLUser-ec u,u,u serverCA-ec C,C,C ExtendedSSLUser-ecmixed u,u,u clientCA T,C,C chain-1-clientCA-dsa ,, clientCA-dsa T,C,C chain-2-clientCA-ec ,, chain-2-clientCA-dsa ,, chain-1-clientCA ,, chain-2-clientCA ,, chain-1-clientCA-ec ,, clientCA-ec T,C,C Alice #2 ,, Alice #1 ,, Alice #99 ,, Alice #3 ,, Alice #4 ,, Alice #100 ,, CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests.v3.3122 -t Test2 -f ../tests.pw merge.sh: #10: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests.v1.3122 -t Test1 -f ../tests.pw merge.sh: #11: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #12: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . This is a test message from Alice to Bob. merge.sh: #13: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #14: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Wed Sep 28 00:49:55 2022 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Wed Sep 28 00:35:22 2022 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Wed Sep 28 00:49:46 2022 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #15: Verifying TestCA CRL - PASSED TEST_MODE=SHARED_DB NSS_DEFAULT_DB_TYPE=sql TIMESTAMP merge END: Wed Sep 28 03:41:09 UTC 2022 Running tests for pkits TIMESTAMP pkits BEGIN: Wed Sep 28 03:41:09 UTC 2022 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Wed Sep 28 03:41:09 UTC 2022 Running tests for chains TIMESTAMP chains BEGIN: Wed Sep 28 03:41:09 UTC 2022 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #1: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034110 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #3: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #4: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #5: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #9: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #10: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #14: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #15: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #16: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9234 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #17: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #18: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #19: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #20: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -2 -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #21: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #22: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #23: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #24: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -2 -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #25: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #26: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #27: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #28: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -2 -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #29: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #30: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #31: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #32: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -2 -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #33: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #34: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #35: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #36: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -2 -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #37: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9234 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #38: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #39: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #40: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -2 -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #41: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #42: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #43: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #44: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -2 -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #45: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #46: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #47: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #48: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -2 -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #49: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9234 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #50: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #51: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #52: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -2 -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #53: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #54: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #55: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #56: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -2 -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #57: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9233/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #58: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #59: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #60: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -2 -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #61: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9234 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #62: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #63: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20220928034302Z nextupdate=20230928034302Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Wed Sep 28 03:43:02 2022 Next Update: Thu Sep 28 03:43:02 2023 CRL Extensions: chains.sh: #64: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20220928034304Z addcert 2 20220928034304Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Wed Sep 28 03:43:04 2022 Next Update: Thu Sep 28 03:43:02 2023 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Sep 28 03:43:04 2022 CRL Extensions: chains.sh: #65: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20220928034306Z nextupdate=20230928034306Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed Sep 28 03:43:06 2022 Next Update: Thu Sep 28 03:43:06 2023 CRL Extensions: chains.sh: #66: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20220928034308Z addcert 2 20220928034308Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed Sep 28 03:43:08 2022 Next Update: Thu Sep 28 03:43:06 2023 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Sep 28 03:43:08 2022 CRL Extensions: chains.sh: #67: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20220928034310Z addcert 4 20220928034310Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed Sep 28 03:43:10 2022 Next Update: Thu Sep 28 03:43:06 2023 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Sep 28 03:43:08 2022 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Wed Sep 28 03:43:10 2022 CRL Extensions: chains.sh: #68: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20220928034312Z nextupdate=20230928034312Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed Sep 28 03:43:12 2022 Next Update: Thu Sep 28 03:43:12 2023 CRL Extensions: chains.sh: #69: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20220928034314Z addcert 2 20220928034314Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed Sep 28 03:43:14 2022 Next Update: Thu Sep 28 03:43:12 2023 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Sep 28 03:43:14 2022 CRL Extensions: chains.sh: #70: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20220928034316Z addcert 3 20220928034316Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed Sep 28 03:43:16 2022 Next Update: Thu Sep 28 03:43:12 2023 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Sep 28 03:43:14 2022 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Wed Sep 28 03:43:16 2022 CRL Extensions: chains.sh: #71: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20220928034318Z nextupdate=20230928034318Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed Sep 28 03:43:18 2022 Next Update: Thu Sep 28 03:43:18 2023 CRL Extensions: chains.sh: #72: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20220928034320Z addcert 2 20220928034320Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed Sep 28 03:43:20 2022 Next Update: Thu Sep 28 03:43:18 2023 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Sep 28 03:43:20 2022 CRL Extensions: chains.sh: #73: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20220928034322Z addcert 3 20220928034322Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed Sep 28 03:43:22 2022 Next Update: Thu Sep 28 03:43:18 2023 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Sep 28 03:43:20 2022 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Wed Sep 28 03:43:22 2022 CRL Extensions: chains.sh: #74: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #75: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #76: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #77: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #78: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #79: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #80: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #81: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #82: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #83: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #84: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #85: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #86: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #87: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #88: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #89: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #90: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #91: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #92: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #93: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #94: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #95: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #96: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #97: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #98: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #99: IPsec: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034111 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #100: IPsec: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #101: IPsec: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #102: IPsec: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #103: IPsec: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 928034112 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #104: IPsec: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #105: IPsec: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB NoKUDB certutil -N -d NoKUDB -f NoKUDB/dbpasswd chains.sh: #106: IPsec: Creating DB NoKUDB - PASSED chains.sh: Creating EE certifiate request NoKUReq.der certutil -s "CN=NoKU EE, O=NoKU, C=US" -R -2 -d NoKUDB -f NoKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o NoKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #107: IPsec: Creating EE certifiate request NoKUReq.der - PASSED chains.sh: Creating certficate NoKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoKUReq.der -o NoKUCA1.der -f CA1DB/dbpasswd -m 928034113 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #108: IPsec: Creating certficate NoKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoKUCA1.der to NoKUDB database certutil -A -n NoKU -t u,u,u -d NoKUDB -f NoKUDB/dbpasswd -i NoKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #109: IPsec: Importing certificate NoKUCA1.der to NoKUDB database - PASSED chains.sh: Creating DB DigSigDB certutil -N -d DigSigDB -f DigSigDB/dbpasswd chains.sh: #110: IPsec: Creating DB DigSigDB - PASSED chains.sh: Creating EE certifiate request DigSigReq.der certutil -s "CN=DigSig EE, O=DigSig, C=US" -R -2 -d DigSigDB -f DigSigDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o DigSigReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #111: IPsec: Creating EE certifiate request DigSigReq.der - PASSED chains.sh: Creating certficate DigSigCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigReq.der -o DigSigCA1.der -f CA1DB/dbpasswd -m 928034114 --keyUsage digitalSignature < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #112: IPsec: Creating certficate DigSigCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigCA1.der to DigSigDB database certutil -A -n DigSig -t u,u,u -d DigSigDB -f DigSigDB/dbpasswd -i DigSigCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #113: IPsec: Importing certificate DigSigCA1.der to DigSigDB database - PASSED chains.sh: Creating DB NonRepDB certutil -N -d NonRepDB -f NonRepDB/dbpasswd chains.sh: #114: IPsec: Creating DB NonRepDB - PASSED chains.sh: Creating EE certifiate request NonRepReq.der certutil -s "CN=NonRep EE, O=NonRep, C=US" -R -2 -d NonRepDB -f NonRepDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o NonRepReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #115: IPsec: Creating EE certifiate request NonRepReq.der - PASSED chains.sh: Creating certficate NonRepCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonRepReq.der -o NonRepCA1.der -f CA1DB/dbpasswd -m 928034115 --keyUsage nonRepudiation < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #116: IPsec: Creating certficate NonRepCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonRepCA1.der to NonRepDB database certutil -A -n NonRep -t u,u,u -d NonRepDB -f NonRepDB/dbpasswd -i NonRepCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #117: IPsec: Importing certificate NonRepCA1.der to NonRepDB database - PASSED chains.sh: Creating DB DigSigNonRepAndExtraDB certutil -N -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd chains.sh: #118: IPsec: Creating DB DigSigNonRepAndExtraDB - PASSED chains.sh: Creating EE certifiate request DigSigNonRepAndExtraReq.der certutil -s "CN=DigSigNonRepAndExtra EE, O=DigSigNonRepAndExtra, C=US" -R -2 -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o DigSigNonRepAndExtraReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #119: IPsec: Creating EE certifiate request DigSigNonRepAndExtraReq.der - PASSED chains.sh: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigNonRepAndExtraReq.der -o DigSigNonRepAndExtraCA1.der -f CA1DB/dbpasswd -m 928034116 --keyUsage digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #120: IPsec: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database certutil -A -n DigSigNonRepAndExtra -t u,u,u -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -i DigSigNonRepAndExtraCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #121: IPsec: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database - PASSED chains.sh: Creating DB NoMatchDB certutil -N -d NoMatchDB -f NoMatchDB/dbpasswd chains.sh: #122: IPsec: Creating DB NoMatchDB - PASSED chains.sh: Creating EE certifiate request NoMatchReq.der certutil -s "CN=NoMatch EE, O=NoMatch, C=US" -R -2 -d NoMatchDB -f NoMatchDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o NoMatchReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #123: IPsec: Creating EE certifiate request NoMatchReq.der - PASSED chains.sh: Creating certficate NoMatchCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoMatchReq.der -o NoMatchCA1.der -f CA1DB/dbpasswd -m 928034117 --keyUsage keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #124: IPsec: Creating certficate NoMatchCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoMatchCA1.der to NoMatchDB database certutil -A -n NoMatch -t u,u,u -d NoMatchDB -f NoMatchDB/dbpasswd -i NoMatchCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #125: IPsec: Importing certificate NoMatchCA1.der to NoMatchDB database - PASSED chains.sh: Creating DB NonCriticalServerAuthEKUDB certutil -N -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd chains.sh: #126: IPsec: Creating DB NonCriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request NonCriticalServerAuthEKUReq.der certutil -s "CN=NonCriticalServerAuthEKU EE, O=NonCriticalServerAuthEKU, C=US" -R -2 -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o NonCriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #127: IPsec: Creating EE certifiate request NonCriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonCriticalServerAuthEKUReq.der -o NonCriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 928034118 --extKeyUsage serverAuth < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #128: IPsec: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database certutil -A -n NonCriticalServerAuthEKU -t u,u,u -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -i NonCriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #129: IPsec: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB NonIPSECEKUDB certutil -N -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd chains.sh: #130: IPsec: Creating DB NonIPSECEKUDB - PASSED chains.sh: Creating EE certifiate request NonIPSECEKUReq.der certutil -s "CN=NonIPSECEKU EE, O=NonIPSECEKU, C=US" -R -2 -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o NonIPSECEKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #131: IPsec: Creating EE certifiate request NonIPSECEKUReq.der - PASSED chains.sh: Creating certficate NonIPSECEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonIPSECEKUReq.der -o NonIPSECEKUCA1.der -f CA1DB/dbpasswd -m 928034119 --extKeyUsage codeSigning < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #132: IPsec: Creating certficate NonIPSECEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database certutil -A -n NonIPSECEKU -t u,u,u -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -i NonIPSECEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #133: IPsec: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database - PASSED chains.sh: Creating DB CriticalServerAuthEKUDB certutil -N -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd chains.sh: #134: IPsec: Creating DB CriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request CriticalServerAuthEKUReq.der certutil -s "CN=CriticalServerAuthEKU EE, O=CriticalServerAuthEKU, C=US" -R -2 -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #135: IPsec: Creating EE certifiate request CriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CriticalServerAuthEKUReq.der -o CriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 928034120 --keyUsage digitalSignature --extKeyUsage critical,serverAuth < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #136: IPsec: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database certutil -A -n CriticalServerAuthEKU -t u,u,u -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -i CriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #137: IPsec: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB EKUIPsecIKEDB certutil -N -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd chains.sh: #138: IPsec: Creating DB EKUIPsecIKEDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEReq.der certutil -s "CN=EKUIPsecIKE EE, O=EKUIPsecIKE, C=US" -R -2 -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EKUIPsecIKEReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #139: IPsec: Creating EE certifiate request EKUIPsecIKEReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKECA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEReq.der -o EKUIPsecIKECA1.der -f CA1DB/dbpasswd -m 928034121 --keyUsage digitalSignature --extKeyUsage critical,ipsecIKE < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #140: IPsec: Creating certficate EKUIPsecIKECA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database certutil -A -n EKUIPsecIKE -t u,u,u -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -i EKUIPsecIKECA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #141: IPsec: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database - PASSED chains.sh: Creating DB EKUIPsecIKEEndDB certutil -N -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd chains.sh: #142: IPsec: Creating DB EKUIPsecIKEEndDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEEndReq.der certutil -s "CN=EKUIPsecIKEEnd EE, O=EKUIPsecIKEEnd, C=US" -R -2 -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EKUIPsecIKEEndReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #143: IPsec: Creating EE certifiate request EKUIPsecIKEEndReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEEndReq.der -o EKUIPsecIKEEndCA1.der -f CA1DB/dbpasswd -m 928034122 --keyUsage digitalSignature --extKeyUsage ipsecIKEEnd < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #144: IPsec: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database certutil -A -n EKUIPsecIKEEnd -t u,u,u -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -i EKUIPsecIKEEndCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #145: IPsec: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database - PASSED chains.sh: Creating DB EKUIPsecIKEIntermediateDB certutil -N -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd chains.sh: #146: IPsec: Creating DB EKUIPsecIKEIntermediateDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der certutil -s "CN=EKUIPsecIKEIntermediate EE, O=EKUIPsecIKEIntermediate, C=US" -R -2 -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EKUIPsecIKEIntermediateReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #147: IPsec: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEIntermediateReq.der -o EKUIPsecIKEIntermediateCA1.der -f CA1DB/dbpasswd -m 928034123 --keyUsage digitalSignature --extKeyUsage codeSigning,serverAuth,ipsecIKEIntermediate < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #148: IPsec: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database certutil -A -n EKUIPsecIKEIntermediate -t u,u,u -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -i EKUIPsecIKEIntermediateCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #149: IPsec: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database - PASSED chains.sh: Creating DB EKUAnyDB certutil -N -d EKUAnyDB -f EKUAnyDB/dbpasswd chains.sh: #150: IPsec: Creating DB EKUAnyDB - PASSED chains.sh: Creating EE certifiate request EKUAnyReq.der certutil -s "CN=EKUAny EE, O=EKUAny, C=US" -R -2 -d EKUAnyDB -f EKUAnyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EKUAnyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #151: IPsec: Creating EE certifiate request EKUAnyReq.der - PASSED chains.sh: Creating certficate EKUAnyCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUAnyReq.der -o EKUAnyCA1.der -f CA1DB/dbpasswd -m 928034124 --keyUsage digitalSignature --extKeyUsage x509Any < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #152: IPsec: Creating certficate EKUAnyCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUAnyCA1.der to EKUAnyDB database certutil -A -n EKUAny -t u,u,u -d EKUAnyDB -f EKUAnyDB/dbpasswd -i EKUAnyCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #153: IPsec: Importing certificate EKUAnyCA1.der to EKUAnyDB database - PASSED chains.sh: Creating DB EKUEmailDB certutil -N -d EKUEmailDB -f EKUEmailDB/dbpasswd chains.sh: #154: IPsec: Creating DB EKUEmailDB - PASSED chains.sh: Creating EE certifiate request EKUEmailReq.der certutil -s "CN=EKUEmail EE, O=EKUEmail, C=US" -R -2 -d EKUEmailDB -f EKUEmailDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EKUEmailReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #155: IPsec: Creating EE certifiate request EKUEmailReq.der - PASSED chains.sh: Creating certficate EKUEmailCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUEmailReq.der -o EKUEmailCA1.der -f CA1DB/dbpasswd -m 928034125 --keyUsage digitalSignature --extKeyUsage emailProtection < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #156: IPsec: Creating certficate EKUEmailCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUEmailCA1.der to EKUEmailDB database certutil -A -n EKUEmail -t u,u,u -d EKUEmailDB -f EKUEmailDB/dbpasswd -i EKUEmailCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #157: IPsec: Importing certificate EKUEmailCA1.der to EKUEmailDB database - PASSED chains.sh: Creating DB EKUIPsecUserDB certutil -N -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd chains.sh: #158: IPsec: Creating DB EKUIPsecUserDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecUserReq.der certutil -s "CN=EKUIPsecUser EE, O=EKUIPsecUser, C=US" -R -2 -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EKUIPsecUserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #159: IPsec: Creating EE certifiate request EKUIPsecUserReq.der - PASSED chains.sh: Creating certficate EKUIPsecUserCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecUserReq.der -o EKUIPsecUserCA1.der -f CA1DB/dbpasswd -m 928034126 --keyUsage digitalSignature --extKeyUsage ipsecUser < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #160: IPsec: Creating certficate EKUIPsecUserCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database certutil -A -n EKUIPsecUser -t u,u,u -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -i EKUIPsecUserCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #161: IPsec: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #162: IPsec: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,," -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #163: IPsec: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #164: IPsec: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034111 (0x3750ad3f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:44:08 2022 Not After : Wed Sep 28 03:44:08 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:1b:7a:c4:7f:46:60:cc:3a:c0:bf:fd:8e:bf:aa:1c: 70:eb:b3:72:50:a9:84:bc:0f:cc:0a:c0:00:0c:09:ec: b7:5b:3e:a6:db:d4:33:ee:b6:05:bf:39:0e:cb:3d:b2: 8a:1d:36:a1:18:86:a3:df:cc:3e:04:cb:1e:b3:9d:28: c6:20:d9:a3:40:75:08:e8:74:df:9e:48:55:85:fb:23: 41:43:36:aa:c9:cc:de:64:5b:66:45:3a:2d:a5:9e:40: 39:38:90:dc:51:93:11:e5:53:5a:93:02:48:f7:45:38: fa:fd:41:a4:f9:dc:17:2c:33:80:a1:f8:42:70:69:22: e3:4e:96:ae:b6:97:b8:9d:57:d4:24:91:a1:64:cd:2d: 26:9f:01:0b:d7:85:14:96:7b:1a:31:11:52:4a:37:ee: f3:1f:93:41:b2:f0:1f:ef:d4:46:41:3e:ae:12:fc:25: 8a:0a:12:18:2f:72:d7:52:a1:4c:90:71:dd:a9:8e:ec: 5b:2b:bd:24:e7:b8:0c:b4:5f:8c:05:4b:e8:53:aa:13: 77:81:39:92:2e:8e:74:22:f7:e9:ca:ee:7d:99:f8:5d: 82:77:2b:3c:f0:f6:f0:b4:cc:1e:7a:a2:18:b0:7a:ea: 05:26:bf:e1:df:45:86:aa:ee:e4:69:9e:16:7c:bf:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:f7:c2:84:89:46:0c:15:44:69:a8:7d:9e:88:10:3c: 6c:44:e7:e7:d2:1b:bd:3d:1d:40:51:b7:27:3e:d6:ca: 9d:5e:0a:1e:03:b4:40:25:9f:a9:eb:bc:28:ba:78:f6: 91:11:4d:76:6a:d4:4b:9c:b9:47:d1:6a:33:02:6e:41: 91:ab:1f:62:26:f2:e0:ac:32:ec:22:6c:ae:e0:6b:e2: 02:51:a2:27:a8:b1:e3:21:f4:97:a7:34:35:7b:5e:8d: 71:7c:4a:43:61:33:64:d0:95:ff:01:a2:74:b3:47:d9: 3a:6b:68:30:c5:54:0d:0d:c3:22:e1:f1:37:0d:6d:54: c2:9e:77:58:e2:71:29:14:d8:b7:e5:95:f4:a7:5d:87: 41:ba:0b:62:52:1c:b5:90:29:8f:ff:83:6a:14:0d:ee: ff:cd:3d:b7:ac:03:21:1e:fa:bf:a4:68:67:65:cb:e5: 62:02:87:a2:62:40:51:d5:15:df:e0:4d:61:1c:27:d6: 23:77:73:45:5d:0b:06:ff:6c:61:41:a7:8f:72:f4:03: 6e:e5:07:df:dc:f5:82:cb:0c:54:ae:42:15:c1:43:9a: c7:3c:cc:9f:1a:6c:0d:62:bd:2e:7e:73:6c:0e:89:d0: 1b:28:96:11:a8:28:4b:be:3e:4d:8b:dc:66:a8:97:88 Fingerprint (SHA-256): 3F:B0:BF:E9:B4:50:5B:2E:3E:7F:20:BC:FF:C3:4F:70:D9:29:92:01:CC:E2:83:CC:8E:3A:A7:B1:92:62:95:94 Fingerprint (SHA1): C4:29:19:BC:91:54:69:E6:20:2A:2B:8C:73:DE:A3:C1:A4:C6:24:22 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NoKU EE,O=NoKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #165: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #166: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #167: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034111 (0x3750ad3f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:44:08 2022 Not After : Wed Sep 28 03:44:08 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:1b:7a:c4:7f:46:60:cc:3a:c0:bf:fd:8e:bf:aa:1c: 70:eb:b3:72:50:a9:84:bc:0f:cc:0a:c0:00:0c:09:ec: b7:5b:3e:a6:db:d4:33:ee:b6:05:bf:39:0e:cb:3d:b2: 8a:1d:36:a1:18:86:a3:df:cc:3e:04:cb:1e:b3:9d:28: c6:20:d9:a3:40:75:08:e8:74:df:9e:48:55:85:fb:23: 41:43:36:aa:c9:cc:de:64:5b:66:45:3a:2d:a5:9e:40: 39:38:90:dc:51:93:11:e5:53:5a:93:02:48:f7:45:38: fa:fd:41:a4:f9:dc:17:2c:33:80:a1:f8:42:70:69:22: e3:4e:96:ae:b6:97:b8:9d:57:d4:24:91:a1:64:cd:2d: 26:9f:01:0b:d7:85:14:96:7b:1a:31:11:52:4a:37:ee: f3:1f:93:41:b2:f0:1f:ef:d4:46:41:3e:ae:12:fc:25: 8a:0a:12:18:2f:72:d7:52:a1:4c:90:71:dd:a9:8e:ec: 5b:2b:bd:24:e7:b8:0c:b4:5f:8c:05:4b:e8:53:aa:13: 77:81:39:92:2e:8e:74:22:f7:e9:ca:ee:7d:99:f8:5d: 82:77:2b:3c:f0:f6:f0:b4:cc:1e:7a:a2:18:b0:7a:ea: 05:26:bf:e1:df:45:86:aa:ee:e4:69:9e:16:7c:bf:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:f7:c2:84:89:46:0c:15:44:69:a8:7d:9e:88:10:3c: 6c:44:e7:e7:d2:1b:bd:3d:1d:40:51:b7:27:3e:d6:ca: 9d:5e:0a:1e:03:b4:40:25:9f:a9:eb:bc:28:ba:78:f6: 91:11:4d:76:6a:d4:4b:9c:b9:47:d1:6a:33:02:6e:41: 91:ab:1f:62:26:f2:e0:ac:32:ec:22:6c:ae:e0:6b:e2: 02:51:a2:27:a8:b1:e3:21:f4:97:a7:34:35:7b:5e:8d: 71:7c:4a:43:61:33:64:d0:95:ff:01:a2:74:b3:47:d9: 3a:6b:68:30:c5:54:0d:0d:c3:22:e1:f1:37:0d:6d:54: c2:9e:77:58:e2:71:29:14:d8:b7:e5:95:f4:a7:5d:87: 41:ba:0b:62:52:1c:b5:90:29:8f:ff:83:6a:14:0d:ee: ff:cd:3d:b7:ac:03:21:1e:fa:bf:a4:68:67:65:cb:e5: 62:02:87:a2:62:40:51:d5:15:df:e0:4d:61:1c:27:d6: 23:77:73:45:5d:0b:06:ff:6c:61:41:a7:8f:72:f4:03: 6e:e5:07:df:dc:f5:82:cb:0c:54:ae:42:15:c1:43:9a: c7:3c:cc:9f:1a:6c:0d:62:bd:2e:7e:73:6c:0e:89:d0: 1b:28:96:11:a8:28:4b:be:3e:4d:8b:dc:66:a8:97:88 Fingerprint (SHA-256): 3F:B0:BF:E9:B4:50:5B:2E:3E:7F:20:BC:FF:C3:4F:70:D9:29:92:01:CC:E2:83:CC:8E:3A:A7:B1:92:62:95:94 Fingerprint (SHA1): C4:29:19:BC:91:54:69:E6:20:2A:2B:8C:73:DE:A3:C1:A4:C6:24:22 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSig EE,O=DigSig,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #168: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #169: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #170: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonRepCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034111 (0x3750ad3f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:44:08 2022 Not After : Wed Sep 28 03:44:08 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:1b:7a:c4:7f:46:60:cc:3a:c0:bf:fd:8e:bf:aa:1c: 70:eb:b3:72:50:a9:84:bc:0f:cc:0a:c0:00:0c:09:ec: b7:5b:3e:a6:db:d4:33:ee:b6:05:bf:39:0e:cb:3d:b2: 8a:1d:36:a1:18:86:a3:df:cc:3e:04:cb:1e:b3:9d:28: c6:20:d9:a3:40:75:08:e8:74:df:9e:48:55:85:fb:23: 41:43:36:aa:c9:cc:de:64:5b:66:45:3a:2d:a5:9e:40: 39:38:90:dc:51:93:11:e5:53:5a:93:02:48:f7:45:38: fa:fd:41:a4:f9:dc:17:2c:33:80:a1:f8:42:70:69:22: e3:4e:96:ae:b6:97:b8:9d:57:d4:24:91:a1:64:cd:2d: 26:9f:01:0b:d7:85:14:96:7b:1a:31:11:52:4a:37:ee: f3:1f:93:41:b2:f0:1f:ef:d4:46:41:3e:ae:12:fc:25: 8a:0a:12:18:2f:72:d7:52:a1:4c:90:71:dd:a9:8e:ec: 5b:2b:bd:24:e7:b8:0c:b4:5f:8c:05:4b:e8:53:aa:13: 77:81:39:92:2e:8e:74:22:f7:e9:ca:ee:7d:99:f8:5d: 82:77:2b:3c:f0:f6:f0:b4:cc:1e:7a:a2:18:b0:7a:ea: 05:26:bf:e1:df:45:86:aa:ee:e4:69:9e:16:7c:bf:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:f7:c2:84:89:46:0c:15:44:69:a8:7d:9e:88:10:3c: 6c:44:e7:e7:d2:1b:bd:3d:1d:40:51:b7:27:3e:d6:ca: 9d:5e:0a:1e:03:b4:40:25:9f:a9:eb:bc:28:ba:78:f6: 91:11:4d:76:6a:d4:4b:9c:b9:47:d1:6a:33:02:6e:41: 91:ab:1f:62:26:f2:e0:ac:32:ec:22:6c:ae:e0:6b:e2: 02:51:a2:27:a8:b1:e3:21:f4:97:a7:34:35:7b:5e:8d: 71:7c:4a:43:61:33:64:d0:95:ff:01:a2:74:b3:47:d9: 3a:6b:68:30:c5:54:0d:0d:c3:22:e1:f1:37:0d:6d:54: c2:9e:77:58:e2:71:29:14:d8:b7:e5:95:f4:a7:5d:87: 41:ba:0b:62:52:1c:b5:90:29:8f:ff:83:6a:14:0d:ee: ff:cd:3d:b7:ac:03:21:1e:fa:bf:a4:68:67:65:cb:e5: 62:02:87:a2:62:40:51:d5:15:df:e0:4d:61:1c:27:d6: 23:77:73:45:5d:0b:06:ff:6c:61:41:a7:8f:72:f4:03: 6e:e5:07:df:dc:f5:82:cb:0c:54:ae:42:15:c1:43:9a: c7:3c:cc:9f:1a:6c:0d:62:bd:2e:7e:73:6c:0e:89:d0: 1b:28:96:11:a8:28:4b:be:3e:4d:8b:dc:66:a8:97:88 Fingerprint (SHA-256): 3F:B0:BF:E9:B4:50:5B:2E:3E:7F:20:BC:FF:C3:4F:70:D9:29:92:01:CC:E2:83:CC:8E:3A:A7:B1:92:62:95:94 Fingerprint (SHA1): C4:29:19:BC:91:54:69:E6:20:2A:2B:8C:73:DE:A3:C1:A4:C6:24:22 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonRep EE,O=NonRep,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #171: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #172: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #173: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034111 (0x3750ad3f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:44:08 2022 Not After : Wed Sep 28 03:44:08 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:1b:7a:c4:7f:46:60:cc:3a:c0:bf:fd:8e:bf:aa:1c: 70:eb:b3:72:50:a9:84:bc:0f:cc:0a:c0:00:0c:09:ec: b7:5b:3e:a6:db:d4:33:ee:b6:05:bf:39:0e:cb:3d:b2: 8a:1d:36:a1:18:86:a3:df:cc:3e:04:cb:1e:b3:9d:28: c6:20:d9:a3:40:75:08:e8:74:df:9e:48:55:85:fb:23: 41:43:36:aa:c9:cc:de:64:5b:66:45:3a:2d:a5:9e:40: 39:38:90:dc:51:93:11:e5:53:5a:93:02:48:f7:45:38: fa:fd:41:a4:f9:dc:17:2c:33:80:a1:f8:42:70:69:22: e3:4e:96:ae:b6:97:b8:9d:57:d4:24:91:a1:64:cd:2d: 26:9f:01:0b:d7:85:14:96:7b:1a:31:11:52:4a:37:ee: f3:1f:93:41:b2:f0:1f:ef:d4:46:41:3e:ae:12:fc:25: 8a:0a:12:18:2f:72:d7:52:a1:4c:90:71:dd:a9:8e:ec: 5b:2b:bd:24:e7:b8:0c:b4:5f:8c:05:4b:e8:53:aa:13: 77:81:39:92:2e:8e:74:22:f7:e9:ca:ee:7d:99:f8:5d: 82:77:2b:3c:f0:f6:f0:b4:cc:1e:7a:a2:18:b0:7a:ea: 05:26:bf:e1:df:45:86:aa:ee:e4:69:9e:16:7c:bf:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:f7:c2:84:89:46:0c:15:44:69:a8:7d:9e:88:10:3c: 6c:44:e7:e7:d2:1b:bd:3d:1d:40:51:b7:27:3e:d6:ca: 9d:5e:0a:1e:03:b4:40:25:9f:a9:eb:bc:28:ba:78:f6: 91:11:4d:76:6a:d4:4b:9c:b9:47:d1:6a:33:02:6e:41: 91:ab:1f:62:26:f2:e0:ac:32:ec:22:6c:ae:e0:6b:e2: 02:51:a2:27:a8:b1:e3:21:f4:97:a7:34:35:7b:5e:8d: 71:7c:4a:43:61:33:64:d0:95:ff:01:a2:74:b3:47:d9: 3a:6b:68:30:c5:54:0d:0d:c3:22:e1:f1:37:0d:6d:54: c2:9e:77:58:e2:71:29:14:d8:b7:e5:95:f4:a7:5d:87: 41:ba:0b:62:52:1c:b5:90:29:8f:ff:83:6a:14:0d:ee: ff:cd:3d:b7:ac:03:21:1e:fa:bf:a4:68:67:65:cb:e5: 62:02:87:a2:62:40:51:d5:15:df:e0:4d:61:1c:27:d6: 23:77:73:45:5d:0b:06:ff:6c:61:41:a7:8f:72:f4:03: 6e:e5:07:df:dc:f5:82:cb:0c:54:ae:42:15:c1:43:9a: c7:3c:cc:9f:1a:6c:0d:62:bd:2e:7e:73:6c:0e:89:d0: 1b:28:96:11:a8:28:4b:be:3e:4d:8b:dc:66:a8:97:88 Fingerprint (SHA-256): 3F:B0:BF:E9:B4:50:5B:2E:3E:7F:20:BC:FF:C3:4F:70:D9:29:92:01:CC:E2:83:CC:8E:3A:A7:B1:92:62:95:94 Fingerprint (SHA1): C4:29:19:BC:91:54:69:E6:20:2A:2B:8C:73:DE:A3:C1:A4:C6:24:22 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSigNonRepAndExtra EE,O=DigSigNonRepAndExtra,C=U S" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #174: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #175: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #176: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #177: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #178: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #179: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #180: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #181: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #182: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034111 (0x3750ad3f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:44:08 2022 Not After : Wed Sep 28 03:44:08 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:1b:7a:c4:7f:46:60:cc:3a:c0:bf:fd:8e:bf:aa:1c: 70:eb:b3:72:50:a9:84:bc:0f:cc:0a:c0:00:0c:09:ec: b7:5b:3e:a6:db:d4:33:ee:b6:05:bf:39:0e:cb:3d:b2: 8a:1d:36:a1:18:86:a3:df:cc:3e:04:cb:1e:b3:9d:28: c6:20:d9:a3:40:75:08:e8:74:df:9e:48:55:85:fb:23: 41:43:36:aa:c9:cc:de:64:5b:66:45:3a:2d:a5:9e:40: 39:38:90:dc:51:93:11:e5:53:5a:93:02:48:f7:45:38: fa:fd:41:a4:f9:dc:17:2c:33:80:a1:f8:42:70:69:22: e3:4e:96:ae:b6:97:b8:9d:57:d4:24:91:a1:64:cd:2d: 26:9f:01:0b:d7:85:14:96:7b:1a:31:11:52:4a:37:ee: f3:1f:93:41:b2:f0:1f:ef:d4:46:41:3e:ae:12:fc:25: 8a:0a:12:18:2f:72:d7:52:a1:4c:90:71:dd:a9:8e:ec: 5b:2b:bd:24:e7:b8:0c:b4:5f:8c:05:4b:e8:53:aa:13: 77:81:39:92:2e:8e:74:22:f7:e9:ca:ee:7d:99:f8:5d: 82:77:2b:3c:f0:f6:f0:b4:cc:1e:7a:a2:18:b0:7a:ea: 05:26:bf:e1:df:45:86:aa:ee:e4:69:9e:16:7c:bf:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:f7:c2:84:89:46:0c:15:44:69:a8:7d:9e:88:10:3c: 6c:44:e7:e7:d2:1b:bd:3d:1d:40:51:b7:27:3e:d6:ca: 9d:5e:0a:1e:03:b4:40:25:9f:a9:eb:bc:28:ba:78:f6: 91:11:4d:76:6a:d4:4b:9c:b9:47:d1:6a:33:02:6e:41: 91:ab:1f:62:26:f2:e0:ac:32:ec:22:6c:ae:e0:6b:e2: 02:51:a2:27:a8:b1:e3:21:f4:97:a7:34:35:7b:5e:8d: 71:7c:4a:43:61:33:64:d0:95:ff:01:a2:74:b3:47:d9: 3a:6b:68:30:c5:54:0d:0d:c3:22:e1:f1:37:0d:6d:54: c2:9e:77:58:e2:71:29:14:d8:b7:e5:95:f4:a7:5d:87: 41:ba:0b:62:52:1c:b5:90:29:8f:ff:83:6a:14:0d:ee: ff:cd:3d:b7:ac:03:21:1e:fa:bf:a4:68:67:65:cb:e5: 62:02:87:a2:62:40:51:d5:15:df:e0:4d:61:1c:27:d6: 23:77:73:45:5d:0b:06:ff:6c:61:41:a7:8f:72:f4:03: 6e:e5:07:df:dc:f5:82:cb:0c:54:ae:42:15:c1:43:9a: c7:3c:cc:9f:1a:6c:0d:62:bd:2e:7e:73:6c:0e:89:d0: 1b:28:96:11:a8:28:4b:be:3e:4d:8b:dc:66:a8:97:88 Fingerprint (SHA-256): 3F:B0:BF:E9:B4:50:5B:2E:3E:7F:20:BC:FF:C3:4F:70:D9:29:92:01:CC:E2:83:CC:8E:3A:A7:B1:92:62:95:94 Fingerprint (SHA1): C4:29:19:BC:91:54:69:E6:20:2A:2B:8C:73:DE:A3:C1:A4:C6:24:22 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonCriticalServerAuthEKU EE,O=NonCriticalServerAut hEKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #183: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #184: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #185: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034111 (0x3750ad3f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:44:08 2022 Not After : Wed Sep 28 03:44:08 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:1b:7a:c4:7f:46:60:cc:3a:c0:bf:fd:8e:bf:aa:1c: 70:eb:b3:72:50:a9:84:bc:0f:cc:0a:c0:00:0c:09:ec: b7:5b:3e:a6:db:d4:33:ee:b6:05:bf:39:0e:cb:3d:b2: 8a:1d:36:a1:18:86:a3:df:cc:3e:04:cb:1e:b3:9d:28: c6:20:d9:a3:40:75:08:e8:74:df:9e:48:55:85:fb:23: 41:43:36:aa:c9:cc:de:64:5b:66:45:3a:2d:a5:9e:40: 39:38:90:dc:51:93:11:e5:53:5a:93:02:48:f7:45:38: fa:fd:41:a4:f9:dc:17:2c:33:80:a1:f8:42:70:69:22: e3:4e:96:ae:b6:97:b8:9d:57:d4:24:91:a1:64:cd:2d: 26:9f:01:0b:d7:85:14:96:7b:1a:31:11:52:4a:37:ee: f3:1f:93:41:b2:f0:1f:ef:d4:46:41:3e:ae:12:fc:25: 8a:0a:12:18:2f:72:d7:52:a1:4c:90:71:dd:a9:8e:ec: 5b:2b:bd:24:e7:b8:0c:b4:5f:8c:05:4b:e8:53:aa:13: 77:81:39:92:2e:8e:74:22:f7:e9:ca:ee:7d:99:f8:5d: 82:77:2b:3c:f0:f6:f0:b4:cc:1e:7a:a2:18:b0:7a:ea: 05:26:bf:e1:df:45:86:aa:ee:e4:69:9e:16:7c:bf:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:f7:c2:84:89:46:0c:15:44:69:a8:7d:9e:88:10:3c: 6c:44:e7:e7:d2:1b:bd:3d:1d:40:51:b7:27:3e:d6:ca: 9d:5e:0a:1e:03:b4:40:25:9f:a9:eb:bc:28:ba:78:f6: 91:11:4d:76:6a:d4:4b:9c:b9:47:d1:6a:33:02:6e:41: 91:ab:1f:62:26:f2:e0:ac:32:ec:22:6c:ae:e0:6b:e2: 02:51:a2:27:a8:b1:e3:21:f4:97:a7:34:35:7b:5e:8d: 71:7c:4a:43:61:33:64:d0:95:ff:01:a2:74:b3:47:d9: 3a:6b:68:30:c5:54:0d:0d:c3:22:e1:f1:37:0d:6d:54: c2:9e:77:58:e2:71:29:14:d8:b7:e5:95:f4:a7:5d:87: 41:ba:0b:62:52:1c:b5:90:29:8f:ff:83:6a:14:0d:ee: ff:cd:3d:b7:ac:03:21:1e:fa:bf:a4:68:67:65:cb:e5: 62:02:87:a2:62:40:51:d5:15:df:e0:4d:61:1c:27:d6: 23:77:73:45:5d:0b:06:ff:6c:61:41:a7:8f:72:f4:03: 6e:e5:07:df:dc:f5:82:cb:0c:54:ae:42:15:c1:43:9a: c7:3c:cc:9f:1a:6c:0d:62:bd:2e:7e:73:6c:0e:89:d0: 1b:28:96:11:a8:28:4b:be:3e:4d:8b:dc:66:a8:97:88 Fingerprint (SHA-256): 3F:B0:BF:E9:B4:50:5B:2E:3E:7F:20:BC:FF:C3:4F:70:D9:29:92:01:CC:E2:83:CC:8E:3A:A7:B1:92:62:95:94 Fingerprint (SHA1): C4:29:19:BC:91:54:69:E6:20:2A:2B:8C:73:DE:A3:C1:A4:C6:24:22 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=CriticalServerAuthEKU EE,O=CriticalServerAuthEKU,C =US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #186: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #187: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #188: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKECA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034111 (0x3750ad3f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:44:08 2022 Not After : Wed Sep 28 03:44:08 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:1b:7a:c4:7f:46:60:cc:3a:c0:bf:fd:8e:bf:aa:1c: 70:eb:b3:72:50:a9:84:bc:0f:cc:0a:c0:00:0c:09:ec: b7:5b:3e:a6:db:d4:33:ee:b6:05:bf:39:0e:cb:3d:b2: 8a:1d:36:a1:18:86:a3:df:cc:3e:04:cb:1e:b3:9d:28: c6:20:d9:a3:40:75:08:e8:74:df:9e:48:55:85:fb:23: 41:43:36:aa:c9:cc:de:64:5b:66:45:3a:2d:a5:9e:40: 39:38:90:dc:51:93:11:e5:53:5a:93:02:48:f7:45:38: fa:fd:41:a4:f9:dc:17:2c:33:80:a1:f8:42:70:69:22: e3:4e:96:ae:b6:97:b8:9d:57:d4:24:91:a1:64:cd:2d: 26:9f:01:0b:d7:85:14:96:7b:1a:31:11:52:4a:37:ee: f3:1f:93:41:b2:f0:1f:ef:d4:46:41:3e:ae:12:fc:25: 8a:0a:12:18:2f:72:d7:52:a1:4c:90:71:dd:a9:8e:ec: 5b:2b:bd:24:e7:b8:0c:b4:5f:8c:05:4b:e8:53:aa:13: 77:81:39:92:2e:8e:74:22:f7:e9:ca:ee:7d:99:f8:5d: 82:77:2b:3c:f0:f6:f0:b4:cc:1e:7a:a2:18:b0:7a:ea: 05:26:bf:e1:df:45:86:aa:ee:e4:69:9e:16:7c:bf:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:f7:c2:84:89:46:0c:15:44:69:a8:7d:9e:88:10:3c: 6c:44:e7:e7:d2:1b:bd:3d:1d:40:51:b7:27:3e:d6:ca: 9d:5e:0a:1e:03:b4:40:25:9f:a9:eb:bc:28:ba:78:f6: 91:11:4d:76:6a:d4:4b:9c:b9:47:d1:6a:33:02:6e:41: 91:ab:1f:62:26:f2:e0:ac:32:ec:22:6c:ae:e0:6b:e2: 02:51:a2:27:a8:b1:e3:21:f4:97:a7:34:35:7b:5e:8d: 71:7c:4a:43:61:33:64:d0:95:ff:01:a2:74:b3:47:d9: 3a:6b:68:30:c5:54:0d:0d:c3:22:e1:f1:37:0d:6d:54: c2:9e:77:58:e2:71:29:14:d8:b7:e5:95:f4:a7:5d:87: 41:ba:0b:62:52:1c:b5:90:29:8f:ff:83:6a:14:0d:ee: ff:cd:3d:b7:ac:03:21:1e:fa:bf:a4:68:67:65:cb:e5: 62:02:87:a2:62:40:51:d5:15:df:e0:4d:61:1c:27:d6: 23:77:73:45:5d:0b:06:ff:6c:61:41:a7:8f:72:f4:03: 6e:e5:07:df:dc:f5:82:cb:0c:54:ae:42:15:c1:43:9a: c7:3c:cc:9f:1a:6c:0d:62:bd:2e:7e:73:6c:0e:89:d0: 1b:28:96:11:a8:28:4b:be:3e:4d:8b:dc:66:a8:97:88 Fingerprint (SHA-256): 3F:B0:BF:E9:B4:50:5B:2E:3E:7F:20:BC:FF:C3:4F:70:D9:29:92:01:CC:E2:83:CC:8E:3A:A7:B1:92:62:95:94 Fingerprint (SHA1): C4:29:19:BC:91:54:69:E6:20:2A:2B:8C:73:DE:A3:C1:A4:C6:24:22 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKE EE,O=EKUIPsecIKE,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #189: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #190: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #191: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034111 (0x3750ad3f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:44:08 2022 Not After : Wed Sep 28 03:44:08 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:1b:7a:c4:7f:46:60:cc:3a:c0:bf:fd:8e:bf:aa:1c: 70:eb:b3:72:50:a9:84:bc:0f:cc:0a:c0:00:0c:09:ec: b7:5b:3e:a6:db:d4:33:ee:b6:05:bf:39:0e:cb:3d:b2: 8a:1d:36:a1:18:86:a3:df:cc:3e:04:cb:1e:b3:9d:28: c6:20:d9:a3:40:75:08:e8:74:df:9e:48:55:85:fb:23: 41:43:36:aa:c9:cc:de:64:5b:66:45:3a:2d:a5:9e:40: 39:38:90:dc:51:93:11:e5:53:5a:93:02:48:f7:45:38: fa:fd:41:a4:f9:dc:17:2c:33:80:a1:f8:42:70:69:22: e3:4e:96:ae:b6:97:b8:9d:57:d4:24:91:a1:64:cd:2d: 26:9f:01:0b:d7:85:14:96:7b:1a:31:11:52:4a:37:ee: f3:1f:93:41:b2:f0:1f:ef:d4:46:41:3e:ae:12:fc:25: 8a:0a:12:18:2f:72:d7:52:a1:4c:90:71:dd:a9:8e:ec: 5b:2b:bd:24:e7:b8:0c:b4:5f:8c:05:4b:e8:53:aa:13: 77:81:39:92:2e:8e:74:22:f7:e9:ca:ee:7d:99:f8:5d: 82:77:2b:3c:f0:f6:f0:b4:cc:1e:7a:a2:18:b0:7a:ea: 05:26:bf:e1:df:45:86:aa:ee:e4:69:9e:16:7c:bf:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:f7:c2:84:89:46:0c:15:44:69:a8:7d:9e:88:10:3c: 6c:44:e7:e7:d2:1b:bd:3d:1d:40:51:b7:27:3e:d6:ca: 9d:5e:0a:1e:03:b4:40:25:9f:a9:eb:bc:28:ba:78:f6: 91:11:4d:76:6a:d4:4b:9c:b9:47:d1:6a:33:02:6e:41: 91:ab:1f:62:26:f2:e0:ac:32:ec:22:6c:ae:e0:6b:e2: 02:51:a2:27:a8:b1:e3:21:f4:97:a7:34:35:7b:5e:8d: 71:7c:4a:43:61:33:64:d0:95:ff:01:a2:74:b3:47:d9: 3a:6b:68:30:c5:54:0d:0d:c3:22:e1:f1:37:0d:6d:54: c2:9e:77:58:e2:71:29:14:d8:b7:e5:95:f4:a7:5d:87: 41:ba:0b:62:52:1c:b5:90:29:8f:ff:83:6a:14:0d:ee: ff:cd:3d:b7:ac:03:21:1e:fa:bf:a4:68:67:65:cb:e5: 62:02:87:a2:62:40:51:d5:15:df:e0:4d:61:1c:27:d6: 23:77:73:45:5d:0b:06:ff:6c:61:41:a7:8f:72:f4:03: 6e:e5:07:df:dc:f5:82:cb:0c:54:ae:42:15:c1:43:9a: c7:3c:cc:9f:1a:6c:0d:62:bd:2e:7e:73:6c:0e:89:d0: 1b:28:96:11:a8:28:4b:be:3e:4d:8b:dc:66:a8:97:88 Fingerprint (SHA-256): 3F:B0:BF:E9:B4:50:5B:2E:3E:7F:20:BC:FF:C3:4F:70:D9:29:92:01:CC:E2:83:CC:8E:3A:A7:B1:92:62:95:94 Fingerprint (SHA1): C4:29:19:BC:91:54:69:E6:20:2A:2B:8C:73:DE:A3:C1:A4:C6:24:22 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEEnd EE,O=EKUIPsecIKEEnd,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #192: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #193: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #194: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034111 (0x3750ad3f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:44:08 2022 Not After : Wed Sep 28 03:44:08 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:1b:7a:c4:7f:46:60:cc:3a:c0:bf:fd:8e:bf:aa:1c: 70:eb:b3:72:50:a9:84:bc:0f:cc:0a:c0:00:0c:09:ec: b7:5b:3e:a6:db:d4:33:ee:b6:05:bf:39:0e:cb:3d:b2: 8a:1d:36:a1:18:86:a3:df:cc:3e:04:cb:1e:b3:9d:28: c6:20:d9:a3:40:75:08:e8:74:df:9e:48:55:85:fb:23: 41:43:36:aa:c9:cc:de:64:5b:66:45:3a:2d:a5:9e:40: 39:38:90:dc:51:93:11:e5:53:5a:93:02:48:f7:45:38: fa:fd:41:a4:f9:dc:17:2c:33:80:a1:f8:42:70:69:22: e3:4e:96:ae:b6:97:b8:9d:57:d4:24:91:a1:64:cd:2d: 26:9f:01:0b:d7:85:14:96:7b:1a:31:11:52:4a:37:ee: f3:1f:93:41:b2:f0:1f:ef:d4:46:41:3e:ae:12:fc:25: 8a:0a:12:18:2f:72:d7:52:a1:4c:90:71:dd:a9:8e:ec: 5b:2b:bd:24:e7:b8:0c:b4:5f:8c:05:4b:e8:53:aa:13: 77:81:39:92:2e:8e:74:22:f7:e9:ca:ee:7d:99:f8:5d: 82:77:2b:3c:f0:f6:f0:b4:cc:1e:7a:a2:18:b0:7a:ea: 05:26:bf:e1:df:45:86:aa:ee:e4:69:9e:16:7c:bf:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:f7:c2:84:89:46:0c:15:44:69:a8:7d:9e:88:10:3c: 6c:44:e7:e7:d2:1b:bd:3d:1d:40:51:b7:27:3e:d6:ca: 9d:5e:0a:1e:03:b4:40:25:9f:a9:eb:bc:28:ba:78:f6: 91:11:4d:76:6a:d4:4b:9c:b9:47:d1:6a:33:02:6e:41: 91:ab:1f:62:26:f2:e0:ac:32:ec:22:6c:ae:e0:6b:e2: 02:51:a2:27:a8:b1:e3:21:f4:97:a7:34:35:7b:5e:8d: 71:7c:4a:43:61:33:64:d0:95:ff:01:a2:74:b3:47:d9: 3a:6b:68:30:c5:54:0d:0d:c3:22:e1:f1:37:0d:6d:54: c2:9e:77:58:e2:71:29:14:d8:b7:e5:95:f4:a7:5d:87: 41:ba:0b:62:52:1c:b5:90:29:8f:ff:83:6a:14:0d:ee: ff:cd:3d:b7:ac:03:21:1e:fa:bf:a4:68:67:65:cb:e5: 62:02:87:a2:62:40:51:d5:15:df:e0:4d:61:1c:27:d6: 23:77:73:45:5d:0b:06:ff:6c:61:41:a7:8f:72:f4:03: 6e:e5:07:df:dc:f5:82:cb:0c:54:ae:42:15:c1:43:9a: c7:3c:cc:9f:1a:6c:0d:62:bd:2e:7e:73:6c:0e:89:d0: 1b:28:96:11:a8:28:4b:be:3e:4d:8b:dc:66:a8:97:88 Fingerprint (SHA-256): 3F:B0:BF:E9:B4:50:5B:2E:3E:7F:20:BC:FF:C3:4F:70:D9:29:92:01:CC:E2:83:CC:8E:3A:A7:B1:92:62:95:94 Fingerprint (SHA1): C4:29:19:BC:91:54:69:E6:20:2A:2B:8C:73:DE:A3:C1:A4:C6:24:22 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEIntermediate EE,O=EKUIPsecIKEIntermedia te,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #195: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #196: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #197: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUAnyCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034111 (0x3750ad3f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:44:08 2022 Not After : Wed Sep 28 03:44:08 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:1b:7a:c4:7f:46:60:cc:3a:c0:bf:fd:8e:bf:aa:1c: 70:eb:b3:72:50:a9:84:bc:0f:cc:0a:c0:00:0c:09:ec: b7:5b:3e:a6:db:d4:33:ee:b6:05:bf:39:0e:cb:3d:b2: 8a:1d:36:a1:18:86:a3:df:cc:3e:04:cb:1e:b3:9d:28: c6:20:d9:a3:40:75:08:e8:74:df:9e:48:55:85:fb:23: 41:43:36:aa:c9:cc:de:64:5b:66:45:3a:2d:a5:9e:40: 39:38:90:dc:51:93:11:e5:53:5a:93:02:48:f7:45:38: fa:fd:41:a4:f9:dc:17:2c:33:80:a1:f8:42:70:69:22: e3:4e:96:ae:b6:97:b8:9d:57:d4:24:91:a1:64:cd:2d: 26:9f:01:0b:d7:85:14:96:7b:1a:31:11:52:4a:37:ee: f3:1f:93:41:b2:f0:1f:ef:d4:46:41:3e:ae:12:fc:25: 8a:0a:12:18:2f:72:d7:52:a1:4c:90:71:dd:a9:8e:ec: 5b:2b:bd:24:e7:b8:0c:b4:5f:8c:05:4b:e8:53:aa:13: 77:81:39:92:2e:8e:74:22:f7:e9:ca:ee:7d:99:f8:5d: 82:77:2b:3c:f0:f6:f0:b4:cc:1e:7a:a2:18:b0:7a:ea: 05:26:bf:e1:df:45:86:aa:ee:e4:69:9e:16:7c:bf:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:f7:c2:84:89:46:0c:15:44:69:a8:7d:9e:88:10:3c: 6c:44:e7:e7:d2:1b:bd:3d:1d:40:51:b7:27:3e:d6:ca: 9d:5e:0a:1e:03:b4:40:25:9f:a9:eb:bc:28:ba:78:f6: 91:11:4d:76:6a:d4:4b:9c:b9:47:d1:6a:33:02:6e:41: 91:ab:1f:62:26:f2:e0:ac:32:ec:22:6c:ae:e0:6b:e2: 02:51:a2:27:a8:b1:e3:21:f4:97:a7:34:35:7b:5e:8d: 71:7c:4a:43:61:33:64:d0:95:ff:01:a2:74:b3:47:d9: 3a:6b:68:30:c5:54:0d:0d:c3:22:e1:f1:37:0d:6d:54: c2:9e:77:58:e2:71:29:14:d8:b7:e5:95:f4:a7:5d:87: 41:ba:0b:62:52:1c:b5:90:29:8f:ff:83:6a:14:0d:ee: ff:cd:3d:b7:ac:03:21:1e:fa:bf:a4:68:67:65:cb:e5: 62:02:87:a2:62:40:51:d5:15:df:e0:4d:61:1c:27:d6: 23:77:73:45:5d:0b:06:ff:6c:61:41:a7:8f:72:f4:03: 6e:e5:07:df:dc:f5:82:cb:0c:54:ae:42:15:c1:43:9a: c7:3c:cc:9f:1a:6c:0d:62:bd:2e:7e:73:6c:0e:89:d0: 1b:28:96:11:a8:28:4b:be:3e:4d:8b:dc:66:a8:97:88 Fingerprint (SHA-256): 3F:B0:BF:E9:B4:50:5B:2E:3E:7F:20:BC:FF:C3:4F:70:D9:29:92:01:CC:E2:83:CC:8E:3A:A7:B1:92:62:95:94 Fingerprint (SHA1): C4:29:19:BC:91:54:69:E6:20:2A:2B:8C:73:DE:A3:C1:A4:C6:24:22 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUAny EE,O=EKUAny,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #198: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #199: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #200: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUEmailCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034111 (0x3750ad3f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:44:08 2022 Not After : Wed Sep 28 03:44:08 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:1b:7a:c4:7f:46:60:cc:3a:c0:bf:fd:8e:bf:aa:1c: 70:eb:b3:72:50:a9:84:bc:0f:cc:0a:c0:00:0c:09:ec: b7:5b:3e:a6:db:d4:33:ee:b6:05:bf:39:0e:cb:3d:b2: 8a:1d:36:a1:18:86:a3:df:cc:3e:04:cb:1e:b3:9d:28: c6:20:d9:a3:40:75:08:e8:74:df:9e:48:55:85:fb:23: 41:43:36:aa:c9:cc:de:64:5b:66:45:3a:2d:a5:9e:40: 39:38:90:dc:51:93:11:e5:53:5a:93:02:48:f7:45:38: fa:fd:41:a4:f9:dc:17:2c:33:80:a1:f8:42:70:69:22: e3:4e:96:ae:b6:97:b8:9d:57:d4:24:91:a1:64:cd:2d: 26:9f:01:0b:d7:85:14:96:7b:1a:31:11:52:4a:37:ee: f3:1f:93:41:b2:f0:1f:ef:d4:46:41:3e:ae:12:fc:25: 8a:0a:12:18:2f:72:d7:52:a1:4c:90:71:dd:a9:8e:ec: 5b:2b:bd:24:e7:b8:0c:b4:5f:8c:05:4b:e8:53:aa:13: 77:81:39:92:2e:8e:74:22:f7:e9:ca:ee:7d:99:f8:5d: 82:77:2b:3c:f0:f6:f0:b4:cc:1e:7a:a2:18:b0:7a:ea: 05:26:bf:e1:df:45:86:aa:ee:e4:69:9e:16:7c:bf:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:f7:c2:84:89:46:0c:15:44:69:a8:7d:9e:88:10:3c: 6c:44:e7:e7:d2:1b:bd:3d:1d:40:51:b7:27:3e:d6:ca: 9d:5e:0a:1e:03:b4:40:25:9f:a9:eb:bc:28:ba:78:f6: 91:11:4d:76:6a:d4:4b:9c:b9:47:d1:6a:33:02:6e:41: 91:ab:1f:62:26:f2:e0:ac:32:ec:22:6c:ae:e0:6b:e2: 02:51:a2:27:a8:b1:e3:21:f4:97:a7:34:35:7b:5e:8d: 71:7c:4a:43:61:33:64:d0:95:ff:01:a2:74:b3:47:d9: 3a:6b:68:30:c5:54:0d:0d:c3:22:e1:f1:37:0d:6d:54: c2:9e:77:58:e2:71:29:14:d8:b7:e5:95:f4:a7:5d:87: 41:ba:0b:62:52:1c:b5:90:29:8f:ff:83:6a:14:0d:ee: ff:cd:3d:b7:ac:03:21:1e:fa:bf:a4:68:67:65:cb:e5: 62:02:87:a2:62:40:51:d5:15:df:e0:4d:61:1c:27:d6: 23:77:73:45:5d:0b:06:ff:6c:61:41:a7:8f:72:f4:03: 6e:e5:07:df:dc:f5:82:cb:0c:54:ae:42:15:c1:43:9a: c7:3c:cc:9f:1a:6c:0d:62:bd:2e:7e:73:6c:0e:89:d0: 1b:28:96:11:a8:28:4b:be:3e:4d:8b:dc:66:a8:97:88 Fingerprint (SHA-256): 3F:B0:BF:E9:B4:50:5B:2E:3E:7F:20:BC:FF:C3:4F:70:D9:29:92:01:CC:E2:83:CC:8E:3A:A7:B1:92:62:95:94 Fingerprint (SHA1): C4:29:19:BC:91:54:69:E6:20:2A:2B:8C:73:DE:A3:C1:A4:C6:24:22 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUEmail EE,O=EKUEmail,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #201: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #202: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #203: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 - PASSED httpserv starting at Wed Sep 28 03:45:50 UTC 2022 httpserv -D -p 9233 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.3122 & trying to connect to httpserv at Wed Sep 28 03:45:50 UTC 2022 tstclnt -4 -p 9233 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9233 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 18362 >/dev/null 2>/dev/null httpserv with PID 18362 found at Wed Sep 28 03:45:50 UTC 2022 httpserv with PID 18362 started at Wed Sep 28 03:45:50 UTC 2022 chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecUserCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034111 (0x3750ad3f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:44:08 2022 Not After : Wed Sep 28 03:44:08 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:1b:7a:c4:7f:46:60:cc:3a:c0:bf:fd:8e:bf:aa:1c: 70:eb:b3:72:50:a9:84:bc:0f:cc:0a:c0:00:0c:09:ec: b7:5b:3e:a6:db:d4:33:ee:b6:05:bf:39:0e:cb:3d:b2: 8a:1d:36:a1:18:86:a3:df:cc:3e:04:cb:1e:b3:9d:28: c6:20:d9:a3:40:75:08:e8:74:df:9e:48:55:85:fb:23: 41:43:36:aa:c9:cc:de:64:5b:66:45:3a:2d:a5:9e:40: 39:38:90:dc:51:93:11:e5:53:5a:93:02:48:f7:45:38: fa:fd:41:a4:f9:dc:17:2c:33:80:a1:f8:42:70:69:22: e3:4e:96:ae:b6:97:b8:9d:57:d4:24:91:a1:64:cd:2d: 26:9f:01:0b:d7:85:14:96:7b:1a:31:11:52:4a:37:ee: f3:1f:93:41:b2:f0:1f:ef:d4:46:41:3e:ae:12:fc:25: 8a:0a:12:18:2f:72:d7:52:a1:4c:90:71:dd:a9:8e:ec: 5b:2b:bd:24:e7:b8:0c:b4:5f:8c:05:4b:e8:53:aa:13: 77:81:39:92:2e:8e:74:22:f7:e9:ca:ee:7d:99:f8:5d: 82:77:2b:3c:f0:f6:f0:b4:cc:1e:7a:a2:18:b0:7a:ea: 05:26:bf:e1:df:45:86:aa:ee:e4:69:9e:16:7c:bf:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:f7:c2:84:89:46:0c:15:44:69:a8:7d:9e:88:10:3c: 6c:44:e7:e7:d2:1b:bd:3d:1d:40:51:b7:27:3e:d6:ca: 9d:5e:0a:1e:03:b4:40:25:9f:a9:eb:bc:28:ba:78:f6: 91:11:4d:76:6a:d4:4b:9c:b9:47:d1:6a:33:02:6e:41: 91:ab:1f:62:26:f2:e0:ac:32:ec:22:6c:ae:e0:6b:e2: 02:51:a2:27:a8:b1:e3:21:f4:97:a7:34:35:7b:5e:8d: 71:7c:4a:43:61:33:64:d0:95:ff:01:a2:74:b3:47:d9: 3a:6b:68:30:c5:54:0d:0d:c3:22:e1:f1:37:0d:6d:54: c2:9e:77:58:e2:71:29:14:d8:b7:e5:95:f4:a7:5d:87: 41:ba:0b:62:52:1c:b5:90:29:8f:ff:83:6a:14:0d:ee: ff:cd:3d:b7:ac:03:21:1e:fa:bf:a4:68:67:65:cb:e5: 62:02:87:a2:62:40:51:d5:15:df:e0:4d:61:1c:27:d6: 23:77:73:45:5d:0b:06:ff:6c:61:41:a7:8f:72:f4:03: 6e:e5:07:df:dc:f5:82:cb:0c:54:ae:42:15:c1:43:9a: c7:3c:cc:9f:1a:6c:0d:62:bd:2e:7e:73:6c:0e:89:d0: 1b:28:96:11:a8:28:4b:be:3e:4d:8b:dc:66:a8:97:88 Fingerprint (SHA-256): 3F:B0:BF:E9:B4:50:5B:2E:3E:7F:20:BC:FF:C3:4F:70:D9:29:92:01:CC:E2:83:CC:8E:3A:A7:B1:92:62:95:94 Fingerprint (SHA1): C4:29:19:BC:91:54:69:E6:20:2A:2B:8C:73:DE:A3:C1:A4:C6:24:22 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecUser EE,O=EKUIPsecUser,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #204: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #205: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #206: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 - PASSED tstclnt -4 -h localhost.localdomain -p 9233 -q -t 20 chains.sh: #207: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034110 (0x3750ad3e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Wed Sep 28 03:41:13 2022 Not After : Wed Sep 28 03:41:13 2072 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:75:3d:fc:de:b4:56:c9:7a:2a:53:19:e9:2c:ab:8f: 9e:09:66:5e:7d:83:84:c2:53:f0:3c:1b:d7:b9:35:47: 54:b1:74:dd:47:2d:8e:15:62:32:1b:d3:39:23:26:ae: 0f:d1:6a:49:f2:e0:96:5a:46:3d:f9:d1:76:44:60:26: 68:d4:b3:f4:6c:8d:ce:ee:81:2e:42:36:6c:ae:73:9a: 16:c1:a5:d9:6b:0e:44:5b:80:44:6d:ee:1c:6e:e8:84: d9:41:d3:b7:41:7f:de:01:9d:b9:e5:e5:cc:df:33:97: 94:3c:93:3b:1a:fa:52:23:af:fc:60:4d:6a:f5:48:1d: 70:76:01:ab:bf:aa:19:16:53:fd:03:b9:df:77:3d:98: 00:4e:1a:8a:96:d3:5b:94:1f:da:37:e1:dd:db:6f:82: 2c:ae:8a:bd:a3:5b:93:80:05:fc:0b:af:c9:cf:09:93: 60:9b:8b:62:00:9e:cb:6b:57:19:22:16:5c:8f:f5:31: c9:d5:7d:c7:22:bf:c5:9d:96:50:b8:98:be:fc:d8:d2: b7:1c:a6:7c:a4:d0:d2:36:6f:fa:bd:9a:87:fc:bd:35: 3c:c4:1a:5d:ed:12:a6:50:03:59:e9:c2:17:24:b9:7c: c4:f2:6d:96:a9:20:3d:59:9e:61:e9:f6:7b:b3:8f:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 63:89:85:2a:8a:d5:cb:72:74:66:ca:36:aa:56:d4:f0: 39:7f:12:ce:77:ea:ba:87:08:a9:35:92:3a:3e:ee:d3: 65:a2:2a:74:8f:02:7a:a5:24:33:2d:ae:ad:61:a7:71: 83:d9:91:7e:3e:e5:2b:6f:41:8a:2e:56:eb:7c:7c:31: 3d:c7:23:c5:7b:0e:63:fb:27:5d:c9:be:ec:bc:43:e0: bc:c0:70:db:d0:2f:fd:f9:36:bf:73:31:7f:7d:12:6d: 14:fe:10:66:d6:e4:2d:c3:78:2c:56:bd:29:d7:9e:c9: 3f:71:9f:ea:2a:5d:6c:59:ee:47:6b:2e:20:17:9b:6a: b3:a8:03:4e:0c:c7:bb:89:ef:dc:3d:a3:1b:2b:9e:bb: 85:96:3d:b5:59:72:5f:6a:29:e3:34:91:99:ab:e0:ef: 47:fc:8a:7e:c6:5f:a2:4b:3d:be:a8:5c:c2:3e:de:c0: 1d:06:85:d3:dc:10:78:56:e1:c6:f9:1f:99:d8:b2:80: d4:78:cc:e1:f4:03:c8:e6:a1:6a:df:38:46:42:8d:31: e0:70:ea:a6:90:bc:9c:ee:12:1e:10:98:bb:93:e9:b5: 0e:d6:e8:13:2a:6e:ab:a7:a7:05:1d:ba:83:35:68:af: b1:fb:92:01:20:36:35:c8:07:4b:3d:30:6a:5a:53:d1 Fingerprint (SHA-256): C7:87:90:7D:38:38:13:BF:CA:61:DE:51:7A:99:22:9C:AB:1F:39:FD:4D:53:E6:52:19:9A:98:42:10:C4:5C:53 Fingerprint (SHA1): 6C:C5:61:C5:B8:97:D7:43:DA:A1:50:1D:E4:A5:5A:BE:E6:BE:5A:45 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #208: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #209: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #210: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 18362 at Wed Sep 28 03:45:56 UTC 2022 kill -USR1 18362 httpserv: normal termination httpserv -b -p 9233 2>/dev/null; httpserv with PID 18362 killed at Wed Sep 28 03:45:56 UTC 2022 httpserv starting at Wed Sep 28 03:45:56 UTC 2022 httpserv -D -p 9233 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.3122 & trying to connect to httpserv at Wed Sep 28 03:45:56 UTC 2022 tstclnt -4 -p 9233 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9233 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 18563 >/dev/null 2>/dev/null httpserv with PID 18563 found at Wed Sep 28 03:45:56 UTC 2022 httpserv with PID 18563 started at Wed Sep 28 03:45:56 UTC 2022 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #211: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. OCSPEE12OCSPCA1 : ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #212: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #213: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED tstclnt -4 -h localhost.localdomain -p 9233 -q -t 20 chains.sh: #214: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034110 (0x3750ad3e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Wed Sep 28 03:41:13 2022 Not After : Wed Sep 28 03:41:13 2072 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:75:3d:fc:de:b4:56:c9:7a:2a:53:19:e9:2c:ab:8f: 9e:09:66:5e:7d:83:84:c2:53:f0:3c:1b:d7:b9:35:47: 54:b1:74:dd:47:2d:8e:15:62:32:1b:d3:39:23:26:ae: 0f:d1:6a:49:f2:e0:96:5a:46:3d:f9:d1:76:44:60:26: 68:d4:b3:f4:6c:8d:ce:ee:81:2e:42:36:6c:ae:73:9a: 16:c1:a5:d9:6b:0e:44:5b:80:44:6d:ee:1c:6e:e8:84: d9:41:d3:b7:41:7f:de:01:9d:b9:e5:e5:cc:df:33:97: 94:3c:93:3b:1a:fa:52:23:af:fc:60:4d:6a:f5:48:1d: 70:76:01:ab:bf:aa:19:16:53:fd:03:b9:df:77:3d:98: 00:4e:1a:8a:96:d3:5b:94:1f:da:37:e1:dd:db:6f:82: 2c:ae:8a:bd:a3:5b:93:80:05:fc:0b:af:c9:cf:09:93: 60:9b:8b:62:00:9e:cb:6b:57:19:22:16:5c:8f:f5:31: c9:d5:7d:c7:22:bf:c5:9d:96:50:b8:98:be:fc:d8:d2: b7:1c:a6:7c:a4:d0:d2:36:6f:fa:bd:9a:87:fc:bd:35: 3c:c4:1a:5d:ed:12:a6:50:03:59:e9:c2:17:24:b9:7c: c4:f2:6d:96:a9:20:3d:59:9e:61:e9:f6:7b:b3:8f:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 63:89:85:2a:8a:d5:cb:72:74:66:ca:36:aa:56:d4:f0: 39:7f:12:ce:77:ea:ba:87:08:a9:35:92:3a:3e:ee:d3: 65:a2:2a:74:8f:02:7a:a5:24:33:2d:ae:ad:61:a7:71: 83:d9:91:7e:3e:e5:2b:6f:41:8a:2e:56:eb:7c:7c:31: 3d:c7:23:c5:7b:0e:63:fb:27:5d:c9:be:ec:bc:43:e0: bc:c0:70:db:d0:2f:fd:f9:36:bf:73:31:7f:7d:12:6d: 14:fe:10:66:d6:e4:2d:c3:78:2c:56:bd:29:d7:9e:c9: 3f:71:9f:ea:2a:5d:6c:59:ee:47:6b:2e:20:17:9b:6a: b3:a8:03:4e:0c:c7:bb:89:ef:dc:3d:a3:1b:2b:9e:bb: 85:96:3d:b5:59:72:5f:6a:29:e3:34:91:99:ab:e0:ef: 47:fc:8a:7e:c6:5f:a2:4b:3d:be:a8:5c:c2:3e:de:c0: 1d:06:85:d3:dc:10:78:56:e1:c6:f9:1f:99:d8:b2:80: d4:78:cc:e1:f4:03:c8:e6:a1:6a:df:38:46:42:8d:31: e0:70:ea:a6:90:bc:9c:ee:12:1e:10:98:bb:93:e9:b5: 0e:d6:e8:13:2a:6e:ab:a7:a7:05:1d:ba:83:35:68:af: b1:fb:92:01:20:36:35:c8:07:4b:3d:30:6a:5a:53:d1 Fingerprint (SHA-256): C7:87:90:7D:38:38:13:BF:CA:61:DE:51:7A:99:22:9C:AB:1F:39:FD:4D:53:E6:52:19:9A:98:42:10:C4:5C:53 Fingerprint (SHA1): 6C:C5:61:C5:B8:97:D7:43:DA:A1:50:1D:E4:A5:5A:BE:E6:BE:5A:45 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #215: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #216: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #217: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 18563 at Wed Sep 28 03:46:02 UTC 2022 kill -USR1 18563 httpserv: normal termination httpserv -b -p 9233 2>/dev/null; httpserv with PID 18563 killed at Wed Sep 28 03:46:03 UTC 2022 httpserv starting at Wed Sep 28 03:46:03 UTC 2022 httpserv -D -p 9233 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.3122 & trying to connect to httpserv at Wed Sep 28 03:46:03 UTC 2022 tstclnt -4 -p 9233 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9233 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 18783 >/dev/null 2>/dev/null httpserv with PID 18783 found at Wed Sep 28 03:46:03 UTC 2022 httpserv with PID 18783 started at Wed Sep 28 03:46:03 UTC 2022 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #218: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #219: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034127 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #220: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #221: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #222: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034128 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #223: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #224: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #225: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #226: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 928034129 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #227: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #228: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 928034130 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #229: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #230: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #231: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #232: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #233: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 928034131 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #234: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #235: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #236: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #237: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #238: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034128 (0x3750ad50) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Sep 28 03:46:15 2022 Not After : Wed Sep 28 03:46:15 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:7f:56:65:68:7a:a1:aa:ac:fa:83:01:36:51:c1:87: a0:99:9d:fb:c8:9e:70:0b:f0:4f:f2:1f:17:11:f6:10: 25:36:05:d9:c3:f5:f8:23:3e:d2:88:33:90:57:f1:a1: 62:e8:dc:9f:b9:6a:00:97:6a:5a:8a:8a:a6:9a:f6:99: ee:9d:ad:43:14:81:35:02:13:bd:ee:51:71:e2:16:37: 25:83:a9:92:1e:8c:e3:87:e8:f1:cc:85:87:cf:cd:93: f1:2f:76:9d:94:35:b4:db:f8:e3:be:c9:c1:62:26:9b: 65:4b:1a:7e:ab:ac:9f:1b:d3:03:de:c5:c4:e3:87:e9: 69:c9:21:af:90:d4:b1:72:60:a8:a7:a0:df:c1:aa:de: e6:13:4c:17:f3:4d:0e:36:50:a7:9e:ec:ff:92:42:2f: 25:fb:b3:e2:40:c5:08:79:3e:a5:8a:1c:ad:ba:de:de: 88:36:c7:be:33:f5:83:79:69:8c:6d:9a:82:14:0e:f0: d2:04:87:b2:4d:01:48:b6:46:67:92:3c:2f:0a:fe:bf: b6:ee:95:95:8c:48:61:8c:11:0c:34:93:f7:7d:2c:ab: e0:0b:c5:14:67:c0:00:0d:15:fa:c4:49:37:3e:a2:ae: af:1b:1a:ff:16:da:80:e6:a6:c0:f3:1e:5b:01:d4:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:5d:61:a8:f9:9c:84:d8:48:06:26:ac:d8:32:60:aa: e1:58:18:9b:41:e3:bf:cf:d1:0b:85:0a:b9:a9:a5:04: 81:cc:d7:28:aa:26:b1:46:d7:c2:04:3a:09:29:e7:a3: ee:87:39:73:47:53:25:d5:1f:cc:04:68:40:7b:a8:f1: cb:0a:2e:9c:58:79:59:28:f7:00:8b:80:25:ec:cb:cb: 63:a4:d3:08:45:47:12:b0:79:11:83:d6:42:7a:f8:94: 28:e3:bc:58:46:5d:08:02:c9:94:22:04:40:97:25:d3: 82:c9:88:69:e2:7c:a0:7c:04:a2:83:10:0e:d2:3d:e5: 67:ac:02:ae:4e:f8:e4:bb:47:c1:a0:d6:14:ba:ab:ea: 05:b9:5a:4f:44:5d:4d:85:de:2c:6a:7a:d2:72:16:1b: fd:9e:7d:57:b9:81:3f:5c:8b:82:6d:5c:70:75:e3:4c: b7:26:5e:4e:78:15:0c:20:5f:36:fb:30:be:32:61:12: dd:8c:67:8b:40:b0:59:1d:60:7d:bc:44:ec:b8:ca:cd: 8d:95:d0:f9:45:30:73:62:ea:d8:64:74:66:c4:28:1c: ee:84:39:7c:03:21:09:11:70:81:d8:67:f4:be:cc:d9: ab:7b:73:15:18:2e:09:3e:ce:61:4b:da:87:68:73:0f Fingerprint (SHA-256): C7:30:33:23:64:AC:D1:D5:E0:7A:80:F5:60:67:0A:D4:97:60:49:DE:E2:37:12:99:41:1B:C0:46:2E:5C:92:B8 Fingerprint (SHA1): AF:62:9E:82:70:8B:FC:27:47:33:0D:39:5B:3F:82:43:E5:54:DE:EA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #239: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034127 (0x3750ad4f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Sep 28 03:46:10 2022 Not After : Wed Sep 28 03:46:10 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:b4:dd:fe:b0:09:84:84:2d:1e:96:55:7e:d2:e0:39: c2:28:a8:ce:7d:f9:66:eb:92:53:af:bd:c3:62:11:a8: 53:8c:1f:4d:4c:45:0b:c2:35:75:2a:5b:cc:bf:c3:d9: 51:4a:96:72:1f:74:f2:6e:e4:e2:05:3f:8a:f2:50:56: 0e:b5:96:4d:a8:9d:5b:ba:11:a6:8f:89:5c:2b:e3:fe: 32:3e:b3:df:55:b4:b1:fa:b5:95:23:fe:13:75:cb:48: df:6e:87:ad:af:e2:ce:52:20:3e:93:e8:7b:e3:fe:11: 29:a4:d2:ca:00:51:ea:ce:15:09:15:44:42:1d:5e:ac: 1f:a8:a9:c4:f5:32:ef:55:41:21:7c:78:6b:5e:db:7c: d6:98:d8:37:d5:b6:99:54:9e:f5:51:73:ea:f6:9f:f0: 8f:c6:ea:ed:bb:60:24:6a:0f:c4:f4:3d:1d:fc:75:0d: a0:f1:d4:44:17:fa:a5:cf:8e:dc:88:ec:3c:6c:8b:a6: 03:9f:96:1a:80:45:75:63:45:fe:e7:57:9a:de:4a:5c: 4d:e8:06:28:30:dd:20:07:09:d1:ad:c4:5d:0f:6f:ff: 67:b2:ac:ed:cf:35:5f:42:2f:cc:eb:3d:6d:e9:ce:1b: db:c6:cd:8f:b4:6d:80:26:95:d3:14:a2:4b:6c:b1:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ae:78:f7:d2:d6:5b:79:38:04:c3:10:09:91:bb:d0:e5: 7f:91:f4:f9:f9:2c:84:4d:9d:03:18:a1:86:31:61:b0: 03:35:a3:81:20:e8:c6:ee:46:93:d9:c0:29:ca:56:da: 1e:79:46:a3:98:18:7d:f9:ea:ab:01:79:22:f6:89:28: 5d:b7:70:3d:09:1d:39:79:54:5c:5b:0d:bd:b4:a9:8f: b9:a1:b4:90:09:27:f1:4d:ce:33:76:52:7c:eb:85:13: 7a:64:21:3c:89:55:cd:ba:57:e9:b0:e3:e6:7a:5c:3d: ce:f3:68:d2:cf:54:41:de:f3:38:fc:37:57:b0:d4:70: 03:59:5a:aa:93:4c:91:39:a1:2d:b0:9d:20:d7:4d:ea: 44:55:b4:0a:1a:f9:13:3a:eb:9a:a3:a5:f2:69:ef:9a: 6e:27:4d:f3:ab:21:d2:36:15:2d:23:27:14:06:ef:72: 6b:56:9b:43:be:1d:97:91:81:b5:ba:f1:51:ac:3e:d9: b2:6c:d6:40:46:cf:cf:83:ec:aa:7c:ef:2f:50:04:8a: 77:d3:05:28:f7:d5:73:09:31:4c:4e:38:47:bf:b8:d1: 36:bf:25:0d:86:3c:43:83:0a:69:1c:5b:6c:bd:c8:46: 18:34:54:79:78:dd:2c:e9:a8:2b:3e:60:a6:56:25:0f Fingerprint (SHA-256): 7B:DD:12:64:3E:78:64:37:F3:48:99:DA:F4:C3:03:18:9A:1F:5D:6B:BD:FE:DF:96:4F:20:BC:B9:85:60:6B:38 Fingerprint (SHA1): B2:3D:9B:29:A8:FF:D8:DF:F0:B0:86:84:E0:D0:80:E3:27:E5:DC:07 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #240: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #241: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #242: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #243: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034127 (0x3750ad4f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Sep 28 03:46:10 2022 Not After : Wed Sep 28 03:46:10 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:b4:dd:fe:b0:09:84:84:2d:1e:96:55:7e:d2:e0:39: c2:28:a8:ce:7d:f9:66:eb:92:53:af:bd:c3:62:11:a8: 53:8c:1f:4d:4c:45:0b:c2:35:75:2a:5b:cc:bf:c3:d9: 51:4a:96:72:1f:74:f2:6e:e4:e2:05:3f:8a:f2:50:56: 0e:b5:96:4d:a8:9d:5b:ba:11:a6:8f:89:5c:2b:e3:fe: 32:3e:b3:df:55:b4:b1:fa:b5:95:23:fe:13:75:cb:48: df:6e:87:ad:af:e2:ce:52:20:3e:93:e8:7b:e3:fe:11: 29:a4:d2:ca:00:51:ea:ce:15:09:15:44:42:1d:5e:ac: 1f:a8:a9:c4:f5:32:ef:55:41:21:7c:78:6b:5e:db:7c: d6:98:d8:37:d5:b6:99:54:9e:f5:51:73:ea:f6:9f:f0: 8f:c6:ea:ed:bb:60:24:6a:0f:c4:f4:3d:1d:fc:75:0d: a0:f1:d4:44:17:fa:a5:cf:8e:dc:88:ec:3c:6c:8b:a6: 03:9f:96:1a:80:45:75:63:45:fe:e7:57:9a:de:4a:5c: 4d:e8:06:28:30:dd:20:07:09:d1:ad:c4:5d:0f:6f:ff: 67:b2:ac:ed:cf:35:5f:42:2f:cc:eb:3d:6d:e9:ce:1b: db:c6:cd:8f:b4:6d:80:26:95:d3:14:a2:4b:6c:b1:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ae:78:f7:d2:d6:5b:79:38:04:c3:10:09:91:bb:d0:e5: 7f:91:f4:f9:f9:2c:84:4d:9d:03:18:a1:86:31:61:b0: 03:35:a3:81:20:e8:c6:ee:46:93:d9:c0:29:ca:56:da: 1e:79:46:a3:98:18:7d:f9:ea:ab:01:79:22:f6:89:28: 5d:b7:70:3d:09:1d:39:79:54:5c:5b:0d:bd:b4:a9:8f: b9:a1:b4:90:09:27:f1:4d:ce:33:76:52:7c:eb:85:13: 7a:64:21:3c:89:55:cd:ba:57:e9:b0:e3:e6:7a:5c:3d: ce:f3:68:d2:cf:54:41:de:f3:38:fc:37:57:b0:d4:70: 03:59:5a:aa:93:4c:91:39:a1:2d:b0:9d:20:d7:4d:ea: 44:55:b4:0a:1a:f9:13:3a:eb:9a:a3:a5:f2:69:ef:9a: 6e:27:4d:f3:ab:21:d2:36:15:2d:23:27:14:06:ef:72: 6b:56:9b:43:be:1d:97:91:81:b5:ba:f1:51:ac:3e:d9: b2:6c:d6:40:46:cf:cf:83:ec:aa:7c:ef:2f:50:04:8a: 77:d3:05:28:f7:d5:73:09:31:4c:4e:38:47:bf:b8:d1: 36:bf:25:0d:86:3c:43:83:0a:69:1c:5b:6c:bd:c8:46: 18:34:54:79:78:dd:2c:e9:a8:2b:3e:60:a6:56:25:0f Fingerprint (SHA-256): 7B:DD:12:64:3E:78:64:37:F3:48:99:DA:F4:C3:03:18:9A:1F:5D:6B:BD:FE:DF:96:4F:20:BC:B9:85:60:6B:38 Fingerprint (SHA1): B2:3D:9B:29:A8:FF:D8:DF:F0:B0:86:84:E0:D0:80:E3:27:E5:DC:07 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #244: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034128 (0x3750ad50) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Sep 28 03:46:15 2022 Not After : Wed Sep 28 03:46:15 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:7f:56:65:68:7a:a1:aa:ac:fa:83:01:36:51:c1:87: a0:99:9d:fb:c8:9e:70:0b:f0:4f:f2:1f:17:11:f6:10: 25:36:05:d9:c3:f5:f8:23:3e:d2:88:33:90:57:f1:a1: 62:e8:dc:9f:b9:6a:00:97:6a:5a:8a:8a:a6:9a:f6:99: ee:9d:ad:43:14:81:35:02:13:bd:ee:51:71:e2:16:37: 25:83:a9:92:1e:8c:e3:87:e8:f1:cc:85:87:cf:cd:93: f1:2f:76:9d:94:35:b4:db:f8:e3:be:c9:c1:62:26:9b: 65:4b:1a:7e:ab:ac:9f:1b:d3:03:de:c5:c4:e3:87:e9: 69:c9:21:af:90:d4:b1:72:60:a8:a7:a0:df:c1:aa:de: e6:13:4c:17:f3:4d:0e:36:50:a7:9e:ec:ff:92:42:2f: 25:fb:b3:e2:40:c5:08:79:3e:a5:8a:1c:ad:ba:de:de: 88:36:c7:be:33:f5:83:79:69:8c:6d:9a:82:14:0e:f0: d2:04:87:b2:4d:01:48:b6:46:67:92:3c:2f:0a:fe:bf: b6:ee:95:95:8c:48:61:8c:11:0c:34:93:f7:7d:2c:ab: e0:0b:c5:14:67:c0:00:0d:15:fa:c4:49:37:3e:a2:ae: af:1b:1a:ff:16:da:80:e6:a6:c0:f3:1e:5b:01:d4:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:5d:61:a8:f9:9c:84:d8:48:06:26:ac:d8:32:60:aa: e1:58:18:9b:41:e3:bf:cf:d1:0b:85:0a:b9:a9:a5:04: 81:cc:d7:28:aa:26:b1:46:d7:c2:04:3a:09:29:e7:a3: ee:87:39:73:47:53:25:d5:1f:cc:04:68:40:7b:a8:f1: cb:0a:2e:9c:58:79:59:28:f7:00:8b:80:25:ec:cb:cb: 63:a4:d3:08:45:47:12:b0:79:11:83:d6:42:7a:f8:94: 28:e3:bc:58:46:5d:08:02:c9:94:22:04:40:97:25:d3: 82:c9:88:69:e2:7c:a0:7c:04:a2:83:10:0e:d2:3d:e5: 67:ac:02:ae:4e:f8:e4:bb:47:c1:a0:d6:14:ba:ab:ea: 05:b9:5a:4f:44:5d:4d:85:de:2c:6a:7a:d2:72:16:1b: fd:9e:7d:57:b9:81:3f:5c:8b:82:6d:5c:70:75:e3:4c: b7:26:5e:4e:78:15:0c:20:5f:36:fb:30:be:32:61:12: dd:8c:67:8b:40:b0:59:1d:60:7d:bc:44:ec:b8:ca:cd: 8d:95:d0:f9:45:30:73:62:ea:d8:64:74:66:c4:28:1c: ee:84:39:7c:03:21:09:11:70:81:d8:67:f4:be:cc:d9: ab:7b:73:15:18:2e:09:3e:ce:61:4b:da:87:68:73:0f Fingerprint (SHA-256): C7:30:33:23:64:AC:D1:D5:E0:7A:80:F5:60:67:0A:D4:97:60:49:DE:E2:37:12:99:41:1B:C0:46:2E:5C:92:B8 Fingerprint (SHA1): AF:62:9E:82:70:8B:FC:27:47:33:0D:39:5B:3F:82:43:E5:54:DE:EA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #245: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #246: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #247: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #248: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #249: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #250: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034128 (0x3750ad50) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Sep 28 03:46:15 2022 Not After : Wed Sep 28 03:46:15 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:7f:56:65:68:7a:a1:aa:ac:fa:83:01:36:51:c1:87: a0:99:9d:fb:c8:9e:70:0b:f0:4f:f2:1f:17:11:f6:10: 25:36:05:d9:c3:f5:f8:23:3e:d2:88:33:90:57:f1:a1: 62:e8:dc:9f:b9:6a:00:97:6a:5a:8a:8a:a6:9a:f6:99: ee:9d:ad:43:14:81:35:02:13:bd:ee:51:71:e2:16:37: 25:83:a9:92:1e:8c:e3:87:e8:f1:cc:85:87:cf:cd:93: f1:2f:76:9d:94:35:b4:db:f8:e3:be:c9:c1:62:26:9b: 65:4b:1a:7e:ab:ac:9f:1b:d3:03:de:c5:c4:e3:87:e9: 69:c9:21:af:90:d4:b1:72:60:a8:a7:a0:df:c1:aa:de: e6:13:4c:17:f3:4d:0e:36:50:a7:9e:ec:ff:92:42:2f: 25:fb:b3:e2:40:c5:08:79:3e:a5:8a:1c:ad:ba:de:de: 88:36:c7:be:33:f5:83:79:69:8c:6d:9a:82:14:0e:f0: d2:04:87:b2:4d:01:48:b6:46:67:92:3c:2f:0a:fe:bf: b6:ee:95:95:8c:48:61:8c:11:0c:34:93:f7:7d:2c:ab: e0:0b:c5:14:67:c0:00:0d:15:fa:c4:49:37:3e:a2:ae: af:1b:1a:ff:16:da:80:e6:a6:c0:f3:1e:5b:01:d4:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:5d:61:a8:f9:9c:84:d8:48:06:26:ac:d8:32:60:aa: e1:58:18:9b:41:e3:bf:cf:d1:0b:85:0a:b9:a9:a5:04: 81:cc:d7:28:aa:26:b1:46:d7:c2:04:3a:09:29:e7:a3: ee:87:39:73:47:53:25:d5:1f:cc:04:68:40:7b:a8:f1: cb:0a:2e:9c:58:79:59:28:f7:00:8b:80:25:ec:cb:cb: 63:a4:d3:08:45:47:12:b0:79:11:83:d6:42:7a:f8:94: 28:e3:bc:58:46:5d:08:02:c9:94:22:04:40:97:25:d3: 82:c9:88:69:e2:7c:a0:7c:04:a2:83:10:0e:d2:3d:e5: 67:ac:02:ae:4e:f8:e4:bb:47:c1:a0:d6:14:ba:ab:ea: 05:b9:5a:4f:44:5d:4d:85:de:2c:6a:7a:d2:72:16:1b: fd:9e:7d:57:b9:81:3f:5c:8b:82:6d:5c:70:75:e3:4c: b7:26:5e:4e:78:15:0c:20:5f:36:fb:30:be:32:61:12: dd:8c:67:8b:40:b0:59:1d:60:7d:bc:44:ec:b8:ca:cd: 8d:95:d0:f9:45:30:73:62:ea:d8:64:74:66:c4:28:1c: ee:84:39:7c:03:21:09:11:70:81:d8:67:f4:be:cc:d9: ab:7b:73:15:18:2e:09:3e:ce:61:4b:da:87:68:73:0f Fingerprint (SHA-256): C7:30:33:23:64:AC:D1:D5:E0:7A:80:F5:60:67:0A:D4:97:60:49:DE:E2:37:12:99:41:1B:C0:46:2E:5C:92:B8 Fingerprint (SHA1): AF:62:9E:82:70:8B:FC:27:47:33:0D:39:5B:3F:82:43:E5:54:DE:EA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #251: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034128 (0x3750ad50) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Sep 28 03:46:15 2022 Not After : Wed Sep 28 03:46:15 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:7f:56:65:68:7a:a1:aa:ac:fa:83:01:36:51:c1:87: a0:99:9d:fb:c8:9e:70:0b:f0:4f:f2:1f:17:11:f6:10: 25:36:05:d9:c3:f5:f8:23:3e:d2:88:33:90:57:f1:a1: 62:e8:dc:9f:b9:6a:00:97:6a:5a:8a:8a:a6:9a:f6:99: ee:9d:ad:43:14:81:35:02:13:bd:ee:51:71:e2:16:37: 25:83:a9:92:1e:8c:e3:87:e8:f1:cc:85:87:cf:cd:93: f1:2f:76:9d:94:35:b4:db:f8:e3:be:c9:c1:62:26:9b: 65:4b:1a:7e:ab:ac:9f:1b:d3:03:de:c5:c4:e3:87:e9: 69:c9:21:af:90:d4:b1:72:60:a8:a7:a0:df:c1:aa:de: e6:13:4c:17:f3:4d:0e:36:50:a7:9e:ec:ff:92:42:2f: 25:fb:b3:e2:40:c5:08:79:3e:a5:8a:1c:ad:ba:de:de: 88:36:c7:be:33:f5:83:79:69:8c:6d:9a:82:14:0e:f0: d2:04:87:b2:4d:01:48:b6:46:67:92:3c:2f:0a:fe:bf: b6:ee:95:95:8c:48:61:8c:11:0c:34:93:f7:7d:2c:ab: e0:0b:c5:14:67:c0:00:0d:15:fa:c4:49:37:3e:a2:ae: af:1b:1a:ff:16:da:80:e6:a6:c0:f3:1e:5b:01:d4:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:5d:61:a8:f9:9c:84:d8:48:06:26:ac:d8:32:60:aa: e1:58:18:9b:41:e3:bf:cf:d1:0b:85:0a:b9:a9:a5:04: 81:cc:d7:28:aa:26:b1:46:d7:c2:04:3a:09:29:e7:a3: ee:87:39:73:47:53:25:d5:1f:cc:04:68:40:7b:a8:f1: cb:0a:2e:9c:58:79:59:28:f7:00:8b:80:25:ec:cb:cb: 63:a4:d3:08:45:47:12:b0:79:11:83:d6:42:7a:f8:94: 28:e3:bc:58:46:5d:08:02:c9:94:22:04:40:97:25:d3: 82:c9:88:69:e2:7c:a0:7c:04:a2:83:10:0e:d2:3d:e5: 67:ac:02:ae:4e:f8:e4:bb:47:c1:a0:d6:14:ba:ab:ea: 05:b9:5a:4f:44:5d:4d:85:de:2c:6a:7a:d2:72:16:1b: fd:9e:7d:57:b9:81:3f:5c:8b:82:6d:5c:70:75:e3:4c: b7:26:5e:4e:78:15:0c:20:5f:36:fb:30:be:32:61:12: dd:8c:67:8b:40:b0:59:1d:60:7d:bc:44:ec:b8:ca:cd: 8d:95:d0:f9:45:30:73:62:ea:d8:64:74:66:c4:28:1c: ee:84:39:7c:03:21:09:11:70:81:d8:67:f4:be:cc:d9: ab:7b:73:15:18:2e:09:3e:ce:61:4b:da:87:68:73:0f Fingerprint (SHA-256): C7:30:33:23:64:AC:D1:D5:E0:7A:80:F5:60:67:0A:D4:97:60:49:DE:E2:37:12:99:41:1B:C0:46:2E:5C:92:B8 Fingerprint (SHA1): AF:62:9E:82:70:8B:FC:27:47:33:0D:39:5B:3F:82:43:E5:54:DE:EA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #252: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #253: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #254: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #255: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #256: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #257: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034127 (0x3750ad4f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Sep 28 03:46:10 2022 Not After : Wed Sep 28 03:46:10 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:b4:dd:fe:b0:09:84:84:2d:1e:96:55:7e:d2:e0:39: c2:28:a8:ce:7d:f9:66:eb:92:53:af:bd:c3:62:11:a8: 53:8c:1f:4d:4c:45:0b:c2:35:75:2a:5b:cc:bf:c3:d9: 51:4a:96:72:1f:74:f2:6e:e4:e2:05:3f:8a:f2:50:56: 0e:b5:96:4d:a8:9d:5b:ba:11:a6:8f:89:5c:2b:e3:fe: 32:3e:b3:df:55:b4:b1:fa:b5:95:23:fe:13:75:cb:48: df:6e:87:ad:af:e2:ce:52:20:3e:93:e8:7b:e3:fe:11: 29:a4:d2:ca:00:51:ea:ce:15:09:15:44:42:1d:5e:ac: 1f:a8:a9:c4:f5:32:ef:55:41:21:7c:78:6b:5e:db:7c: d6:98:d8:37:d5:b6:99:54:9e:f5:51:73:ea:f6:9f:f0: 8f:c6:ea:ed:bb:60:24:6a:0f:c4:f4:3d:1d:fc:75:0d: a0:f1:d4:44:17:fa:a5:cf:8e:dc:88:ec:3c:6c:8b:a6: 03:9f:96:1a:80:45:75:63:45:fe:e7:57:9a:de:4a:5c: 4d:e8:06:28:30:dd:20:07:09:d1:ad:c4:5d:0f:6f:ff: 67:b2:ac:ed:cf:35:5f:42:2f:cc:eb:3d:6d:e9:ce:1b: db:c6:cd:8f:b4:6d:80:26:95:d3:14:a2:4b:6c:b1:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ae:78:f7:d2:d6:5b:79:38:04:c3:10:09:91:bb:d0:e5: 7f:91:f4:f9:f9:2c:84:4d:9d:03:18:a1:86:31:61:b0: 03:35:a3:81:20:e8:c6:ee:46:93:d9:c0:29:ca:56:da: 1e:79:46:a3:98:18:7d:f9:ea:ab:01:79:22:f6:89:28: 5d:b7:70:3d:09:1d:39:79:54:5c:5b:0d:bd:b4:a9:8f: b9:a1:b4:90:09:27:f1:4d:ce:33:76:52:7c:eb:85:13: 7a:64:21:3c:89:55:cd:ba:57:e9:b0:e3:e6:7a:5c:3d: ce:f3:68:d2:cf:54:41:de:f3:38:fc:37:57:b0:d4:70: 03:59:5a:aa:93:4c:91:39:a1:2d:b0:9d:20:d7:4d:ea: 44:55:b4:0a:1a:f9:13:3a:eb:9a:a3:a5:f2:69:ef:9a: 6e:27:4d:f3:ab:21:d2:36:15:2d:23:27:14:06:ef:72: 6b:56:9b:43:be:1d:97:91:81:b5:ba:f1:51:ac:3e:d9: b2:6c:d6:40:46:cf:cf:83:ec:aa:7c:ef:2f:50:04:8a: 77:d3:05:28:f7:d5:73:09:31:4c:4e:38:47:bf:b8:d1: 36:bf:25:0d:86:3c:43:83:0a:69:1c:5b:6c:bd:c8:46: 18:34:54:79:78:dd:2c:e9:a8:2b:3e:60:a6:56:25:0f Fingerprint (SHA-256): 7B:DD:12:64:3E:78:64:37:F3:48:99:DA:F4:C3:03:18:9A:1F:5D:6B:BD:FE:DF:96:4F:20:BC:B9:85:60:6B:38 Fingerprint (SHA1): B2:3D:9B:29:A8:FF:D8:DF:F0:B0:86:84:E0:D0:80:E3:27:E5:DC:07 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #258: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034127 (0x3750ad4f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Sep 28 03:46:10 2022 Not After : Wed Sep 28 03:46:10 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:b4:dd:fe:b0:09:84:84:2d:1e:96:55:7e:d2:e0:39: c2:28:a8:ce:7d:f9:66:eb:92:53:af:bd:c3:62:11:a8: 53:8c:1f:4d:4c:45:0b:c2:35:75:2a:5b:cc:bf:c3:d9: 51:4a:96:72:1f:74:f2:6e:e4:e2:05:3f:8a:f2:50:56: 0e:b5:96:4d:a8:9d:5b:ba:11:a6:8f:89:5c:2b:e3:fe: 32:3e:b3:df:55:b4:b1:fa:b5:95:23:fe:13:75:cb:48: df:6e:87:ad:af:e2:ce:52:20:3e:93:e8:7b:e3:fe:11: 29:a4:d2:ca:00:51:ea:ce:15:09:15:44:42:1d:5e:ac: 1f:a8:a9:c4:f5:32:ef:55:41:21:7c:78:6b:5e:db:7c: d6:98:d8:37:d5:b6:99:54:9e:f5:51:73:ea:f6:9f:f0: 8f:c6:ea:ed:bb:60:24:6a:0f:c4:f4:3d:1d:fc:75:0d: a0:f1:d4:44:17:fa:a5:cf:8e:dc:88:ec:3c:6c:8b:a6: 03:9f:96:1a:80:45:75:63:45:fe:e7:57:9a:de:4a:5c: 4d:e8:06:28:30:dd:20:07:09:d1:ad:c4:5d:0f:6f:ff: 67:b2:ac:ed:cf:35:5f:42:2f:cc:eb:3d:6d:e9:ce:1b: db:c6:cd:8f:b4:6d:80:26:95:d3:14:a2:4b:6c:b1:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ae:78:f7:d2:d6:5b:79:38:04:c3:10:09:91:bb:d0:e5: 7f:91:f4:f9:f9:2c:84:4d:9d:03:18:a1:86:31:61:b0: 03:35:a3:81:20:e8:c6:ee:46:93:d9:c0:29:ca:56:da: 1e:79:46:a3:98:18:7d:f9:ea:ab:01:79:22:f6:89:28: 5d:b7:70:3d:09:1d:39:79:54:5c:5b:0d:bd:b4:a9:8f: b9:a1:b4:90:09:27:f1:4d:ce:33:76:52:7c:eb:85:13: 7a:64:21:3c:89:55:cd:ba:57:e9:b0:e3:e6:7a:5c:3d: ce:f3:68:d2:cf:54:41:de:f3:38:fc:37:57:b0:d4:70: 03:59:5a:aa:93:4c:91:39:a1:2d:b0:9d:20:d7:4d:ea: 44:55:b4:0a:1a:f9:13:3a:eb:9a:a3:a5:f2:69:ef:9a: 6e:27:4d:f3:ab:21:d2:36:15:2d:23:27:14:06:ef:72: 6b:56:9b:43:be:1d:97:91:81:b5:ba:f1:51:ac:3e:d9: b2:6c:d6:40:46:cf:cf:83:ec:aa:7c:ef:2f:50:04:8a: 77:d3:05:28:f7:d5:73:09:31:4c:4e:38:47:bf:b8:d1: 36:bf:25:0d:86:3c:43:83:0a:69:1c:5b:6c:bd:c8:46: 18:34:54:79:78:dd:2c:e9:a8:2b:3e:60:a6:56:25:0f Fingerprint (SHA-256): 7B:DD:12:64:3E:78:64:37:F3:48:99:DA:F4:C3:03:18:9A:1F:5D:6B:BD:FE:DF:96:4F:20:BC:B9:85:60:6B:38 Fingerprint (SHA1): B2:3D:9B:29:A8:FF:D8:DF:F0:B0:86:84:E0:D0:80:E3:27:E5:DC:07 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #259: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #260: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034132 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #261: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #262: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #263: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034133 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #264: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #265: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #266: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034134 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #267: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #268: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #269: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034135 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #270: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #271: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #272: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034136 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #273: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #274: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #275: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034137 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #276: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #277: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #278: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034138 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #279: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #280: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #281: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034139 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #282: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #283: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #284: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034140 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #285: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #286: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #287: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #288: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 928034141 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #289: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #290: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 928034142 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #291: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #292: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 928034143 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #293: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #294: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #295: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #296: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #297: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 928034144 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #298: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #299: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 928034145 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #300: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #301: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 928034146 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #302: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #303: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #304: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #305: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #306: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 928034147 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #307: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #308: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 928034148 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #309: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #310: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 928034149 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #311: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #312: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #313: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #314: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #315: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 928034150 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #316: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #317: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 928034151 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #318: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #319: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 928034152 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #320: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #321: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #322: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #323: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #324: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 928034153 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #325: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #326: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #327: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #328: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 928034154 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #329: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #330: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034132 (0x3750ad54) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Wed Sep 28 03:46:43 2022 Not After : Wed Sep 28 03:46:43 2072 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:85:f5:39:33:53:4c:7b:85:aa:33:cf:1d:d5:5e:3b: e7:52:1d:6d:fa:fc:77:4c:3d:9e:4a:21:db:19:0d:62: 8a:52:2a:a8:09:73:51:63:49:ab:66:62:de:df:f8:96: e7:ee:03:b3:f5:ae:53:c7:de:42:f5:db:77:64:88:d5: 2c:76:e8:3c:73:77:44:1e:2b:67:ae:37:67:34:f7:02: 01:a4:0a:57:e9:96:9c:68:9b:f3:62:25:5e:98:c2:3c: 13:4a:f3:ce:76:00:7f:d9:77:d2:ca:83:27:fd:18:aa: 52:2e:57:95:4d:69:ec:2e:52:c2:85:79:0e:11:66:62: f7:5b:30:4e:28:46:1b:59:a6:4c:03:c6:b4:67:e8:ee: 84:e8:28:2a:7a:c8:cf:0c:2f:8f:dc:b0:fc:0f:36:4b: 7a:e3:74:9f:03:0c:2a:4c:f8:bc:e7:65:4f:1f:9c:43: 1e:70:16:f8:04:5e:70:3f:98:dd:2d:a5:2a:ff:f1:7c: 77:62:26:fb:10:6d:f9:05:46:2a:c9:da:c0:16:62:61: 67:3e:42:4d:21:9d:93:2e:79:bc:e5:58:07:40:98:df: 4a:b8:2e:3b:33:a9:01:64:41:7b:4c:3d:b9:fd:48:27: 9c:59:5c:46:94:e6:e2:74:f9:41:3a:9b:2b:94:b7:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:b6:1b:f7:b1:26:af:a3:11:e4:45:f1:94:91:a8:74: be:fc:15:dd:3d:a4:fd:19:db:76:4f:16:2e:72:8f:de: 4d:71:92:00:49:4d:45:78:c1:7d:2d:37:d9:3e:ba:a4: e3:4c:2f:d3:9d:bd:1d:7c:93:7b:3e:40:e6:34:59:f5: 79:c0:06:55:eb:34:10:89:8d:04:1a:20:05:95:f9:7f: 94:4c:d4:41:12:ca:a3:12:d2:76:61:71:d4:b5:b3:14: 8e:d9:9c:75:b1:f6:b6:42:c7:36:ed:6b:53:35:d3:eb: 76:49:b3:25:6e:59:b1:71:ac:85:b5:9e:ae:31:f7:65: d4:0c:db:a0:ef:14:e9:7c:0b:89:02:a2:15:41:87:35: 66:a2:37:90:41:f4:6b:8c:a6:d9:0a:ca:ea:12:4a:9d: eb:98:85:8b:7d:b5:51:d9:94:e8:51:79:35:74:46:17: fe:ef:f3:b8:ab:40:ef:1d:a1:33:35:62:c9:62:24:0c: e3:53:22:72:66:10:ad:b9:f2:cf:30:49:49:4f:ca:e0: f7:c3:c0:70:49:81:6c:dc:09:96:11:c4:00:18:c2:e9: dd:f5:62:cb:d4:9f:64:d4:55:74:bc:97:56:ac:0f:c8: fd:f1:94:c2:af:85:88:d8:66:47:ac:97:ea:ea:a7:36 Fingerprint (SHA-256): F5:A3:56:8B:89:AF:C0:B8:74:90:31:78:CD:46:51:C7:6D:9D:1A:D6:10:57:16:CF:78:B4:EE:12:4F:A6:1D:61 Fingerprint (SHA1): D5:1E:5B:E4:8E:91:EE:F9:C9:E0:AB:68:A4:8D:75:EB:87:60:EC:45 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #331: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034133 (0x3750ad55) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Wed Sep 28 03:46:48 2022 Not After : Wed Sep 28 03:46:48 2072 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:68:d9:6f:36:78:f0:7a:5f:f4:e5:16:b4:05:98:b2: 68:71:50:66:92:fd:10:73:a5:f1:04:3f:66:3d:73:60: 5b:2c:e7:7a:ab:ef:32:2b:e7:49:64:57:4b:6f:dd:f3: f6:dd:3b:52:fc:50:fd:46:be:1e:db:18:c8:fb:02:db: ed:fc:7e:71:9e:8a:15:ca:35:ea:7f:50:04:a3:83:76: df:76:b2:63:94:c0:4b:75:d4:9b:7a:b8:15:97:10:5f: 14:87:f8:7f:11:19:39:c2:21:d1:40:3b:0a:ee:00:9c: 21:45:d7:c6:79:6c:43:b2:76:f3:5d:e5:1a:d5:9b:7d: 17:8d:fb:9c:45:0b:f4:a6:92:10:e7:4c:44:be:83:2e: 59:f0:c0:35:f0:a3:b9:e2:53:69:85:3e:bc:60:bc:5e: b2:7e:59:b6:46:b1:ff:bf:e1:08:f5:df:d5:3d:fa:35: 30:f1:4d:19:1d:99:2d:32:0d:60:cb:73:31:30:86:40: ca:d1:f7:e3:6f:7e:02:91:8c:74:a1:f3:9b:a0:dc:1d: bd:37:9e:96:9b:6a:3c:d6:d9:db:7b:98:83:55:52:1e: a0:23:0b:0e:8b:5c:04:70:f4:af:23:fd:5f:5a:4f:4a: f1:27:35:12:5a:9a:05:c6:01:4d:86:f0:be:eb:65:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:89:39:e5:11:84:87:7f:0b:39:bd:24:26:34:7e:e1: 31:e9:a5:90:dd:69:59:d0:3e:1e:7d:bd:7f:4c:b8:2a: f4:b0:72:6e:d8:d1:56:b1:1e:12:a2:b7:a2:d6:60:af: f3:9c:3c:66:2b:89:45:55:a3:b9:e0:ff:42:2a:82:7e: 93:d5:7b:b9:0b:75:1e:58:bb:77:0b:71:c3:c2:29:79: 79:dc:30:c3:f2:80:10:d8:e2:bb:f9:f6:6b:8f:60:b5: c7:56:2d:bd:85:d8:5b:79:b6:4b:22:34:a5:e4:fa:fa: 6f:bc:9e:97:f1:ac:59:3a:7f:5e:1f:76:cb:ee:48:20: d6:77:5d:18:c9:dc:78:af:3f:28:72:71:ab:75:23:43: 42:cf:6d:18:6c:7e:51:70:49:94:ec:bc:2d:09:71:d6: 53:95:22:f2:5b:52:b5:52:44:19:da:60:ad:86:c8:04: 56:8e:ab:a4:1f:2a:94:a4:4a:62:41:23:7b:86:11:05: 21:82:15:03:e9:ff:e4:52:87:db:25:ad:00:b6:be:02: a0:d3:e8:8e:6e:e4:e3:06:00:af:9b:4d:e5:47:fb:6b: dc:c4:90:23:93:b8:b2:a0:c7:a3:d6:2f:a0:cc:83:0c: f2:03:07:b9:8a:4d:a5:d7:ff:42:d5:6a:08:3b:a2:3e Fingerprint (SHA-256): 48:88:5C:1D:37:DF:39:9F:31:50:00:BB:4A:64:66:96:45:1C:20:43:6C:E1:CD:F4:3A:48:41:DC:98:04:D9:D0 Fingerprint (SHA1): FE:64:3C:09:61:58:12:95:FF:DC:C1:DB:84:DE:21:70:72:BF:CC:30 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #332: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034134 (0x3750ad56) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Wed Sep 28 03:46:52 2022 Not After : Wed Sep 28 03:46:52 2072 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:61:44:fe:c1:31:43:ab:53:3a:8f:c0:18:6f:a1:69: a5:9b:e1:a0:30:e6:e0:f3:77:f8:aa:ff:68:7f:8e:21: a2:98:0c:ff:8b:5b:2e:ee:14:23:e0:bb:b2:c6:1e:5c: 05:8f:d0:5b:05:56:81:70:50:b6:d7:7c:70:f6:87:86: bf:74:68:c5:19:12:0e:06:ab:22:81:85:a5:30:7b:b5: 55:73:09:96:4b:70:19:fb:30:0c:0b:dc:ea:a3:28:24: b7:9c:76:bc:9b:69:c6:2f:81:6f:39:57:d1:d8:98:cb: 44:8e:4a:d3:c3:21:cf:4e:ad:27:95:8c:68:45:b8:2a: 0e:d4:46:34:f7:6e:eb:d4:de:a8:59:a2:b6:e4:a8:9c: f3:93:86:73:20:89:4e:10:46:95:3d:89:aa:85:8d:8e: 47:6f:01:01:a0:9b:b5:36:e1:4f:4c:41:49:6d:cc:4e: 68:68:ac:ff:ae:98:b9:a5:e7:c5:dc:68:63:4f:ba:ec: 2a:c3:69:77:20:c3:b3:14:06:2e:a2:bb:1c:bc:de:0b: e2:e4:4b:bb:da:0b:77:82:8e:cd:b4:6c:57:82:4b:d3: 6c:fa:1a:81:17:f0:4b:3a:58:8c:a4:45:2e:e7:e8:cf: a7:7a:10:f1:9f:df:89:f2:6d:7e:07:8c:79:75:15:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:4b:6d:a9:b1:53:0b:99:c7:a0:3e:9e:45:eb:0a:32: 8b:b1:83:18:d5:2a:55:d2:c7:bc:b5:2c:ab:3c:48:97: 71:83:09:f9:e6:b3:36:11:af:11:3d:f2:9a:36:7e:f4: dd:9d:83:c3:57:c8:e8:ad:3c:3e:dd:86:64:4f:5f:ad: 26:d0:01:98:8a:c9:34:17:96:34:3a:a7:d0:91:8a:13: 32:83:9f:2b:46:c6:f3:d7:14:13:f8:dd:4a:cc:6a:ea: d0:25:a9:64:0b:f6:8d:e5:bf:28:d3:9f:1d:40:2b:6b: d1:03:24:40:7a:5c:6b:13:f7:6a:71:bb:71:08:56:f3: eb:88:99:11:24:ea:73:47:87:3e:4c:03:7e:44:4b:50: e1:22:8d:d6:15:28:6d:c4:a3:c9:32:8c:f4:d1:f1:57: ac:6f:6e:2c:35:0d:5c:d9:89:f7:db:ec:ee:72:07:e4: 17:76:6e:01:02:08:69:e2:3e:b8:58:7e:fd:42:c6:c7: 0e:e9:aa:11:e1:fd:8e:9f:6b:50:60:fd:b6:92:37:ae: f6:92:48:13:03:32:1f:60:f8:cf:13:0b:b5:24:76:91: 16:82:03:80:45:f7:3d:8a:bf:d0:46:24:fb:2c:4c:6d: ca:69:74:d5:ba:cb:19:cf:47:d3:40:cf:3a:01:a2:56 Fingerprint (SHA-256): EA:1B:A8:BC:E0:78:0D:FE:FB:5B:F6:2B:90:5F:3D:0B:75:68:F9:B6:FE:55:CE:8C:C2:AF:F3:10:C6:9D:3D:8F Fingerprint (SHA1): FC:31:A4:FD:E6:D8:F8:E5:70:32:82:7F:1C:45:CC:86:78:33:40:55 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #333: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034135 (0x3750ad57) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Wed Sep 28 03:46:56 2022 Not After : Wed Sep 28 03:46:56 2072 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:d1:65:c4:2f:c1:60:cf:eb:89:45:a9:0e:eb:ea:76: 76:bb:3f:29:49:fc:68:e8:2b:34:d9:30:d4:e4:e9:4d: f8:f3:dc:5e:1a:70:fc:b5:87:7f:19:ef:d0:ab:3e:fc: 0f:1d:26:4f:3d:69:11:32:b0:0d:f5:0e:3c:cb:ea:73: 2c:94:3a:f7:a1:86:d8:28:85:9f:7e:94:0f:d3:89:d8: f1:e8:15:d9:1f:b0:81:34:01:3d:d2:b0:81:e4:5c:e9: 72:0b:ad:4f:81:5c:80:6c:33:cf:4f:4a:83:e6:e0:37: e8:e9:d8:ce:af:c6:37:65:e9:f7:30:db:79:0a:f6:c6: 3e:f3:e7:b7:f5:da:23:6c:1d:6b:d6:12:8c:bc:77:36: 29:c9:73:5c:11:79:6b:cc:b0:67:ca:e9:b4:72:04:cc: 34:8c:36:67:f2:22:a4:47:b2:21:8a:f7:99:21:5e:b9: 73:66:60:fb:7b:84:74:6b:94:91:ec:80:76:d7:4e:17: 77:7e:6e:96:9f:74:f1:42:65:73:9c:9a:dd:7f:76:a0: 27:31:9d:2e:58:f0:30:fa:5b:fa:e4:3f:d9:a9:2a:60: 48:0f:15:bc:90:aa:64:ea:e9:c4:2c:71:bf:63:ed:91: 4a:eb:4e:ff:49:70:3b:82:9e:c3:86:1b:36:e3:de:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:9d:cf:70:f3:e1:d5:fd:77:c2:82:40:9c:2d:f6:9a: df:17:42:49:42:ca:30:3a:02:8d:02:db:fd:b9:72:60: b9:e3:95:f8:a4:94:43:1d:e1:9f:90:85:84:c6:aa:d1: f1:ed:13:54:b5:61:89:32:f6:bb:53:ad:bd:f7:f0:ab: ec:f0:6b:92:87:80:fa:ad:97:6e:b4:c5:aa:80:5b:45: b9:f0:4e:d2:f8:bc:02:03:f3:ff:48:7a:c3:fe:92:8c: 75:73:8f:83:28:19:05:c6:38:a8:6b:d5:de:27:bd:8a: 54:f0:89:fc:ee:c3:05:74:f6:bf:ae:ff:56:ef:b9:83: e8:ff:61:a0:62:d3:fc:21:7f:b7:0e:7b:3b:a2:47:bb: 4e:fe:d5:b1:a9:21:4c:a7:77:8b:b7:9c:7e:68:22:90: a7:93:97:db:7e:92:be:d0:a4:05:31:95:62:5a:9b:75: ac:a7:ff:97:d9:35:79:fe:8d:96:8d:27:90:b0:cb:66: 0e:1d:f3:d5:f3:c1:3e:e5:6a:98:e8:af:d7:c7:59:07: fc:ae:44:d5:39:3f:8b:65:e0:68:b0:72:5f:84:57:2b: d8:34:0d:91:02:2b:5e:34:fa:ae:31:aa:4b:33:c4:d4: 96:b8:92:5b:0c:f7:35:5f:31:eb:53:90:ba:57:6c:8f Fingerprint (SHA-256): 90:33:BD:90:1F:1F:7D:0D:A6:65:83:14:10:04:43:D5:C4:19:5F:87:A5:6B:F5:75:4E:7D:96:CB:2E:91:9F:97 Fingerprint (SHA1): 7C:41:C4:E3:59:12:B6:69:0E:E4:0A:13:E0:17:E6:0D:E9:9C:A9:B6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #334: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034136 (0x3750ad58) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Wed Sep 28 03:47:00 2022 Not After : Wed Sep 28 03:47:00 2072 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:bf:ec:71:89:9a:89:f6:44:0d:81:95:0c:46:c8:52: e3:63:51:74:cf:f7:c9:34:91:72:f3:94:08:a5:95:44: 2d:ac:fd:87:ae:7e:7c:c2:36:bc:20:f9:38:73:0e:54: f8:fc:75:d5:a0:da:9f:22:b1:be:92:3d:34:be:eb:50: 70:ec:8a:bc:8f:74:2e:3e:c5:2a:32:6c:55:2f:c2:72: 2b:bb:a1:79:bc:1e:2c:34:7b:f3:57:95:0c:10:87:51: 49:5d:fe:15:c9:b7:df:b3:4f:ee:50:71:e0:a3:c7:ad: 0b:5e:aa:69:2f:aa:a4:80:c8:2a:23:f4:87:72:59:c2: cd:d2:2c:0b:74:fa:ee:1a:90:58:b3:15:fd:06:49:bd: 5c:6a:c2:4d:50:5f:64:9a:1c:7c:dc:5e:82:36:0e:33: 05:2d:98:80:33:c6:e7:16:d5:bf:80:94:e3:3e:ae:5e: 61:c7:8e:1e:9d:aa:08:00:1d:6d:e6:1c:c1:f4:af:84: 0a:2d:1f:b8:95:5a:0f:7a:d5:94:af:df:e8:86:9c:f0: c5:bd:dc:80:dd:8b:cf:d9:98:d0:ad:23:5c:4f:6b:07: 1b:2f:f2:55:f5:c0:03:82:62:91:83:27:12:5e:ca:f8: 81:87:f3:c6:d4:28:15:c0:5c:7a:46:3f:65:12:94:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:7b:70:6f:fe:82:47:c4:13:c4:6c:29:8e:74:e1:32: 8d:e1:cb:d4:07:85:87:9d:ad:5c:d4:c0:df:1b:bc:fa: 95:8a:43:f5:f7:d7:ea:9a:84:51:15:94:76:d0:ef:32: 20:d0:5c:eb:7b:d5:26:1c:14:b7:fa:b4:92:73:6c:17: 7c:40:db:45:6f:62:39:8c:c0:ef:f9:e9:e4:25:ab:42: c4:e1:d4:0e:e1:24:48:ff:74:80:61:8a:61:88:4a:e6: 05:22:5f:92:44:2e:f9:d0:e2:24:28:64:0c:90:84:cc: 99:82:59:55:30:ff:93:fc:8f:df:5d:5c:bb:34:24:1e: d3:f8:00:5e:c5:f2:68:67:29:72:a0:da:d3:96:a4:83: 03:38:aa:ed:ec:8b:df:76:71:17:99:9e:ee:ae:48:e4: c4:e9:af:0d:5f:ee:ce:5a:77:16:93:75:70:46:3d:ad: c4:08:87:7b:1c:75:16:99:de:36:31:c4:be:61:b6:ac: ae:34:23:b8:0d:78:a8:3b:5d:9f:6e:48:74:13:dd:a1: b8:0b:d5:68:a3:85:e6:e1:4b:c3:1e:58:9f:bf:20:28: d3:86:20:b7:2e:33:94:d8:fc:37:1f:35:dc:07:a7:56: 4d:5e:51:4a:53:c4:ee:ff:ae:13:0d:55:82:57:48:1e Fingerprint (SHA-256): F5:E7:B1:2F:C1:39:EE:82:13:63:96:16:A6:54:BC:A6:36:B4:07:19:66:EB:2B:6A:48:F1:D2:8D:2C:9C:4D:3F Fingerprint (SHA1): 31:7F:41:93:8F:DE:F6:38:00:0A:EF:1C:7F:4F:C4:53:59:8D:27:28 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #335: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034137 (0x3750ad59) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Wed Sep 28 03:47:05 2022 Not After : Wed Sep 28 03:47:05 2072 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:38:66:73:a0:e8:9f:d1:ff:31:e9:06:81:8c:8e:1c: ee:8f:47:36:d6:65:21:17:ef:00:f1:e1:86:3d:a5:54: 8a:47:af:6f:e5:e5:bd:03:c3:dd:52:4d:fc:73:60:7d: 50:98:e7:e4:9c:f3:b9:2e:47:a2:e2:6d:2d:69:4b:82: 3b:27:85:8b:27:43:a2:b2:16:02:56:4e:bc:67:41:55: 9d:a5:f1:04:86:f5:a6:9c:3b:9e:d0:0d:6c:b3:55:62: 98:bf:0a:0e:fe:ad:c6:d0:0a:f8:92:85:d4:aa:7f:d6: d5:aa:fc:26:a4:e3:39:6e:a4:1e:ca:c2:ba:fd:dc:9d: 8d:0e:5a:48:fb:ac:49:51:b0:38:67:69:f2:2f:82:40: ab:59:70:7c:b8:76:05:07:02:5b:cd:1b:98:c6:d3:5e: d8:16:0b:9b:42:52:6f:f9:a0:53:1a:81:ab:40:28:a9: f5:71:3a:81:c6:42:89:58:74:9b:b1:b3:65:e0:69:ca: 63:67:94:20:91:48:ca:b2:79:43:2f:44:0b:4c:4b:b6: f6:23:84:7e:1c:4c:58:44:82:58:ac:09:c9:a5:d8:16: 79:83:98:ea:99:c2:36:50:1f:d7:6a:ce:65:12:82:83: a1:0a:e1:16:18:be:f0:42:6d:a3:dd:68:e0:23:f6:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:30:b8:e2:de:eb:c3:42:4c:bc:7d:62:64:c3:a5:bf: 68:61:5c:9d:24:ca:14:49:39:7b:20:a1:a6:e4:b0:98: a5:48:4c:0e:18:e6:cb:fc:a2:4f:73:f3:7f:79:bb:2b: cb:23:85:70:35:f0:5f:d9:9c:97:dd:60:a7:cf:86:57: a1:36:2e:30:a8:b7:7d:91:98:7b:3f:ab:ca:7c:3c:fc: 57:e7:0f:29:05:5c:d0:d0:ce:34:cb:68:2e:e5:15:76: 52:79:7c:e9:fb:8b:b4:11:bf:ca:b6:94:34:31:b5:66: 61:c0:21:12:5b:7c:c6:43:d6:6a:87:6b:b2:d3:cf:86: 3d:a2:56:0c:6d:41:0c:63:a5:59:e8:0a:d1:16:b2:c8: 34:a2:14:e8:bc:e0:bc:97:75:7d:45:51:76:d0:01:cb: d1:cf:e3:cc:3b:09:da:d0:f0:4c:b1:0b:32:cd:67:16: e2:76:46:dd:0c:37:4e:95:d7:0b:57:2e:b7:ea:ec:df: 3b:5d:88:f0:9d:e8:4b:97:d2:64:84:e6:bb:cb:31:43: d0:d3:e5:3e:ad:f0:d8:f8:4e:21:62:d5:80:ab:4e:21: 26:9d:45:e7:0c:f5:76:ed:ac:42:ba:3f:fb:4a:d9:d4: 32:d1:98:b8:64:29:ee:66:bc:f5:73:2c:59:be:c8:58 Fingerprint (SHA-256): CB:F9:C4:41:8D:48:E2:AD:AD:B4:D8:ED:91:AA:4F:EE:65:54:D0:B2:CE:A2:E5:9B:A1:37:FE:D5:52:A0:A4:C4 Fingerprint (SHA1): 6D:03:C9:CE:E4:55:5E:62:FF:07:D2:B3:9F:5E:15:0A:FB:5C:05:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #336: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034138 (0x3750ad5a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Wed Sep 28 03:47:09 2022 Not After : Wed Sep 28 03:47:09 2072 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:bb:16:db:ac:d8:25:5d:9d:87:f6:b4:7a:6d:96:7b: 02:fa:1d:a8:a6:2a:ed:6e:88:86:12:83:5c:5e:b0:8e: d4:17:a4:af:f0:19:f5:63:0b:20:78:02:95:5a:56:f2: 30:48:85:41:ab:9e:6d:40:62:0c:2b:bd:e7:b8:48:5e: 2a:d7:ba:03:d2:9f:54:dd:0c:57:25:0d:91:36:81:33: d7:b4:fd:15:2d:e2:07:3a:04:28:67:df:72:2e:ea:a8: db:4b:a1:f4:fe:9c:4c:41:1f:1d:ef:eb:12:eb:60:dd: 4b:8f:fd:a1:f3:c2:d8:b5:8f:5d:7a:ff:f9:7d:83:2d: b9:2d:84:f9:1f:23:c0:c8:ea:43:ec:7a:e6:15:3d:39: b6:f9:2f:09:b3:97:4b:ff:fa:ec:c5:54:be:6f:e0:96: 7a:7d:f2:37:7b:f6:f7:29:98:3b:05:cf:26:f6:9a:69: 6a:08:14:db:d0:b1:f7:7b:85:98:24:a3:18:89:bb:00: a3:9f:d6:0f:73:b8:9f:39:f6:49:fe:e7:db:60:73:66: 39:40:0f:bf:26:fe:12:9f:86:df:dd:98:0a:25:6a:24: 02:72:0a:7e:f4:b8:51:14:cb:c4:bd:9f:4c:71:9c:57: ec:1b:29:2b:94:88:9b:18:47:bc:ce:43:cf:1d:a5:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:cd:26:b8:04:b0:c0:c6:40:71:16:b0:0b:f6:75:06: e5:ec:1f:5e:45:da:69:05:ef:a8:ec:92:48:25:a1:66: ae:91:7a:db:f5:cb:d0:c0:cd:83:e2:4b:e6:c5:4c:16: 32:5f:62:0c:88:c2:04:cf:b8:50:21:58:09:3c:16:e0: 19:d8:37:c4:e6:44:bc:33:ca:4b:5e:73:de:7e:f0:6b: de:f2:3e:3e:d1:57:41:d4:cf:d3:3b:f1:89:1f:89:84: c7:66:75:35:71:9d:69:44:41:a9:0c:cc:15:46:5e:f6: a5:b8:f0:97:a9:4c:b4:5e:8b:4a:59:b1:e2:d5:5f:bd: 1c:76:70:d8:50:eb:1e:45:a7:b8:0e:cb:16:9b:b0:34: 6b:0b:88:9f:42:6b:1f:89:c0:94:e3:bb:05:f3:b3:63: 59:5b:ab:ec:99:eb:97:17:3e:bc:01:68:c8:02:2b:19: 62:c1:9b:60:dd:51:a4:93:42:5e:04:f3:b7:49:b3:ab: dc:58:30:02:df:ba:23:3d:7d:49:10:b9:78:a3:20:3d: 7a:37:44:7d:5b:46:ff:63:95:0e:2d:c3:7e:16:2a:f4: 2b:3b:43:27:c5:e1:f9:a9:25:46:76:01:6f:b2:7b:62: 7c:77:20:17:fe:6b:23:4d:9a:0a:73:33:4a:88:a5:a7 Fingerprint (SHA-256): 7F:95:6D:25:F4:83:9A:13:7C:88:23:FD:9E:68:8B:1F:FE:45:51:42:E1:B0:93:CC:F0:AC:C4:FD:81:6D:2A:B8 Fingerprint (SHA1): E7:D3:A1:D7:62:6D:25:F8:16:D9:FC:73:D5:48:73:32:D1:BB:98:C7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #337: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034139 (0x3750ad5b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Wed Sep 28 03:47:15 2022 Not After : Wed Sep 28 03:47:15 2072 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:71:f4:09:a0:b2:45:91:cd:01:41:b4:66:62:d3:e6: 49:25:be:79:c1:be:ac:c4:aa:c6:c2:13:54:6e:36:b5: d9:e4:7d:a9:6d:72:55:87:73:46:1b:48:cd:bc:39:a5: c0:e0:0e:61:a6:3e:8b:1c:c2:08:03:fe:a9:fd:a1:57: df:1b:80:f8:fa:de:6a:42:6e:d6:a8:60:46:64:b3:29: 26:77:7c:5c:92:6e:9c:06:d0:8c:d2:d0:37:39:58:28: bc:d2:3a:90:ff:02:49:89:9c:c3:f8:48:40:93:17:2f: 73:2e:7f:b3:dc:9f:a1:8f:56:cd:1b:f3:b9:f1:b2:8d: 81:98:d6:7d:75:17:f0:0c:4c:cc:fa:a3:24:05:2c:9b: 81:9e:02:85:ca:cc:42:fb:8c:c1:27:c8:91:93:34:34: 71:34:e5:32:b3:ff:fc:69:28:7f:7e:0f:4b:b3:c7:78: 55:46:c1:44:56:87:72:0f:54:a5:44:53:72:ad:d8:7f: ce:24:81:c5:e3:c7:3b:94:ec:94:4d:f2:f9:d2:0a:e6: e4:bb:1b:a8:3d:96:a6:64:79:d8:ce:22:d0:8e:74:49: 31:d4:e6:03:7e:80:02:04:e3:2b:b6:1f:f1:f4:ac:3e: 54:42:f0:04:79:cc:e0:52:26:5d:74:0e:8d:32:aa:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:89:8a:5e:d1:b4:80:3b:a6:ea:5b:1d:86:bf:9c:37: c8:38:56:cb:a8:98:f2:bf:72:84:b0:88:7b:4b:dd:c3: 18:b4:3d:cd:31:70:9f:04:bd:4c:d4:4d:75:72:15:8b: 95:d4:20:d5:b2:c7:a8:36:3e:d9:9e:ba:1f:fc:2b:8e: 7b:af:2e:5c:69:84:71:28:55:50:d6:26:e4:91:da:47: 62:68:91:78:d1:55:d6:14:9e:3e:82:11:9a:03:f5:0d: 1e:c8:0b:ff:d2:d9:3e:a1:d6:ac:5f:83:e4:2f:89:75: 74:1c:88:82:06:55:f8:92:05:1a:22:e0:07:50:d3:a8: f5:6c:66:4c:be:f4:38:cb:9b:fe:8f:56:68:d4:68:32: 68:1d:c9:30:d1:d4:78:b7:3c:9c:1d:3a:38:f5:aa:54: 90:3b:a7:e5:09:01:b9:65:73:88:c8:54:2f:2d:2b:da: 42:c0:9d:f5:7c:2d:18:81:ca:22:6c:f5:b3:67:a0:92: 7f:99:af:5f:5c:8e:5d:3b:75:43:ca:d1:6c:85:36:4b: df:71:0b:a6:59:3d:d9:84:a8:35:a6:bf:2e:5e:30:d6: 08:55:20:f1:1a:b5:e6:aa:36:60:c7:51:2d:62:49:af: e9:fa:83:de:b2:35:e5:c2:58:42:aa:0e:55:b7:89:24 Fingerprint (SHA-256): 69:19:84:50:63:71:DF:14:DD:30:0D:68:88:01:F6:C3:D8:CB:E3:CE:50:2A:2E:3D:72:C0:47:2F:74:4B:64:EF Fingerprint (SHA1): 22:FB:BA:5A:DB:87:F8:59:B8:19:AB:AD:99:8A:5B:DF:D1:97:42:F7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #338: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034140 (0x3750ad5c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Wed Sep 28 03:47:19 2022 Not After : Wed Sep 28 03:47:19 2072 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:0b:43:77:cc:c1:85:5c:f9:cd:84:40:2d:e0:74:61: 41:fe:00:a3:19:3c:f3:f0:b0:74:be:84:fd:b8:74:48: 2f:77:50:98:ba:9f:67:c0:a3:33:60:6e:aa:0c:2f:97: c8:42:d7:ad:7d:f3:7d:45:06:57:5e:b4:93:2e:b9:5a: ad:d0:6b:69:0b:8b:c9:5a:d6:72:5e:78:60:34:b3:3e: 0e:06:c8:72:be:5e:bd:6f:fe:6f:d7:cd:22:55:3c:ff: be:bb:b1:c7:5b:49:37:4c:1a:a7:88:2d:91:22:b4:0c: a9:af:4b:26:50:a1:69:a3:59:d6:74:50:1a:0b:2c:f3: 27:a1:fc:2c:0e:23:75:a8:b7:63:49:41:d2:d1:9d:30: e8:b7:34:05:7f:5d:57:88:fc:91:04:ec:fd:33:37:3e: d7:20:b5:6e:f5:22:66:48:4f:3a:b7:77:9f:0c:59:69: 9c:a2:37:c6:f6:34:e3:c9:9c:8c:58:b4:c8:4a:5c:50: 10:bf:3c:d6:e8:ce:8c:ce:5d:97:53:3f:dc:86:9c:7f: bf:98:08:59:7e:db:ea:f9:37:87:07:53:e0:e7:d7:07: 0b:de:89:80:5e:f5:18:52:c7:9b:4e:ae:b8:bd:5c:78: 2b:f4:73:8a:c2:89:bc:2b:ab:15:76:38:5e:48:d1:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bd:8c:bc:16:c4:c6:72:9d:87:d4:fe:e7:70:c0:0b:63: e1:d0:89:f5:48:c5:81:9b:a5:83:39:fd:84:ca:f5:55: bd:ba:ea:da:22:e3:59:4d:c1:71:68:c0:d9:4c:f7:e8: af:e7:c2:69:61:c3:05:2c:65:13:5f:35:d7:3c:6c:99: 9d:ac:6d:37:29:85:7b:3c:05:6d:10:2b:1d:7b:37:a1: a8:1e:fa:82:c5:48:79:ce:85:85:72:24:e8:7d:d9:3f: d8:0f:8c:4f:13:2d:9f:56:3e:e2:74:c6:be:46:ae:46: f3:7b:be:8c:60:3c:af:d4:4a:ab:44:09:d2:4a:ff:af: c1:ab:80:3b:8d:92:18:f1:5b:e3:86:6b:0d:18:04:a7: 4d:cd:00:bb:c2:c8:2b:5c:c5:a3:ba:65:23:9f:bf:6b: 6d:b5:a4:99:2b:25:9d:f2:3f:af:75:b4:d7:ab:ae:18: c3:2d:10:92:eb:f2:ec:d7:7b:8a:7a:73:82:07:71:f6: 24:e5:60:d6:fe:4c:c0:fe:ee:2e:e3:2f:bf:d2:d9:1e: 66:99:a2:4c:59:50:fd:b4:5b:e3:40:0b:94:18:9b:e2: b4:b7:84:0e:ca:e9:77:be:9e:55:98:43:23:26:85:91: 13:6f:1c:2b:f8:38:38:58:98:52:b0:58:43:5c:0c:26 Fingerprint (SHA-256): 1D:73:5F:93:04:B7:25:8E:BB:C8:B8:FE:53:FA:42:FD:CF:9A:4B:6D:97:58:BC:94:AE:4D:7A:A9:E5:A0:1C:AD Fingerprint (SHA1): 91:EF:C1:7D:C9:40:63:34:5E:3F:4C:79:1C:07:CF:07:EF:8B:97:A6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #339: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #340: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034155 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #341: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #342: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #343: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #344: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 928034156 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #345: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #346: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #347: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #348: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 928034157 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #349: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #350: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #351: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #352: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 928034158 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #353: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #354: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #355: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034155 (0x3750ad6b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:48:21 2022 Not After : Wed Sep 28 03:48:21 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:77:af:96:38:4e:10:fc:d8:52:ed:fd:a7:3b:d8:21: dd:6a:e3:85:d4:6e:3b:7c:88:66:46:39:b3:3d:51:9f: f8:e0:c4:0a:16:0d:78:6b:6d:49:a5:0d:6c:56:0a:8d: e6:da:22:c3:39:69:16:cb:55:4e:13:bd:fb:f8:bb:f8: 61:c2:b4:62:2a:22:0c:02:69:b3:54:bb:86:75:cc:97: 4c:43:27:3a:f7:f3:fb:81:47:09:64:7f:56:c5:94:47: 5f:3d:34:c2:81:fe:a4:1b:24:23:b9:3d:d2:12:c2:63: cc:a4:ce:e7:ad:0a:18:63:ba:ee:6f:8b:fa:f7:0e:b7: 50:74:fe:05:94:ac:bf:80:8b:21:31:36:a4:45:c0:5e: d2:6e:33:30:62:d0:46:58:c3:be:ec:6f:f1:30:80:41: 39:03:1d:41:36:30:e3:72:8b:75:89:4a:e9:9f:ae:3e: 19:10:c6:02:2d:3d:58:32:cc:de:8b:97:80:5d:a7:eb: 16:e6:62:f8:9d:8c:08:e5:06:67:79:6c:0c:ec:8d:68: 84:79:bf:df:97:67:b1:ad:81:35:97:74:aa:6e:a0:f9: dc:c8:6a:3c:91:c2:56:36:50:15:ef:4f:29:8d:27:ed: cb:85:30:da:4c:49:8b:87:89:78:e7:ec:6c:2c:79:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:8c:71:30:6e:34:fb:83:10:a2:9f:d2:b9:58:d6:d0: f6:aa:5f:d6:55:2e:a6:69:25:fc:6b:75:9f:20:82:8e: ea:6c:95:d4:42:32:0e:75:c7:00:22:fd:f6:4a:c8:a9: 81:8f:d0:67:16:1b:c5:eb:a9:67:c3:5b:f8:db:dd:6e: d6:e9:4c:2e:2a:1d:23:7c:bf:d3:43:88:d8:29:15:7a: ce:87:06:09:48:81:b4:b5:36:8f:a3:81:02:53:c9:b2: ad:79:c8:bc:ba:cd:7d:64:03:cd:35:38:06:cf:ae:7d: c1:07:6d:a8:65:08:b0:e8:56:3f:65:92:33:be:34:e9: fb:e8:e3:e3:4c:80:8f:78:6b:94:e2:e8:54:cf:c3:65: 70:75:41:03:ca:db:d6:03:1f:01:65:eb:64:17:34:31: d3:c5:67:68:59:54:43:ba:a2:11:3d:ec:28:b5:9d:d8: b4:7a:c4:05:8d:6e:2e:45:46:06:0e:bc:97:26:64:75: 5c:51:2b:aa:69:76:9e:8a:eb:8f:26:97:bd:5d:3e:da: 18:9a:c6:3f:94:0e:ff:59:49:02:e0:13:74:01:7c:5d: 4a:8c:04:e5:d3:cb:32:d4:1e:7a:53:44:08:84:77:88: d9:30:87:2d:73:2a:95:db:d1:72:5d:e6:a1:87:02:de Fingerprint (SHA-256): 64:F9:A7:86:4F:F7:CD:A9:3D:D4:22:B5:81:A4:B6:FC:0B:5B:A2:D8:69:9E:0A:5D:3C:53:C3:F6:51:C7:EC:DD Fingerprint (SHA1): 6D:AB:63:1F:79:28:1A:E8:BE:1B:59:2F:DE:48:2B:CF:8A:8E:68:16 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #356: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #357: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034156 (0x3750ad6c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:48:25 2022 Not After : Tue Sep 28 03:48:25 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c4:b3:9b:fa:59:eb:32:5d:1c:0a:33:a0:f2:15:08: e6:e8:db:5c:79:67:ae:2c:fb:d0:8f:0f:98:c1:d9:cd: 61:87:18:52:2e:2e:0f:c9:f2:5e:10:bc:4c:57:65:d0: 91:4e:dd:c3:b4:cb:a1:09:06:3d:c1:72:16:de:a9:10: 00:71:5a:47:cd:d1:f4:0c:0f:1f:c2:2f:6d:8d:4c:9c: 17:7b:a4:51:2d:ca:5b:79:95:25:de:a6:b2:ef:33:48: f3:b2:7f:f7:26:07:ab:cd:a4:b9:b4:42:7e:08:d4:12: 29:ca:0b:2e:28:aa:a4:77:4b:ee:17:d6:75:d4:5b:a0: 93:d6:dc:63:4d:07:a7:15:14:32:5c:b6:00:2e:8c:06: 1f:58:28:b2:d5:82:48:41:90:c6:26:a1:8e:49:51:7c: e0:ee:e7:d1:87:56:c3:98:82:c6:56:b0:6c:a1:f5:f8: 4b:7b:6d:1c:fb:fe:ba:4b:6e:54:cd:05:39:a5:1f:a5: 23:37:3f:2f:18:1f:4c:1e:f7:c8:94:65:c0:8f:fa:5a: ef:e1:94:20:58:2a:d4:7a:d9:2f:61:83:81:5f:b9:7a: 8f:99:9a:8c:be:2c:e7:86:88:29:d5:47:2b:06:d8:31: 17:b5:de:2b:14:c7:e3:52:2a:01:42:c4:b8:09:cc:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:68:57:1b:b6:5a:55:e7:e2:60:1a:cd:92:7c:f1:12: 99:e9:1e:2a:39:1c:b6:7d:f2:50:3d:42:8e:7d:62:e9: 90:38:75:cf:0c:d8:d3:f8:d0:21:90:0f:db:69:bb:81: 2c:90:55:8b:3d:01:4d:63:07:7d:88:7b:52:96:ef:72: fe:05:e4:2d:40:2d:a2:23:f4:8c:cd:3a:39:bf:17:7a: 4c:d1:d6:15:7d:03:7d:6d:2d:17:52:0c:38:49:34:e8: ae:ab:18:74:f9:9e:6a:45:14:8a:0f:69:ce:dc:85:75: 66:f9:15:db:32:4d:2a:e0:56:7f:8d:62:d8:e3:a9:ae: 82:73:77:85:ff:8e:6f:3f:a9:59:5b:c2:4c:9f:a7:76: fe:a9:bf:f4:f3:bf:84:52:52:29:52:f8:3c:0e:34:4c: d6:81:fd:c7:ff:8e:09:58:ea:32:5b:78:7a:6a:87:3b: ae:c9:e2:fe:6a:5a:a0:18:fd:14:a5:0f:6d:2f:ae:a0: 5d:ba:e5:39:09:dc:e8:1e:e6:f3:bf:87:72:45:bf:43: eb:c4:df:6d:15:3b:58:da:c2:d8:f0:ef:b3:f8:35:7d: 49:0b:9e:95:72:d1:99:fb:65:26:00:bd:5a:6a:d8:92: 42:fe:db:6a:0b:49:03:32:a1:bc:59:d5:51:29:07:20 Fingerprint (SHA-256): B6:89:40:73:10:67:FA:E2:63:32:49:DF:9F:FF:07:CC:23:A6:72:31:83:38:7B:3D:FF:3F:F8:4C:69:09:9C:73 Fingerprint (SHA1): D0:6B:BA:3F:55:E2:84:11:9F:04:52:6C:50:07:F4:0B:08:E2:BD:6B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #358: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #359: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034157 (0x3750ad6d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Sep 28 03:48:31 2022 Not After : Tue Sep 28 03:48:31 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:91:6b:df:d0:b3:c2:76:22:56:9f:4a:59:47:30:aa: a2:61:c6:dc:40:8d:6a:25:15:90:cc:66:a2:07:d9:7c: dc:c6:ec:33:e1:dd:b5:24:8f:d6:f7:54:fd:64:61:18: 13:0f:3a:0d:86:0b:c9:16:77:0e:24:b4:20:b2:8e:96: 34:fc:23:8e:d6:fd:ac:11:fe:36:fd:1f:58:12:b9:06: 5f:e0:74:d1:63:52:5f:35:e8:53:1b:c6:28:d0:80:1f: 2b:77:a1:3f:b8:72:22:30:51:fc:be:62:fb:70:42:7f: f5:17:16:7a:cc:c9:b1:78:04:fb:76:3a:19:33:c1:ba: 37:b6:fd:73:8d:8c:c0:26:63:11:ed:54:82:9a:66:e8: 72:08:f9:29:f9:df:84:bc:e9:1c:94:f5:fc:2e:fb:fa: 6e:88:22:6e:9d:1e:e2:2f:7e:94:92:ab:e5:47:d7:46: 04:c1:05:a1:86:dd:a3:7a:ae:88:48:4e:9a:01:d9:1e: ae:ee:9f:41:00:b8:07:06:55:ed:38:a8:71:a2:50:83: 7f:d0:9f:86:52:e5:a3:b1:4f:9a:b0:1f:b3:b0:63:d4: dd:f8:50:d1:d0:43:48:8c:05:11:cc:40:53:44:6a:c7: 06:98:57:0f:b9:b7:be:55:c2:41:81:5d:9a:58:20:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:a8:90:3c:05:68:dc:7d:79:89:bf:94:77:bc:49:6f: 06:e6:40:57:55:b3:8f:e8:63:80:9f:cf:31:b8:50:44: a0:a2:23:36:52:83:37:93:03:9b:88:1d:e9:76:b5:2e: 70:21:3d:01:fe:2a:45:4b:c0:d1:40:99:b6:bf:6b:ed: 8d:89:41:86:c1:13:3b:0b:26:07:08:ad:0d:f8:1a:98: 1e:75:34:0b:75:16:e8:ee:85:5f:ac:85:97:fc:ba:75: e8:d8:a0:f6:48:67:b2:dc:cc:07:df:f5:b0:4e:8e:12: 87:04:f3:26:90:21:16:70:c9:e1:71:82:56:59:71:7e: e7:29:b3:6f:13:21:7c:90:04:62:ae:cc:0a:d1:29:85: 8f:cc:06:16:5e:99:2c:66:f8:9a:85:86:e8:9c:03:82: 31:f0:d3:2e:6a:a5:1f:1f:84:de:52:f3:c5:1e:8f:6a: 7d:12:0a:86:c7:71:12:d0:a3:b9:a8:62:6a:c0:fa:06: c0:79:1c:df:1c:4a:01:ca:5a:40:55:90:7e:3b:9c:d1: 5d:b9:08:55:1f:18:c5:01:cf:4e:01:41:56:b8:41:67: 3e:16:fd:5f:ff:2a:6c:4e:47:ab:ce:26:fd:a2:f0:3f: 2d:f9:66:b4:7b:07:38:1f:a8:ea:d3:15:b0:dd:40:1b Fingerprint (SHA-256): 07:68:F8:AF:A6:95:45:B2:95:93:AE:10:08:36:A0:35:74:9E:5E:C0:80:73:7F:79:4B:38:29:E2:5E:BA:CC:C0 Fingerprint (SHA1): D6:F2:3D:F4:AE:60:B4:98:9F:83:91:26:1F:C9:1A:9E:6E:C8:EA:B9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #360: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #361: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #362: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #363: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #364: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034155 (0x3750ad6b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:48:21 2022 Not After : Wed Sep 28 03:48:21 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:77:af:96:38:4e:10:fc:d8:52:ed:fd:a7:3b:d8:21: dd:6a:e3:85:d4:6e:3b:7c:88:66:46:39:b3:3d:51:9f: f8:e0:c4:0a:16:0d:78:6b:6d:49:a5:0d:6c:56:0a:8d: e6:da:22:c3:39:69:16:cb:55:4e:13:bd:fb:f8:bb:f8: 61:c2:b4:62:2a:22:0c:02:69:b3:54:bb:86:75:cc:97: 4c:43:27:3a:f7:f3:fb:81:47:09:64:7f:56:c5:94:47: 5f:3d:34:c2:81:fe:a4:1b:24:23:b9:3d:d2:12:c2:63: cc:a4:ce:e7:ad:0a:18:63:ba:ee:6f:8b:fa:f7:0e:b7: 50:74:fe:05:94:ac:bf:80:8b:21:31:36:a4:45:c0:5e: d2:6e:33:30:62:d0:46:58:c3:be:ec:6f:f1:30:80:41: 39:03:1d:41:36:30:e3:72:8b:75:89:4a:e9:9f:ae:3e: 19:10:c6:02:2d:3d:58:32:cc:de:8b:97:80:5d:a7:eb: 16:e6:62:f8:9d:8c:08:e5:06:67:79:6c:0c:ec:8d:68: 84:79:bf:df:97:67:b1:ad:81:35:97:74:aa:6e:a0:f9: dc:c8:6a:3c:91:c2:56:36:50:15:ef:4f:29:8d:27:ed: cb:85:30:da:4c:49:8b:87:89:78:e7:ec:6c:2c:79:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:8c:71:30:6e:34:fb:83:10:a2:9f:d2:b9:58:d6:d0: f6:aa:5f:d6:55:2e:a6:69:25:fc:6b:75:9f:20:82:8e: ea:6c:95:d4:42:32:0e:75:c7:00:22:fd:f6:4a:c8:a9: 81:8f:d0:67:16:1b:c5:eb:a9:67:c3:5b:f8:db:dd:6e: d6:e9:4c:2e:2a:1d:23:7c:bf:d3:43:88:d8:29:15:7a: ce:87:06:09:48:81:b4:b5:36:8f:a3:81:02:53:c9:b2: ad:79:c8:bc:ba:cd:7d:64:03:cd:35:38:06:cf:ae:7d: c1:07:6d:a8:65:08:b0:e8:56:3f:65:92:33:be:34:e9: fb:e8:e3:e3:4c:80:8f:78:6b:94:e2:e8:54:cf:c3:65: 70:75:41:03:ca:db:d6:03:1f:01:65:eb:64:17:34:31: d3:c5:67:68:59:54:43:ba:a2:11:3d:ec:28:b5:9d:d8: b4:7a:c4:05:8d:6e:2e:45:46:06:0e:bc:97:26:64:75: 5c:51:2b:aa:69:76:9e:8a:eb:8f:26:97:bd:5d:3e:da: 18:9a:c6:3f:94:0e:ff:59:49:02:e0:13:74:01:7c:5d: 4a:8c:04:e5:d3:cb:32:d4:1e:7a:53:44:08:84:77:88: d9:30:87:2d:73:2a:95:db:d1:72:5d:e6:a1:87:02:de Fingerprint (SHA-256): 64:F9:A7:86:4F:F7:CD:A9:3D:D4:22:B5:81:A4:B6:FC:0B:5B:A2:D8:69:9E:0A:5D:3C:53:C3:F6:51:C7:EC:DD Fingerprint (SHA1): 6D:AB:63:1F:79:28:1A:E8:BE:1B:59:2F:DE:48:2B:CF:8A:8E:68:16 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #365: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #366: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034156 (0x3750ad6c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:48:25 2022 Not After : Tue Sep 28 03:48:25 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c4:b3:9b:fa:59:eb:32:5d:1c:0a:33:a0:f2:15:08: e6:e8:db:5c:79:67:ae:2c:fb:d0:8f:0f:98:c1:d9:cd: 61:87:18:52:2e:2e:0f:c9:f2:5e:10:bc:4c:57:65:d0: 91:4e:dd:c3:b4:cb:a1:09:06:3d:c1:72:16:de:a9:10: 00:71:5a:47:cd:d1:f4:0c:0f:1f:c2:2f:6d:8d:4c:9c: 17:7b:a4:51:2d:ca:5b:79:95:25:de:a6:b2:ef:33:48: f3:b2:7f:f7:26:07:ab:cd:a4:b9:b4:42:7e:08:d4:12: 29:ca:0b:2e:28:aa:a4:77:4b:ee:17:d6:75:d4:5b:a0: 93:d6:dc:63:4d:07:a7:15:14:32:5c:b6:00:2e:8c:06: 1f:58:28:b2:d5:82:48:41:90:c6:26:a1:8e:49:51:7c: e0:ee:e7:d1:87:56:c3:98:82:c6:56:b0:6c:a1:f5:f8: 4b:7b:6d:1c:fb:fe:ba:4b:6e:54:cd:05:39:a5:1f:a5: 23:37:3f:2f:18:1f:4c:1e:f7:c8:94:65:c0:8f:fa:5a: ef:e1:94:20:58:2a:d4:7a:d9:2f:61:83:81:5f:b9:7a: 8f:99:9a:8c:be:2c:e7:86:88:29:d5:47:2b:06:d8:31: 17:b5:de:2b:14:c7:e3:52:2a:01:42:c4:b8:09:cc:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:68:57:1b:b6:5a:55:e7:e2:60:1a:cd:92:7c:f1:12: 99:e9:1e:2a:39:1c:b6:7d:f2:50:3d:42:8e:7d:62:e9: 90:38:75:cf:0c:d8:d3:f8:d0:21:90:0f:db:69:bb:81: 2c:90:55:8b:3d:01:4d:63:07:7d:88:7b:52:96:ef:72: fe:05:e4:2d:40:2d:a2:23:f4:8c:cd:3a:39:bf:17:7a: 4c:d1:d6:15:7d:03:7d:6d:2d:17:52:0c:38:49:34:e8: ae:ab:18:74:f9:9e:6a:45:14:8a:0f:69:ce:dc:85:75: 66:f9:15:db:32:4d:2a:e0:56:7f:8d:62:d8:e3:a9:ae: 82:73:77:85:ff:8e:6f:3f:a9:59:5b:c2:4c:9f:a7:76: fe:a9:bf:f4:f3:bf:84:52:52:29:52:f8:3c:0e:34:4c: d6:81:fd:c7:ff:8e:09:58:ea:32:5b:78:7a:6a:87:3b: ae:c9:e2:fe:6a:5a:a0:18:fd:14:a5:0f:6d:2f:ae:a0: 5d:ba:e5:39:09:dc:e8:1e:e6:f3:bf:87:72:45:bf:43: eb:c4:df:6d:15:3b:58:da:c2:d8:f0:ef:b3:f8:35:7d: 49:0b:9e:95:72:d1:99:fb:65:26:00:bd:5a:6a:d8:92: 42:fe:db:6a:0b:49:03:32:a1:bc:59:d5:51:29:07:20 Fingerprint (SHA-256): B6:89:40:73:10:67:FA:E2:63:32:49:DF:9F:FF:07:CC:23:A6:72:31:83:38:7B:3D:FF:3F:F8:4C:69:09:9C:73 Fingerprint (SHA1): D0:6B:BA:3F:55:E2:84:11:9F:04:52:6C:50:07:F4:0B:08:E2:BD:6B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #367: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #368: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034157 (0x3750ad6d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Sep 28 03:48:31 2022 Not After : Tue Sep 28 03:48:31 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:91:6b:df:d0:b3:c2:76:22:56:9f:4a:59:47:30:aa: a2:61:c6:dc:40:8d:6a:25:15:90:cc:66:a2:07:d9:7c: dc:c6:ec:33:e1:dd:b5:24:8f:d6:f7:54:fd:64:61:18: 13:0f:3a:0d:86:0b:c9:16:77:0e:24:b4:20:b2:8e:96: 34:fc:23:8e:d6:fd:ac:11:fe:36:fd:1f:58:12:b9:06: 5f:e0:74:d1:63:52:5f:35:e8:53:1b:c6:28:d0:80:1f: 2b:77:a1:3f:b8:72:22:30:51:fc:be:62:fb:70:42:7f: f5:17:16:7a:cc:c9:b1:78:04:fb:76:3a:19:33:c1:ba: 37:b6:fd:73:8d:8c:c0:26:63:11:ed:54:82:9a:66:e8: 72:08:f9:29:f9:df:84:bc:e9:1c:94:f5:fc:2e:fb:fa: 6e:88:22:6e:9d:1e:e2:2f:7e:94:92:ab:e5:47:d7:46: 04:c1:05:a1:86:dd:a3:7a:ae:88:48:4e:9a:01:d9:1e: ae:ee:9f:41:00:b8:07:06:55:ed:38:a8:71:a2:50:83: 7f:d0:9f:86:52:e5:a3:b1:4f:9a:b0:1f:b3:b0:63:d4: dd:f8:50:d1:d0:43:48:8c:05:11:cc:40:53:44:6a:c7: 06:98:57:0f:b9:b7:be:55:c2:41:81:5d:9a:58:20:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:a8:90:3c:05:68:dc:7d:79:89:bf:94:77:bc:49:6f: 06:e6:40:57:55:b3:8f:e8:63:80:9f:cf:31:b8:50:44: a0:a2:23:36:52:83:37:93:03:9b:88:1d:e9:76:b5:2e: 70:21:3d:01:fe:2a:45:4b:c0:d1:40:99:b6:bf:6b:ed: 8d:89:41:86:c1:13:3b:0b:26:07:08:ad:0d:f8:1a:98: 1e:75:34:0b:75:16:e8:ee:85:5f:ac:85:97:fc:ba:75: e8:d8:a0:f6:48:67:b2:dc:cc:07:df:f5:b0:4e:8e:12: 87:04:f3:26:90:21:16:70:c9:e1:71:82:56:59:71:7e: e7:29:b3:6f:13:21:7c:90:04:62:ae:cc:0a:d1:29:85: 8f:cc:06:16:5e:99:2c:66:f8:9a:85:86:e8:9c:03:82: 31:f0:d3:2e:6a:a5:1f:1f:84:de:52:f3:c5:1e:8f:6a: 7d:12:0a:86:c7:71:12:d0:a3:b9:a8:62:6a:c0:fa:06: c0:79:1c:df:1c:4a:01:ca:5a:40:55:90:7e:3b:9c:d1: 5d:b9:08:55:1f:18:c5:01:cf:4e:01:41:56:b8:41:67: 3e:16:fd:5f:ff:2a:6c:4e:47:ab:ce:26:fd:a2:f0:3f: 2d:f9:66:b4:7b:07:38:1f:a8:ea:d3:15:b0:dd:40:1b Fingerprint (SHA-256): 07:68:F8:AF:A6:95:45:B2:95:93:AE:10:08:36:A0:35:74:9E:5E:C0:80:73:7F:79:4B:38:29:E2:5E:BA:CC:C0 Fingerprint (SHA1): D6:F2:3D:F4:AE:60:B4:98:9F:83:91:26:1F:C9:1A:9E:6E:C8:EA:B9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #369: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #370: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #371: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034159 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #372: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #373: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #374: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #375: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 928034160 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #376: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #377: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #378: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #379: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 928034161 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #380: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #381: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #382: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #383: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 928034162 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #384: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #385: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #386: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #387: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 928034163 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #388: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #389: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #390: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034159 (0x3750ad6f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:48:48 2022 Not After : Wed Sep 28 03:48:48 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:41:e8:cb:57:1b:9a:a2:ac:d8:58:e8:23:7d:94:5a: 75:62:7e:ad:19:02:20:6d:50:2c:e3:44:5b:95:df:7f: 9e:b2:2e:99:b5:b3:a2:39:4b:f8:2e:3f:d9:64:0a:de: c9:f4:3a:14:b4:a6:d9:30:3a:85:2a:07:d6:98:2d:41: 37:34:6e:2e:e6:e6:09:f9:0c:93:da:77:67:e3:95:32: bf:e9:c1:15:f6:b6:3e:12:1b:ff:94:d0:97:80:e5:27: 5a:59:73:86:31:b2:2f:46:37:03:a0:bf:9a:b5:b8:39: a4:23:12:b8:2c:1c:b9:b9:a8:c5:21:1f:ef:d6:00:6c: 2a:b7:9f:6a:12:68:a6:f7:8e:fa:e8:a1:20:5d:41:45: 68:9d:6a:49:53:66:0d:43:98:d7:f3:28:dd:52:25:ca: 59:66:36:a4:88:db:3f:39:2a:c6:c8:16:e6:dd:97:51: 74:48:c6:83:31:f1:1e:f2:29:f8:08:b7:da:d4:ca:70: 59:6f:ea:1a:00:48:58:f5:b1:62:56:f4:ad:84:d3:32: ee:50:3e:1e:cd:36:ec:09:5a:db:3e:1e:f7:af:92:0d: 0c:f7:fd:fe:73:ca:aa:34:fc:a2:ad:67:28:db:42:1c: c1:f7:9a:0e:d9:0b:9a:b1:12:44:88:70:4a:5a:c6:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:6a:c7:97:b5:bc:bc:b4:24:34:f3:0c:1e:08:d7:04: 82:cc:2c:3a:7b:99:ad:af:e9:02:a3:46:d3:18:8e:59: fa:62:89:ca:c6:10:a9:e2:4e:1c:22:57:78:ef:f7:8a: 1e:33:5b:60:75:d0:5c:b2:26:7f:6f:27:6d:59:85:62: 2a:c2:7e:52:81:6d:a9:0a:25:db:60:66:7a:ff:54:02: 9b:81:6b:1a:ff:01:30:44:dd:2c:80:0d:38:8f:f6:0b: 5d:3b:48:89:5d:ab:02:fa:45:54:2a:1c:15:66:2c:5b: 3b:20:e0:65:80:b2:3f:e5:68:3a:bf:fa:60:e7:d4:f7: af:62:50:6b:bb:40:b7:3f:e4:28:30:a3:9f:20:74:7c: 3b:b5:56:c1:64:5c:0c:4e:62:4a:7c:d6:f1:62:0a:6a: 23:d6:37:8f:ab:e3:58:78:17:e3:4c:b3:1e:e4:06:4f: 59:85:04:64:a8:36:b4:7d:f8:9a:f9:85:3b:90:cc:1e: 65:a3:c0:68:61:76:ce:d4:80:38:b7:39:5d:7d:b6:41: c0:bf:50:cd:61:21:eb:ef:3d:e7:eb:51:ac:44:aa:93: 5a:06:ac:45:da:12:f7:01:0f:f6:a2:a8:52:e9:96:1d: 1f:53:b9:91:b1:95:cb:1a:e3:fc:0e:a8:16:44:5f:79 Fingerprint (SHA-256): A1:70:C1:29:66:79:48:E7:01:A4:4B:7E:EF:76:22:E7:72:5C:41:A3:35:DC:E5:BE:B6:9B:F1:EA:25:44:A6:90 Fingerprint (SHA1): 05:B4:5E:34:41:BA:AC:96:23:90:19:2C:42:7E:96:8D:4E:23:51:BA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #391: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #392: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034160 (0x3750ad70) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:48:53 2022 Not After : Tue Sep 28 03:48:53 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:0c:5b:24:c0:5d:bf:e5:0b:f3:26:c8:81:30:3a:29: 79:71:0f:58:b4:2c:c5:43:1d:2e:bc:cb:5d:2f:c0:20: a5:fd:22:f7:93:6f:a2:3c:90:00:f1:52:05:99:fd:f7: ba:9c:7b:d5:a4:8d:e3:c5:67:62:5c:f0:37:50:21:d7: db:b2:64:ea:33:e3:95:dc:27:5f:bb:76:cf:07:6f:21: 36:97:59:4d:52:6e:f3:53:7f:7b:fb:14:de:c9:90:e5: 1a:d1:cb:3a:14:92:63:3b:a3:94:ae:0f:e8:01:eb:72: 2a:da:6b:df:1c:99:1f:c9:d4:d6:e0:be:1b:b8:cc:10: 00:8d:49:d6:13:66:38:b2:c5:8e:fb:f6:57:67:3e:c8: 08:b6:1b:2f:c0:41:30:b1:36:5c:4e:16:02:e9:3b:7f: ba:25:54:26:d2:f2:a6:52:00:78:50:0d:39:20:78:b5: da:77:00:8a:45:71:5c:63:ee:b1:94:15:2c:39:ff:26: ee:27:bf:ab:e8:3c:00:07:86:62:c5:5c:4d:e5:5f:be: 6e:89:2e:13:39:6a:de:c6:60:ff:41:28:51:de:84:b1: 87:4b:c0:91:13:ad:42:0e:6f:10:f4:39:d0:b1:fb:33: 53:1a:1b:0f:7c:f0:eb:d3:33:27:8d:9b:89:7c:96:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:6f:7d:b8:29:b6:fe:8b:c9:a0:88:5c:df:2a:38:bf: 82:c5:4e:66:e8:e0:c5:72:3e:bd:4e:d9:91:71:01:d8: d1:38:24:09:48:11:d6:2c:21:7a:03:1d:ae:41:2f:e3: ea:a1:bf:94:9a:83:2c:95:bb:4d:ad:f4:2b:e1:55:0a: 8a:bd:74:5f:cb:20:8d:c9:1d:c1:46:bc:da:79:e6:00: d9:7a:d0:b7:24:df:84:6e:a0:cb:de:84:4a:16:d0:ad: b8:3b:92:b7:88:9c:8e:97:db:bb:7d:63:bb:9a:b4:b3: a9:b1:75:41:76:d5:fd:c8:08:67:93:7c:04:45:36:03: 3a:8f:af:1d:57:8a:ad:0e:0e:44:7c:62:43:b0:e3:16: bb:4f:20:4b:56:f9:d3:2e:14:87:72:d9:a2:e7:08:b5: d0:16:db:48:47:46:12:74:3c:5f:18:3c:63:5f:bd:5a: e7:07:80:c3:1e:35:6b:cc:f1:51:b5:f4:dd:d0:a2:11: 40:09:49:60:50:15:db:46:80:06:31:f4:fd:61:38:3a: 37:d7:e5:64:15:a0:7a:f5:d5:b4:cd:24:b6:7f:27:d3: 99:cb:78:66:0b:0f:94:11:b9:14:e9:58:53:79:e5:e9: ba:c7:06:09:f9:81:28:51:f1:5a:70:f7:14:b8:ee:c0 Fingerprint (SHA-256): AB:63:F6:87:E0:43:7B:25:A1:EE:B9:9C:F1:D5:89:05:87:FB:47:53:47:BE:87:F0:8F:D1:35:16:FA:92:26:71 Fingerprint (SHA1): CC:5F:2D:DD:59:53:B2:FF:68:27:5C:D5:18:00:A6:B0:DC:E6:08:E2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #393: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #394: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034161 (0x3750ad71) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Sep 28 03:48:58 2022 Not After : Tue Sep 28 03:48:58 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:bd:94:c3:6c:66:f6:52:e0:24:ba:1b:cb:0d:6f:3b: 34:c3:70:c1:15:92:38:38:3e:c4:71:1f:3c:da:e5:cd: 4d:28:8f:cf:5a:e6:f5:63:b5:60:8e:8d:5f:2f:ce:d6: 40:4a:e4:dc:e0:24:a1:de:ee:38:3a:11:e0:ba:2a:61: 6f:25:5d:86:02:17:07:ad:d3:33:a7:f0:5d:78:0b:ff: 3e:dc:64:33:ce:a4:cf:b8:d0:58:24:75:27:6d:ea:88: 43:f4:51:ef:e7:fd:5b:b3:0a:4d:f7:df:1a:3a:54:c4: e9:d1:21:20:44:28:3b:de:55:c9:4c:b7:1f:30:4a:d8: 27:ea:86:f5:47:1e:c0:af:a8:57:6a:4a:48:b5:97:49: 1a:0e:51:c8:2c:cc:f8:6a:7b:17:51:8e:3f:60:17:d4: f4:b4:8a:bf:c6:c0:02:32:2d:d2:e1:2c:af:06:45:59: 0c:af:2d:c4:b8:54:04:be:47:f5:6b:9f:a5:76:35:1c: 3f:80:ce:98:c4:f8:e4:92:51:bb:77:27:6d:6a:d2:f6: 00:f1:fa:2f:5e:37:7f:a1:11:0b:b1:18:65:b3:2f:86: 57:40:29:b2:16:a5:11:5f:a5:69:35:d1:e6:28:6e:75: 04:78:cd:88:57:9e:0a:c2:9c:8c:45:4d:42:f5:ce:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:ac:b4:89:08:41:b3:f2:79:26:b0:09:bb:e9:f4:38: 7d:63:03:1d:3d:a5:b0:b8:a4:b0:e2:9a:85:a5:c0:6a: 8c:dc:9b:3e:2f:8e:1e:16:77:bd:57:8d:c8:f5:d2:e7: b7:9e:f8:14:96:cd:d2:f9:ed:a1:67:0b:d9:f9:04:63: 07:84:02:09:8f:68:38:50:23:02:1e:f0:9c:e1:48:6f: 42:b2:83:a7:67:a5:d8:d7:e3:24:4e:1b:86:bc:33:cd: d5:a4:13:b7:83:93:ba:88:02:8b:9d:1a:a9:63:2a:38: 75:68:e3:4c:87:af:39:5b:07:0f:2d:6a:13:29:87:a7: 93:44:62:ce:0e:4d:38:82:54:e5:71:0c:e2:b0:12:21: 78:3c:17:69:d0:e9:88:18:11:2d:82:40:a1:1a:b5:bc: 49:e0:1b:8c:f6:bb:b6:ad:b5:29:2b:53:dc:30:43:6d: 0f:da:79:9e:33:88:31:83:7b:cc:77:49:01:2b:0a:65: 80:32:df:ad:2f:53:25:a7:7e:7c:d4:f5:f5:77:7c:bc: 69:67:4a:1c:c2:cc:df:5a:3a:6a:a7:ff:19:f5:86:8a: a4:a2:c4:f4:8e:fa:5e:06:80:aa:89:a5:ff:84:de:cc: 5a:e9:ae:47:b7:d6:bb:4c:39:b4:89:4e:76:6d:e4:0a Fingerprint (SHA-256): 57:10:95:0E:B4:7F:1E:38:A8:42:8B:61:06:08:97:D0:1E:69:4A:96:5A:82:4F:90:CD:E3:14:C9:BB:40:29:25 Fingerprint (SHA1): F3:49:6B:CC:BA:AD:9A:DB:76:4A:E8:F3:CA:A3:D3:EB:0F:52:3F:22 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #395: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #396: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #397: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #398: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #399: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034159 (0x3750ad6f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:48:48 2022 Not After : Wed Sep 28 03:48:48 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:41:e8:cb:57:1b:9a:a2:ac:d8:58:e8:23:7d:94:5a: 75:62:7e:ad:19:02:20:6d:50:2c:e3:44:5b:95:df:7f: 9e:b2:2e:99:b5:b3:a2:39:4b:f8:2e:3f:d9:64:0a:de: c9:f4:3a:14:b4:a6:d9:30:3a:85:2a:07:d6:98:2d:41: 37:34:6e:2e:e6:e6:09:f9:0c:93:da:77:67:e3:95:32: bf:e9:c1:15:f6:b6:3e:12:1b:ff:94:d0:97:80:e5:27: 5a:59:73:86:31:b2:2f:46:37:03:a0:bf:9a:b5:b8:39: a4:23:12:b8:2c:1c:b9:b9:a8:c5:21:1f:ef:d6:00:6c: 2a:b7:9f:6a:12:68:a6:f7:8e:fa:e8:a1:20:5d:41:45: 68:9d:6a:49:53:66:0d:43:98:d7:f3:28:dd:52:25:ca: 59:66:36:a4:88:db:3f:39:2a:c6:c8:16:e6:dd:97:51: 74:48:c6:83:31:f1:1e:f2:29:f8:08:b7:da:d4:ca:70: 59:6f:ea:1a:00:48:58:f5:b1:62:56:f4:ad:84:d3:32: ee:50:3e:1e:cd:36:ec:09:5a:db:3e:1e:f7:af:92:0d: 0c:f7:fd:fe:73:ca:aa:34:fc:a2:ad:67:28:db:42:1c: c1:f7:9a:0e:d9:0b:9a:b1:12:44:88:70:4a:5a:c6:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:6a:c7:97:b5:bc:bc:b4:24:34:f3:0c:1e:08:d7:04: 82:cc:2c:3a:7b:99:ad:af:e9:02:a3:46:d3:18:8e:59: fa:62:89:ca:c6:10:a9:e2:4e:1c:22:57:78:ef:f7:8a: 1e:33:5b:60:75:d0:5c:b2:26:7f:6f:27:6d:59:85:62: 2a:c2:7e:52:81:6d:a9:0a:25:db:60:66:7a:ff:54:02: 9b:81:6b:1a:ff:01:30:44:dd:2c:80:0d:38:8f:f6:0b: 5d:3b:48:89:5d:ab:02:fa:45:54:2a:1c:15:66:2c:5b: 3b:20:e0:65:80:b2:3f:e5:68:3a:bf:fa:60:e7:d4:f7: af:62:50:6b:bb:40:b7:3f:e4:28:30:a3:9f:20:74:7c: 3b:b5:56:c1:64:5c:0c:4e:62:4a:7c:d6:f1:62:0a:6a: 23:d6:37:8f:ab:e3:58:78:17:e3:4c:b3:1e:e4:06:4f: 59:85:04:64:a8:36:b4:7d:f8:9a:f9:85:3b:90:cc:1e: 65:a3:c0:68:61:76:ce:d4:80:38:b7:39:5d:7d:b6:41: c0:bf:50:cd:61:21:eb:ef:3d:e7:eb:51:ac:44:aa:93: 5a:06:ac:45:da:12:f7:01:0f:f6:a2:a8:52:e9:96:1d: 1f:53:b9:91:b1:95:cb:1a:e3:fc:0e:a8:16:44:5f:79 Fingerprint (SHA-256): A1:70:C1:29:66:79:48:E7:01:A4:4B:7E:EF:76:22:E7:72:5C:41:A3:35:DC:E5:BE:B6:9B:F1:EA:25:44:A6:90 Fingerprint (SHA1): 05:B4:5E:34:41:BA:AC:96:23:90:19:2C:42:7E:96:8D:4E:23:51:BA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #400: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #401: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034160 (0x3750ad70) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:48:53 2022 Not After : Tue Sep 28 03:48:53 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:0c:5b:24:c0:5d:bf:e5:0b:f3:26:c8:81:30:3a:29: 79:71:0f:58:b4:2c:c5:43:1d:2e:bc:cb:5d:2f:c0:20: a5:fd:22:f7:93:6f:a2:3c:90:00:f1:52:05:99:fd:f7: ba:9c:7b:d5:a4:8d:e3:c5:67:62:5c:f0:37:50:21:d7: db:b2:64:ea:33:e3:95:dc:27:5f:bb:76:cf:07:6f:21: 36:97:59:4d:52:6e:f3:53:7f:7b:fb:14:de:c9:90:e5: 1a:d1:cb:3a:14:92:63:3b:a3:94:ae:0f:e8:01:eb:72: 2a:da:6b:df:1c:99:1f:c9:d4:d6:e0:be:1b:b8:cc:10: 00:8d:49:d6:13:66:38:b2:c5:8e:fb:f6:57:67:3e:c8: 08:b6:1b:2f:c0:41:30:b1:36:5c:4e:16:02:e9:3b:7f: ba:25:54:26:d2:f2:a6:52:00:78:50:0d:39:20:78:b5: da:77:00:8a:45:71:5c:63:ee:b1:94:15:2c:39:ff:26: ee:27:bf:ab:e8:3c:00:07:86:62:c5:5c:4d:e5:5f:be: 6e:89:2e:13:39:6a:de:c6:60:ff:41:28:51:de:84:b1: 87:4b:c0:91:13:ad:42:0e:6f:10:f4:39:d0:b1:fb:33: 53:1a:1b:0f:7c:f0:eb:d3:33:27:8d:9b:89:7c:96:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:6f:7d:b8:29:b6:fe:8b:c9:a0:88:5c:df:2a:38:bf: 82:c5:4e:66:e8:e0:c5:72:3e:bd:4e:d9:91:71:01:d8: d1:38:24:09:48:11:d6:2c:21:7a:03:1d:ae:41:2f:e3: ea:a1:bf:94:9a:83:2c:95:bb:4d:ad:f4:2b:e1:55:0a: 8a:bd:74:5f:cb:20:8d:c9:1d:c1:46:bc:da:79:e6:00: d9:7a:d0:b7:24:df:84:6e:a0:cb:de:84:4a:16:d0:ad: b8:3b:92:b7:88:9c:8e:97:db:bb:7d:63:bb:9a:b4:b3: a9:b1:75:41:76:d5:fd:c8:08:67:93:7c:04:45:36:03: 3a:8f:af:1d:57:8a:ad:0e:0e:44:7c:62:43:b0:e3:16: bb:4f:20:4b:56:f9:d3:2e:14:87:72:d9:a2:e7:08:b5: d0:16:db:48:47:46:12:74:3c:5f:18:3c:63:5f:bd:5a: e7:07:80:c3:1e:35:6b:cc:f1:51:b5:f4:dd:d0:a2:11: 40:09:49:60:50:15:db:46:80:06:31:f4:fd:61:38:3a: 37:d7:e5:64:15:a0:7a:f5:d5:b4:cd:24:b6:7f:27:d3: 99:cb:78:66:0b:0f:94:11:b9:14:e9:58:53:79:e5:e9: ba:c7:06:09:f9:81:28:51:f1:5a:70:f7:14:b8:ee:c0 Fingerprint (SHA-256): AB:63:F6:87:E0:43:7B:25:A1:EE:B9:9C:F1:D5:89:05:87:FB:47:53:47:BE:87:F0:8F:D1:35:16:FA:92:26:71 Fingerprint (SHA1): CC:5F:2D:DD:59:53:B2:FF:68:27:5C:D5:18:00:A6:B0:DC:E6:08:E2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #402: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #403: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034161 (0x3750ad71) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Sep 28 03:48:58 2022 Not After : Tue Sep 28 03:48:58 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:bd:94:c3:6c:66:f6:52:e0:24:ba:1b:cb:0d:6f:3b: 34:c3:70:c1:15:92:38:38:3e:c4:71:1f:3c:da:e5:cd: 4d:28:8f:cf:5a:e6:f5:63:b5:60:8e:8d:5f:2f:ce:d6: 40:4a:e4:dc:e0:24:a1:de:ee:38:3a:11:e0:ba:2a:61: 6f:25:5d:86:02:17:07:ad:d3:33:a7:f0:5d:78:0b:ff: 3e:dc:64:33:ce:a4:cf:b8:d0:58:24:75:27:6d:ea:88: 43:f4:51:ef:e7:fd:5b:b3:0a:4d:f7:df:1a:3a:54:c4: e9:d1:21:20:44:28:3b:de:55:c9:4c:b7:1f:30:4a:d8: 27:ea:86:f5:47:1e:c0:af:a8:57:6a:4a:48:b5:97:49: 1a:0e:51:c8:2c:cc:f8:6a:7b:17:51:8e:3f:60:17:d4: f4:b4:8a:bf:c6:c0:02:32:2d:d2:e1:2c:af:06:45:59: 0c:af:2d:c4:b8:54:04:be:47:f5:6b:9f:a5:76:35:1c: 3f:80:ce:98:c4:f8:e4:92:51:bb:77:27:6d:6a:d2:f6: 00:f1:fa:2f:5e:37:7f:a1:11:0b:b1:18:65:b3:2f:86: 57:40:29:b2:16:a5:11:5f:a5:69:35:d1:e6:28:6e:75: 04:78:cd:88:57:9e:0a:c2:9c:8c:45:4d:42:f5:ce:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:ac:b4:89:08:41:b3:f2:79:26:b0:09:bb:e9:f4:38: 7d:63:03:1d:3d:a5:b0:b8:a4:b0:e2:9a:85:a5:c0:6a: 8c:dc:9b:3e:2f:8e:1e:16:77:bd:57:8d:c8:f5:d2:e7: b7:9e:f8:14:96:cd:d2:f9:ed:a1:67:0b:d9:f9:04:63: 07:84:02:09:8f:68:38:50:23:02:1e:f0:9c:e1:48:6f: 42:b2:83:a7:67:a5:d8:d7:e3:24:4e:1b:86:bc:33:cd: d5:a4:13:b7:83:93:ba:88:02:8b:9d:1a:a9:63:2a:38: 75:68:e3:4c:87:af:39:5b:07:0f:2d:6a:13:29:87:a7: 93:44:62:ce:0e:4d:38:82:54:e5:71:0c:e2:b0:12:21: 78:3c:17:69:d0:e9:88:18:11:2d:82:40:a1:1a:b5:bc: 49:e0:1b:8c:f6:bb:b6:ad:b5:29:2b:53:dc:30:43:6d: 0f:da:79:9e:33:88:31:83:7b:cc:77:49:01:2b:0a:65: 80:32:df:ad:2f:53:25:a7:7e:7c:d4:f5:f5:77:7c:bc: 69:67:4a:1c:c2:cc:df:5a:3a:6a:a7:ff:19:f5:86:8a: a4:a2:c4:f4:8e:fa:5e:06:80:aa:89:a5:ff:84:de:cc: 5a:e9:ae:47:b7:d6:bb:4c:39:b4:89:4e:76:6d:e4:0a Fingerprint (SHA-256): 57:10:95:0E:B4:7F:1E:38:A8:42:8B:61:06:08:97:D0:1E:69:4A:96:5A:82:4F:90:CD:E3:14:C9:BB:40:29:25 Fingerprint (SHA1): F3:49:6B:CC:BA:AD:9A:DB:76:4A:E8:F3:CA:A3:D3:EB:0F:52:3F:22 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #404: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #405: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034159 (0x3750ad6f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:48:48 2022 Not After : Wed Sep 28 03:48:48 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:41:e8:cb:57:1b:9a:a2:ac:d8:58:e8:23:7d:94:5a: 75:62:7e:ad:19:02:20:6d:50:2c:e3:44:5b:95:df:7f: 9e:b2:2e:99:b5:b3:a2:39:4b:f8:2e:3f:d9:64:0a:de: c9:f4:3a:14:b4:a6:d9:30:3a:85:2a:07:d6:98:2d:41: 37:34:6e:2e:e6:e6:09:f9:0c:93:da:77:67:e3:95:32: bf:e9:c1:15:f6:b6:3e:12:1b:ff:94:d0:97:80:e5:27: 5a:59:73:86:31:b2:2f:46:37:03:a0:bf:9a:b5:b8:39: a4:23:12:b8:2c:1c:b9:b9:a8:c5:21:1f:ef:d6:00:6c: 2a:b7:9f:6a:12:68:a6:f7:8e:fa:e8:a1:20:5d:41:45: 68:9d:6a:49:53:66:0d:43:98:d7:f3:28:dd:52:25:ca: 59:66:36:a4:88:db:3f:39:2a:c6:c8:16:e6:dd:97:51: 74:48:c6:83:31:f1:1e:f2:29:f8:08:b7:da:d4:ca:70: 59:6f:ea:1a:00:48:58:f5:b1:62:56:f4:ad:84:d3:32: ee:50:3e:1e:cd:36:ec:09:5a:db:3e:1e:f7:af:92:0d: 0c:f7:fd:fe:73:ca:aa:34:fc:a2:ad:67:28:db:42:1c: c1:f7:9a:0e:d9:0b:9a:b1:12:44:88:70:4a:5a:c6:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:6a:c7:97:b5:bc:bc:b4:24:34:f3:0c:1e:08:d7:04: 82:cc:2c:3a:7b:99:ad:af:e9:02:a3:46:d3:18:8e:59: fa:62:89:ca:c6:10:a9:e2:4e:1c:22:57:78:ef:f7:8a: 1e:33:5b:60:75:d0:5c:b2:26:7f:6f:27:6d:59:85:62: 2a:c2:7e:52:81:6d:a9:0a:25:db:60:66:7a:ff:54:02: 9b:81:6b:1a:ff:01:30:44:dd:2c:80:0d:38:8f:f6:0b: 5d:3b:48:89:5d:ab:02:fa:45:54:2a:1c:15:66:2c:5b: 3b:20:e0:65:80:b2:3f:e5:68:3a:bf:fa:60:e7:d4:f7: af:62:50:6b:bb:40:b7:3f:e4:28:30:a3:9f:20:74:7c: 3b:b5:56:c1:64:5c:0c:4e:62:4a:7c:d6:f1:62:0a:6a: 23:d6:37:8f:ab:e3:58:78:17:e3:4c:b3:1e:e4:06:4f: 59:85:04:64:a8:36:b4:7d:f8:9a:f9:85:3b:90:cc:1e: 65:a3:c0:68:61:76:ce:d4:80:38:b7:39:5d:7d:b6:41: c0:bf:50:cd:61:21:eb:ef:3d:e7:eb:51:ac:44:aa:93: 5a:06:ac:45:da:12:f7:01:0f:f6:a2:a8:52:e9:96:1d: 1f:53:b9:91:b1:95:cb:1a:e3:fc:0e:a8:16:44:5f:79 Fingerprint (SHA-256): A1:70:C1:29:66:79:48:E7:01:A4:4B:7E:EF:76:22:E7:72:5C:41:A3:35:DC:E5:BE:B6:9B:F1:EA:25:44:A6:90 Fingerprint (SHA1): 05:B4:5E:34:41:BA:AC:96:23:90:19:2C:42:7E:96:8D:4E:23:51:BA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #406: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034159 (0x3750ad6f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:48:48 2022 Not After : Wed Sep 28 03:48:48 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:41:e8:cb:57:1b:9a:a2:ac:d8:58:e8:23:7d:94:5a: 75:62:7e:ad:19:02:20:6d:50:2c:e3:44:5b:95:df:7f: 9e:b2:2e:99:b5:b3:a2:39:4b:f8:2e:3f:d9:64:0a:de: c9:f4:3a:14:b4:a6:d9:30:3a:85:2a:07:d6:98:2d:41: 37:34:6e:2e:e6:e6:09:f9:0c:93:da:77:67:e3:95:32: bf:e9:c1:15:f6:b6:3e:12:1b:ff:94:d0:97:80:e5:27: 5a:59:73:86:31:b2:2f:46:37:03:a0:bf:9a:b5:b8:39: a4:23:12:b8:2c:1c:b9:b9:a8:c5:21:1f:ef:d6:00:6c: 2a:b7:9f:6a:12:68:a6:f7:8e:fa:e8:a1:20:5d:41:45: 68:9d:6a:49:53:66:0d:43:98:d7:f3:28:dd:52:25:ca: 59:66:36:a4:88:db:3f:39:2a:c6:c8:16:e6:dd:97:51: 74:48:c6:83:31:f1:1e:f2:29:f8:08:b7:da:d4:ca:70: 59:6f:ea:1a:00:48:58:f5:b1:62:56:f4:ad:84:d3:32: ee:50:3e:1e:cd:36:ec:09:5a:db:3e:1e:f7:af:92:0d: 0c:f7:fd:fe:73:ca:aa:34:fc:a2:ad:67:28:db:42:1c: c1:f7:9a:0e:d9:0b:9a:b1:12:44:88:70:4a:5a:c6:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:6a:c7:97:b5:bc:bc:b4:24:34:f3:0c:1e:08:d7:04: 82:cc:2c:3a:7b:99:ad:af:e9:02:a3:46:d3:18:8e:59: fa:62:89:ca:c6:10:a9:e2:4e:1c:22:57:78:ef:f7:8a: 1e:33:5b:60:75:d0:5c:b2:26:7f:6f:27:6d:59:85:62: 2a:c2:7e:52:81:6d:a9:0a:25:db:60:66:7a:ff:54:02: 9b:81:6b:1a:ff:01:30:44:dd:2c:80:0d:38:8f:f6:0b: 5d:3b:48:89:5d:ab:02:fa:45:54:2a:1c:15:66:2c:5b: 3b:20:e0:65:80:b2:3f:e5:68:3a:bf:fa:60:e7:d4:f7: af:62:50:6b:bb:40:b7:3f:e4:28:30:a3:9f:20:74:7c: 3b:b5:56:c1:64:5c:0c:4e:62:4a:7c:d6:f1:62:0a:6a: 23:d6:37:8f:ab:e3:58:78:17:e3:4c:b3:1e:e4:06:4f: 59:85:04:64:a8:36:b4:7d:f8:9a:f9:85:3b:90:cc:1e: 65:a3:c0:68:61:76:ce:d4:80:38:b7:39:5d:7d:b6:41: c0:bf:50:cd:61:21:eb:ef:3d:e7:eb:51:ac:44:aa:93: 5a:06:ac:45:da:12:f7:01:0f:f6:a2:a8:52:e9:96:1d: 1f:53:b9:91:b1:95:cb:1a:e3:fc:0e:a8:16:44:5f:79 Fingerprint (SHA-256): A1:70:C1:29:66:79:48:E7:01:A4:4B:7E:EF:76:22:E7:72:5C:41:A3:35:DC:E5:BE:B6:9B:F1:EA:25:44:A6:90 Fingerprint (SHA1): 05:B4:5E:34:41:BA:AC:96:23:90:19:2C:42:7E:96:8D:4E:23:51:BA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #407: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034160 (0x3750ad70) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:48:53 2022 Not After : Tue Sep 28 03:48:53 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:0c:5b:24:c0:5d:bf:e5:0b:f3:26:c8:81:30:3a:29: 79:71:0f:58:b4:2c:c5:43:1d:2e:bc:cb:5d:2f:c0:20: a5:fd:22:f7:93:6f:a2:3c:90:00:f1:52:05:99:fd:f7: ba:9c:7b:d5:a4:8d:e3:c5:67:62:5c:f0:37:50:21:d7: db:b2:64:ea:33:e3:95:dc:27:5f:bb:76:cf:07:6f:21: 36:97:59:4d:52:6e:f3:53:7f:7b:fb:14:de:c9:90:e5: 1a:d1:cb:3a:14:92:63:3b:a3:94:ae:0f:e8:01:eb:72: 2a:da:6b:df:1c:99:1f:c9:d4:d6:e0:be:1b:b8:cc:10: 00:8d:49:d6:13:66:38:b2:c5:8e:fb:f6:57:67:3e:c8: 08:b6:1b:2f:c0:41:30:b1:36:5c:4e:16:02:e9:3b:7f: ba:25:54:26:d2:f2:a6:52:00:78:50:0d:39:20:78:b5: da:77:00:8a:45:71:5c:63:ee:b1:94:15:2c:39:ff:26: ee:27:bf:ab:e8:3c:00:07:86:62:c5:5c:4d:e5:5f:be: 6e:89:2e:13:39:6a:de:c6:60:ff:41:28:51:de:84:b1: 87:4b:c0:91:13:ad:42:0e:6f:10:f4:39:d0:b1:fb:33: 53:1a:1b:0f:7c:f0:eb:d3:33:27:8d:9b:89:7c:96:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:6f:7d:b8:29:b6:fe:8b:c9:a0:88:5c:df:2a:38:bf: 82:c5:4e:66:e8:e0:c5:72:3e:bd:4e:d9:91:71:01:d8: d1:38:24:09:48:11:d6:2c:21:7a:03:1d:ae:41:2f:e3: ea:a1:bf:94:9a:83:2c:95:bb:4d:ad:f4:2b:e1:55:0a: 8a:bd:74:5f:cb:20:8d:c9:1d:c1:46:bc:da:79:e6:00: d9:7a:d0:b7:24:df:84:6e:a0:cb:de:84:4a:16:d0:ad: b8:3b:92:b7:88:9c:8e:97:db:bb:7d:63:bb:9a:b4:b3: a9:b1:75:41:76:d5:fd:c8:08:67:93:7c:04:45:36:03: 3a:8f:af:1d:57:8a:ad:0e:0e:44:7c:62:43:b0:e3:16: bb:4f:20:4b:56:f9:d3:2e:14:87:72:d9:a2:e7:08:b5: d0:16:db:48:47:46:12:74:3c:5f:18:3c:63:5f:bd:5a: e7:07:80:c3:1e:35:6b:cc:f1:51:b5:f4:dd:d0:a2:11: 40:09:49:60:50:15:db:46:80:06:31:f4:fd:61:38:3a: 37:d7:e5:64:15:a0:7a:f5:d5:b4:cd:24:b6:7f:27:d3: 99:cb:78:66:0b:0f:94:11:b9:14:e9:58:53:79:e5:e9: ba:c7:06:09:f9:81:28:51:f1:5a:70:f7:14:b8:ee:c0 Fingerprint (SHA-256): AB:63:F6:87:E0:43:7B:25:A1:EE:B9:9C:F1:D5:89:05:87:FB:47:53:47:BE:87:F0:8F:D1:35:16:FA:92:26:71 Fingerprint (SHA1): CC:5F:2D:DD:59:53:B2:FF:68:27:5C:D5:18:00:A6:B0:DC:E6:08:E2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #408: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034160 (0x3750ad70) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:48:53 2022 Not After : Tue Sep 28 03:48:53 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:0c:5b:24:c0:5d:bf:e5:0b:f3:26:c8:81:30:3a:29: 79:71:0f:58:b4:2c:c5:43:1d:2e:bc:cb:5d:2f:c0:20: a5:fd:22:f7:93:6f:a2:3c:90:00:f1:52:05:99:fd:f7: ba:9c:7b:d5:a4:8d:e3:c5:67:62:5c:f0:37:50:21:d7: db:b2:64:ea:33:e3:95:dc:27:5f:bb:76:cf:07:6f:21: 36:97:59:4d:52:6e:f3:53:7f:7b:fb:14:de:c9:90:e5: 1a:d1:cb:3a:14:92:63:3b:a3:94:ae:0f:e8:01:eb:72: 2a:da:6b:df:1c:99:1f:c9:d4:d6:e0:be:1b:b8:cc:10: 00:8d:49:d6:13:66:38:b2:c5:8e:fb:f6:57:67:3e:c8: 08:b6:1b:2f:c0:41:30:b1:36:5c:4e:16:02:e9:3b:7f: ba:25:54:26:d2:f2:a6:52:00:78:50:0d:39:20:78:b5: da:77:00:8a:45:71:5c:63:ee:b1:94:15:2c:39:ff:26: ee:27:bf:ab:e8:3c:00:07:86:62:c5:5c:4d:e5:5f:be: 6e:89:2e:13:39:6a:de:c6:60:ff:41:28:51:de:84:b1: 87:4b:c0:91:13:ad:42:0e:6f:10:f4:39:d0:b1:fb:33: 53:1a:1b:0f:7c:f0:eb:d3:33:27:8d:9b:89:7c:96:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:6f:7d:b8:29:b6:fe:8b:c9:a0:88:5c:df:2a:38:bf: 82:c5:4e:66:e8:e0:c5:72:3e:bd:4e:d9:91:71:01:d8: d1:38:24:09:48:11:d6:2c:21:7a:03:1d:ae:41:2f:e3: ea:a1:bf:94:9a:83:2c:95:bb:4d:ad:f4:2b:e1:55:0a: 8a:bd:74:5f:cb:20:8d:c9:1d:c1:46:bc:da:79:e6:00: d9:7a:d0:b7:24:df:84:6e:a0:cb:de:84:4a:16:d0:ad: b8:3b:92:b7:88:9c:8e:97:db:bb:7d:63:bb:9a:b4:b3: a9:b1:75:41:76:d5:fd:c8:08:67:93:7c:04:45:36:03: 3a:8f:af:1d:57:8a:ad:0e:0e:44:7c:62:43:b0:e3:16: bb:4f:20:4b:56:f9:d3:2e:14:87:72:d9:a2:e7:08:b5: d0:16:db:48:47:46:12:74:3c:5f:18:3c:63:5f:bd:5a: e7:07:80:c3:1e:35:6b:cc:f1:51:b5:f4:dd:d0:a2:11: 40:09:49:60:50:15:db:46:80:06:31:f4:fd:61:38:3a: 37:d7:e5:64:15:a0:7a:f5:d5:b4:cd:24:b6:7f:27:d3: 99:cb:78:66:0b:0f:94:11:b9:14:e9:58:53:79:e5:e9: ba:c7:06:09:f9:81:28:51:f1:5a:70:f7:14:b8:ee:c0 Fingerprint (SHA-256): AB:63:F6:87:E0:43:7B:25:A1:EE:B9:9C:F1:D5:89:05:87:FB:47:53:47:BE:87:F0:8F:D1:35:16:FA:92:26:71 Fingerprint (SHA1): CC:5F:2D:DD:59:53:B2:FF:68:27:5C:D5:18:00:A6:B0:DC:E6:08:E2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #409: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034161 (0x3750ad71) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Sep 28 03:48:58 2022 Not After : Tue Sep 28 03:48:58 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:bd:94:c3:6c:66:f6:52:e0:24:ba:1b:cb:0d:6f:3b: 34:c3:70:c1:15:92:38:38:3e:c4:71:1f:3c:da:e5:cd: 4d:28:8f:cf:5a:e6:f5:63:b5:60:8e:8d:5f:2f:ce:d6: 40:4a:e4:dc:e0:24:a1:de:ee:38:3a:11:e0:ba:2a:61: 6f:25:5d:86:02:17:07:ad:d3:33:a7:f0:5d:78:0b:ff: 3e:dc:64:33:ce:a4:cf:b8:d0:58:24:75:27:6d:ea:88: 43:f4:51:ef:e7:fd:5b:b3:0a:4d:f7:df:1a:3a:54:c4: e9:d1:21:20:44:28:3b:de:55:c9:4c:b7:1f:30:4a:d8: 27:ea:86:f5:47:1e:c0:af:a8:57:6a:4a:48:b5:97:49: 1a:0e:51:c8:2c:cc:f8:6a:7b:17:51:8e:3f:60:17:d4: f4:b4:8a:bf:c6:c0:02:32:2d:d2:e1:2c:af:06:45:59: 0c:af:2d:c4:b8:54:04:be:47:f5:6b:9f:a5:76:35:1c: 3f:80:ce:98:c4:f8:e4:92:51:bb:77:27:6d:6a:d2:f6: 00:f1:fa:2f:5e:37:7f:a1:11:0b:b1:18:65:b3:2f:86: 57:40:29:b2:16:a5:11:5f:a5:69:35:d1:e6:28:6e:75: 04:78:cd:88:57:9e:0a:c2:9c:8c:45:4d:42:f5:ce:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:ac:b4:89:08:41:b3:f2:79:26:b0:09:bb:e9:f4:38: 7d:63:03:1d:3d:a5:b0:b8:a4:b0:e2:9a:85:a5:c0:6a: 8c:dc:9b:3e:2f:8e:1e:16:77:bd:57:8d:c8:f5:d2:e7: b7:9e:f8:14:96:cd:d2:f9:ed:a1:67:0b:d9:f9:04:63: 07:84:02:09:8f:68:38:50:23:02:1e:f0:9c:e1:48:6f: 42:b2:83:a7:67:a5:d8:d7:e3:24:4e:1b:86:bc:33:cd: d5:a4:13:b7:83:93:ba:88:02:8b:9d:1a:a9:63:2a:38: 75:68:e3:4c:87:af:39:5b:07:0f:2d:6a:13:29:87:a7: 93:44:62:ce:0e:4d:38:82:54:e5:71:0c:e2:b0:12:21: 78:3c:17:69:d0:e9:88:18:11:2d:82:40:a1:1a:b5:bc: 49:e0:1b:8c:f6:bb:b6:ad:b5:29:2b:53:dc:30:43:6d: 0f:da:79:9e:33:88:31:83:7b:cc:77:49:01:2b:0a:65: 80:32:df:ad:2f:53:25:a7:7e:7c:d4:f5:f5:77:7c:bc: 69:67:4a:1c:c2:cc:df:5a:3a:6a:a7:ff:19:f5:86:8a: a4:a2:c4:f4:8e:fa:5e:06:80:aa:89:a5:ff:84:de:cc: 5a:e9:ae:47:b7:d6:bb:4c:39:b4:89:4e:76:6d:e4:0a Fingerprint (SHA-256): 57:10:95:0E:B4:7F:1E:38:A8:42:8B:61:06:08:97:D0:1E:69:4A:96:5A:82:4F:90:CD:E3:14:C9:BB:40:29:25 Fingerprint (SHA1): F3:49:6B:CC:BA:AD:9A:DB:76:4A:E8:F3:CA:A3:D3:EB:0F:52:3F:22 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #410: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034161 (0x3750ad71) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Sep 28 03:48:58 2022 Not After : Tue Sep 28 03:48:58 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:bd:94:c3:6c:66:f6:52:e0:24:ba:1b:cb:0d:6f:3b: 34:c3:70:c1:15:92:38:38:3e:c4:71:1f:3c:da:e5:cd: 4d:28:8f:cf:5a:e6:f5:63:b5:60:8e:8d:5f:2f:ce:d6: 40:4a:e4:dc:e0:24:a1:de:ee:38:3a:11:e0:ba:2a:61: 6f:25:5d:86:02:17:07:ad:d3:33:a7:f0:5d:78:0b:ff: 3e:dc:64:33:ce:a4:cf:b8:d0:58:24:75:27:6d:ea:88: 43:f4:51:ef:e7:fd:5b:b3:0a:4d:f7:df:1a:3a:54:c4: e9:d1:21:20:44:28:3b:de:55:c9:4c:b7:1f:30:4a:d8: 27:ea:86:f5:47:1e:c0:af:a8:57:6a:4a:48:b5:97:49: 1a:0e:51:c8:2c:cc:f8:6a:7b:17:51:8e:3f:60:17:d4: f4:b4:8a:bf:c6:c0:02:32:2d:d2:e1:2c:af:06:45:59: 0c:af:2d:c4:b8:54:04:be:47:f5:6b:9f:a5:76:35:1c: 3f:80:ce:98:c4:f8:e4:92:51:bb:77:27:6d:6a:d2:f6: 00:f1:fa:2f:5e:37:7f:a1:11:0b:b1:18:65:b3:2f:86: 57:40:29:b2:16:a5:11:5f:a5:69:35:d1:e6:28:6e:75: 04:78:cd:88:57:9e:0a:c2:9c:8c:45:4d:42:f5:ce:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:ac:b4:89:08:41:b3:f2:79:26:b0:09:bb:e9:f4:38: 7d:63:03:1d:3d:a5:b0:b8:a4:b0:e2:9a:85:a5:c0:6a: 8c:dc:9b:3e:2f:8e:1e:16:77:bd:57:8d:c8:f5:d2:e7: b7:9e:f8:14:96:cd:d2:f9:ed:a1:67:0b:d9:f9:04:63: 07:84:02:09:8f:68:38:50:23:02:1e:f0:9c:e1:48:6f: 42:b2:83:a7:67:a5:d8:d7:e3:24:4e:1b:86:bc:33:cd: d5:a4:13:b7:83:93:ba:88:02:8b:9d:1a:a9:63:2a:38: 75:68:e3:4c:87:af:39:5b:07:0f:2d:6a:13:29:87:a7: 93:44:62:ce:0e:4d:38:82:54:e5:71:0c:e2:b0:12:21: 78:3c:17:69:d0:e9:88:18:11:2d:82:40:a1:1a:b5:bc: 49:e0:1b:8c:f6:bb:b6:ad:b5:29:2b:53:dc:30:43:6d: 0f:da:79:9e:33:88:31:83:7b:cc:77:49:01:2b:0a:65: 80:32:df:ad:2f:53:25:a7:7e:7c:d4:f5:f5:77:7c:bc: 69:67:4a:1c:c2:cc:df:5a:3a:6a:a7:ff:19:f5:86:8a: a4:a2:c4:f4:8e:fa:5e:06:80:aa:89:a5:ff:84:de:cc: 5a:e9:ae:47:b7:d6:bb:4c:39:b4:89:4e:76:6d:e4:0a Fingerprint (SHA-256): 57:10:95:0E:B4:7F:1E:38:A8:42:8B:61:06:08:97:D0:1E:69:4A:96:5A:82:4F:90:CD:E3:14:C9:BB:40:29:25 Fingerprint (SHA1): F3:49:6B:CC:BA:AD:9A:DB:76:4A:E8:F3:CA:A3:D3:EB:0F:52:3F:22 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #411: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #412: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034164 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #413: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #414: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #415: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #416: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 928034165 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #417: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #418: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #419: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #420: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 928034166 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #421: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #422: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #423: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #424: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 928034167 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #425: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #426: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #427: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #428: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 928034168 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #429: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #430: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #431: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #432: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 928034169 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #433: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #434: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #435: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #436: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 928034170 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #437: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #438: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #439: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #440: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #441: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #442: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #443: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034164 (0x3750ad74) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 03:49:23 2022 Not After : Wed Sep 28 03:49:23 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:5f:23:b8:4f:1d:b0:2e:3e:ca:46:ad:4f:a0:75:2e: 7e:90:a0:95:a0:44:cf:f6:04:0b:be:09:3c:28:cc:f1: 3d:4a:d9:78:f3:2d:e1:9b:b0:fd:6b:45:66:a5:a5:81: b8:46:bf:ae:b5:3f:98:b3:e6:1c:fe:de:13:0c:04:08: 90:0a:45:12:41:7e:8a:33:ff:62:b8:77:9d:7e:33:98: 90:67:99:0b:2e:69:b4:88:e9:92:1b:44:1a:78:0a:0f: 85:bd:cc:79:0b:21:0a:65:fe:d3:4b:4e:3e:f4:66:be: 90:46:4b:b1:87:8d:5c:22:14:cb:e3:f2:8c:d5:6e:b1: 98:a8:c0:9a:04:fc:8d:e3:bc:73:71:1d:a0:29:08:6c: fd:fb:30:33:79:3f:13:3a:e6:c0:ca:63:e5:c1:55:86: de:aa:c1:d9:da:fa:f7:c7:23:e0:84:31:d5:4b:6b:16: e7:72:80:e0:bb:33:12:91:73:52:51:2b:db:0a:84:6f: c6:78:02:0b:46:b8:74:04:68:06:64:e6:c6:fa:6d:5c: f6:5e:c1:42:b5:4d:e3:b8:18:46:b8:93:a8:5d:00:f8: 53:81:c4:f5:f5:0c:c9:6f:68:22:f6:52:0a:ab:5d:14: 0e:38:36:8f:40:8d:40:d6:49:9f:6c:6c:4a:dd:7f:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:6e:e6:21:14:73:8a:0f:14:48:62:ea:04:2b:db:ed: 10:7f:fe:3c:76:38:80:c8:93:f3:9c:67:6f:85:2a:2a: 50:71:98:48:11:23:ce:02:d2:d2:3e:5f:cf:15:44:59: c9:f3:ae:5d:49:b2:38:b0:2a:0c:d0:3e:bc:fe:5a:04: 4a:24:d5:30:c8:21:11:bd:b5:7d:82:82:0d:63:7e:df: 73:35:3b:f9:77:b7:4a:d2:b0:6d:fd:65:af:b8:eb:8b: 53:a4:16:d2:c6:2b:e3:54:8c:6c:13:78:f2:f0:d4:bd: 9e:56:62:a4:a4:c6:c0:41:14:ae:bb:3d:3b:2f:e4:b6: 9e:08:77:27:ab:7b:f7:31:ca:1f:12:08:3e:9d:52:ba: 96:9f:68:26:0f:a0:3e:71:f8:18:cc:7a:f6:7c:77:2b: bb:ea:b6:38:81:7e:2e:1c:76:5d:57:78:6a:a0:c3:74: 2a:fd:74:4b:5e:66:7b:f2:a3:1f:21:dd:28:c8:e0:c6: 03:a3:db:c2:5b:61:52:43:0b:4b:64:6d:7a:57:8e:a2: 24:70:e8:32:97:70:0f:64:e5:90:e9:1d:fd:51:88:38: 39:d7:4d:74:a3:e0:a4:ac:a9:32:41:ad:b2:59:3b:28: c3:5b:12:8d:d2:5a:b4:e0:26:a9:b0:ce:57:11:5e:de Fingerprint (SHA-256): 6A:E9:9E:32:84:D4:08:4C:15:F1:39:DC:01:10:EA:17:FA:EF:7E:24:D8:B5:9A:E8:23:13:C1:6B:56:BF:AE:AE Fingerprint (SHA1): C4:8C:6D:23:38:F7:04:6E:E4:FB:05:B2:AF:BE:8E:0A:F9:CB:54:5A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #444: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #445: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #446: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #447: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034164 (0x3750ad74) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 03:49:23 2022 Not After : Wed Sep 28 03:49:23 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:5f:23:b8:4f:1d:b0:2e:3e:ca:46:ad:4f:a0:75:2e: 7e:90:a0:95:a0:44:cf:f6:04:0b:be:09:3c:28:cc:f1: 3d:4a:d9:78:f3:2d:e1:9b:b0:fd:6b:45:66:a5:a5:81: b8:46:bf:ae:b5:3f:98:b3:e6:1c:fe:de:13:0c:04:08: 90:0a:45:12:41:7e:8a:33:ff:62:b8:77:9d:7e:33:98: 90:67:99:0b:2e:69:b4:88:e9:92:1b:44:1a:78:0a:0f: 85:bd:cc:79:0b:21:0a:65:fe:d3:4b:4e:3e:f4:66:be: 90:46:4b:b1:87:8d:5c:22:14:cb:e3:f2:8c:d5:6e:b1: 98:a8:c0:9a:04:fc:8d:e3:bc:73:71:1d:a0:29:08:6c: fd:fb:30:33:79:3f:13:3a:e6:c0:ca:63:e5:c1:55:86: de:aa:c1:d9:da:fa:f7:c7:23:e0:84:31:d5:4b:6b:16: e7:72:80:e0:bb:33:12:91:73:52:51:2b:db:0a:84:6f: c6:78:02:0b:46:b8:74:04:68:06:64:e6:c6:fa:6d:5c: f6:5e:c1:42:b5:4d:e3:b8:18:46:b8:93:a8:5d:00:f8: 53:81:c4:f5:f5:0c:c9:6f:68:22:f6:52:0a:ab:5d:14: 0e:38:36:8f:40:8d:40:d6:49:9f:6c:6c:4a:dd:7f:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:6e:e6:21:14:73:8a:0f:14:48:62:ea:04:2b:db:ed: 10:7f:fe:3c:76:38:80:c8:93:f3:9c:67:6f:85:2a:2a: 50:71:98:48:11:23:ce:02:d2:d2:3e:5f:cf:15:44:59: c9:f3:ae:5d:49:b2:38:b0:2a:0c:d0:3e:bc:fe:5a:04: 4a:24:d5:30:c8:21:11:bd:b5:7d:82:82:0d:63:7e:df: 73:35:3b:f9:77:b7:4a:d2:b0:6d:fd:65:af:b8:eb:8b: 53:a4:16:d2:c6:2b:e3:54:8c:6c:13:78:f2:f0:d4:bd: 9e:56:62:a4:a4:c6:c0:41:14:ae:bb:3d:3b:2f:e4:b6: 9e:08:77:27:ab:7b:f7:31:ca:1f:12:08:3e:9d:52:ba: 96:9f:68:26:0f:a0:3e:71:f8:18:cc:7a:f6:7c:77:2b: bb:ea:b6:38:81:7e:2e:1c:76:5d:57:78:6a:a0:c3:74: 2a:fd:74:4b:5e:66:7b:f2:a3:1f:21:dd:28:c8:e0:c6: 03:a3:db:c2:5b:61:52:43:0b:4b:64:6d:7a:57:8e:a2: 24:70:e8:32:97:70:0f:64:e5:90:e9:1d:fd:51:88:38: 39:d7:4d:74:a3:e0:a4:ac:a9:32:41:ad:b2:59:3b:28: c3:5b:12:8d:d2:5a:b4:e0:26:a9:b0:ce:57:11:5e:de Fingerprint (SHA-256): 6A:E9:9E:32:84:D4:08:4C:15:F1:39:DC:01:10:EA:17:FA:EF:7E:24:D8:B5:9A:E8:23:13:C1:6B:56:BF:AE:AE Fingerprint (SHA1): C4:8C:6D:23:38:F7:04:6E:E4:FB:05:B2:AF:BE:8E:0A:F9:CB:54:5A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #448: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #449: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #450: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034171 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #451: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #452: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #453: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #454: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 928034172 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #455: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #456: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #457: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #458: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 928034173 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #459: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #460: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #461: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #462: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 928034174 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #463: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #464: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #465: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #466: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 928034175 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #467: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #468: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #469: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #470: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 928034176 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #471: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #472: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #473: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #474: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 928034177 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #475: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #476: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #477: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #478: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 928034178 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #479: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #480: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #481: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #482: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 928034179 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #483: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #484: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #485: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #486: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 928034180 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #487: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #488: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #489: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #490: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 928034181 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #491: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #492: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #493: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #494: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 928034182 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #495: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #496: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #497: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #498: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 928034183 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #499: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #500: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #501: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #502: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 928034184 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #503: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #504: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #505: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #506: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 928034185 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #507: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #508: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #509: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #510: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 928034186 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #511: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #512: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #513: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #514: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 928034187 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #515: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #516: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #517: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #518: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 928034188 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #519: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #520: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #521: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #522: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 928034189 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #523: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #524: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #525: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #526: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 928034190 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #527: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #528: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #529: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #530: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 928034191 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #531: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #532: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #533: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #534: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 928034192 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #535: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #536: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #537: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #538: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 928034193 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #539: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #540: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #541: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #542: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 928034194 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #543: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #544: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #545: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #546: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 928034195 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #547: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #548: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #549: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #550: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 928034196 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #551: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #552: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #553: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #554: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 928034197 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #555: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #556: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #557: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #558: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 928034198 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #559: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #560: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #561: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #562: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 928034199 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #563: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #564: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #565: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #566: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 928034200 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #567: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #568: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #569: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034171 (0x3750ad7b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 03:50:05 2022 Not After : Wed Sep 28 03:50:05 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:86:3c:bd:31:0a:a8:3e:4b:cf:fb:9c:52:d1:37:f0: 52:df:a2:fa:0d:ba:cc:ff:23:0d:9d:9a:28:8b:7c:2c: fd:d5:27:05:8e:7f:b3:db:ff:93:60:05:9e:2a:b9:fd: 7f:76:03:9b:f4:14:b3:6d:12:9a:d8:7d:45:ab:70:2d: 2b:79:14:90:e9:d8:ac:cc:38:a0:a9:c2:0e:19:46:27: 8e:d2:c4:2a:b1:92:35:9c:20:ce:e6:d0:ed:e4:5d:37: 61:71:0b:ff:67:54:00:9a:11:8c:b3:df:cb:d3:10:c2: 6c:34:3e:f3:f4:c4:de:a4:b2:4a:9e:bb:7b:38:cb:61: 2b:cf:7d:8d:02:bc:a8:12:77:1f:3d:13:10:c1:b9:73: 6e:f4:40:76:e0:3e:fb:e0:2b:e0:2f:d8:ad:f1:b7:64: 82:c7:8f:59:44:34:26:e9:b4:b3:74:bb:4a:1e:b3:12: b4:30:6d:ff:ba:00:37:40:7a:62:c5:c5:e6:5d:7d:8d: 49:87:52:24:57:21:17:f3:fd:5f:2f:5f:8e:0c:da:00: e0:a5:44:81:1a:81:d2:63:a2:68:6d:bb:26:14:b3:5a: 65:63:9f:92:b8:fa:ad:4a:fd:5b:63:90:94:ac:a5:06: a0:e6:4e:08:f9:bc:b8:01:f8:1c:e4:34:ea:93:bf:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:20:05:6a:6c:91:54:42:c8:d9:9f:48:27:c4:30:d8: dd:8a:1b:73:2e:2d:8d:20:34:96:79:0e:32:0c:fc:3e: 5e:e3:40:b6:2e:2c:7a:d9:6a:75:7f:03:3b:ca:71:42: 1d:f9:f6:a5:09:d0:aa:f1:1a:93:c3:d0:e8:c7:74:4a: 08:6f:93:20:b7:f9:9a:fc:d6:4c:c4:f1:36:c1:76:72: c5:7b:f8:6c:7d:07:7b:d4:c1:1f:1c:90:19:57:79:9c: 83:f8:ed:d7:31:18:b7:95:d2:a0:7a:83:2d:31:33:fe: 51:6a:d5:88:23:6c:88:72:bc:93:38:39:28:5e:e5:5e: 1a:68:a8:bb:d0:0b:fb:a6:2f:e5:38:57:b3:01:55:d9: f1:a3:8b:99:7a:8f:c8:cc:9d:28:2d:da:37:de:f1:75: 27:af:0e:71:0f:1b:94:01:93:a6:7c:80:48:f8:79:f6: ae:9b:68:89:6d:49:d0:a2:39:9b:2f:b8:ec:aa:26:c6: 7a:d7:c4:59:d3:62:90:2d:21:39:92:8f:24:39:d6:a2: 14:bc:1c:28:99:53:11:9e:7d:5d:5a:81:46:d9:45:a4: 25:2b:0b:14:6b:82:2e:97:cd:f2:9d:e7:b6:5d:a8:42: df:9b:15:6f:51:71:2c:fb:36:e1:20:ab:70:da:56:3e Fingerprint (SHA-256): 42:D9:18:F5:38:0C:9B:08:79:2D:05:81:A1:1C:54:F8:C0:79:41:F6:68:1A:7C:E9:7A:4A:1B:89:C1:E3:AE:1D Fingerprint (SHA1): AB:6C:B4:F0:A8:96:9F:53:62:96:C4:9D:C0:E6:89:73:01:CB:F5:5A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #570: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #571: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034171 (0x3750ad7b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 03:50:05 2022 Not After : Wed Sep 28 03:50:05 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:86:3c:bd:31:0a:a8:3e:4b:cf:fb:9c:52:d1:37:f0: 52:df:a2:fa:0d:ba:cc:ff:23:0d:9d:9a:28:8b:7c:2c: fd:d5:27:05:8e:7f:b3:db:ff:93:60:05:9e:2a:b9:fd: 7f:76:03:9b:f4:14:b3:6d:12:9a:d8:7d:45:ab:70:2d: 2b:79:14:90:e9:d8:ac:cc:38:a0:a9:c2:0e:19:46:27: 8e:d2:c4:2a:b1:92:35:9c:20:ce:e6:d0:ed:e4:5d:37: 61:71:0b:ff:67:54:00:9a:11:8c:b3:df:cb:d3:10:c2: 6c:34:3e:f3:f4:c4:de:a4:b2:4a:9e:bb:7b:38:cb:61: 2b:cf:7d:8d:02:bc:a8:12:77:1f:3d:13:10:c1:b9:73: 6e:f4:40:76:e0:3e:fb:e0:2b:e0:2f:d8:ad:f1:b7:64: 82:c7:8f:59:44:34:26:e9:b4:b3:74:bb:4a:1e:b3:12: b4:30:6d:ff:ba:00:37:40:7a:62:c5:c5:e6:5d:7d:8d: 49:87:52:24:57:21:17:f3:fd:5f:2f:5f:8e:0c:da:00: e0:a5:44:81:1a:81:d2:63:a2:68:6d:bb:26:14:b3:5a: 65:63:9f:92:b8:fa:ad:4a:fd:5b:63:90:94:ac:a5:06: a0:e6:4e:08:f9:bc:b8:01:f8:1c:e4:34:ea:93:bf:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:20:05:6a:6c:91:54:42:c8:d9:9f:48:27:c4:30:d8: dd:8a:1b:73:2e:2d:8d:20:34:96:79:0e:32:0c:fc:3e: 5e:e3:40:b6:2e:2c:7a:d9:6a:75:7f:03:3b:ca:71:42: 1d:f9:f6:a5:09:d0:aa:f1:1a:93:c3:d0:e8:c7:74:4a: 08:6f:93:20:b7:f9:9a:fc:d6:4c:c4:f1:36:c1:76:72: c5:7b:f8:6c:7d:07:7b:d4:c1:1f:1c:90:19:57:79:9c: 83:f8:ed:d7:31:18:b7:95:d2:a0:7a:83:2d:31:33:fe: 51:6a:d5:88:23:6c:88:72:bc:93:38:39:28:5e:e5:5e: 1a:68:a8:bb:d0:0b:fb:a6:2f:e5:38:57:b3:01:55:d9: f1:a3:8b:99:7a:8f:c8:cc:9d:28:2d:da:37:de:f1:75: 27:af:0e:71:0f:1b:94:01:93:a6:7c:80:48:f8:79:f6: ae:9b:68:89:6d:49:d0:a2:39:9b:2f:b8:ec:aa:26:c6: 7a:d7:c4:59:d3:62:90:2d:21:39:92:8f:24:39:d6:a2: 14:bc:1c:28:99:53:11:9e:7d:5d:5a:81:46:d9:45:a4: 25:2b:0b:14:6b:82:2e:97:cd:f2:9d:e7:b6:5d:a8:42: df:9b:15:6f:51:71:2c:fb:36:e1:20:ab:70:da:56:3e Fingerprint (SHA-256): 42:D9:18:F5:38:0C:9B:08:79:2D:05:81:A1:1C:54:F8:C0:79:41:F6:68:1A:7C:E9:7A:4A:1B:89:C1:E3:AE:1D Fingerprint (SHA1): AB:6C:B4:F0:A8:96:9F:53:62:96:C4:9D:C0:E6:89:73:01:CB:F5:5A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #572: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #573: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #574: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #575: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034171 (0x3750ad7b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 03:50:05 2022 Not After : Wed Sep 28 03:50:05 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:86:3c:bd:31:0a:a8:3e:4b:cf:fb:9c:52:d1:37:f0: 52:df:a2:fa:0d:ba:cc:ff:23:0d:9d:9a:28:8b:7c:2c: fd:d5:27:05:8e:7f:b3:db:ff:93:60:05:9e:2a:b9:fd: 7f:76:03:9b:f4:14:b3:6d:12:9a:d8:7d:45:ab:70:2d: 2b:79:14:90:e9:d8:ac:cc:38:a0:a9:c2:0e:19:46:27: 8e:d2:c4:2a:b1:92:35:9c:20:ce:e6:d0:ed:e4:5d:37: 61:71:0b:ff:67:54:00:9a:11:8c:b3:df:cb:d3:10:c2: 6c:34:3e:f3:f4:c4:de:a4:b2:4a:9e:bb:7b:38:cb:61: 2b:cf:7d:8d:02:bc:a8:12:77:1f:3d:13:10:c1:b9:73: 6e:f4:40:76:e0:3e:fb:e0:2b:e0:2f:d8:ad:f1:b7:64: 82:c7:8f:59:44:34:26:e9:b4:b3:74:bb:4a:1e:b3:12: b4:30:6d:ff:ba:00:37:40:7a:62:c5:c5:e6:5d:7d:8d: 49:87:52:24:57:21:17:f3:fd:5f:2f:5f:8e:0c:da:00: e0:a5:44:81:1a:81:d2:63:a2:68:6d:bb:26:14:b3:5a: 65:63:9f:92:b8:fa:ad:4a:fd:5b:63:90:94:ac:a5:06: a0:e6:4e:08:f9:bc:b8:01:f8:1c:e4:34:ea:93:bf:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:20:05:6a:6c:91:54:42:c8:d9:9f:48:27:c4:30:d8: dd:8a:1b:73:2e:2d:8d:20:34:96:79:0e:32:0c:fc:3e: 5e:e3:40:b6:2e:2c:7a:d9:6a:75:7f:03:3b:ca:71:42: 1d:f9:f6:a5:09:d0:aa:f1:1a:93:c3:d0:e8:c7:74:4a: 08:6f:93:20:b7:f9:9a:fc:d6:4c:c4:f1:36:c1:76:72: c5:7b:f8:6c:7d:07:7b:d4:c1:1f:1c:90:19:57:79:9c: 83:f8:ed:d7:31:18:b7:95:d2:a0:7a:83:2d:31:33:fe: 51:6a:d5:88:23:6c:88:72:bc:93:38:39:28:5e:e5:5e: 1a:68:a8:bb:d0:0b:fb:a6:2f:e5:38:57:b3:01:55:d9: f1:a3:8b:99:7a:8f:c8:cc:9d:28:2d:da:37:de:f1:75: 27:af:0e:71:0f:1b:94:01:93:a6:7c:80:48:f8:79:f6: ae:9b:68:89:6d:49:d0:a2:39:9b:2f:b8:ec:aa:26:c6: 7a:d7:c4:59:d3:62:90:2d:21:39:92:8f:24:39:d6:a2: 14:bc:1c:28:99:53:11:9e:7d:5d:5a:81:46:d9:45:a4: 25:2b:0b:14:6b:82:2e:97:cd:f2:9d:e7:b6:5d:a8:42: df:9b:15:6f:51:71:2c:fb:36:e1:20:ab:70:da:56:3e Fingerprint (SHA-256): 42:D9:18:F5:38:0C:9B:08:79:2D:05:81:A1:1C:54:F8:C0:79:41:F6:68:1A:7C:E9:7A:4A:1B:89:C1:E3:AE:1D Fingerprint (SHA1): AB:6C:B4:F0:A8:96:9F:53:62:96:C4:9D:C0:E6:89:73:01:CB:F5:5A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #576: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #577: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #578: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #579: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034171 (0x3750ad7b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 03:50:05 2022 Not After : Wed Sep 28 03:50:05 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:86:3c:bd:31:0a:a8:3e:4b:cf:fb:9c:52:d1:37:f0: 52:df:a2:fa:0d:ba:cc:ff:23:0d:9d:9a:28:8b:7c:2c: fd:d5:27:05:8e:7f:b3:db:ff:93:60:05:9e:2a:b9:fd: 7f:76:03:9b:f4:14:b3:6d:12:9a:d8:7d:45:ab:70:2d: 2b:79:14:90:e9:d8:ac:cc:38:a0:a9:c2:0e:19:46:27: 8e:d2:c4:2a:b1:92:35:9c:20:ce:e6:d0:ed:e4:5d:37: 61:71:0b:ff:67:54:00:9a:11:8c:b3:df:cb:d3:10:c2: 6c:34:3e:f3:f4:c4:de:a4:b2:4a:9e:bb:7b:38:cb:61: 2b:cf:7d:8d:02:bc:a8:12:77:1f:3d:13:10:c1:b9:73: 6e:f4:40:76:e0:3e:fb:e0:2b:e0:2f:d8:ad:f1:b7:64: 82:c7:8f:59:44:34:26:e9:b4:b3:74:bb:4a:1e:b3:12: b4:30:6d:ff:ba:00:37:40:7a:62:c5:c5:e6:5d:7d:8d: 49:87:52:24:57:21:17:f3:fd:5f:2f:5f:8e:0c:da:00: e0:a5:44:81:1a:81:d2:63:a2:68:6d:bb:26:14:b3:5a: 65:63:9f:92:b8:fa:ad:4a:fd:5b:63:90:94:ac:a5:06: a0:e6:4e:08:f9:bc:b8:01:f8:1c:e4:34:ea:93:bf:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:20:05:6a:6c:91:54:42:c8:d9:9f:48:27:c4:30:d8: dd:8a:1b:73:2e:2d:8d:20:34:96:79:0e:32:0c:fc:3e: 5e:e3:40:b6:2e:2c:7a:d9:6a:75:7f:03:3b:ca:71:42: 1d:f9:f6:a5:09:d0:aa:f1:1a:93:c3:d0:e8:c7:74:4a: 08:6f:93:20:b7:f9:9a:fc:d6:4c:c4:f1:36:c1:76:72: c5:7b:f8:6c:7d:07:7b:d4:c1:1f:1c:90:19:57:79:9c: 83:f8:ed:d7:31:18:b7:95:d2:a0:7a:83:2d:31:33:fe: 51:6a:d5:88:23:6c:88:72:bc:93:38:39:28:5e:e5:5e: 1a:68:a8:bb:d0:0b:fb:a6:2f:e5:38:57:b3:01:55:d9: f1:a3:8b:99:7a:8f:c8:cc:9d:28:2d:da:37:de:f1:75: 27:af:0e:71:0f:1b:94:01:93:a6:7c:80:48:f8:79:f6: ae:9b:68:89:6d:49:d0:a2:39:9b:2f:b8:ec:aa:26:c6: 7a:d7:c4:59:d3:62:90:2d:21:39:92:8f:24:39:d6:a2: 14:bc:1c:28:99:53:11:9e:7d:5d:5a:81:46:d9:45:a4: 25:2b:0b:14:6b:82:2e:97:cd:f2:9d:e7:b6:5d:a8:42: df:9b:15:6f:51:71:2c:fb:36:e1:20:ab:70:da:56:3e Fingerprint (SHA-256): 42:D9:18:F5:38:0C:9B:08:79:2D:05:81:A1:1C:54:F8:C0:79:41:F6:68:1A:7C:E9:7A:4A:1B:89:C1:E3:AE:1D Fingerprint (SHA1): AB:6C:B4:F0:A8:96:9F:53:62:96:C4:9D:C0:E6:89:73:01:CB:F5:5A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #580: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034171 (0x3750ad7b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 03:50:05 2022 Not After : Wed Sep 28 03:50:05 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:86:3c:bd:31:0a:a8:3e:4b:cf:fb:9c:52:d1:37:f0: 52:df:a2:fa:0d:ba:cc:ff:23:0d:9d:9a:28:8b:7c:2c: fd:d5:27:05:8e:7f:b3:db:ff:93:60:05:9e:2a:b9:fd: 7f:76:03:9b:f4:14:b3:6d:12:9a:d8:7d:45:ab:70:2d: 2b:79:14:90:e9:d8:ac:cc:38:a0:a9:c2:0e:19:46:27: 8e:d2:c4:2a:b1:92:35:9c:20:ce:e6:d0:ed:e4:5d:37: 61:71:0b:ff:67:54:00:9a:11:8c:b3:df:cb:d3:10:c2: 6c:34:3e:f3:f4:c4:de:a4:b2:4a:9e:bb:7b:38:cb:61: 2b:cf:7d:8d:02:bc:a8:12:77:1f:3d:13:10:c1:b9:73: 6e:f4:40:76:e0:3e:fb:e0:2b:e0:2f:d8:ad:f1:b7:64: 82:c7:8f:59:44:34:26:e9:b4:b3:74:bb:4a:1e:b3:12: b4:30:6d:ff:ba:00:37:40:7a:62:c5:c5:e6:5d:7d:8d: 49:87:52:24:57:21:17:f3:fd:5f:2f:5f:8e:0c:da:00: e0:a5:44:81:1a:81:d2:63:a2:68:6d:bb:26:14:b3:5a: 65:63:9f:92:b8:fa:ad:4a:fd:5b:63:90:94:ac:a5:06: a0:e6:4e:08:f9:bc:b8:01:f8:1c:e4:34:ea:93:bf:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:20:05:6a:6c:91:54:42:c8:d9:9f:48:27:c4:30:d8: dd:8a:1b:73:2e:2d:8d:20:34:96:79:0e:32:0c:fc:3e: 5e:e3:40:b6:2e:2c:7a:d9:6a:75:7f:03:3b:ca:71:42: 1d:f9:f6:a5:09:d0:aa:f1:1a:93:c3:d0:e8:c7:74:4a: 08:6f:93:20:b7:f9:9a:fc:d6:4c:c4:f1:36:c1:76:72: c5:7b:f8:6c:7d:07:7b:d4:c1:1f:1c:90:19:57:79:9c: 83:f8:ed:d7:31:18:b7:95:d2:a0:7a:83:2d:31:33:fe: 51:6a:d5:88:23:6c:88:72:bc:93:38:39:28:5e:e5:5e: 1a:68:a8:bb:d0:0b:fb:a6:2f:e5:38:57:b3:01:55:d9: f1:a3:8b:99:7a:8f:c8:cc:9d:28:2d:da:37:de:f1:75: 27:af:0e:71:0f:1b:94:01:93:a6:7c:80:48:f8:79:f6: ae:9b:68:89:6d:49:d0:a2:39:9b:2f:b8:ec:aa:26:c6: 7a:d7:c4:59:d3:62:90:2d:21:39:92:8f:24:39:d6:a2: 14:bc:1c:28:99:53:11:9e:7d:5d:5a:81:46:d9:45:a4: 25:2b:0b:14:6b:82:2e:97:cd:f2:9d:e7:b6:5d:a8:42: df:9b:15:6f:51:71:2c:fb:36:e1:20:ab:70:da:56:3e Fingerprint (SHA-256): 42:D9:18:F5:38:0C:9B:08:79:2D:05:81:A1:1C:54:F8:C0:79:41:F6:68:1A:7C:E9:7A:4A:1B:89:C1:E3:AE:1D Fingerprint (SHA1): AB:6C:B4:F0:A8:96:9F:53:62:96:C4:9D:C0:E6:89:73:01:CB:F5:5A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #581: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #582: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034171 (0x3750ad7b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 03:50:05 2022 Not After : Wed Sep 28 03:50:05 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:86:3c:bd:31:0a:a8:3e:4b:cf:fb:9c:52:d1:37:f0: 52:df:a2:fa:0d:ba:cc:ff:23:0d:9d:9a:28:8b:7c:2c: fd:d5:27:05:8e:7f:b3:db:ff:93:60:05:9e:2a:b9:fd: 7f:76:03:9b:f4:14:b3:6d:12:9a:d8:7d:45:ab:70:2d: 2b:79:14:90:e9:d8:ac:cc:38:a0:a9:c2:0e:19:46:27: 8e:d2:c4:2a:b1:92:35:9c:20:ce:e6:d0:ed:e4:5d:37: 61:71:0b:ff:67:54:00:9a:11:8c:b3:df:cb:d3:10:c2: 6c:34:3e:f3:f4:c4:de:a4:b2:4a:9e:bb:7b:38:cb:61: 2b:cf:7d:8d:02:bc:a8:12:77:1f:3d:13:10:c1:b9:73: 6e:f4:40:76:e0:3e:fb:e0:2b:e0:2f:d8:ad:f1:b7:64: 82:c7:8f:59:44:34:26:e9:b4:b3:74:bb:4a:1e:b3:12: b4:30:6d:ff:ba:00:37:40:7a:62:c5:c5:e6:5d:7d:8d: 49:87:52:24:57:21:17:f3:fd:5f:2f:5f:8e:0c:da:00: e0:a5:44:81:1a:81:d2:63:a2:68:6d:bb:26:14:b3:5a: 65:63:9f:92:b8:fa:ad:4a:fd:5b:63:90:94:ac:a5:06: a0:e6:4e:08:f9:bc:b8:01:f8:1c:e4:34:ea:93:bf:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:20:05:6a:6c:91:54:42:c8:d9:9f:48:27:c4:30:d8: dd:8a:1b:73:2e:2d:8d:20:34:96:79:0e:32:0c:fc:3e: 5e:e3:40:b6:2e:2c:7a:d9:6a:75:7f:03:3b:ca:71:42: 1d:f9:f6:a5:09:d0:aa:f1:1a:93:c3:d0:e8:c7:74:4a: 08:6f:93:20:b7:f9:9a:fc:d6:4c:c4:f1:36:c1:76:72: c5:7b:f8:6c:7d:07:7b:d4:c1:1f:1c:90:19:57:79:9c: 83:f8:ed:d7:31:18:b7:95:d2:a0:7a:83:2d:31:33:fe: 51:6a:d5:88:23:6c:88:72:bc:93:38:39:28:5e:e5:5e: 1a:68:a8:bb:d0:0b:fb:a6:2f:e5:38:57:b3:01:55:d9: f1:a3:8b:99:7a:8f:c8:cc:9d:28:2d:da:37:de:f1:75: 27:af:0e:71:0f:1b:94:01:93:a6:7c:80:48:f8:79:f6: ae:9b:68:89:6d:49:d0:a2:39:9b:2f:b8:ec:aa:26:c6: 7a:d7:c4:59:d3:62:90:2d:21:39:92:8f:24:39:d6:a2: 14:bc:1c:28:99:53:11:9e:7d:5d:5a:81:46:d9:45:a4: 25:2b:0b:14:6b:82:2e:97:cd:f2:9d:e7:b6:5d:a8:42: df:9b:15:6f:51:71:2c:fb:36:e1:20:ab:70:da:56:3e Fingerprint (SHA-256): 42:D9:18:F5:38:0C:9B:08:79:2D:05:81:A1:1C:54:F8:C0:79:41:F6:68:1A:7C:E9:7A:4A:1B:89:C1:E3:AE:1D Fingerprint (SHA1): AB:6C:B4:F0:A8:96:9F:53:62:96:C4:9D:C0:E6:89:73:01:CB:F5:5A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #583: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #584: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #585: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #586: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034171 (0x3750ad7b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 03:50:05 2022 Not After : Wed Sep 28 03:50:05 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:86:3c:bd:31:0a:a8:3e:4b:cf:fb:9c:52:d1:37:f0: 52:df:a2:fa:0d:ba:cc:ff:23:0d:9d:9a:28:8b:7c:2c: fd:d5:27:05:8e:7f:b3:db:ff:93:60:05:9e:2a:b9:fd: 7f:76:03:9b:f4:14:b3:6d:12:9a:d8:7d:45:ab:70:2d: 2b:79:14:90:e9:d8:ac:cc:38:a0:a9:c2:0e:19:46:27: 8e:d2:c4:2a:b1:92:35:9c:20:ce:e6:d0:ed:e4:5d:37: 61:71:0b:ff:67:54:00:9a:11:8c:b3:df:cb:d3:10:c2: 6c:34:3e:f3:f4:c4:de:a4:b2:4a:9e:bb:7b:38:cb:61: 2b:cf:7d:8d:02:bc:a8:12:77:1f:3d:13:10:c1:b9:73: 6e:f4:40:76:e0:3e:fb:e0:2b:e0:2f:d8:ad:f1:b7:64: 82:c7:8f:59:44:34:26:e9:b4:b3:74:bb:4a:1e:b3:12: b4:30:6d:ff:ba:00:37:40:7a:62:c5:c5:e6:5d:7d:8d: 49:87:52:24:57:21:17:f3:fd:5f:2f:5f:8e:0c:da:00: e0:a5:44:81:1a:81:d2:63:a2:68:6d:bb:26:14:b3:5a: 65:63:9f:92:b8:fa:ad:4a:fd:5b:63:90:94:ac:a5:06: a0:e6:4e:08:f9:bc:b8:01:f8:1c:e4:34:ea:93:bf:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:20:05:6a:6c:91:54:42:c8:d9:9f:48:27:c4:30:d8: dd:8a:1b:73:2e:2d:8d:20:34:96:79:0e:32:0c:fc:3e: 5e:e3:40:b6:2e:2c:7a:d9:6a:75:7f:03:3b:ca:71:42: 1d:f9:f6:a5:09:d0:aa:f1:1a:93:c3:d0:e8:c7:74:4a: 08:6f:93:20:b7:f9:9a:fc:d6:4c:c4:f1:36:c1:76:72: c5:7b:f8:6c:7d:07:7b:d4:c1:1f:1c:90:19:57:79:9c: 83:f8:ed:d7:31:18:b7:95:d2:a0:7a:83:2d:31:33:fe: 51:6a:d5:88:23:6c:88:72:bc:93:38:39:28:5e:e5:5e: 1a:68:a8:bb:d0:0b:fb:a6:2f:e5:38:57:b3:01:55:d9: f1:a3:8b:99:7a:8f:c8:cc:9d:28:2d:da:37:de:f1:75: 27:af:0e:71:0f:1b:94:01:93:a6:7c:80:48:f8:79:f6: ae:9b:68:89:6d:49:d0:a2:39:9b:2f:b8:ec:aa:26:c6: 7a:d7:c4:59:d3:62:90:2d:21:39:92:8f:24:39:d6:a2: 14:bc:1c:28:99:53:11:9e:7d:5d:5a:81:46:d9:45:a4: 25:2b:0b:14:6b:82:2e:97:cd:f2:9d:e7:b6:5d:a8:42: df:9b:15:6f:51:71:2c:fb:36:e1:20:ab:70:da:56:3e Fingerprint (SHA-256): 42:D9:18:F5:38:0C:9B:08:79:2D:05:81:A1:1C:54:F8:C0:79:41:F6:68:1A:7C:E9:7A:4A:1B:89:C1:E3:AE:1D Fingerprint (SHA1): AB:6C:B4:F0:A8:96:9F:53:62:96:C4:9D:C0:E6:89:73:01:CB:F5:5A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #587: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034171 (0x3750ad7b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 03:50:05 2022 Not After : Wed Sep 28 03:50:05 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:86:3c:bd:31:0a:a8:3e:4b:cf:fb:9c:52:d1:37:f0: 52:df:a2:fa:0d:ba:cc:ff:23:0d:9d:9a:28:8b:7c:2c: fd:d5:27:05:8e:7f:b3:db:ff:93:60:05:9e:2a:b9:fd: 7f:76:03:9b:f4:14:b3:6d:12:9a:d8:7d:45:ab:70:2d: 2b:79:14:90:e9:d8:ac:cc:38:a0:a9:c2:0e:19:46:27: 8e:d2:c4:2a:b1:92:35:9c:20:ce:e6:d0:ed:e4:5d:37: 61:71:0b:ff:67:54:00:9a:11:8c:b3:df:cb:d3:10:c2: 6c:34:3e:f3:f4:c4:de:a4:b2:4a:9e:bb:7b:38:cb:61: 2b:cf:7d:8d:02:bc:a8:12:77:1f:3d:13:10:c1:b9:73: 6e:f4:40:76:e0:3e:fb:e0:2b:e0:2f:d8:ad:f1:b7:64: 82:c7:8f:59:44:34:26:e9:b4:b3:74:bb:4a:1e:b3:12: b4:30:6d:ff:ba:00:37:40:7a:62:c5:c5:e6:5d:7d:8d: 49:87:52:24:57:21:17:f3:fd:5f:2f:5f:8e:0c:da:00: e0:a5:44:81:1a:81:d2:63:a2:68:6d:bb:26:14:b3:5a: 65:63:9f:92:b8:fa:ad:4a:fd:5b:63:90:94:ac:a5:06: a0:e6:4e:08:f9:bc:b8:01:f8:1c:e4:34:ea:93:bf:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:20:05:6a:6c:91:54:42:c8:d9:9f:48:27:c4:30:d8: dd:8a:1b:73:2e:2d:8d:20:34:96:79:0e:32:0c:fc:3e: 5e:e3:40:b6:2e:2c:7a:d9:6a:75:7f:03:3b:ca:71:42: 1d:f9:f6:a5:09:d0:aa:f1:1a:93:c3:d0:e8:c7:74:4a: 08:6f:93:20:b7:f9:9a:fc:d6:4c:c4:f1:36:c1:76:72: c5:7b:f8:6c:7d:07:7b:d4:c1:1f:1c:90:19:57:79:9c: 83:f8:ed:d7:31:18:b7:95:d2:a0:7a:83:2d:31:33:fe: 51:6a:d5:88:23:6c:88:72:bc:93:38:39:28:5e:e5:5e: 1a:68:a8:bb:d0:0b:fb:a6:2f:e5:38:57:b3:01:55:d9: f1:a3:8b:99:7a:8f:c8:cc:9d:28:2d:da:37:de:f1:75: 27:af:0e:71:0f:1b:94:01:93:a6:7c:80:48:f8:79:f6: ae:9b:68:89:6d:49:d0:a2:39:9b:2f:b8:ec:aa:26:c6: 7a:d7:c4:59:d3:62:90:2d:21:39:92:8f:24:39:d6:a2: 14:bc:1c:28:99:53:11:9e:7d:5d:5a:81:46:d9:45:a4: 25:2b:0b:14:6b:82:2e:97:cd:f2:9d:e7:b6:5d:a8:42: df:9b:15:6f:51:71:2c:fb:36:e1:20:ab:70:da:56:3e Fingerprint (SHA-256): 42:D9:18:F5:38:0C:9B:08:79:2D:05:81:A1:1C:54:F8:C0:79:41:F6:68:1A:7C:E9:7A:4A:1B:89:C1:E3:AE:1D Fingerprint (SHA1): AB:6C:B4:F0:A8:96:9F:53:62:96:C4:9D:C0:E6:89:73:01:CB:F5:5A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #588: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034171 (0x3750ad7b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 03:50:05 2022 Not After : Wed Sep 28 03:50:05 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:86:3c:bd:31:0a:a8:3e:4b:cf:fb:9c:52:d1:37:f0: 52:df:a2:fa:0d:ba:cc:ff:23:0d:9d:9a:28:8b:7c:2c: fd:d5:27:05:8e:7f:b3:db:ff:93:60:05:9e:2a:b9:fd: 7f:76:03:9b:f4:14:b3:6d:12:9a:d8:7d:45:ab:70:2d: 2b:79:14:90:e9:d8:ac:cc:38:a0:a9:c2:0e:19:46:27: 8e:d2:c4:2a:b1:92:35:9c:20:ce:e6:d0:ed:e4:5d:37: 61:71:0b:ff:67:54:00:9a:11:8c:b3:df:cb:d3:10:c2: 6c:34:3e:f3:f4:c4:de:a4:b2:4a:9e:bb:7b:38:cb:61: 2b:cf:7d:8d:02:bc:a8:12:77:1f:3d:13:10:c1:b9:73: 6e:f4:40:76:e0:3e:fb:e0:2b:e0:2f:d8:ad:f1:b7:64: 82:c7:8f:59:44:34:26:e9:b4:b3:74:bb:4a:1e:b3:12: b4:30:6d:ff:ba:00:37:40:7a:62:c5:c5:e6:5d:7d:8d: 49:87:52:24:57:21:17:f3:fd:5f:2f:5f:8e:0c:da:00: e0:a5:44:81:1a:81:d2:63:a2:68:6d:bb:26:14:b3:5a: 65:63:9f:92:b8:fa:ad:4a:fd:5b:63:90:94:ac:a5:06: a0:e6:4e:08:f9:bc:b8:01:f8:1c:e4:34:ea:93:bf:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:20:05:6a:6c:91:54:42:c8:d9:9f:48:27:c4:30:d8: dd:8a:1b:73:2e:2d:8d:20:34:96:79:0e:32:0c:fc:3e: 5e:e3:40:b6:2e:2c:7a:d9:6a:75:7f:03:3b:ca:71:42: 1d:f9:f6:a5:09:d0:aa:f1:1a:93:c3:d0:e8:c7:74:4a: 08:6f:93:20:b7:f9:9a:fc:d6:4c:c4:f1:36:c1:76:72: c5:7b:f8:6c:7d:07:7b:d4:c1:1f:1c:90:19:57:79:9c: 83:f8:ed:d7:31:18:b7:95:d2:a0:7a:83:2d:31:33:fe: 51:6a:d5:88:23:6c:88:72:bc:93:38:39:28:5e:e5:5e: 1a:68:a8:bb:d0:0b:fb:a6:2f:e5:38:57:b3:01:55:d9: f1:a3:8b:99:7a:8f:c8:cc:9d:28:2d:da:37:de:f1:75: 27:af:0e:71:0f:1b:94:01:93:a6:7c:80:48:f8:79:f6: ae:9b:68:89:6d:49:d0:a2:39:9b:2f:b8:ec:aa:26:c6: 7a:d7:c4:59:d3:62:90:2d:21:39:92:8f:24:39:d6:a2: 14:bc:1c:28:99:53:11:9e:7d:5d:5a:81:46:d9:45:a4: 25:2b:0b:14:6b:82:2e:97:cd:f2:9d:e7:b6:5d:a8:42: df:9b:15:6f:51:71:2c:fb:36:e1:20:ab:70:da:56:3e Fingerprint (SHA-256): 42:D9:18:F5:38:0C:9B:08:79:2D:05:81:A1:1C:54:F8:C0:79:41:F6:68:1A:7C:E9:7A:4A:1B:89:C1:E3:AE:1D Fingerprint (SHA1): AB:6C:B4:F0:A8:96:9F:53:62:96:C4:9D:C0:E6:89:73:01:CB:F5:5A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #589: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034171 (0x3750ad7b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 03:50:05 2022 Not After : Wed Sep 28 03:50:05 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:86:3c:bd:31:0a:a8:3e:4b:cf:fb:9c:52:d1:37:f0: 52:df:a2:fa:0d:ba:cc:ff:23:0d:9d:9a:28:8b:7c:2c: fd:d5:27:05:8e:7f:b3:db:ff:93:60:05:9e:2a:b9:fd: 7f:76:03:9b:f4:14:b3:6d:12:9a:d8:7d:45:ab:70:2d: 2b:79:14:90:e9:d8:ac:cc:38:a0:a9:c2:0e:19:46:27: 8e:d2:c4:2a:b1:92:35:9c:20:ce:e6:d0:ed:e4:5d:37: 61:71:0b:ff:67:54:00:9a:11:8c:b3:df:cb:d3:10:c2: 6c:34:3e:f3:f4:c4:de:a4:b2:4a:9e:bb:7b:38:cb:61: 2b:cf:7d:8d:02:bc:a8:12:77:1f:3d:13:10:c1:b9:73: 6e:f4:40:76:e0:3e:fb:e0:2b:e0:2f:d8:ad:f1:b7:64: 82:c7:8f:59:44:34:26:e9:b4:b3:74:bb:4a:1e:b3:12: b4:30:6d:ff:ba:00:37:40:7a:62:c5:c5:e6:5d:7d:8d: 49:87:52:24:57:21:17:f3:fd:5f:2f:5f:8e:0c:da:00: e0:a5:44:81:1a:81:d2:63:a2:68:6d:bb:26:14:b3:5a: 65:63:9f:92:b8:fa:ad:4a:fd:5b:63:90:94:ac:a5:06: a0:e6:4e:08:f9:bc:b8:01:f8:1c:e4:34:ea:93:bf:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:20:05:6a:6c:91:54:42:c8:d9:9f:48:27:c4:30:d8: dd:8a:1b:73:2e:2d:8d:20:34:96:79:0e:32:0c:fc:3e: 5e:e3:40:b6:2e:2c:7a:d9:6a:75:7f:03:3b:ca:71:42: 1d:f9:f6:a5:09:d0:aa:f1:1a:93:c3:d0:e8:c7:74:4a: 08:6f:93:20:b7:f9:9a:fc:d6:4c:c4:f1:36:c1:76:72: c5:7b:f8:6c:7d:07:7b:d4:c1:1f:1c:90:19:57:79:9c: 83:f8:ed:d7:31:18:b7:95:d2:a0:7a:83:2d:31:33:fe: 51:6a:d5:88:23:6c:88:72:bc:93:38:39:28:5e:e5:5e: 1a:68:a8:bb:d0:0b:fb:a6:2f:e5:38:57:b3:01:55:d9: f1:a3:8b:99:7a:8f:c8:cc:9d:28:2d:da:37:de:f1:75: 27:af:0e:71:0f:1b:94:01:93:a6:7c:80:48:f8:79:f6: ae:9b:68:89:6d:49:d0:a2:39:9b:2f:b8:ec:aa:26:c6: 7a:d7:c4:59:d3:62:90:2d:21:39:92:8f:24:39:d6:a2: 14:bc:1c:28:99:53:11:9e:7d:5d:5a:81:46:d9:45:a4: 25:2b:0b:14:6b:82:2e:97:cd:f2:9d:e7:b6:5d:a8:42: df:9b:15:6f:51:71:2c:fb:36:e1:20:ab:70:da:56:3e Fingerprint (SHA-256): 42:D9:18:F5:38:0C:9B:08:79:2D:05:81:A1:1C:54:F8:C0:79:41:F6:68:1A:7C:E9:7A:4A:1B:89:C1:E3:AE:1D Fingerprint (SHA1): AB:6C:B4:F0:A8:96:9F:53:62:96:C4:9D:C0:E6:89:73:01:CB:F5:5A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #590: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034171 (0x3750ad7b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 03:50:05 2022 Not After : Wed Sep 28 03:50:05 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:86:3c:bd:31:0a:a8:3e:4b:cf:fb:9c:52:d1:37:f0: 52:df:a2:fa:0d:ba:cc:ff:23:0d:9d:9a:28:8b:7c:2c: fd:d5:27:05:8e:7f:b3:db:ff:93:60:05:9e:2a:b9:fd: 7f:76:03:9b:f4:14:b3:6d:12:9a:d8:7d:45:ab:70:2d: 2b:79:14:90:e9:d8:ac:cc:38:a0:a9:c2:0e:19:46:27: 8e:d2:c4:2a:b1:92:35:9c:20:ce:e6:d0:ed:e4:5d:37: 61:71:0b:ff:67:54:00:9a:11:8c:b3:df:cb:d3:10:c2: 6c:34:3e:f3:f4:c4:de:a4:b2:4a:9e:bb:7b:38:cb:61: 2b:cf:7d:8d:02:bc:a8:12:77:1f:3d:13:10:c1:b9:73: 6e:f4:40:76:e0:3e:fb:e0:2b:e0:2f:d8:ad:f1:b7:64: 82:c7:8f:59:44:34:26:e9:b4:b3:74:bb:4a:1e:b3:12: b4:30:6d:ff:ba:00:37:40:7a:62:c5:c5:e6:5d:7d:8d: 49:87:52:24:57:21:17:f3:fd:5f:2f:5f:8e:0c:da:00: e0:a5:44:81:1a:81:d2:63:a2:68:6d:bb:26:14:b3:5a: 65:63:9f:92:b8:fa:ad:4a:fd:5b:63:90:94:ac:a5:06: a0:e6:4e:08:f9:bc:b8:01:f8:1c:e4:34:ea:93:bf:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:20:05:6a:6c:91:54:42:c8:d9:9f:48:27:c4:30:d8: dd:8a:1b:73:2e:2d:8d:20:34:96:79:0e:32:0c:fc:3e: 5e:e3:40:b6:2e:2c:7a:d9:6a:75:7f:03:3b:ca:71:42: 1d:f9:f6:a5:09:d0:aa:f1:1a:93:c3:d0:e8:c7:74:4a: 08:6f:93:20:b7:f9:9a:fc:d6:4c:c4:f1:36:c1:76:72: c5:7b:f8:6c:7d:07:7b:d4:c1:1f:1c:90:19:57:79:9c: 83:f8:ed:d7:31:18:b7:95:d2:a0:7a:83:2d:31:33:fe: 51:6a:d5:88:23:6c:88:72:bc:93:38:39:28:5e:e5:5e: 1a:68:a8:bb:d0:0b:fb:a6:2f:e5:38:57:b3:01:55:d9: f1:a3:8b:99:7a:8f:c8:cc:9d:28:2d:da:37:de:f1:75: 27:af:0e:71:0f:1b:94:01:93:a6:7c:80:48:f8:79:f6: ae:9b:68:89:6d:49:d0:a2:39:9b:2f:b8:ec:aa:26:c6: 7a:d7:c4:59:d3:62:90:2d:21:39:92:8f:24:39:d6:a2: 14:bc:1c:28:99:53:11:9e:7d:5d:5a:81:46:d9:45:a4: 25:2b:0b:14:6b:82:2e:97:cd:f2:9d:e7:b6:5d:a8:42: df:9b:15:6f:51:71:2c:fb:36:e1:20:ab:70:da:56:3e Fingerprint (SHA-256): 42:D9:18:F5:38:0C:9B:08:79:2D:05:81:A1:1C:54:F8:C0:79:41:F6:68:1A:7C:E9:7A:4A:1B:89:C1:E3:AE:1D Fingerprint (SHA1): AB:6C:B4:F0:A8:96:9F:53:62:96:C4:9D:C0:E6:89:73:01:CB:F5:5A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #591: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034171 (0x3750ad7b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 03:50:05 2022 Not After : Wed Sep 28 03:50:05 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:86:3c:bd:31:0a:a8:3e:4b:cf:fb:9c:52:d1:37:f0: 52:df:a2:fa:0d:ba:cc:ff:23:0d:9d:9a:28:8b:7c:2c: fd:d5:27:05:8e:7f:b3:db:ff:93:60:05:9e:2a:b9:fd: 7f:76:03:9b:f4:14:b3:6d:12:9a:d8:7d:45:ab:70:2d: 2b:79:14:90:e9:d8:ac:cc:38:a0:a9:c2:0e:19:46:27: 8e:d2:c4:2a:b1:92:35:9c:20:ce:e6:d0:ed:e4:5d:37: 61:71:0b:ff:67:54:00:9a:11:8c:b3:df:cb:d3:10:c2: 6c:34:3e:f3:f4:c4:de:a4:b2:4a:9e:bb:7b:38:cb:61: 2b:cf:7d:8d:02:bc:a8:12:77:1f:3d:13:10:c1:b9:73: 6e:f4:40:76:e0:3e:fb:e0:2b:e0:2f:d8:ad:f1:b7:64: 82:c7:8f:59:44:34:26:e9:b4:b3:74:bb:4a:1e:b3:12: b4:30:6d:ff:ba:00:37:40:7a:62:c5:c5:e6:5d:7d:8d: 49:87:52:24:57:21:17:f3:fd:5f:2f:5f:8e:0c:da:00: e0:a5:44:81:1a:81:d2:63:a2:68:6d:bb:26:14:b3:5a: 65:63:9f:92:b8:fa:ad:4a:fd:5b:63:90:94:ac:a5:06: a0:e6:4e:08:f9:bc:b8:01:f8:1c:e4:34:ea:93:bf:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:20:05:6a:6c:91:54:42:c8:d9:9f:48:27:c4:30:d8: dd:8a:1b:73:2e:2d:8d:20:34:96:79:0e:32:0c:fc:3e: 5e:e3:40:b6:2e:2c:7a:d9:6a:75:7f:03:3b:ca:71:42: 1d:f9:f6:a5:09:d0:aa:f1:1a:93:c3:d0:e8:c7:74:4a: 08:6f:93:20:b7:f9:9a:fc:d6:4c:c4:f1:36:c1:76:72: c5:7b:f8:6c:7d:07:7b:d4:c1:1f:1c:90:19:57:79:9c: 83:f8:ed:d7:31:18:b7:95:d2:a0:7a:83:2d:31:33:fe: 51:6a:d5:88:23:6c:88:72:bc:93:38:39:28:5e:e5:5e: 1a:68:a8:bb:d0:0b:fb:a6:2f:e5:38:57:b3:01:55:d9: f1:a3:8b:99:7a:8f:c8:cc:9d:28:2d:da:37:de:f1:75: 27:af:0e:71:0f:1b:94:01:93:a6:7c:80:48:f8:79:f6: ae:9b:68:89:6d:49:d0:a2:39:9b:2f:b8:ec:aa:26:c6: 7a:d7:c4:59:d3:62:90:2d:21:39:92:8f:24:39:d6:a2: 14:bc:1c:28:99:53:11:9e:7d:5d:5a:81:46:d9:45:a4: 25:2b:0b:14:6b:82:2e:97:cd:f2:9d:e7:b6:5d:a8:42: df:9b:15:6f:51:71:2c:fb:36:e1:20:ab:70:da:56:3e Fingerprint (SHA-256): 42:D9:18:F5:38:0C:9B:08:79:2D:05:81:A1:1C:54:F8:C0:79:41:F6:68:1A:7C:E9:7A:4A:1B:89:C1:E3:AE:1D Fingerprint (SHA1): AB:6C:B4:F0:A8:96:9F:53:62:96:C4:9D:C0:E6:89:73:01:CB:F5:5A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #592: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #593: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #594: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034201 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #595: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #596: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #597: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #598: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 928034202 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #599: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #600: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #601: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #602: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 928034203 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #603: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #604: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #605: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #606: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 928034204 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #607: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #608: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #609: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #610: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 928034205 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #611: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #612: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #613: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #614: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 928034206 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #615: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #616: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #617: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #618: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 928034207 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #619: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #620: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #621: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034201 (0x3750ad99) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:53:01 2022 Not After : Wed Sep 28 03:53:01 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:67:2c:62:6a:b5:5b:27:22:29:f1:7c:e2:c9:11:34: 8c:92:09:57:0f:59:68:dc:50:02:01:7f:16:11:22:33: 37:55:c5:10:bf:0f:2e:db:ea:ff:5c:69:d7:0b:9d:2c: 32:19:22:0f:cb:fe:63:d5:61:c3:f8:1e:c5:4b:70:70: 2c:99:3b:66:19:33:75:7c:3b:ae:24:07:55:52:9f:c4: 5a:8d:7e:44:d9:70:e0:82:91:82:cc:fe:0c:23:a8:66: 4d:44:e5:51:6a:9e:f6:b5:8d:88:37:f1:2d:a1:87:58: 0e:5a:5e:81:2e:01:fe:7b:e7:a8:aa:1f:13:59:cf:0f: ca:45:4a:5b:4e:1f:60:21:b7:3b:86:bb:e4:b7:81:1a: 78:29:2b:25:93:23:09:d3:2f:c7:21:13:f4:32:82:44: 8f:c9:2d:c0:a9:67:30:36:01:10:cc:22:87:b5:e8:14: 8d:e7:7f:a8:62:8c:84:95:e3:fc:05:e8:c9:2c:64:e5: cf:05:4b:6c:7f:62:0f:ae:da:94:a1:cf:76:8f:d1:f9: 97:d3:cd:d5:64:20:11:1f:60:0d:03:77:d6:18:70:c3: 67:5d:5b:ec:1d:9c:a6:da:0b:8d:e3:65:07:f1:3f:e6: b9:c0:b0:85:bd:3c:93:ee:1a:3a:ca:2e:05:6d:e4:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:e6:00:3f:4a:97:d5:58:41:39:74:da:8e:0d:ae:23: 74:44:b3:53:21:e7:93:f4:49:e8:ed:4a:5c:3e:10:51: da:53:bf:d0:7b:5b:68:c7:b9:9a:74:bd:d9:2d:51:db: 5c:9c:ce:33:35:65:0e:59:65:cd:0d:1a:14:3d:ab:6a: ac:74:0a:21:6f:e4:48:16:2a:91:c2:30:0b:eb:76:70: 6c:3b:60:3c:09:e6:6e:b5:8a:ee:1f:f4:f1:bb:b1:78: a3:6c:3d:46:b3:bd:01:f0:09:04:b5:4b:7f:fd:fe:3a: 53:e4:44:13:1b:e1:82:a8:2e:56:f2:2b:5f:a4:69:fe: 12:d8:a0:ca:d8:fb:35:f1:b3:53:bf:25:b1:ed:3a:9e: cb:bc:96:15:0a:b1:24:2b:8a:f5:de:2d:94:35:9f:b6: 20:7b:a9:8f:04:20:77:a9:d9:2a:d5:dc:78:7c:ab:e7: 33:4e:f1:03:16:30:2d:15:f8:02:b5:b4:5b:f5:1e:29: 1a:d6:e0:51:82:f1:b8:ba:86:d8:ed:64:6e:46:7b:00: ed:a4:c4:c9:5d:9f:a2:49:67:62:fe:b6:4b:77:0e:86: 60:a8:53:7e:38:9c:c4:c9:46:91:12:6c:ab:34:e3:4f: ce:44:2a:b7:f3:8a:49:ef:ad:21:9f:eb:0d:ab:fd:25 Fingerprint (SHA-256): 34:3F:EE:22:C2:BC:DA:1C:3C:F5:E4:04:54:86:D8:09:20:23:79:E5:48:58:4F:57:E9:C6:AC:2D:60:E0:C0:7B Fingerprint (SHA1): EB:74:7E:DB:76:1F:32:13:01:4C:7B:CC:5C:D7:BB:EC:9D:CC:CB:9B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #622: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #623: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #624: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #625: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034201 (0x3750ad99) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:53:01 2022 Not After : Wed Sep 28 03:53:01 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:67:2c:62:6a:b5:5b:27:22:29:f1:7c:e2:c9:11:34: 8c:92:09:57:0f:59:68:dc:50:02:01:7f:16:11:22:33: 37:55:c5:10:bf:0f:2e:db:ea:ff:5c:69:d7:0b:9d:2c: 32:19:22:0f:cb:fe:63:d5:61:c3:f8:1e:c5:4b:70:70: 2c:99:3b:66:19:33:75:7c:3b:ae:24:07:55:52:9f:c4: 5a:8d:7e:44:d9:70:e0:82:91:82:cc:fe:0c:23:a8:66: 4d:44:e5:51:6a:9e:f6:b5:8d:88:37:f1:2d:a1:87:58: 0e:5a:5e:81:2e:01:fe:7b:e7:a8:aa:1f:13:59:cf:0f: ca:45:4a:5b:4e:1f:60:21:b7:3b:86:bb:e4:b7:81:1a: 78:29:2b:25:93:23:09:d3:2f:c7:21:13:f4:32:82:44: 8f:c9:2d:c0:a9:67:30:36:01:10:cc:22:87:b5:e8:14: 8d:e7:7f:a8:62:8c:84:95:e3:fc:05:e8:c9:2c:64:e5: cf:05:4b:6c:7f:62:0f:ae:da:94:a1:cf:76:8f:d1:f9: 97:d3:cd:d5:64:20:11:1f:60:0d:03:77:d6:18:70:c3: 67:5d:5b:ec:1d:9c:a6:da:0b:8d:e3:65:07:f1:3f:e6: b9:c0:b0:85:bd:3c:93:ee:1a:3a:ca:2e:05:6d:e4:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:e6:00:3f:4a:97:d5:58:41:39:74:da:8e:0d:ae:23: 74:44:b3:53:21:e7:93:f4:49:e8:ed:4a:5c:3e:10:51: da:53:bf:d0:7b:5b:68:c7:b9:9a:74:bd:d9:2d:51:db: 5c:9c:ce:33:35:65:0e:59:65:cd:0d:1a:14:3d:ab:6a: ac:74:0a:21:6f:e4:48:16:2a:91:c2:30:0b:eb:76:70: 6c:3b:60:3c:09:e6:6e:b5:8a:ee:1f:f4:f1:bb:b1:78: a3:6c:3d:46:b3:bd:01:f0:09:04:b5:4b:7f:fd:fe:3a: 53:e4:44:13:1b:e1:82:a8:2e:56:f2:2b:5f:a4:69:fe: 12:d8:a0:ca:d8:fb:35:f1:b3:53:bf:25:b1:ed:3a:9e: cb:bc:96:15:0a:b1:24:2b:8a:f5:de:2d:94:35:9f:b6: 20:7b:a9:8f:04:20:77:a9:d9:2a:d5:dc:78:7c:ab:e7: 33:4e:f1:03:16:30:2d:15:f8:02:b5:b4:5b:f5:1e:29: 1a:d6:e0:51:82:f1:b8:ba:86:d8:ed:64:6e:46:7b:00: ed:a4:c4:c9:5d:9f:a2:49:67:62:fe:b6:4b:77:0e:86: 60:a8:53:7e:38:9c:c4:c9:46:91:12:6c:ab:34:e3:4f: ce:44:2a:b7:f3:8a:49:ef:ad:21:9f:eb:0d:ab:fd:25 Fingerprint (SHA-256): 34:3F:EE:22:C2:BC:DA:1C:3C:F5:E4:04:54:86:D8:09:20:23:79:E5:48:58:4F:57:E9:C6:AC:2D:60:E0:C0:7B Fingerprint (SHA1): EB:74:7E:DB:76:1F:32:13:01:4C:7B:CC:5C:D7:BB:EC:9D:CC:CB:9B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #626: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #627: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #628: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #629: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034208 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #630: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #631: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #632: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #633: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 928034209 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #634: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #635: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #636: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #637: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 928034210 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #638: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #639: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #640: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #641: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 928034211 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #642: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #643: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #644: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #645: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #646: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #647: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034208 (0x3750ada0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:53:43 2022 Not After : Wed Sep 28 03:53:43 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:df:5b:21:7d:c7:3e:3a:9a:9f:97:ff:85:f7:37:e7: 47:59:e0:3c:e3:94:18:42:b7:96:da:b5:a4:7f:48:8f: bb:09:c2:96:50:e7:d7:42:a1:0a:85:e7:8b:82:d5:99: c9:f8:29:c9:73:e3:14:1f:35:82:1e:ff:86:dc:d0:f0: 2b:15:f1:ba:7e:b2:cf:67:64:8d:00:5c:fd:09:64:ea: 93:ab:2e:21:40:07:4c:82:ef:5c:8a:e2:bc:44:97:9b: e0:cc:de:6e:67:3d:ab:52:ae:8c:0d:9a:69:18:f3:ec: 31:5b:87:81:aa:d1:b9:e8:26:bf:7b:fa:8e:1f:d1:b8: ec:44:75:aa:7b:ad:d3:86:bf:c2:29:ab:6a:85:c1:b6: 3f:ed:ce:cf:e0:52:be:3e:b9:b5:52:f5:8d:f3:b6:04: 6d:7e:90:ef:76:cf:a9:75:c0:ef:fd:3c:7c:5f:57:46: 09:61:28:66:91:25:90:ac:e0:67:56:18:c6:be:b9:fa: 45:75:2f:a2:a4:d3:7f:15:55:3e:55:c7:84:d2:cd:3f: e9:25:2b:58:e9:94:03:be:18:8d:68:b4:7e:77:da:4a: 0c:0f:c9:a3:79:f0:fe:d6:f0:c4:9e:dd:42:54:83:7e: 76:79:1c:44:4f:df:ac:a5:e8:fd:50:40:73:24:da:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:68:e9:fc:54:1b:f2:1d:ac:c6:7a:ba:1e:22:ba:3c: 25:20:af:80:6c:5f:f4:ca:e0:00:75:f2:7a:f7:ef:02: 51:ec:77:e8:cd:2d:32:9f:d8:3b:3f:67:8e:9f:fa:57: 73:3e:f7:53:7d:16:ab:2f:d7:49:45:f1:de:5d:a9:64: d4:e3:2e:50:74:16:d5:64:6b:a5:65:a0:8a:48:4e:43: 68:1a:1c:57:f3:aa:08:1c:ab:4b:e8:e4:11:e0:eb:4b: 92:9c:a8:1c:83:51:26:82:c4:23:fc:8a:6f:ae:b8:d0: 24:60:ef:0d:5c:2a:09:d2:12:a8:9f:d9:26:6a:10:7f: 3e:c7:dd:a3:d4:8e:5c:73:bc:06:c6:29:8f:18:35:3e: 52:d1:f4:d8:65:37:4f:a6:56:84:54:4c:2b:38:a7:7d: 00:49:86:be:6a:7f:3a:3d:21:6a:5a:13:92:a5:86:72: b3:42:81:93:52:33:28:18:05:d0:b0:b8:2d:3a:78:5e: e8:97:9b:bb:39:a4:40:92:df:8a:0b:cb:fa:15:f2:7d: 8e:64:6f:19:59:e7:4e:b6:f4:ae:7d:f9:92:99:d3:46: dc:72:6b:15:09:28:54:47:c9:d0:12:ba:26:e2:a4:6c: db:06:9c:65:7d:9c:2e:f5:ed:db:b5:05:0f:3a:72:21 Fingerprint (SHA-256): 5B:8D:86:C0:E3:E4:34:F4:73:BD:CC:88:15:F4:C8:1B:F1:A1:40:E6:4A:D6:AE:81:9E:B0:B0:28:A0:4F:2E:01 Fingerprint (SHA1): 30:BE:65:0D:AD:FF:E1:31:7B:FF:A0:82:35:AC:BE:F0:F2:71:8D:59 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #648: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #649: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #650: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034209 (0x3750ada1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:53:48 2022 Not After : Tue Sep 28 03:53:48 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:48:5b:d6:19:fe:cb:a4:48:43:6e:0b:3b:0a:37:d5: 30:af:d6:74:fc:95:1b:5c:13:7e:f1:fb:97:63:41:30: b8:c0:20:5a:8e:18:3b:b0:14:90:7f:7b:2d:16:b9:de: 21:e7:d3:57:8b:73:b9:9d:b8:e9:88:eb:d3:32:50:04: ec:c1:e1:8a:d4:c4:87:2b:2c:f4:99:34:57:5a:b2:78: 0b:8c:fd:d8:b3:ca:fd:55:48:da:a0:05:c5:93:bb:4b: c5:7f:a7:46:10:d7:6f:fd:39:00:b7:6e:5a:42:1a:9c: 8d:b3:91:51:67:fb:9c:5c:f0:d5:3e:0e:6f:77:f2:10: 58:38:5e:6f:c8:22:e7:9b:f2:80:e8:75:ce:05:38:7b: 0b:2d:d6:fb:b9:8d:e4:eb:48:6e:8b:09:87:04:e2:a3: eb:42:9c:78:e5:75:fb:0c:b7:d8:bc:b0:2d:7f:cf:da: b2:49:db:bf:d6:49:1b:d9:c3:8e:19:cf:41:38:90:df: 52:36:ef:86:ac:83:0b:4d:cc:a7:34:d4:aa:d3:2b:09: ae:87:00:8f:ad:38:4e:46:1c:51:31:e1:cb:83:39:70: e3:a8:e0:cf:aa:bf:49:8c:ca:e4:61:a9:25:68:23:b5: 59:87:93:96:6d:d0:28:e0:c9:04:9f:dd:21:5a:83:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a5:b8:2b:55:57:02:c1:9e:0e:79:ac:4f:1a:b9:e9:41: e6:e3:c2:27:0c:b5:49:f9:c8:e5:db:a7:4b:7d:6d:03: c4:5d:6e:73:a3:8c:d1:a0:26:a7:3e:6e:a3:0e:cf:3e: 27:b9:85:ac:19:d3:a0:ab:8f:b9:71:be:a9:42:47:9c: bd:0a:9e:48:58:30:c6:fd:d6:d6:eb:a6:ab:9a:7a:ee: dc:86:96:71:5e:a8:b3:fa:99:db:57:e6:77:65:99:a7: d8:ac:2a:e7:0a:89:88:62:77:ec:49:1f:da:cc:3c:5d: a8:91:06:18:1c:7c:2a:12:a4:1d:39:f2:66:4d:12:88: 41:54:b1:50:ad:88:5b:a0:b4:af:39:e7:1f:70:da:91: d4:cc:ff:93:6b:27:d5:14:f6:dd:fd:53:e2:1d:85:50: 43:b8:15:75:c6:8b:46:32:8c:69:ce:4d:fe:b6:4b:60: 6a:e6:a8:51:4d:64:5e:2b:31:5e:75:c0:1e:28:a1:b6: e1:8c:93:d4:10:76:30:d6:5e:4b:40:53:76:ec:c9:eb: 1a:c9:1f:cd:0b:bc:23:a8:03:88:fe:06:f4:40:55:3b: 3e:be:a8:21:f7:88:eb:a9:ae:31:94:b5:97:43:8c:aa: a9:d0:01:78:c3:3c:cf:ba:f9:8e:ff:de:c5:a6:aa:89 Fingerprint (SHA-256): B3:F6:F9:4E:1E:3A:6B:12:AF:27:4B:CA:61:57:3B:DB:93:EA:93:4F:E7:C3:13:26:2F:B6:F7:AE:A4:68:67:8B Fingerprint (SHA1): 3A:C4:94:E2:13:AA:11:CA:C7:4C:3C:C4:1F:8A:BD:80:BD:32:B9:B4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #651: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #652: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034210 (0x3750ada2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Sep 28 03:53:54 2022 Not After : Tue Sep 28 03:53:54 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:83:78:ff:eb:c7:93:7b:b2:bd:d0:f6:11:f8:a9:1b: 62:74:f0:03:af:7a:d5:ec:fc:64:7e:70:c1:a2:bd:c0: 22:6f:f6:9c:3d:f2:c6:bd:d0:f7:85:60:2b:bf:98:46: 05:df:4f:ac:a3:94:9c:5d:6b:9a:14:b5:b3:be:99:35: 4f:2c:9e:7d:38:98:39:ee:e2:7b:40:af:4a:74:38:7e: 72:89:b6:84:6e:3e:1d:d9:07:ce:21:84:0b:e1:a6:f6: cc:dd:e7:e9:57:a4:5c:8a:d6:6d:f7:d3:58:85:71:72: 18:13:e3:80:63:7e:47:b1:b4:b6:89:0e:d8:25:3f:de: 7d:b3:a6:b4:81:17:bb:93:6b:2b:5b:7e:2d:0d:ab:47: ef:86:6a:51:c8:dc:5b:25:c6:7a:92:a5:1a:11:64:c1: ec:c1:0c:f4:9c:04:24:ea:aa:bc:63:31:c8:44:c6:d7: 4d:89:92:fa:70:3b:58:90:8a:88:02:71:45:1c:83:f1: a5:e9:87:23:de:5b:9b:b7:99:31:d5:2f:0e:28:33:cf: 0a:0e:29:16:2d:07:e0:3f:e2:bb:09:f9:fd:c3:40:92: 71:83:f4:74:81:c7:d5:ca:71:b0:ad:b1:6e:eb:1b:a0: a9:8b:59:52:6e:4f:38:ad:c4:0e:dc:c1:62:0d:6d:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:94:84:42:04:6c:68:bb:ee:b4:e4:60:b2:b2:0a:f4: 94:4a:b6:78:72:46:b0:e1:22:ba:dc:5b:50:fd:fe:17: 57:cd:ec:7b:be:0e:26:a2:60:62:85:0a:53:fb:90:94: 74:b7:b1:e1:76:61:cd:97:d3:9d:96:97:89:30:c2:1c: 7f:c6:05:0d:06:19:8f:39:72:fe:80:af:0c:2a:d6:66: 9a:63:7d:ac:87:f6:eb:59:69:a1:3b:93:bb:3e:2a:0a: af:88:e4:30:a8:09:6b:b3:90:aa:0f:d0:10:f7:4e:5f: c6:cc:71:16:7d:ab:56:8c:ad:c0:8d:33:26:5b:f0:f7: 02:db:19:6c:92:8f:0c:a6:61:48:13:29:9a:4f:96:d7: 41:1d:bc:2c:c8:73:ff:ee:e3:87:bd:e6:5b:37:dd:5e: e3:42:19:9b:fa:26:81:0e:57:f3:6d:85:4d:57:e9:6f: 8f:4f:73:e3:66:87:70:ab:16:76:bb:87:3b:02:07:33: 5b:36:04:5c:3e:3f:cc:ed:2e:0d:8d:39:b0:82:3b:dc: 1e:05:3e:5d:e3:ca:8e:f9:47:5d:db:bc:82:62:ed:5e: bc:24:da:28:2e:ea:b0:01:f7:c2:d2:4d:f7:c2:e1:09: 91:3e:f2:07:1a:13:3d:c9:32:25:4a:00:9c:39:e7:04 Fingerprint (SHA-256): FB:C3:A8:46:36:C0:93:B3:A4:7E:DD:A0:DD:12:A2:51:93:25:97:CF:5E:1A:F7:DE:91:9A:1D:40:45:AE:51:AD Fingerprint (SHA1): A3:AC:EB:26:6E:C8:45:EA:00:E4:64:2C:DD:5E:F4:0D:29:87:79:4D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #653: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #654: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034212 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #655: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #656: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #657: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #658: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 928034213 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #659: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #660: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #661: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #662: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 928034214 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #663: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #664: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #665: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #666: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 928034215 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #667: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #668: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #669: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #670: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 928034216 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #671: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #672: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #673: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #674: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #675: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #676: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #677: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034212 (0x3750ada4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:54:11 2022 Not After : Wed Sep 28 03:54:11 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:b9:e9:aa:b0:4d:38:9c:04:df:0f:4a:36:19:82:c4: 4b:49:f4:3c:56:b1:a6:cb:e2:80:95:39:26:46:a9:73: b4:a1:0a:be:ab:0c:26:f1:34:e0:5d:88:79:a3:b1:91: f0:87:bf:30:48:d3:d9:1e:4c:13:db:a7:a9:20:32:89: e3:41:26:ae:27:c6:a5:16:65:dd:26:3f:35:6b:5f:81: c1:fd:e0:68:95:1d:e6:50:67:e4:c1:f3:12:fb:8c:44: ea:c0:b5:8b:41:d9:e1:ee:3e:de:6b:17:b8:69:43:64: ec:b1:4a:fb:c2:6f:b8:53:0a:66:b5:ed:9c:ae:83:42: 81:e5:bf:33:43:49:c6:fc:83:26:1b:53:53:99:73:0a: 77:3d:5d:89:22:55:e3:28:c5:c3:a2:bc:8b:18:fa:06: d9:2a:bd:e1:16:19:2f:23:cc:cc:63:b2:3c:00:88:a0: 7c:4e:5b:16:a0:f3:7f:ec:d0:4f:28:68:6f:4c:7d:76: 36:07:ad:92:31:c0:c3:3d:76:77:c9:dd:f1:a4:0d:f5: 3c:ce:49:da:e6:f2:d1:5e:ff:9c:f4:26:a9:82:23:bf: ff:7d:81:fc:ca:4f:fc:5a:d8:50:02:4f:fc:35:ba:22: 98:10:74:36:45:af:ff:51:33:82:9d:65:1f:aa:d6:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:f8:21:d2:15:50:83:df:d0:5b:e7:38:46:67:91:18: 0c:a0:e7:02:e5:9b:30:15:6b:65:16:1f:c5:1d:59:6a: c0:5e:bc:06:3b:c4:04:d1:69:d0:d5:da:b5:b4:75:03: d5:64:54:de:78:09:79:35:e7:2d:9e:c1:5b:9a:c0:7c: 7a:23:98:dc:51:66:d1:bb:95:94:dd:90:30:10:af:8d: df:a0:2a:66:1b:5b:d8:2d:63:d2:09:dd:cc:fb:d1:68: 8f:ba:12:cd:5c:1e:6e:5c:4f:9e:b0:7c:92:e7:75:92: 08:2e:98:80:9e:9f:3a:9a:c9:2d:38:33:dc:97:63:5a: 20:56:b5:00:a8:c3:75:7a:f9:d8:e5:db:2f:ff:82:28: 7b:b8:2c:11:dd:14:22:54:21:3b:53:b2:ef:80:bc:73: 7b:08:e8:14:36:71:bd:ca:27:f7:a2:e4:55:74:44:d0: a2:6c:ad:b6:3c:be:44:1d:a2:31:30:12:8a:b6:a4:44: e7:79:2c:c3:44:c9:2a:0e:1e:3a:e4:95:bc:ce:2a:2b: fa:4b:cf:e8:2a:54:9b:2d:0a:66:8a:14:23:ab:f5:78: 61:4e:14:7c:45:8b:63:28:4c:ca:26:96:56:ec:0e:37: e6:04:be:69:33:66:93:b4:5b:61:a6:3f:f1:1d:1d:b3 Fingerprint (SHA-256): 86:3E:53:65:0D:D3:81:8F:91:89:44:9D:8E:DC:C3:DC:41:F4:C8:E3:B3:75:97:7A:2A:C8:60:FE:B0:E7:05:65 Fingerprint (SHA1): AE:02:8A:0C:B5:5E:BC:F7:4C:84:AB:5B:E4:C1:81:84:30:F1:74:5C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #678: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #679: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034213 (0x3750ada5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:54:16 2022 Not After : Tue Sep 28 03:54:16 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:35:81:23:5a:5a:48:73:03:00:c1:98:aa:4d:3c:18: 00:fa:ae:f0:5e:8a:03:1f:34:81:c7:29:29:94:e2:49: 92:c0:cc:f1:7a:f4:87:02:64:46:e6:ed:0e:34:fc:bf: a5:6c:d6:18:53:e6:33:db:6d:44:9d:68:13:46:66:cc: 41:38:bf:94:a8:f5:0d:cc:71:11:c8:91:1e:62:ea:54: d1:de:06:3d:a5:ff:cc:1b:90:14:65:00:f7:b4:d3:de: f9:14:22:9f:97:b6:34:13:3f:8b:f8:68:c8:46:21:a3: 49:9a:d9:9e:25:4b:29:29:4b:3e:1f:8b:d9:2f:99:3d: d2:43:38:2d:11:0b:3a:ba:8e:7a:22:a8:dc:ee:19:db: 34:51:17:72:43:5f:f3:03:05:25:6f:d2:f4:ac:c3:93: 26:8e:6b:26:9c:2c:32:4b:df:75:7f:26:93:4d:47:de: 80:b2:fe:b3:c0:55:57:cc:3c:66:65:65:16:12:4c:ac: 5f:dc:48:72:65:b7:88:27:2e:a7:27:07:53:e5:6a:82: 68:67:0c:58:ff:27:0d:f4:10:62:67:87:9b:3e:ca:67: 2b:b8:d3:82:f9:30:63:2f:f1:b6:79:df:e7:66:07:2e: 55:66:de:c0:d9:49:77:ee:79:73:d5:57:ae:d8:73:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:69:81:f1:d4:ce:f1:b2:e2:f0:81:8d:e8:be:e3:ce: e3:ba:b2:32:e2:e6:a2:92:68:93:43:89:31:db:3e:a4: d1:b6:91:a0:90:c5:89:83:79:94:62:4f:06:d9:b3:77: d4:4a:08:41:10:2b:ae:a5:73:70:bc:b9:22:b5:68:d2: be:a1:db:ec:f6:b3:d8:cd:61:cc:35:4f:6c:95:24:c7: 32:6a:b6:25:3c:c4:f6:c7:2a:5c:83:eb:c3:fc:c0:fe: 53:2e:fc:58:48:73:e8:f7:26:e2:a0:49:8c:45:7d:af: d5:8f:b2:c4:ee:e2:a4:c0:2a:4f:99:f9:e4:2b:d7:a2: df:db:7c:c3:48:8d:95:7e:57:9b:e7:6c:a4:63:3e:15: d2:47:ad:0d:b9:33:1e:ff:1b:50:7a:ee:fb:0e:99:b5: 97:70:64:a4:4e:c4:e3:58:ae:61:4f:ff:fe:48:b4:86: 15:1c:a8:44:c1:0c:da:0c:e2:c3:2c:59:7c:ee:4d:90: e3:d0:aa:17:d8:62:c4:f9:b1:75:e3:84:92:17:16:6e: d4:a6:ea:6c:33:4c:79:70:4a:b7:8b:3a:fa:01:9c:1b: d5:41:85:51:14:2b:e7:14:e9:75:cc:36:75:82:19:4d: 09:d4:b1:93:e4:ab:09:4a:d5:eb:47:b2:e8:15:c8:89 Fingerprint (SHA-256): 55:55:9E:B4:0D:C7:5A:D0:D8:E0:F2:FA:5A:F4:76:C7:CD:44:45:97:58:BD:F6:DB:3C:D6:1B:EF:78:71:C7:47 Fingerprint (SHA1): F7:5F:A7:0D:CC:BA:98:6E:1A:FC:93:69:5C:F0:A3:EA:76:8C:48:63 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #680: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #681: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #682: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034214 (0x3750ada6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Sep 28 03:54:22 2022 Not After : Tue Sep 28 03:54:22 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:c7:7f:53:8f:d4:9b:86:2f:a8:4d:14:7c:f9:3b:4f: 6e:1e:79:91:73:77:66:3c:d2:6c:b8:22:0e:b3:7f:87: 08:fd:20:d0:53:40:3c:92:45:fa:af:43:83:d6:a5:a4: 5f:2f:ca:1e:fd:9e:44:f0:1f:aa:5b:86:0f:c2:0b:ac: fd:5e:ca:8b:96:38:22:a4:eb:96:a0:9e:f8:03:a3:ae: ee:20:e1:72:a0:85:20:59:ee:ed:73:26:48:2e:b0:db: d8:b7:82:f6:33:f0:94:f0:cd:d9:75:6f:2a:1f:28:1c: eb:49:e3:fb:6e:93:b3:ca:b8:8a:bb:fa:72:7f:54:82: 73:d7:b9:ca:99:47:97:44:f4:af:65:c9:88:ea:5d:08: cd:94:ae:54:ea:37:75:de:70:93:ba:5e:73:a3:b8:f0: 1f:14:7a:6e:da:07:a1:01:0d:de:91:bc:36:27:d4:96: 21:0a:be:b4:9c:2c:73:f8:e2:2a:7a:b6:e1:ca:86:00: 45:17:42:10:c9:7e:44:a1:d7:66:b2:43:0d:e7:08:8f: e4:7a:2d:24:8a:d7:28:11:a7:c6:2b:68:72:50:8f:07: a9:09:6f:9e:b2:40:fc:77:3a:4b:9c:9d:f0:28:fb:26: c2:6e:e8:92:c4:c3:74:0d:46:00:a3:e4:7c:3b:7b:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:2c:41:ac:de:ba:29:c8:9e:cd:7f:f8:40:07:81:c3: 7c:6f:f6:4d:30:bd:42:2d:34:0b:c1:dc:14:05:d8:88: c1:33:85:e2:ca:2f:e5:d9:ca:9d:4d:5d:3e:d7:9c:01: d3:26:25:38:95:85:27:e9:5b:ea:45:2d:5e:f9:67:61: e5:f2:64:72:e1:9d:57:74:87:30:46:e3:54:d9:cc:7a: 18:d1:62:2b:5a:79:f5:1f:05:e8:32:d3:a0:59:94:69: 8e:d1:01:9a:52:bd:b4:0b:cc:9f:cd:ea:b9:a0:48:42: 81:5f:2c:6f:21:64:ce:e6:de:66:07:82:12:fa:3d:b2: f5:66:8e:76:3a:69:74:b6:e8:ec:61:a0:4f:8a:11:7b: 0c:61:18:85:fc:17:59:60:f7:e3:9a:98:10:e9:d1:15: fb:ac:cf:33:e4:2d:f8:44:bb:e4:34:70:c5:8c:d7:09: 45:fd:eb:82:92:6e:82:b5:1d:f3:ac:04:34:f8:7d:b7: 33:40:73:1e:89:16:94:75:35:d5:34:3d:ea:63:75:b2: 5f:21:69:2d:b6:b6:d0:2c:b2:85:c9:af:7a:a3:2a:45: 63:d2:eb:1f:d5:33:88:05:36:89:a7:95:f3:4a:3c:8d: 8d:e6:6c:3c:df:f5:df:c3:ed:6c:ff:7b:af:8f:bb:59 Fingerprint (SHA-256): D0:0D:BB:5E:A6:6F:85:EB:2D:24:3C:AA:0B:6F:79:F2:7E:5B:24:9B:12:E4:60:5D:0F:8B:F2:2E:BD:F2:9F:C2 Fingerprint (SHA1): D2:68:9E:BE:8C:67:F4:54:EC:18:92:24:DC:1D:21:54:76:27:9E:6F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #683: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #684: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034217 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #685: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #686: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #687: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #688: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 928034218 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #689: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #690: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #691: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #692: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 928034219 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA1Root-928034110.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #693: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #694: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #695: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #696: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 928034220 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #697: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #698: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #699: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034217 (0x3750ada9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:54:43 2022 Not After : Wed Sep 28 03:54:43 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:da:f2:19:9d:b3:0e:f5:d9:1b:e5:f7:58:57:9b:79: 28:2b:d2:d2:b4:5f:18:cd:b2:57:ac:2b:88:a9:99:80: a2:97:e8:d0:51:c9:5e:19:f7:dc:5e:21:bc:d2:e7:b8: 01:46:95:6a:c0:86:b9:5f:41:4f:45:d6:fa:5e:24:9f: 15:8c:08:d2:d7:1b:96:62:a3:9e:a5:f3:84:a0:35:c7: e2:5e:f7:06:59:f4:57:cd:bc:f7:98:1d:30:f6:3f:7c: 97:a1:c7:59:73:ee:15:c8:5e:82:08:29:27:56:9d:31: ed:4f:fe:10:b2:a2:25:31:89:43:57:ae:0e:59:00:78: 13:d5:83:9d:13:f3:0a:3e:fc:98:a5:74:2a:03:45:7e: c5:28:3d:4b:9b:65:f3:4b:cb:49:04:00:f4:31:f0:71: 95:8d:bb:23:9b:9c:ca:4b:9c:35:ec:ec:bc:b2:02:9e: b3:0c:91:7e:9f:e6:eb:8b:c9:cb:97:2f:60:f1:d6:37: fb:0a:2b:3b:9d:06:10:cd:55:c6:fd:c0:dc:2e:22:36: 8b:2b:10:59:52:1d:a5:eb:65:51:ac:1a:2f:7d:70:25: 62:25:8f:0d:f4:84:ec:17:67:92:29:aa:46:24:0c:85: 27:a6:3f:14:4e:b5:8d:c9:c6:ac:b8:a8:e1:b5:99:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:ad:8a:b3:fa:4b:64:0f:12:64:37:1f:4a:14:d0:f4: e1:ea:4c:7a:e1:63:ba:d7:55:0d:91:e5:b7:35:f1:85: cc:08:72:4a:87:77:56:ff:90:ba:c4:a7:43:ad:55:09: 07:ea:0f:1a:07:e8:68:2d:1a:0a:a2:25:a4:38:bd:1c: 19:c8:9e:bd:a2:6f:93:90:a9:c1:05:79:dd:ad:76:a1: 81:a4:3d:93:2f:fd:d3:5e:cb:39:36:86:ec:08:75:7b: 4e:6a:ca:01:a5:9b:1f:f4:47:a1:17:fd:d7:32:79:39: 0e:4a:a3:a1:f2:51:40:6e:d9:99:69:d6:a7:01:12:c0: 99:26:5f:2e:cc:96:ed:47:17:e0:dd:71:d8:47:2a:4e: 5a:82:50:8a:1e:b0:0f:95:d3:66:b2:32:26:73:2f:a1: 47:f7:d0:8b:23:81:a0:10:75:f1:68:75:7d:af:b1:7f: f1:95:c7:fb:7e:ba:49:75:cc:bb:2a:b9:90:5c:5a:61: 7f:e0:4e:44:b7:c0:f2:2a:83:e0:b6:b9:06:0d:59:ca: 3f:49:4f:6f:6a:45:3f:5a:06:b3:f2:f9:6c:a5:e8:f6: 04:be:16:90:ed:c9:c2:0d:fc:28:21:71:38:68:bd:65: 0a:e9:3b:8b:ac:af:f3:e9:45:a6:0a:ac:a2:f8:f7:25 Fingerprint (SHA-256): C0:64:4F:C2:C3:49:1E:1C:98:9B:65:08:7B:BE:CF:6C:8A:18:1A:74:CC:63:E2:59:91:57:4B:10:72:9F:9D:5C Fingerprint (SHA1): 99:C3:A4:91:AC:B5:8D:FE:E6:21:36:F3:FA:04:CE:34:69:09:2B:F8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #700: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #701: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034221 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #702: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #703: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #704: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034222 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #705: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #706: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #707: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #708: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 928034223 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #709: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #710: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 928034224 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #711: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #712: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #713: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #714: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #715: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 928034225 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-Bridge-928034111.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #716: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #717: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #718: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #719: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 928034226 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #720: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #721: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #722: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034221 (0x3750adad) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Sep 28 03:55:05 2022 Not After : Wed Sep 28 03:55:05 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:eb:86:cf:9e:30:7a:1a:08:27:25:6f:7d:27:6c:7d: 58:5c:59:6e:a0:bf:df:65:00:dc:61:52:f3:00:ef:93: f5:70:40:29:4c:a1:31:13:f6:d4:aa:50:b1:bf:15:0e: d8:7d:78:07:1a:fc:29:d6:e3:02:83:69:c4:ce:a7:54: fb:28:94:1c:f8:44:5e:07:66:09:51:3c:a2:68:76:80: 81:a2:5f:ea:a3:cc:ae:bb:6d:d1:df:dc:1e:2d:8f:27: e6:a9:f2:6f:99:fe:e3:61:6c:7e:6e:64:bf:41:f7:c1: dd:4c:b6:58:78:b9:5c:f9:43:e6:b9:43:ed:3b:11:98: ad:0e:6e:a8:4e:0e:81:f2:7d:77:71:f7:1d:08:90:f3: 17:cc:d5:f7:e0:54:10:3a:f8:fe:8e:5f:c8:95:eb:4b: 65:ea:c0:80:f6:6f:c2:0d:59:f4:6c:70:4c:41:26:2e: d6:14:f5:9e:be:a8:37:ec:b8:ec:50:9b:b6:75:5a:2b: 18:0b:bd:14:11:0c:25:56:43:00:30:4e:f8:07:5f:4e: 19:a2:09:99:87:87:81:e8:df:b0:5f:37:a9:8a:c5:c6: dd:e0:78:34:05:46:0a:46:f0:6f:f5:04:51:85:bb:bb: 29:52:0b:e4:f0:bb:eb:75:e9:dc:92:7e:45:5c:5e:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:fc:be:03:b2:83:03:2d:fd:9e:c7:cf:e9:50:38:1c: f4:28:5f:c9:2d:49:18:56:8b:d3:f2:fb:de:1a:1e:7d: bd:67:e4:df:21:a7:fa:0d:bf:2f:26:48:3b:0c:8a:8f: a3:ee:ec:54:94:db:2d:00:15:61:b2:6b:e7:3b:19:62: 90:09:db:0b:8d:dd:12:5f:4d:a0:10:6c:46:f5:c1:97: a3:42:1f:a4:c5:ac:af:46:91:8e:ff:b2:22:bf:91:0d: 59:53:ff:9b:53:a5:af:77:d9:3f:fe:57:f3:96:7b:15: 58:c0:cf:cb:16:20:d6:4f:65:e7:a2:fd:8a:be:9e:2c: 10:7d:7b:ca:6c:af:f4:22:71:01:60:66:6b:74:bd:df: ee:97:8d:d8:8a:4e:80:33:5b:21:be:2c:a3:c6:1c:10: 5e:eb:db:98:1c:26:e4:59:33:10:0c:e0:ad:0d:46:cb: f9:49:a8:14:7d:93:cf:3b:72:78:26:b6:5d:68:aa:b7: 36:3b:f0:73:4a:dd:aa:ed:52:b0:42:6c:4e:2d:1c:78: bb:23:82:d1:d6:a5:8a:62:6e:bf:fb:32:cc:36:94:1a: 84:2c:57:a8:99:aa:a7:dd:e4:7e:28:fb:4a:6d:37:ae: 05:d2:a9:c1:6a:56:5d:5d:f6:5b:dd:53:aa:07:6f:97 Fingerprint (SHA-256): B2:D5:77:E6:7B:7D:30:DD:B4:DC:AD:DB:AF:91:9B:C5:53:41:D7:6C:0B:AF:C7:F4:EE:E9:A6:5E:91:1C:1B:99 Fingerprint (SHA1): 96:62:01:57:3A:6F:36:04:A8:44:A8:09:75:83:74:E1:C6:46:C6:B3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #723: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034222 (0x3750adae) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Sep 28 03:55:09 2022 Not After : Wed Sep 28 03:55:09 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:c3:6c:4a:83:31:52:db:fe:3d:f1:fd:78:67:6a:31: 39:cf:03:61:30:53:3a:1c:55:04:cb:90:8f:ef:f4:85: 15:57:54:72:8a:ff:cd:0d:5f:9d:c6:b0:fd:1d:81:ce: ca:19:c1:4c:3d:c4:06:93:ba:87:e1:d9:d8:10:ac:b4: 74:22:c9:f9:af:e8:5e:cd:82:04:36:92:61:89:89:77: c5:32:e7:82:18:af:1f:be:c3:b2:71:9c:d6:9c:c0:17: ea:e9:b7:96:87:2f:c1:d6:c0:98:4f:86:d4:1a:19:78: f7:2e:b4:51:11:e4:40:27:9f:64:34:40:53:3c:7a:d4: ae:f3:25:79:89:08:ff:48:cd:6d:44:cb:b9:23:ef:6a: 35:9c:83:b9:7a:85:3a:64:60:f8:3f:f4:d9:08:e1:ee: 12:c6:a6:9d:95:f4:ad:49:c8:86:55:1e:9f:0c:32:ad: 97:c0:5c:f7:05:2e:35:ba:f7:7c:ee:32:a9:4a:9a:c8: 2e:89:10:78:d5:b7:5d:89:42:cc:73:76:56:3b:5b:b7: 07:71:88:83:d3:ad:da:9f:c1:b0:c2:4e:6d:11:fe:31: c5:ba:d4:96:89:09:27:70:97:6f:4d:a8:a9:ab:05:83: 93:7c:e9:7a:be:d2:12:c7:88:69:11:8e:54:54:b6:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:ad:5c:ea:d5:28:ab:a3:19:da:a1:4f:3f:37:70:bb: f1:cd:27:54:6b:6d:5a:e6:a2:4e:d5:d1:c4:7f:f6:ee: 07:09:2b:53:8f:14:f5:89:ab:5c:7c:3c:8c:c2:6b:f2: d2:15:0a:5a:c5:a0:fe:ce:59:cc:ab:79:bb:32:fb:01: 89:c8:57:ab:f3:b0:a6:dd:bf:5d:c3:38:76:62:c7:88: e1:18:1b:93:ea:5b:c4:21:9c:f9:e4:8b:f0:e4:aa:fa: 5f:b3:6f:ad:d5:4b:2d:ee:38:9d:91:53:f3:be:8d:90: ec:bc:01:d6:cb:e4:2e:47:3d:7e:9e:06:ed:b8:0e:6a: 4d:f7:d6:15:32:ee:e3:5e:63:9a:b8:38:6b:c9:4f:0a: 8e:aa:c9:40:b9:71:ad:1e:50:43:cc:94:fb:cd:ea:07: 34:a3:0b:e6:bd:56:b5:a7:84:b7:60:5f:e6:b8:78:a4: 7b:dd:63:56:b9:4d:ee:26:7f:fd:be:8e:45:ff:fa:36: cb:74:e7:a0:96:9e:5b:9b:98:38:d7:eb:41:ce:26:ab: 9d:ba:87:e5:e9:46:f4:37:a9:36:d1:e0:5f:ea:e9:d2: 12:ef:47:0a:60:0c:fb:01:60:28:05:fa:13:c8:33:c5: a7:3d:4b:89:12:16:4c:60:8c:b6:2a:50:b3:be:ed:99 Fingerprint (SHA-256): D3:AA:36:21:C7:76:BB:5C:1C:43:30:D4:94:05:31:3B:E7:73:C8:9C:70:D4:D8:F2:F4:F2:5C:59:38:CC:07:69 Fingerprint (SHA1): C3:F6:F8:59:13:64:A1:A2:55:08:F0:C8:CB:9B:03:0A:96:D8:AD:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #724: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034222 (0x3750adae) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Sep 28 03:55:09 2022 Not After : Wed Sep 28 03:55:09 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:c3:6c:4a:83:31:52:db:fe:3d:f1:fd:78:67:6a:31: 39:cf:03:61:30:53:3a:1c:55:04:cb:90:8f:ef:f4:85: 15:57:54:72:8a:ff:cd:0d:5f:9d:c6:b0:fd:1d:81:ce: ca:19:c1:4c:3d:c4:06:93:ba:87:e1:d9:d8:10:ac:b4: 74:22:c9:f9:af:e8:5e:cd:82:04:36:92:61:89:89:77: c5:32:e7:82:18:af:1f:be:c3:b2:71:9c:d6:9c:c0:17: ea:e9:b7:96:87:2f:c1:d6:c0:98:4f:86:d4:1a:19:78: f7:2e:b4:51:11:e4:40:27:9f:64:34:40:53:3c:7a:d4: ae:f3:25:79:89:08:ff:48:cd:6d:44:cb:b9:23:ef:6a: 35:9c:83:b9:7a:85:3a:64:60:f8:3f:f4:d9:08:e1:ee: 12:c6:a6:9d:95:f4:ad:49:c8:86:55:1e:9f:0c:32:ad: 97:c0:5c:f7:05:2e:35:ba:f7:7c:ee:32:a9:4a:9a:c8: 2e:89:10:78:d5:b7:5d:89:42:cc:73:76:56:3b:5b:b7: 07:71:88:83:d3:ad:da:9f:c1:b0:c2:4e:6d:11:fe:31: c5:ba:d4:96:89:09:27:70:97:6f:4d:a8:a9:ab:05:83: 93:7c:e9:7a:be:d2:12:c7:88:69:11:8e:54:54:b6:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:ad:5c:ea:d5:28:ab:a3:19:da:a1:4f:3f:37:70:bb: f1:cd:27:54:6b:6d:5a:e6:a2:4e:d5:d1:c4:7f:f6:ee: 07:09:2b:53:8f:14:f5:89:ab:5c:7c:3c:8c:c2:6b:f2: d2:15:0a:5a:c5:a0:fe:ce:59:cc:ab:79:bb:32:fb:01: 89:c8:57:ab:f3:b0:a6:dd:bf:5d:c3:38:76:62:c7:88: e1:18:1b:93:ea:5b:c4:21:9c:f9:e4:8b:f0:e4:aa:fa: 5f:b3:6f:ad:d5:4b:2d:ee:38:9d:91:53:f3:be:8d:90: ec:bc:01:d6:cb:e4:2e:47:3d:7e:9e:06:ed:b8:0e:6a: 4d:f7:d6:15:32:ee:e3:5e:63:9a:b8:38:6b:c9:4f:0a: 8e:aa:c9:40:b9:71:ad:1e:50:43:cc:94:fb:cd:ea:07: 34:a3:0b:e6:bd:56:b5:a7:84:b7:60:5f:e6:b8:78:a4: 7b:dd:63:56:b9:4d:ee:26:7f:fd:be:8e:45:ff:fa:36: cb:74:e7:a0:96:9e:5b:9b:98:38:d7:eb:41:ce:26:ab: 9d:ba:87:e5:e9:46:f4:37:a9:36:d1:e0:5f:ea:e9:d2: 12:ef:47:0a:60:0c:fb:01:60:28:05:fa:13:c8:33:c5: a7:3d:4b:89:12:16:4c:60:8c:b6:2a:50:b3:be:ed:99 Fingerprint (SHA-256): D3:AA:36:21:C7:76:BB:5C:1C:43:30:D4:94:05:31:3B:E7:73:C8:9C:70:D4:D8:F2:F4:F2:5C:59:38:CC:07:69 Fingerprint (SHA1): C3:F6:F8:59:13:64:A1:A2:55:08:F0:C8:CB:9B:03:0A:96:D8:AD:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #725: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #726: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034227 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #727: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #728: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #729: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034228 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #730: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #731: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #732: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #733: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 928034229 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #734: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #735: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 928034230 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #736: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #737: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #738: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #739: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #740: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 928034231 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-Bridge-928034112.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #741: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #742: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #743: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #744: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 928034232 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #745: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #746: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #747: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #748: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 928034233 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-BridgeNavy-928034113.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #749: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #750: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #751: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #752: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 928034234 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #753: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #754: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #755: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034227 (0x3750adb3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Sep 28 03:55:36 2022 Not After : Wed Sep 28 03:55:36 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:13:de:0f:22:13:a9:9a:63:bd:aa:da:21:5a:db:a9: 7c:05:ce:cf:78:46:42:e1:72:ef:fb:cc:50:fc:56:3a: b5:5c:c3:a9:89:74:0b:c1:8f:4e:02:35:4a:ed:d8:06: 8f:47:85:d9:a5:45:18:77:3e:bc:a3:cc:5f:58:3f:f2: d4:1a:dd:cd:86:5f:8a:84:b6:9d:cb:25:67:17:e9:6d: 76:4f:dc:8e:e5:2a:7c:07:e7:fc:fe:e1:cb:b7:72:59: 98:94:b2:50:42:68:e3:13:e9:1d:14:c9:94:23:f6:64: 7d:a8:9c:b2:ff:5f:63:9c:10:e9:7c:2f:14:68:64:19: ae:45:52:ae:7e:8a:b7:bf:5d:47:6b:2a:cf:0b:27:ab: 63:91:62:82:a2:8c:ef:e6:ef:a5:0b:d7:72:0a:cd:80: f6:21:8a:ab:52:1b:31:f1:1a:46:e0:0c:27:25:af:10: 5c:89:5c:a9:85:bf:89:94:35:e4:e8:59:6c:0f:29:0f: 1b:9b:16:e6:45:f1:92:ef:a6:54:a7:44:53:2d:b8:78: 71:e3:56:12:dd:01:78:ae:fa:ed:70:2b:df:b3:ba:97: 6d:ca:47:48:df:89:c2:d6:14:7a:85:d4:a3:f8:65:42: d1:91:e4:6c:92:68:50:90:8c:72:3b:4b:af:58:0d:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:7a:82:d1:cf:3e:22:bb:b0:dd:8a:df:da:80:eb:24: e4:6c:17:69:f7:bd:27:b7:e9:f8:b8:6f:63:33:1d:71: 45:97:14:7c:d8:a2:7d:f0:9f:55:3b:68:20:b1:b8:1d: 74:d7:26:a4:3e:0e:33:40:c0:02:37:43:9c:ad:dd:2a: 54:df:e8:f1:25:1e:cb:7a:bf:7b:5e:c1:c7:c3:6e:d8: 5b:3c:af:a5:33:34:23:34:3b:bf:c0:3e:25:9a:08:dd: c8:53:a8:ae:24:cb:c5:89:5c:0e:7b:af:ee:85:d8:1b: ab:88:8b:07:d3:5f:76:f7:6a:fc:9a:be:61:00:58:ac: d7:34:ea:2c:33:f9:d4:46:46:96:a9:70:b5:86:65:8e: 26:5d:2e:88:da:f8:12:45:11:e7:7f:9b:d8:c3:f0:c5: 6b:10:ae:d9:73:43:98:55:6a:93:08:02:cd:85:68:25: e1:54:e9:ff:c3:a7:ee:79:15:58:72:08:66:17:57:d6: b6:e0:d1:a0:05:94:4e:7d:98:38:ce:b9:03:27:e9:f3: d2:97:80:06:73:2a:e8:bb:1d:ce:e0:e0:22:9c:39:89: aa:48:8b:a2:43:e4:da:0b:dd:38:e5:83:68:c1:8e:4b: a6:a1:05:fe:39:75:43:c5:7f:66:5a:b5:9c:b5:ca:ac Fingerprint (SHA-256): 8D:B1:E4:BD:69:73:CF:51:F6:4E:48:B2:28:CB:46:F7:FC:4F:94:DE:53:FA:16:15:7D:89:4D:97:9D:18:05:88 Fingerprint (SHA1): 66:73:BE:AA:F4:06:A1:EB:7C:75:7A:7D:13:62:BD:C3:B5:14:2C:85 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #756: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034228 (0x3750adb4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Sep 28 03:55:40 2022 Not After : Wed Sep 28 03:55:40 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:d3:09:d0:2c:e9:c6:18:7c:a0:6a:85:37:21:74:19: 61:2e:47:0e:72:cf:2f:1e:52:b7:43:0a:97:ff:8c:79: 9e:26:de:ff:6e:5d:0b:49:8f:80:40:96:a8:db:e6:22: db:53:e7:75:21:7e:40:13:1c:da:27:cd:e8:43:9c:bd: d3:77:25:35:ab:c6:57:9f:24:8b:b0:ed:5a:34:23:67: 1f:dc:e0:f2:f8:8e:36:02:e4:ba:bf:d2:b9:ab:78:79: c2:39:64:53:5e:01:6d:dc:0d:ab:01:ba:a6:72:3a:23: b2:1f:6e:f5:4a:4a:5e:03:8d:b4:50:8c:10:40:44:05: 51:5e:55:02:1c:fb:06:2d:d4:54:01:cf:57:43:c3:8e: 2a:8c:cc:d6:8c:77:a8:a7:34:a6:c7:fb:9e:f1:9b:64: 75:28:b9:9e:34:05:a8:c1:0f:81:5b:79:87:6b:d8:4b: 0a:5f:eb:4d:0f:fd:a3:b6:ad:02:55:fa:c7:e8:13:d9: a6:dc:ae:0a:d4:21:d4:3c:26:ec:5e:52:95:9d:10:df: e8:36:e7:62:3b:8b:29:e4:29:ab:03:eb:85:67:37:bb: 09:3a:5c:e3:90:67:71:e1:c0:9e:f3:89:c4:6a:5d:cd: 0e:af:70:18:8c:70:f0:10:f5:d2:2f:07:19:99:4d:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:ce:d8:a2:01:82:32:91:f9:cd:d5:b6:c5:0f:54:66: f9:f2:49:e6:83:e8:94:e5:21:2d:88:26:59:cb:94:15: 14:36:98:e6:0b:14:8a:c2:99:99:0d:b4:39:95:1c:36: e9:69:3a:0e:ce:b2:b5:a4:db:e2:9f:79:e2:68:f0:91: 08:66:c3:28:f6:4b:26:49:a6:49:bb:d0:36:13:0b:ae: c4:77:0a:ab:c2:5a:49:65:b9:47:0a:bd:b1:38:9c:82: 42:89:e1:a0:be:f8:a3:4c:24:bd:74:54:0f:03:76:2c: 13:a4:a6:bd:a2:3f:a9:15:a8:0b:c2:31:8e:6d:db:ce: c9:d3:97:36:b9:ed:44:7e:ee:80:07:ef:a6:ce:e3:47: 8d:a8:7f:bf:49:a3:e1:a9:6b:37:b2:72:6c:9b:fb:bd: 1d:8c:c8:ab:fc:7c:aa:3f:64:52:e3:2a:d6:17:c5:d9: 4f:45:27:8e:64:b2:27:9c:60:14:13:96:c4:14:3c:34: bd:31:35:ad:b9:aa:65:4c:e1:b8:51:27:de:f4:af:ff: ac:f8:3f:51:bd:ed:1f:9d:99:e9:24:d9:9c:2b:2c:19: 21:c6:c0:3c:da:47:8f:e5:3f:d9:eb:1f:00:50:4f:a3: a4:b4:a8:0a:ed:7d:7c:f1:4d:61:34:eb:c4:62:27:44 Fingerprint (SHA-256): 84:04:D9:9B:56:6B:5C:AF:32:1A:5C:D1:E0:D5:7C:C9:96:A0:E1:2E:3F:3A:C2:6B:B3:B0:1D:85:FC:DF:E0:8E Fingerprint (SHA1): DC:AC:B5:41:02:23:74:6D:45:52:32:BF:1E:84:65:10:F4:28:F9:B5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #757: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034228 (0x3750adb4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Sep 28 03:55:40 2022 Not After : Wed Sep 28 03:55:40 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:d3:09:d0:2c:e9:c6:18:7c:a0:6a:85:37:21:74:19: 61:2e:47:0e:72:cf:2f:1e:52:b7:43:0a:97:ff:8c:79: 9e:26:de:ff:6e:5d:0b:49:8f:80:40:96:a8:db:e6:22: db:53:e7:75:21:7e:40:13:1c:da:27:cd:e8:43:9c:bd: d3:77:25:35:ab:c6:57:9f:24:8b:b0:ed:5a:34:23:67: 1f:dc:e0:f2:f8:8e:36:02:e4:ba:bf:d2:b9:ab:78:79: c2:39:64:53:5e:01:6d:dc:0d:ab:01:ba:a6:72:3a:23: b2:1f:6e:f5:4a:4a:5e:03:8d:b4:50:8c:10:40:44:05: 51:5e:55:02:1c:fb:06:2d:d4:54:01:cf:57:43:c3:8e: 2a:8c:cc:d6:8c:77:a8:a7:34:a6:c7:fb:9e:f1:9b:64: 75:28:b9:9e:34:05:a8:c1:0f:81:5b:79:87:6b:d8:4b: 0a:5f:eb:4d:0f:fd:a3:b6:ad:02:55:fa:c7:e8:13:d9: a6:dc:ae:0a:d4:21:d4:3c:26:ec:5e:52:95:9d:10:df: e8:36:e7:62:3b:8b:29:e4:29:ab:03:eb:85:67:37:bb: 09:3a:5c:e3:90:67:71:e1:c0:9e:f3:89:c4:6a:5d:cd: 0e:af:70:18:8c:70:f0:10:f5:d2:2f:07:19:99:4d:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:ce:d8:a2:01:82:32:91:f9:cd:d5:b6:c5:0f:54:66: f9:f2:49:e6:83:e8:94:e5:21:2d:88:26:59:cb:94:15: 14:36:98:e6:0b:14:8a:c2:99:99:0d:b4:39:95:1c:36: e9:69:3a:0e:ce:b2:b5:a4:db:e2:9f:79:e2:68:f0:91: 08:66:c3:28:f6:4b:26:49:a6:49:bb:d0:36:13:0b:ae: c4:77:0a:ab:c2:5a:49:65:b9:47:0a:bd:b1:38:9c:82: 42:89:e1:a0:be:f8:a3:4c:24:bd:74:54:0f:03:76:2c: 13:a4:a6:bd:a2:3f:a9:15:a8:0b:c2:31:8e:6d:db:ce: c9:d3:97:36:b9:ed:44:7e:ee:80:07:ef:a6:ce:e3:47: 8d:a8:7f:bf:49:a3:e1:a9:6b:37:b2:72:6c:9b:fb:bd: 1d:8c:c8:ab:fc:7c:aa:3f:64:52:e3:2a:d6:17:c5:d9: 4f:45:27:8e:64:b2:27:9c:60:14:13:96:c4:14:3c:34: bd:31:35:ad:b9:aa:65:4c:e1:b8:51:27:de:f4:af:ff: ac:f8:3f:51:bd:ed:1f:9d:99:e9:24:d9:9c:2b:2c:19: 21:c6:c0:3c:da:47:8f:e5:3f:d9:eb:1f:00:50:4f:a3: a4:b4:a8:0a:ed:7d:7c:f1:4d:61:34:eb:c4:62:27:44 Fingerprint (SHA-256): 84:04:D9:9B:56:6B:5C:AF:32:1A:5C:D1:E0:D5:7C:C9:96:A0:E1:2E:3F:3A:C2:6B:B3:B0:1D:85:FC:DF:E0:8E Fingerprint (SHA1): DC:AC:B5:41:02:23:74:6D:45:52:32:BF:1E:84:65:10:F4:28:F9:B5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #758: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #759: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034227 (0x3750adb3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Sep 28 03:55:36 2022 Not After : Wed Sep 28 03:55:36 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:13:de:0f:22:13:a9:9a:63:bd:aa:da:21:5a:db:a9: 7c:05:ce:cf:78:46:42:e1:72:ef:fb:cc:50:fc:56:3a: b5:5c:c3:a9:89:74:0b:c1:8f:4e:02:35:4a:ed:d8:06: 8f:47:85:d9:a5:45:18:77:3e:bc:a3:cc:5f:58:3f:f2: d4:1a:dd:cd:86:5f:8a:84:b6:9d:cb:25:67:17:e9:6d: 76:4f:dc:8e:e5:2a:7c:07:e7:fc:fe:e1:cb:b7:72:59: 98:94:b2:50:42:68:e3:13:e9:1d:14:c9:94:23:f6:64: 7d:a8:9c:b2:ff:5f:63:9c:10:e9:7c:2f:14:68:64:19: ae:45:52:ae:7e:8a:b7:bf:5d:47:6b:2a:cf:0b:27:ab: 63:91:62:82:a2:8c:ef:e6:ef:a5:0b:d7:72:0a:cd:80: f6:21:8a:ab:52:1b:31:f1:1a:46:e0:0c:27:25:af:10: 5c:89:5c:a9:85:bf:89:94:35:e4:e8:59:6c:0f:29:0f: 1b:9b:16:e6:45:f1:92:ef:a6:54:a7:44:53:2d:b8:78: 71:e3:56:12:dd:01:78:ae:fa:ed:70:2b:df:b3:ba:97: 6d:ca:47:48:df:89:c2:d6:14:7a:85:d4:a3:f8:65:42: d1:91:e4:6c:92:68:50:90:8c:72:3b:4b:af:58:0d:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:7a:82:d1:cf:3e:22:bb:b0:dd:8a:df:da:80:eb:24: e4:6c:17:69:f7:bd:27:b7:e9:f8:b8:6f:63:33:1d:71: 45:97:14:7c:d8:a2:7d:f0:9f:55:3b:68:20:b1:b8:1d: 74:d7:26:a4:3e:0e:33:40:c0:02:37:43:9c:ad:dd:2a: 54:df:e8:f1:25:1e:cb:7a:bf:7b:5e:c1:c7:c3:6e:d8: 5b:3c:af:a5:33:34:23:34:3b:bf:c0:3e:25:9a:08:dd: c8:53:a8:ae:24:cb:c5:89:5c:0e:7b:af:ee:85:d8:1b: ab:88:8b:07:d3:5f:76:f7:6a:fc:9a:be:61:00:58:ac: d7:34:ea:2c:33:f9:d4:46:46:96:a9:70:b5:86:65:8e: 26:5d:2e:88:da:f8:12:45:11:e7:7f:9b:d8:c3:f0:c5: 6b:10:ae:d9:73:43:98:55:6a:93:08:02:cd:85:68:25: e1:54:e9:ff:c3:a7:ee:79:15:58:72:08:66:17:57:d6: b6:e0:d1:a0:05:94:4e:7d:98:38:ce:b9:03:27:e9:f3: d2:97:80:06:73:2a:e8:bb:1d:ce:e0:e0:22:9c:39:89: aa:48:8b:a2:43:e4:da:0b:dd:38:e5:83:68:c1:8e:4b: a6:a1:05:fe:39:75:43:c5:7f:66:5a:b5:9c:b5:ca:ac Fingerprint (SHA-256): 8D:B1:E4:BD:69:73:CF:51:F6:4E:48:B2:28:CB:46:F7:FC:4F:94:DE:53:FA:16:15:7D:89:4D:97:9D:18:05:88 Fingerprint (SHA1): 66:73:BE:AA:F4:06:A1:EB:7C:75:7A:7D:13:62:BD:C3:B5:14:2C:85 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #760: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034228 (0x3750adb4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Sep 28 03:55:40 2022 Not After : Wed Sep 28 03:55:40 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:d3:09:d0:2c:e9:c6:18:7c:a0:6a:85:37:21:74:19: 61:2e:47:0e:72:cf:2f:1e:52:b7:43:0a:97:ff:8c:79: 9e:26:de:ff:6e:5d:0b:49:8f:80:40:96:a8:db:e6:22: db:53:e7:75:21:7e:40:13:1c:da:27:cd:e8:43:9c:bd: d3:77:25:35:ab:c6:57:9f:24:8b:b0:ed:5a:34:23:67: 1f:dc:e0:f2:f8:8e:36:02:e4:ba:bf:d2:b9:ab:78:79: c2:39:64:53:5e:01:6d:dc:0d:ab:01:ba:a6:72:3a:23: b2:1f:6e:f5:4a:4a:5e:03:8d:b4:50:8c:10:40:44:05: 51:5e:55:02:1c:fb:06:2d:d4:54:01:cf:57:43:c3:8e: 2a:8c:cc:d6:8c:77:a8:a7:34:a6:c7:fb:9e:f1:9b:64: 75:28:b9:9e:34:05:a8:c1:0f:81:5b:79:87:6b:d8:4b: 0a:5f:eb:4d:0f:fd:a3:b6:ad:02:55:fa:c7:e8:13:d9: a6:dc:ae:0a:d4:21:d4:3c:26:ec:5e:52:95:9d:10:df: e8:36:e7:62:3b:8b:29:e4:29:ab:03:eb:85:67:37:bb: 09:3a:5c:e3:90:67:71:e1:c0:9e:f3:89:c4:6a:5d:cd: 0e:af:70:18:8c:70:f0:10:f5:d2:2f:07:19:99:4d:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:ce:d8:a2:01:82:32:91:f9:cd:d5:b6:c5:0f:54:66: f9:f2:49:e6:83:e8:94:e5:21:2d:88:26:59:cb:94:15: 14:36:98:e6:0b:14:8a:c2:99:99:0d:b4:39:95:1c:36: e9:69:3a:0e:ce:b2:b5:a4:db:e2:9f:79:e2:68:f0:91: 08:66:c3:28:f6:4b:26:49:a6:49:bb:d0:36:13:0b:ae: c4:77:0a:ab:c2:5a:49:65:b9:47:0a:bd:b1:38:9c:82: 42:89:e1:a0:be:f8:a3:4c:24:bd:74:54:0f:03:76:2c: 13:a4:a6:bd:a2:3f:a9:15:a8:0b:c2:31:8e:6d:db:ce: c9:d3:97:36:b9:ed:44:7e:ee:80:07:ef:a6:ce:e3:47: 8d:a8:7f:bf:49:a3:e1:a9:6b:37:b2:72:6c:9b:fb:bd: 1d:8c:c8:ab:fc:7c:aa:3f:64:52:e3:2a:d6:17:c5:d9: 4f:45:27:8e:64:b2:27:9c:60:14:13:96:c4:14:3c:34: bd:31:35:ad:b9:aa:65:4c:e1:b8:51:27:de:f4:af:ff: ac:f8:3f:51:bd:ed:1f:9d:99:e9:24:d9:9c:2b:2c:19: 21:c6:c0:3c:da:47:8f:e5:3f:d9:eb:1f:00:50:4f:a3: a4:b4:a8:0a:ed:7d:7c:f1:4d:61:34:eb:c4:62:27:44 Fingerprint (SHA-256): 84:04:D9:9B:56:6B:5C:AF:32:1A:5C:D1:E0:D5:7C:C9:96:A0:E1:2E:3F:3A:C2:6B:B3:B0:1D:85:FC:DF:E0:8E Fingerprint (SHA1): DC:AC:B5:41:02:23:74:6D:45:52:32:BF:1E:84:65:10:F4:28:F9:B5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #761: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034228 (0x3750adb4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Sep 28 03:55:40 2022 Not After : Wed Sep 28 03:55:40 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:d3:09:d0:2c:e9:c6:18:7c:a0:6a:85:37:21:74:19: 61:2e:47:0e:72:cf:2f:1e:52:b7:43:0a:97:ff:8c:79: 9e:26:de:ff:6e:5d:0b:49:8f:80:40:96:a8:db:e6:22: db:53:e7:75:21:7e:40:13:1c:da:27:cd:e8:43:9c:bd: d3:77:25:35:ab:c6:57:9f:24:8b:b0:ed:5a:34:23:67: 1f:dc:e0:f2:f8:8e:36:02:e4:ba:bf:d2:b9:ab:78:79: c2:39:64:53:5e:01:6d:dc:0d:ab:01:ba:a6:72:3a:23: b2:1f:6e:f5:4a:4a:5e:03:8d:b4:50:8c:10:40:44:05: 51:5e:55:02:1c:fb:06:2d:d4:54:01:cf:57:43:c3:8e: 2a:8c:cc:d6:8c:77:a8:a7:34:a6:c7:fb:9e:f1:9b:64: 75:28:b9:9e:34:05:a8:c1:0f:81:5b:79:87:6b:d8:4b: 0a:5f:eb:4d:0f:fd:a3:b6:ad:02:55:fa:c7:e8:13:d9: a6:dc:ae:0a:d4:21:d4:3c:26:ec:5e:52:95:9d:10:df: e8:36:e7:62:3b:8b:29:e4:29:ab:03:eb:85:67:37:bb: 09:3a:5c:e3:90:67:71:e1:c0:9e:f3:89:c4:6a:5d:cd: 0e:af:70:18:8c:70:f0:10:f5:d2:2f:07:19:99:4d:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:ce:d8:a2:01:82:32:91:f9:cd:d5:b6:c5:0f:54:66: f9:f2:49:e6:83:e8:94:e5:21:2d:88:26:59:cb:94:15: 14:36:98:e6:0b:14:8a:c2:99:99:0d:b4:39:95:1c:36: e9:69:3a:0e:ce:b2:b5:a4:db:e2:9f:79:e2:68:f0:91: 08:66:c3:28:f6:4b:26:49:a6:49:bb:d0:36:13:0b:ae: c4:77:0a:ab:c2:5a:49:65:b9:47:0a:bd:b1:38:9c:82: 42:89:e1:a0:be:f8:a3:4c:24:bd:74:54:0f:03:76:2c: 13:a4:a6:bd:a2:3f:a9:15:a8:0b:c2:31:8e:6d:db:ce: c9:d3:97:36:b9:ed:44:7e:ee:80:07:ef:a6:ce:e3:47: 8d:a8:7f:bf:49:a3:e1:a9:6b:37:b2:72:6c:9b:fb:bd: 1d:8c:c8:ab:fc:7c:aa:3f:64:52:e3:2a:d6:17:c5:d9: 4f:45:27:8e:64:b2:27:9c:60:14:13:96:c4:14:3c:34: bd:31:35:ad:b9:aa:65:4c:e1:b8:51:27:de:f4:af:ff: ac:f8:3f:51:bd:ed:1f:9d:99:e9:24:d9:9c:2b:2c:19: 21:c6:c0:3c:da:47:8f:e5:3f:d9:eb:1f:00:50:4f:a3: a4:b4:a8:0a:ed:7d:7c:f1:4d:61:34:eb:c4:62:27:44 Fingerprint (SHA-256): 84:04:D9:9B:56:6B:5C:AF:32:1A:5C:D1:E0:D5:7C:C9:96:A0:E1:2E:3F:3A:C2:6B:B3:B0:1D:85:FC:DF:E0:8E Fingerprint (SHA1): DC:AC:B5:41:02:23:74:6D:45:52:32:BF:1E:84:65:10:F4:28:F9:B5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #762: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #763: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034235 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #764: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #765: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #766: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034236 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #767: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #768: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #769: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #770: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 928034237 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #771: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #772: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #773: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #774: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 928034238 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #775: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #776: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #777: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #778: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 928034239 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #779: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #780: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 928034240 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #781: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #782: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #783: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #784: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #785: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 928034241 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #786: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #787: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #788: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #789: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 928034242 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #790: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #791: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #792: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #793: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 928034243 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #794: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #795: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #796: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #797: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 928034244 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #798: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #799: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #800: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034235 (0x3750adbb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Sep 28 03:56:17 2022 Not After : Wed Sep 28 03:56:17 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:93:1a:56:9f:8e:bb:bb:70:e5:f8:3a:3d:ad:08:cf: 42:ca:92:57:1b:ba:11:2d:d0:d0:98:15:0b:48:4b:45: c2:ea:1f:ac:93:02:89:41:56:71:ab:60:e8:2c:4f:23: ff:4e:a0:19:2e:d9:8c:dc:86:e5:33:66:28:bf:7e:66: 48:e9:76:f0:7b:72:b3:54:0e:7e:a1:36:90:15:92:e2: 40:2a:2d:0e:c9:1a:8e:eb:3a:f4:d3:5b:f1:96:af:97: b6:7f:87:3d:48:c5:e9:00:37:80:7b:41:16:b5:d1:f6: e3:61:f1:13:7b:c5:07:ee:b9:0a:6b:83:38:ba:52:51: 90:28:48:e2:a9:ed:8b:b7:4c:39:a1:49:b2:5c:ec:6c: 00:e3:1b:3b:0d:31:64:f4:0b:c6:09:b6:0e:84:08:3e: 9e:8e:9e:40:bd:f9:92:ee:34:47:d8:5f:0f:2e:93:4b: a8:c9:c4:fb:65:1a:30:30:a9:f1:f1:c8:75:fb:5a:c7: 7a:33:af:7c:da:a1:c0:ab:63:18:13:d8:01:08:de:fc: f3:87:c2:2b:67:ac:8e:af:45:91:79:ce:42:06:af:40: 35:52:c3:f9:29:d5:32:63:25:bd:ab:27:f2:71:e6:9f: 2b:05:4f:e2:13:9a:27:81:19:de:df:57:d5:be:47:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:22:f1:73:64:10:5c:95:ed:ab:5f:61:dc:5d:6c:56: 11:ba:7c:a2:33:19:9b:43:fe:ac:12:af:8f:70:c9:aa: 65:fc:08:56:41:60:52:3a:21:93:c6:ee:c4:e5:1b:6d: 9d:55:31:fb:28:f9:23:a9:88:40:12:55:e5:42:73:ff: 65:7b:13:78:6e:22:4d:91:5c:88:3d:65:5d:15:66:ab: 2f:31:b5:62:44:64:f1:38:71:fb:f9:52:db:05:a9:47: 12:f9:d6:10:a7:49:3e:91:52:b6:3c:f7:9c:fe:75:15: 5e:ef:f6:7a:3e:f4:06:1a:c8:98:05:96:f3:80:ea:90: 6a:03:6b:7e:71:42:55:f3:b4:06:63:a9:2a:4c:46:2b: 68:cd:6f:14:7f:80:ae:f5:73:b1:9b:c3:35:cc:d4:d8: d9:88:5a:09:87:c5:fb:ec:64:d7:f5:93:35:0d:43:10: 66:8e:af:e5:4a:29:1e:7e:9b:dc:db:6a:ea:ea:32:2e: 79:dd:d4:7b:75:62:42:0a:41:6f:6f:ee:55:26:55:23: ee:30:c5:ef:d0:1f:0c:a7:fa:6d:a8:9f:33:17:99:b3: ed:4f:50:d3:c9:09:fb:fa:56:98:6b:10:00:82:dd:52: 8a:10:99:35:9a:87:e5:e7:b2:9c:7b:bd:f8:e3:8d:b1 Fingerprint (SHA-256): ED:3A:9F:F2:56:33:84:5A:DD:09:B6:1B:5A:E1:F2:9C:2F:DC:C7:FE:B5:D3:8E:4E:3D:E0:D6:6A:0B:2D:74:E7 Fingerprint (SHA1): 65:C4:A8:E4:CF:CB:57:14:EA:FA:2C:56:5A:42:36:B7:08:D5:25:A5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #801: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #802: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #803: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #804: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #805: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #806: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #807: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #808: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #809: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034236 (0x3750adbc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Sep 28 03:56:22 2022 Not After : Wed Sep 28 03:56:22 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:14:79:52:2d:19:7c:f2:04:d8:98:2e:4a:60:c3:d1: ca:35:d5:1d:e8:7a:2b:02:6b:19:00:20:8e:f0:74:eb: 4b:e7:bb:7d:ff:53:3d:3c:bf:bc:b0:e9:f2:ef:6d:2f: 23:4a:03:ec:f0:37:1d:b7:99:d6:80:eb:59:c1:3b:a7: aa:73:5d:a8:ac:b5:1a:dc:ee:8d:ae:0b:c6:f4:73:8e: 13:90:6a:87:d7:4a:95:de:84:0f:ca:b1:5a:7a:f9:dc: 2f:25:cf:d5:8b:5d:34:01:01:2c:f5:69:36:29:83:0c: 03:73:e0:43:3e:15:c5:90:f1:72:e4:8e:4a:71:a8:cd: 1b:fe:a3:ce:98:20:a6:16:ae:f3:69:00:0d:e6:c6:de: f6:e4:16:77:56:13:52:0a:7c:d8:82:57:7e:30:d4:ac: ba:90:1e:e9:7e:24:32:95:e4:06:80:a8:5e:98:e9:89: 20:b9:74:e6:9f:f9:d4:8d:31:b2:66:7b:66:1b:5e:0e: 86:b5:66:4c:a3:d4:12:4d:91:02:7a:fe:eb:56:ea:bf: 90:0f:b3:6c:ef:3d:7e:33:5a:9a:76:52:32:b7:ae:eb: fb:ea:71:56:30:8a:e7:9e:46:7e:5e:22:5e:f0:c8:2c: 4b:16:13:0a:82:c6:06:b6:41:eb:fb:44:f3:d1:8f:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:de:ef:7d:02:85:d6:c7:54:d7:37:16:c8:4d:30:5a: fc:d2:6f:55:5e:54:a0:cd:48:7a:de:ae:95:ce:a3:12: f2:9f:c3:a0:cf:70:69:ce:af:78:50:b9:9d:ef:a0:2b: 6d:44:86:72:99:d7:08:8f:cc:d2:6e:6d:88:e7:07:cb: af:a0:fd:fc:9a:34:56:da:6b:f7:c5:fa:c4:56:53:ee: bb:a5:69:0f:d2:55:d2:71:58:2d:f6:80:f4:e1:83:6c: c8:c3:e0:17:a0:f9:71:dd:0a:bc:cc:11:a9:17:4b:54: 49:b4:83:26:12:b0:0f:ed:0b:2b:b3:a4:fa:a9:1e:c6: 6d:04:c6:41:94:83:9d:8f:a6:18:a4:70:08:36:9a:a9: bd:e0:a5:21:00:e6:13:31:06:d1:b7:74:56:81:8e:c5: cf:4b:fd:98:ce:d7:b9:bf:6b:2f:23:da:c4:8d:2b:5a: 23:f9:5c:15:7a:9b:2f:78:04:a3:cf:96:d9:9f:b6:f5: 2d:28:36:c1:ec:1b:fe:08:d0:11:c3:df:d6:ab:9e:d3: 8a:65:4f:14:c4:05:cc:59:f9:40:6f:40:5e:aa:12:c7: 19:87:6d:d8:ad:ca:1a:57:15:34:84:21:a4:ec:4e:bd: e9:a6:54:07:f5:cc:58:b3:e5:53:9a:83:92:df:52:36 Fingerprint (SHA-256): E8:1A:6B:46:42:C7:6F:43:EB:ED:68:7C:2B:CE:E5:48:17:F9:F3:0A:8C:1A:C5:98:A8:31:0B:2F:66:2C:61:5C Fingerprint (SHA1): E5:2D:53:47:41:49:19:6D:A0:40:46:C3:76:C9:95:34:93:11:D4:2B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #810: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #811: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #812: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #813: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #814: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #815: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #816: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #817: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #818: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #819: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #820: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #821: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #822: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #823: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #824: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #825: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #826: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #827: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #828: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034245 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #829: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #830: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #831: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #832: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 928034246 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #833: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #834: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #835: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #836: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 928034247 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #837: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #838: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #839: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #840: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 928034248 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #841: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #842: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #843: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #844: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 928034249 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #845: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #846: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #847: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #848: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 928034250 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #849: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #850: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #851: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #852: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 928034251 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #853: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #854: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #855: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #856: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 928034252 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #857: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #858: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #859: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #860: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 928034253 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #861: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #862: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #863: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034245 (0x3750adc5) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:57:18 2022 Not After : Wed Sep 28 03:57:18 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 3c:1a:03:bd:be:eb:2e:1c:7b:eb:f8:24:48:93:13:f8: 23:95:ed:cc:66:9a:0a:ce:56:22:5a:27:61:8a:fe:4e: e6:36:70:c0:c3:b6:d5:c9:6e:37:e1:b3:fe:d0:f4:37: 24:a2:3f:ba:29:0c:72:cb:b4:83:1a:b5:81:12:f7:94: 5d:6a:bc:bb:c4:aa:74:29:c7:32:e8:0c:cc:54:8a:23: cb:71:33:09:f7:20:b5:19:ad:56:97:d5:5b:f3:a7:e8: 58:28:d2:c5:bd:89:90:40:91:7b:76:5a:9b:6d:cf:d4: bc:25:38:66:d5:bf:04:04:8f:f6:17:ab:7e:a3:a7:26: 69:57:06:3f:ac:27:68:7d:a4:93:98:1a:7c:75:2a:be: 76:1d:d0:bf:c6:1e:89:8a:8c:af:8a:bc:4c:cf:a2:12: a5:98:48:a2:2e:ae:b7:4e:13:55:e7:41:2e:e3:55:b5: 68:55:cf:a8:df:ff:c0:e5:e6:86:98:47:92:cf:6c:f8: e5:11:83:61:64:3f:8d:d2:a4:b5:be:79:99:ca:04:51: 01:98:80:f9:20:8a:4b:9f:03:c6:f0:b2:d3:de:28:5d: c2:e0:49:c3:a4:ab:98:a0:de:88:9c:99:75:06:f2:6f: 01:0a:a0:cc:8f:d9:1c:83:b6:1e:aa:64:bf:53:eb:0a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:c2:04:46:e8:f2:52:a7:25:70:9e:cb: cc:71:57:2f:86:e8:9c:36:1e:a2:7a:e0:bf:17:06:df: b3:02:1c:3a:d3:8b:7b:c7:d7:81:e7:ac:3e:f9:b9:88: 54:87:e5:ff:d3:a3:d8:7b:94:36:7e:02:3d:ae:10 Fingerprint (SHA-256): AE:14:DA:8F:A5:C3:85:11:F9:77:9B:1C:98:1F:7A:B5:E6:55:A4:C4:6F:10:79:AC:C3:AF:6B:A6:95:69:F2:36 Fingerprint (SHA1): A3:3E:3F:A7:F1:1E:66:BF:FB:9B:68:C4:F2:96:CC:C3:AC:13:BB:EC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #864: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034245 (0x3750adc5) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:57:18 2022 Not After : Wed Sep 28 03:57:18 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 3c:1a:03:bd:be:eb:2e:1c:7b:eb:f8:24:48:93:13:f8: 23:95:ed:cc:66:9a:0a:ce:56:22:5a:27:61:8a:fe:4e: e6:36:70:c0:c3:b6:d5:c9:6e:37:e1:b3:fe:d0:f4:37: 24:a2:3f:ba:29:0c:72:cb:b4:83:1a:b5:81:12:f7:94: 5d:6a:bc:bb:c4:aa:74:29:c7:32:e8:0c:cc:54:8a:23: cb:71:33:09:f7:20:b5:19:ad:56:97:d5:5b:f3:a7:e8: 58:28:d2:c5:bd:89:90:40:91:7b:76:5a:9b:6d:cf:d4: bc:25:38:66:d5:bf:04:04:8f:f6:17:ab:7e:a3:a7:26: 69:57:06:3f:ac:27:68:7d:a4:93:98:1a:7c:75:2a:be: 76:1d:d0:bf:c6:1e:89:8a:8c:af:8a:bc:4c:cf:a2:12: a5:98:48:a2:2e:ae:b7:4e:13:55:e7:41:2e:e3:55:b5: 68:55:cf:a8:df:ff:c0:e5:e6:86:98:47:92:cf:6c:f8: e5:11:83:61:64:3f:8d:d2:a4:b5:be:79:99:ca:04:51: 01:98:80:f9:20:8a:4b:9f:03:c6:f0:b2:d3:de:28:5d: c2:e0:49:c3:a4:ab:98:a0:de:88:9c:99:75:06:f2:6f: 01:0a:a0:cc:8f:d9:1c:83:b6:1e:aa:64:bf:53:eb:0a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:c2:04:46:e8:f2:52:a7:25:70:9e:cb: cc:71:57:2f:86:e8:9c:36:1e:a2:7a:e0:bf:17:06:df: b3:02:1c:3a:d3:8b:7b:c7:d7:81:e7:ac:3e:f9:b9:88: 54:87:e5:ff:d3:a3:d8:7b:94:36:7e:02:3d:ae:10 Fingerprint (SHA-256): AE:14:DA:8F:A5:C3:85:11:F9:77:9B:1C:98:1F:7A:B5:E6:55:A4:C4:6F:10:79:AC:C3:AF:6B:A6:95:69:F2:36 Fingerprint (SHA1): A3:3E:3F:A7:F1:1E:66:BF:FB:9B:68:C4:F2:96:CC:C3:AC:13:BB:EC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #865: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034245 (0x3750adc5) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:57:18 2022 Not After : Wed Sep 28 03:57:18 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 3c:1a:03:bd:be:eb:2e:1c:7b:eb:f8:24:48:93:13:f8: 23:95:ed:cc:66:9a:0a:ce:56:22:5a:27:61:8a:fe:4e: e6:36:70:c0:c3:b6:d5:c9:6e:37:e1:b3:fe:d0:f4:37: 24:a2:3f:ba:29:0c:72:cb:b4:83:1a:b5:81:12:f7:94: 5d:6a:bc:bb:c4:aa:74:29:c7:32:e8:0c:cc:54:8a:23: cb:71:33:09:f7:20:b5:19:ad:56:97:d5:5b:f3:a7:e8: 58:28:d2:c5:bd:89:90:40:91:7b:76:5a:9b:6d:cf:d4: bc:25:38:66:d5:bf:04:04:8f:f6:17:ab:7e:a3:a7:26: 69:57:06:3f:ac:27:68:7d:a4:93:98:1a:7c:75:2a:be: 76:1d:d0:bf:c6:1e:89:8a:8c:af:8a:bc:4c:cf:a2:12: a5:98:48:a2:2e:ae:b7:4e:13:55:e7:41:2e:e3:55:b5: 68:55:cf:a8:df:ff:c0:e5:e6:86:98:47:92:cf:6c:f8: e5:11:83:61:64:3f:8d:d2:a4:b5:be:79:99:ca:04:51: 01:98:80:f9:20:8a:4b:9f:03:c6:f0:b2:d3:de:28:5d: c2:e0:49:c3:a4:ab:98:a0:de:88:9c:99:75:06:f2:6f: 01:0a:a0:cc:8f:d9:1c:83:b6:1e:aa:64:bf:53:eb:0a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:c2:04:46:e8:f2:52:a7:25:70:9e:cb: cc:71:57:2f:86:e8:9c:36:1e:a2:7a:e0:bf:17:06:df: b3:02:1c:3a:d3:8b:7b:c7:d7:81:e7:ac:3e:f9:b9:88: 54:87:e5:ff:d3:a3:d8:7b:94:36:7e:02:3d:ae:10 Fingerprint (SHA-256): AE:14:DA:8F:A5:C3:85:11:F9:77:9B:1C:98:1F:7A:B5:E6:55:A4:C4:6F:10:79:AC:C3:AF:6B:A6:95:69:F2:36 Fingerprint (SHA1): A3:3E:3F:A7:F1:1E:66:BF:FB:9B:68:C4:F2:96:CC:C3:AC:13:BB:EC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #866: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034245 (0x3750adc5) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:57:18 2022 Not After : Wed Sep 28 03:57:18 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 3c:1a:03:bd:be:eb:2e:1c:7b:eb:f8:24:48:93:13:f8: 23:95:ed:cc:66:9a:0a:ce:56:22:5a:27:61:8a:fe:4e: e6:36:70:c0:c3:b6:d5:c9:6e:37:e1:b3:fe:d0:f4:37: 24:a2:3f:ba:29:0c:72:cb:b4:83:1a:b5:81:12:f7:94: 5d:6a:bc:bb:c4:aa:74:29:c7:32:e8:0c:cc:54:8a:23: cb:71:33:09:f7:20:b5:19:ad:56:97:d5:5b:f3:a7:e8: 58:28:d2:c5:bd:89:90:40:91:7b:76:5a:9b:6d:cf:d4: bc:25:38:66:d5:bf:04:04:8f:f6:17:ab:7e:a3:a7:26: 69:57:06:3f:ac:27:68:7d:a4:93:98:1a:7c:75:2a:be: 76:1d:d0:bf:c6:1e:89:8a:8c:af:8a:bc:4c:cf:a2:12: a5:98:48:a2:2e:ae:b7:4e:13:55:e7:41:2e:e3:55:b5: 68:55:cf:a8:df:ff:c0:e5:e6:86:98:47:92:cf:6c:f8: e5:11:83:61:64:3f:8d:d2:a4:b5:be:79:99:ca:04:51: 01:98:80:f9:20:8a:4b:9f:03:c6:f0:b2:d3:de:28:5d: c2:e0:49:c3:a4:ab:98:a0:de:88:9c:99:75:06:f2:6f: 01:0a:a0:cc:8f:d9:1c:83:b6:1e:aa:64:bf:53:eb:0a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:c2:04:46:e8:f2:52:a7:25:70:9e:cb: cc:71:57:2f:86:e8:9c:36:1e:a2:7a:e0:bf:17:06:df: b3:02:1c:3a:d3:8b:7b:c7:d7:81:e7:ac:3e:f9:b9:88: 54:87:e5:ff:d3:a3:d8:7b:94:36:7e:02:3d:ae:10 Fingerprint (SHA-256): AE:14:DA:8F:A5:C3:85:11:F9:77:9B:1C:98:1F:7A:B5:E6:55:A4:C4:6F:10:79:AC:C3:AF:6B:A6:95:69:F2:36 Fingerprint (SHA1): A3:3E:3F:A7:F1:1E:66:BF:FB:9B:68:C4:F2:96:CC:C3:AC:13:BB:EC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #867: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #868: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 10 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #869: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #870: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #871: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #872: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #873: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #874: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #875: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #876: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #877: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #878: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #879: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #880: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #881: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #882: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #883: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #884: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #885: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #886: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #887: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #888: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #889: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #890: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #891: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #892: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #893: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #894: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20220928035828Z nextupdate=20230928035828Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Sep 28 03:58:28 2022 Next Update: Thu Sep 28 03:58:28 2023 CRL Extensions: chains.sh: #895: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220928035830Z nextupdate=20230928035830Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Sep 28 03:58:30 2022 Next Update: Thu Sep 28 03:58:30 2023 CRL Extensions: chains.sh: #896: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20220928035832Z nextupdate=20230928035832Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Sep 28 03:58:32 2022 Next Update: Thu Sep 28 03:58:32 2023 CRL Extensions: chains.sh: #897: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20220928035834Z nextupdate=20230928035834Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Sep 28 03:58:34 2022 Next Update: Thu Sep 28 03:58:34 2023 CRL Extensions: chains.sh: #898: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20220928035836Z addcert 14 20220928035836Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Sep 28 03:58:36 2022 Next Update: Thu Sep 28 03:58:32 2023 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Wed Sep 28 03:58:36 2022 CRL Extensions: chains.sh: #899: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220928035838Z addcert 15 20220928035838Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Sep 28 03:58:38 2022 Next Update: Thu Sep 28 03:58:30 2023 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Wed Sep 28 03:58:38 2022 CRL Extensions: chains.sh: #900: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #901: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #902: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #903: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #904: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #905: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #906: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #907: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #908: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #909: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:57:54 2022 Not After : Wed Sep 28 03:57:54 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:51:1d:92:7f:54:5a:e3:89:5d:c1:4c:4d:b7:3e:f9: 2f:ef:f0:3a:59:c1:7a:2c:c4:e2:96:34:c9:f1:5a:56: 59:66:0e:ca:1c:25:9d:3a:56:67:81:69:f3:2f:31:a8: 79:75:ee:61:2f:f2:64:94:e5:9a:20:47:d3:b6:8e:55: 43:d0:f8:87:1b:9d:06:86:9c:63:2b:52:bc:ff:ab:40: 5f:d5:44:ca:c6:a6:c1:d5:fd:c5:98:d1:c5:04:f4:d5: e0:9a:30:a6:ac:45:2a:39:0e:80:2a:ab:ab:b4:e2:d5: fe:23:f6:3c:74:32:b2:87:a1:13:76:77:fb:d4:03:a7: a7:56:d7:95:cf:0d:08:45:97:47:87:3e:d7:10:c9:2e: 8f:49:8c:d6:9b:d5:35:76:8f:a1:e7:69:20:38:51:9f: 8f:4d:fa:66:b3:c8:b4:37:24:cd:ab:6e:c4:a4:4e:de: 9d:9b:cd:b4:e6:5e:be:80:17:83:55:25:ad:b6:02:b0: 4b:0b:1f:0e:32:1d:72:a2:f0:5d:ec:c3:54:6e:b9:fa: 98:2d:6e:28:bf:d3:2b:30:1d:e0:b4:c0:1d:8d:94:78: bc:49:db:18:c7:ce:d7:75:53:7f:e7:d8:c0:c4:24:b2: 71:1a:de:ad:76:9e:c5:11:e9:ec:f3:dc:0a:39:cf:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:e9:2a:c3:76:43:17:90:1a:05:94:33:2a:46:ff:15: 6a:39:18:45:86:dc:1b:ed:39:5a:94:26:8e:a4:3a:f2: 0f:39:cd:e2:76:35:32:3f:6f:32:26:5e:94:0c:a2:c9: f5:78:d5:57:b0:e8:42:16:cc:40:cb:da:ad:b0:3c:8a: 80:cf:e0:97:e0:fe:20:6d:f0:6f:79:32:a4:61:0e:c0: 2d:45:52:dd:5f:e0:de:3f:24:03:01:83:99:e9:d8:b0: b7:5a:2f:d5:54:fa:28:7f:c6:95:b5:a5:79:e4:1f:45: 79:c2:da:64:af:53:da:ef:3a:4a:dc:87:01:8d:30:38: f4:88:b7:e3:cc:8b:11:32:1c:dd:33:fd:14:bf:c7:3e: 3b:0d:b0:59:ad:d8:2b:5a:4a:65:7f:07:e5:ae:d9:b9: 83:31:a3:00:dd:ac:43:d7:df:9c:c9:11:d5:fc:8b:3c: f7:5e:be:ff:2e:17:f3:dd:8a:9b:74:b7:9a:2a:7d:3a: 30:d7:a2:67:20:94:68:a5:0c:0f:2e:f2:74:f2:4b:c1: 0d:98:07:a3:14:3d:1b:46:65:21:eb:ed:14:fe:6f:bb: c1:4b:2d:c8:07:9b:fc:75:6c:0e:6f:94:33:8f:d2:7b: 8b:b2:a6:35:21:87:c0:78:4a:46:e8:a6:1f:97:11:01 Fingerprint (SHA-256): F3:02:EE:2D:93:E4:46:33:DE:33:EA:02:D4:3B:BE:07:3F:83:42:2D:E0:E7:DC:9D:04:98:24:F7:07:AE:45:86 Fingerprint (SHA1): D2:9C:83:F6:0A:36:30:0B:D1:09:9E:92:73:08:5F:10:46:51:8F:70 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #910: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #911: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:57:54 2022 Not After : Wed Sep 28 03:57:54 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:51:1d:92:7f:54:5a:e3:89:5d:c1:4c:4d:b7:3e:f9: 2f:ef:f0:3a:59:c1:7a:2c:c4:e2:96:34:c9:f1:5a:56: 59:66:0e:ca:1c:25:9d:3a:56:67:81:69:f3:2f:31:a8: 79:75:ee:61:2f:f2:64:94:e5:9a:20:47:d3:b6:8e:55: 43:d0:f8:87:1b:9d:06:86:9c:63:2b:52:bc:ff:ab:40: 5f:d5:44:ca:c6:a6:c1:d5:fd:c5:98:d1:c5:04:f4:d5: e0:9a:30:a6:ac:45:2a:39:0e:80:2a:ab:ab:b4:e2:d5: fe:23:f6:3c:74:32:b2:87:a1:13:76:77:fb:d4:03:a7: a7:56:d7:95:cf:0d:08:45:97:47:87:3e:d7:10:c9:2e: 8f:49:8c:d6:9b:d5:35:76:8f:a1:e7:69:20:38:51:9f: 8f:4d:fa:66:b3:c8:b4:37:24:cd:ab:6e:c4:a4:4e:de: 9d:9b:cd:b4:e6:5e:be:80:17:83:55:25:ad:b6:02:b0: 4b:0b:1f:0e:32:1d:72:a2:f0:5d:ec:c3:54:6e:b9:fa: 98:2d:6e:28:bf:d3:2b:30:1d:e0:b4:c0:1d:8d:94:78: bc:49:db:18:c7:ce:d7:75:53:7f:e7:d8:c0:c4:24:b2: 71:1a:de:ad:76:9e:c5:11:e9:ec:f3:dc:0a:39:cf:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:e9:2a:c3:76:43:17:90:1a:05:94:33:2a:46:ff:15: 6a:39:18:45:86:dc:1b:ed:39:5a:94:26:8e:a4:3a:f2: 0f:39:cd:e2:76:35:32:3f:6f:32:26:5e:94:0c:a2:c9: f5:78:d5:57:b0:e8:42:16:cc:40:cb:da:ad:b0:3c:8a: 80:cf:e0:97:e0:fe:20:6d:f0:6f:79:32:a4:61:0e:c0: 2d:45:52:dd:5f:e0:de:3f:24:03:01:83:99:e9:d8:b0: b7:5a:2f:d5:54:fa:28:7f:c6:95:b5:a5:79:e4:1f:45: 79:c2:da:64:af:53:da:ef:3a:4a:dc:87:01:8d:30:38: f4:88:b7:e3:cc:8b:11:32:1c:dd:33:fd:14:bf:c7:3e: 3b:0d:b0:59:ad:d8:2b:5a:4a:65:7f:07:e5:ae:d9:b9: 83:31:a3:00:dd:ac:43:d7:df:9c:c9:11:d5:fc:8b:3c: f7:5e:be:ff:2e:17:f3:dd:8a:9b:74:b7:9a:2a:7d:3a: 30:d7:a2:67:20:94:68:a5:0c:0f:2e:f2:74:f2:4b:c1: 0d:98:07:a3:14:3d:1b:46:65:21:eb:ed:14:fe:6f:bb: c1:4b:2d:c8:07:9b:fc:75:6c:0e:6f:94:33:8f:d2:7b: 8b:b2:a6:35:21:87:c0:78:4a:46:e8:a6:1f:97:11:01 Fingerprint (SHA-256): F3:02:EE:2D:93:E4:46:33:DE:33:EA:02:D4:3B:BE:07:3F:83:42:2D:E0:E7:DC:9D:04:98:24:F7:07:AE:45:86 Fingerprint (SHA1): D2:9C:83:F6:0A:36:30:0B:D1:09:9E:92:73:08:5F:10:46:51:8F:70 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #912: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #913: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #914: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034254 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #915: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #916: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #917: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #918: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 928034255 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #919: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #920: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #921: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-928034130.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #922: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-928034114.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #923: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #924: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #925: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-928034130.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #926: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 928034256 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #927: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #928: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #929: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-928034130.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #930: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-928034115.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #931: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #932: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #933: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #934: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 928034257 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #935: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #936: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #937: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-928034130.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #938: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-928034116.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #939: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #940: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #941: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-928034130.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #942: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-928034117.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #943: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #944: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20220928035932Z nextupdate=20230928035932Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Sep 28 03:59:32 2022 Next Update: Thu Sep 28 03:59:32 2023 CRL Extensions: chains.sh: #945: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220928035934Z nextupdate=20230928035934Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Sep 28 03:59:34 2022 Next Update: Thu Sep 28 03:59:34 2023 CRL Extensions: chains.sh: #946: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20220928035936Z nextupdate=20230928035936Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Sep 28 03:59:36 2022 Next Update: Thu Sep 28 03:59:36 2023 CRL Extensions: chains.sh: #947: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20220928035938Z nextupdate=20230928035938Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Sep 28 03:59:38 2022 Next Update: Thu Sep 28 03:59:38 2023 CRL Extensions: chains.sh: #948: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220928035940Z addcert 20 20220928035940Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Sep 28 03:59:40 2022 Next Update: Thu Sep 28 03:59:34 2023 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Sep 28 03:59:40 2022 CRL Extensions: chains.sh: #949: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220928035942Z addcert 40 20220928035942Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Sep 28 03:59:42 2022 Next Update: Thu Sep 28 03:59:34 2023 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Sep 28 03:59:40 2022 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Wed Sep 28 03:59:42 2022 CRL Extensions: chains.sh: #950: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #951: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #952: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #953: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034254 (0x3750adce) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:58:49 2022 Not After : Wed Sep 28 03:58:49 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:69:3b:10:4f:eb:db:c9:ba:7b:85:1e:20:78:e9:46: a2:cf:a4:c7:58:dd:2a:d0:3d:02:3b:ca:83:8a:28:ed: b8:e2:90:d0:d9:d8:ce:77:07:bd:2f:4c:22:3f:f5:c7: 24:7a:05:46:83:75:e5:d4:82:4a:7d:b7:cf:1d:67:0a: 5f:81:26:2c:27:9b:57:19:b8:da:aa:9d:7a:95:c6:22: 33:8c:9f:aa:ee:b8:24:9b:27:de:75:a1:a4:f1:a7:c2: 96:de:86:fa:b6:14:58:f3:87:34:d5:02:83:75:ce:f6: 51:21:f7:5c:da:3d:39:84:de:01:93:0b:df:00:9e:b1: ee:36:74:fb:34:6b:c1:a7:ac:d5:15:f4:2a:7b:1c:c1: c2:94:55:04:98:bb:85:67:7b:76:98:fd:e8:c3:72:ce: 17:c3:b1:6d:24:70:45:97:59:6d:f5:46:ad:ac:14:c0: 92:3b:20:fe:8d:81:ec:f8:8a:94:8d:a6:a2:2d:44:34: 5b:0c:c0:85:12:a4:d4:02:3d:53:39:8e:ae:36:51:ce: d3:2e:91:de:15:86:34:96:43:58:63:82:ba:07:79:66: 42:7b:58:45:36:3a:f2:04:38:b1:1f:32:3d:f6:6a:7a: 5f:3d:a5:70:60:b5:ea:a8:a9:cd:41:56:62:70:14:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:a9:c3:7a:11:0e:6a:35:e5:7b:b4:67:02:25:ae:1e: dd:9c:95:ae:8a:44:3a:7d:6a:b1:13:1c:f8:29:57:29: a6:00:5e:cd:7d:62:77:76:97:3b:8d:6a:e0:93:5d:eb: 87:36:02:95:4d:57:00:23:d7:4a:bb:3a:d8:a3:50:99: e8:e2:9d:1b:d1:06:45:25:b5:dc:4e:b9:64:81:a0:c3: 83:e5:36:10:e3:86:a8:6c:e9:9f:e1:e0:68:31:86:fc: 56:25:2f:b0:0f:4b:cb:df:8a:34:b7:20:49:57:fd:90: 37:43:09:e2:c0:19:f2:9e:8f:91:c4:28:0f:37:eb:13: 90:c6:88:68:fa:6f:3b:0a:c9:ab:dc:a1:ba:1d:05:54: 7c:82:41:36:c3:95:fb:5d:ae:42:40:20:c4:77:0f:17: ca:27:cb:97:2f:b1:bb:96:cf:01:4e:e4:77:1f:f0:72: 08:39:65:50:f1:7b:df:df:6a:8a:78:b0:4f:0b:33:f9: 8b:3b:2f:0e:64:67:35:fb:40:49:31:7b:8d:d5:f2:44: 47:3e:26:77:69:77:3b:b4:59:bb:bd:90:52:ed:ff:98: 3c:ff:54:12:f0:24:32:d1:75:4a:6f:d7:b8:f5:c3:ea: 40:4a:7a:de:82:24:fc:2f:89:5a:2d:7c:b8:fb:29:c8 Fingerprint (SHA-256): 78:4E:78:78:4A:AD:FD:D1:54:1E:21:B6:3C:5E:0E:26:99:36:36:37:56:9A:1B:28:13:2C:FD:4E:8D:A2:09:4F Fingerprint (SHA1): 79:84:4D:B6:7D:4D:B4:6B:27:28:FF:AD:8A:97:36:4C:21:97:FE:D2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #954: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #955: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034254 (0x3750adce) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 03:58:49 2022 Not After : Wed Sep 28 03:58:49 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:69:3b:10:4f:eb:db:c9:ba:7b:85:1e:20:78:e9:46: a2:cf:a4:c7:58:dd:2a:d0:3d:02:3b:ca:83:8a:28:ed: b8:e2:90:d0:d9:d8:ce:77:07:bd:2f:4c:22:3f:f5:c7: 24:7a:05:46:83:75:e5:d4:82:4a:7d:b7:cf:1d:67:0a: 5f:81:26:2c:27:9b:57:19:b8:da:aa:9d:7a:95:c6:22: 33:8c:9f:aa:ee:b8:24:9b:27:de:75:a1:a4:f1:a7:c2: 96:de:86:fa:b6:14:58:f3:87:34:d5:02:83:75:ce:f6: 51:21:f7:5c:da:3d:39:84:de:01:93:0b:df:00:9e:b1: ee:36:74:fb:34:6b:c1:a7:ac:d5:15:f4:2a:7b:1c:c1: c2:94:55:04:98:bb:85:67:7b:76:98:fd:e8:c3:72:ce: 17:c3:b1:6d:24:70:45:97:59:6d:f5:46:ad:ac:14:c0: 92:3b:20:fe:8d:81:ec:f8:8a:94:8d:a6:a2:2d:44:34: 5b:0c:c0:85:12:a4:d4:02:3d:53:39:8e:ae:36:51:ce: d3:2e:91:de:15:86:34:96:43:58:63:82:ba:07:79:66: 42:7b:58:45:36:3a:f2:04:38:b1:1f:32:3d:f6:6a:7a: 5f:3d:a5:70:60:b5:ea:a8:a9:cd:41:56:62:70:14:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:a9:c3:7a:11:0e:6a:35:e5:7b:b4:67:02:25:ae:1e: dd:9c:95:ae:8a:44:3a:7d:6a:b1:13:1c:f8:29:57:29: a6:00:5e:cd:7d:62:77:76:97:3b:8d:6a:e0:93:5d:eb: 87:36:02:95:4d:57:00:23:d7:4a:bb:3a:d8:a3:50:99: e8:e2:9d:1b:d1:06:45:25:b5:dc:4e:b9:64:81:a0:c3: 83:e5:36:10:e3:86:a8:6c:e9:9f:e1:e0:68:31:86:fc: 56:25:2f:b0:0f:4b:cb:df:8a:34:b7:20:49:57:fd:90: 37:43:09:e2:c0:19:f2:9e:8f:91:c4:28:0f:37:eb:13: 90:c6:88:68:fa:6f:3b:0a:c9:ab:dc:a1:ba:1d:05:54: 7c:82:41:36:c3:95:fb:5d:ae:42:40:20:c4:77:0f:17: ca:27:cb:97:2f:b1:bb:96:cf:01:4e:e4:77:1f:f0:72: 08:39:65:50:f1:7b:df:df:6a:8a:78:b0:4f:0b:33:f9: 8b:3b:2f:0e:64:67:35:fb:40:49:31:7b:8d:d5:f2:44: 47:3e:26:77:69:77:3b:b4:59:bb:bd:90:52:ed:ff:98: 3c:ff:54:12:f0:24:32:d1:75:4a:6f:d7:b8:f5:c3:ea: 40:4a:7a:de:82:24:fc:2f:89:5a:2d:7c:b8:fb:29:c8 Fingerprint (SHA-256): 78:4E:78:78:4A:AD:FD:D1:54:1E:21:B6:3C:5E:0E:26:99:36:36:37:56:9A:1B:28:13:2C:FD:4E:8D:A2:09:4F Fingerprint (SHA1): 79:84:4D:B6:7D:4D:B4:6B:27:28:FF:AD:8A:97:36:4C:21:97:FE:D2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #956: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #957: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #958: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034258 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #959: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #960: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #961: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #962: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 928034259 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #963: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #964: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #965: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #966: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 928034260 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #967: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #968: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #969: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #970: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 928034261 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #971: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #972: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #973: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034262 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #974: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #975: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #976: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #977: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 928034263 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #978: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #979: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #980: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #981: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 928034264 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #982: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #983: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #984: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #985: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #986: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034258 (0x3750add2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 03:59:52 2022 Not After : Wed Sep 28 03:59:52 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:a3:b1:95:0c:93:54:54:94:00:f6:f8:78:6a:7e:86: f2:b6:a1:68:65:dd:2a:c8:7a:a9:b6:66:bb:b2:57:20: b3:66:6f:31:35:ea:68:26:07:a3:c5:e7:c7:b9:72:13: 48:9d:1c:15:97:10:7c:24:54:57:ef:c6:ae:26:b0:fb: da:6d:ac:8a:ba:42:86:ed:2b:6a:dc:24:ee:38:f6:ae: e6:fc:7f:f0:fb:e5:71:75:d3:09:8a:03:ca:bd:bc:a4: a8:06:cb:be:3c:b0:d7:1a:fd:79:e0:eb:96:cb:0a:7a: c4:14:be:d3:55:f2:08:52:13:cf:02:d0:63:98:ba:70: c6:6f:b9:46:fc:32:7a:6d:b8:32:e0:c4:92:66:b2:dc: cc:1d:98:38:57:c6:71:a4:e6:79:71:13:65:91:25:c0: e0:bc:fd:34:a9:24:77:9d:ac:83:98:a1:ac:b0:24:b5: cf:c4:03:98:72:62:4b:13:e5:15:0e:1b:50:84:7b:29: c3:77:0c:49:b2:64:6a:d8:2c:22:9d:1a:60:1c:3c:34: 56:a1:d6:a3:4e:5d:c7:91:66:a1:c3:c5:96:02:e8:f0: b4:0b:65:ca:89:42:92:72:26:3a:0e:f9:1b:c8:48:04: 65:b1:1c:7c:2b:96:17:a1:2b:e8:49:03:c1:08:99:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6c:62:aa:47:7f:4d:72:75:af:28:31:f8:bb:9d:a1:48: 87:65:49:c9:92:61:37:9e:83:f6:2f:db:51:1d:33:2d: ba:24:90:7e:38:95:1c:16:5f:2f:7b:a9:55:87:48:84: a2:ea:df:4a:8f:ff:49:95:91:ae:46:85:e8:c2:3b:1d: ee:5e:2b:36:cd:e1:a3:f5:2a:c1:ec:9e:d5:46:60:de: 84:cb:d1:3f:73:69:c4:a2:9f:c5:53:8d:0f:af:1e:6e: 31:40:6d:cd:49:f2:67:23:dd:7a:67:93:7c:b1:f5:e5: 9e:b1:f2:65:a6:83:af:cb:7b:e6:82:33:c8:9a:2a:95: 06:ba:b2:2e:1b:55:e9:bb:43:ec:e2:0c:8e:42:fa:ea: 2d:5a:52:2a:3e:0f:64:46:53:f7:02:3e:43:0d:df:cb: 2f:5f:b7:5e:63:b0:af:9a:29:5b:56:d7:83:fa:22:13: ef:ad:1a:0d:16:62:b4:8e:8e:73:f0:23:9b:f4:73:79: d2:a4:fa:2a:f0:73:2e:f5:1a:5f:ce:f2:85:59:96:22: 51:9c:c4:ca:b3:3e:3a:72:34:ec:37:7c:d2:99:a2:e2: 59:01:73:4e:15:4b:04:78:f2:99:54:c3:ae:13:9b:7b: 0f:1f:27:e6:23:7a:61:3c:56:a5:cc:e4:7c:76:8f:24 Fingerprint (SHA-256): F1:5A:A7:B7:95:C4:48:E2:F3:78:9A:E6:3C:2F:97:F5:FF:8C:2C:02:71:6A:66:47:27:1C:B8:47:E8:CC:61:38 Fingerprint (SHA1): E8:EA:5E:EA:38:22:46:88:06:F6:B8:35:CD:A2:A5:68:CF:23:9E:16 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #987: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034260 (0x3750add4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Sep 28 04:00:03 2022 Not After : Tue Sep 28 04:00:03 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:99:77:84:05:ec:f9:52:5c:9a:be:9d:99:53:f0:78: 98:00:3d:f5:e8:5a:27:e4:c6:d6:54:ff:72:e5:01:2b: 72:2d:1d:7d:59:07:9a:dd:dd:24:30:e1:78:c1:d8:31: 80:92:6d:b7:74:33:07:78:ef:47:3a:11:b9:79:dc:f2: 61:76:c7:84:a7:97:bd:ee:ca:6d:ba:70:6e:25:b0:90: ce:fd:79:26:55:4d:e3:0a:87:84:02:25:a0:1c:08:5a: 83:4c:f1:41:bf:da:65:a6:35:c2:0e:bb:f3:75:1b:b9: e6:ac:fe:91:1c:ff:fd:a6:3d:e2:4a:52:a8:f9:f8:c4: d5:9b:f7:c1:86:29:23:e7:19:ea:67:a2:5b:58:d4:90: 87:3c:05:e5:1d:e9:4d:0b:b4:f7:2a:b9:03:5b:43:72: 45:3e:7b:53:2c:07:ba:c3:e9:91:2a:34:a5:c0:c3:f8: 0f:e2:87:ed:89:46:9e:b5:6b:17:d0:e8:cb:f1:7c:d7: d3:21:17:f1:6b:98:37:9e:78:e4:a7:a9:e5:78:a6:3d: 77:fe:a5:c5:2e:8c:46:03:ff:24:ea:c4:e7:02:67:66: bf:be:fd:2b:49:a3:83:9c:f2:7a:cb:09:be:c6:68:7a: 98:6e:8e:e0:e1:1a:78:50:a7:19:46:1e:b9:91:03:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:e0:31:e2:cb:7d:27:43:56:7b:58:4f:2b:a5:28:8d: c1:b3:c1:14:53:a8:71:b6:7c:0a:3b:81:1d:83:35:bd: 2a:e3:e6:15:1e:ec:45:1a:43:ca:8c:e5:4e:f7:b7:ef: 99:bb:a0:5f:7d:51:08:2f:d9:9c:8e:fc:31:4f:5a:84: 8b:ea:51:81:3c:71:32:13:83:f3:b5:c6:82:8e:1d:64: cf:d6:05:41:74:f4:15:09:85:7c:09:73:89:7a:54:07: d8:af:d1:41:dc:df:05:0a:70:c6:7a:8a:4c:19:41:4c: ad:b1:62:3e:20:09:1a:a5:d2:57:91:34:5c:a9:1b:8c: 76:53:40:9b:ea:24:50:a7:ec:d8:9a:f8:16:70:0f:07: 09:7b:c0:96:cf:98:55:1e:cc:45:f4:ec:91:20:13:23: 93:17:ec:c1:b4:28:68:da:7f:76:f6:94:ed:3c:25:57: 27:98:e4:fd:e9:d1:69:e3:66:6f:bd:c1:c7:25:88:b4: 22:4a:8b:3f:ce:1c:20:3b:cd:6e:1b:96:6a:e8:a5:f0: 8a:7f:74:21:33:4c:64:a0:f3:fb:81:8c:83:65:92:26: 38:10:62:56:05:9e:80:0b:fb:3d:84:fc:53:4e:b4:cb: da:6b:58:78:24:bc:ff:39:33:3b:88:a2:cf:98:e8:c2 Fingerprint (SHA-256): 7B:F8:24:D1:CD:08:D8:EA:7F:AC:A1:7B:F0:39:D7:7A:55:74:0B:BE:8C:B8:6E:BC:B5:EB:33:F2:FF:1E:EB:D8 Fingerprint (SHA1): 41:A8:64:C9:6F:DF:B8:E6:D2:3F:25:AE:5B:47:24:24:A9:CC:79:8A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #988: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034258 (0x3750add2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 03:59:52 2022 Not After : Wed Sep 28 03:59:52 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:a3:b1:95:0c:93:54:54:94:00:f6:f8:78:6a:7e:86: f2:b6:a1:68:65:dd:2a:c8:7a:a9:b6:66:bb:b2:57:20: b3:66:6f:31:35:ea:68:26:07:a3:c5:e7:c7:b9:72:13: 48:9d:1c:15:97:10:7c:24:54:57:ef:c6:ae:26:b0:fb: da:6d:ac:8a:ba:42:86:ed:2b:6a:dc:24:ee:38:f6:ae: e6:fc:7f:f0:fb:e5:71:75:d3:09:8a:03:ca:bd:bc:a4: a8:06:cb:be:3c:b0:d7:1a:fd:79:e0:eb:96:cb:0a:7a: c4:14:be:d3:55:f2:08:52:13:cf:02:d0:63:98:ba:70: c6:6f:b9:46:fc:32:7a:6d:b8:32:e0:c4:92:66:b2:dc: cc:1d:98:38:57:c6:71:a4:e6:79:71:13:65:91:25:c0: e0:bc:fd:34:a9:24:77:9d:ac:83:98:a1:ac:b0:24:b5: cf:c4:03:98:72:62:4b:13:e5:15:0e:1b:50:84:7b:29: c3:77:0c:49:b2:64:6a:d8:2c:22:9d:1a:60:1c:3c:34: 56:a1:d6:a3:4e:5d:c7:91:66:a1:c3:c5:96:02:e8:f0: b4:0b:65:ca:89:42:92:72:26:3a:0e:f9:1b:c8:48:04: 65:b1:1c:7c:2b:96:17:a1:2b:e8:49:03:c1:08:99:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6c:62:aa:47:7f:4d:72:75:af:28:31:f8:bb:9d:a1:48: 87:65:49:c9:92:61:37:9e:83:f6:2f:db:51:1d:33:2d: ba:24:90:7e:38:95:1c:16:5f:2f:7b:a9:55:87:48:84: a2:ea:df:4a:8f:ff:49:95:91:ae:46:85:e8:c2:3b:1d: ee:5e:2b:36:cd:e1:a3:f5:2a:c1:ec:9e:d5:46:60:de: 84:cb:d1:3f:73:69:c4:a2:9f:c5:53:8d:0f:af:1e:6e: 31:40:6d:cd:49:f2:67:23:dd:7a:67:93:7c:b1:f5:e5: 9e:b1:f2:65:a6:83:af:cb:7b:e6:82:33:c8:9a:2a:95: 06:ba:b2:2e:1b:55:e9:bb:43:ec:e2:0c:8e:42:fa:ea: 2d:5a:52:2a:3e:0f:64:46:53:f7:02:3e:43:0d:df:cb: 2f:5f:b7:5e:63:b0:af:9a:29:5b:56:d7:83:fa:22:13: ef:ad:1a:0d:16:62:b4:8e:8e:73:f0:23:9b:f4:73:79: d2:a4:fa:2a:f0:73:2e:f5:1a:5f:ce:f2:85:59:96:22: 51:9c:c4:ca:b3:3e:3a:72:34:ec:37:7c:d2:99:a2:e2: 59:01:73:4e:15:4b:04:78:f2:99:54:c3:ae:13:9b:7b: 0f:1f:27:e6:23:7a:61:3c:56:a5:cc:e4:7c:76:8f:24 Fingerprint (SHA-256): F1:5A:A7:B7:95:C4:48:E2:F3:78:9A:E6:3C:2F:97:F5:FF:8C:2C:02:71:6A:66:47:27:1C:B8:47:E8:CC:61:38 Fingerprint (SHA1): E8:EA:5E:EA:38:22:46:88:06:F6:B8:35:CD:A2:A5:68:CF:23:9E:16 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #989: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #990: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034258 (0x3750add2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 03:59:52 2022 Not After : Wed Sep 28 03:59:52 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:a3:b1:95:0c:93:54:54:94:00:f6:f8:78:6a:7e:86: f2:b6:a1:68:65:dd:2a:c8:7a:a9:b6:66:bb:b2:57:20: b3:66:6f:31:35:ea:68:26:07:a3:c5:e7:c7:b9:72:13: 48:9d:1c:15:97:10:7c:24:54:57:ef:c6:ae:26:b0:fb: da:6d:ac:8a:ba:42:86:ed:2b:6a:dc:24:ee:38:f6:ae: e6:fc:7f:f0:fb:e5:71:75:d3:09:8a:03:ca:bd:bc:a4: a8:06:cb:be:3c:b0:d7:1a:fd:79:e0:eb:96:cb:0a:7a: c4:14:be:d3:55:f2:08:52:13:cf:02:d0:63:98:ba:70: c6:6f:b9:46:fc:32:7a:6d:b8:32:e0:c4:92:66:b2:dc: cc:1d:98:38:57:c6:71:a4:e6:79:71:13:65:91:25:c0: e0:bc:fd:34:a9:24:77:9d:ac:83:98:a1:ac:b0:24:b5: cf:c4:03:98:72:62:4b:13:e5:15:0e:1b:50:84:7b:29: c3:77:0c:49:b2:64:6a:d8:2c:22:9d:1a:60:1c:3c:34: 56:a1:d6:a3:4e:5d:c7:91:66:a1:c3:c5:96:02:e8:f0: b4:0b:65:ca:89:42:92:72:26:3a:0e:f9:1b:c8:48:04: 65:b1:1c:7c:2b:96:17:a1:2b:e8:49:03:c1:08:99:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6c:62:aa:47:7f:4d:72:75:af:28:31:f8:bb:9d:a1:48: 87:65:49:c9:92:61:37:9e:83:f6:2f:db:51:1d:33:2d: ba:24:90:7e:38:95:1c:16:5f:2f:7b:a9:55:87:48:84: a2:ea:df:4a:8f:ff:49:95:91:ae:46:85:e8:c2:3b:1d: ee:5e:2b:36:cd:e1:a3:f5:2a:c1:ec:9e:d5:46:60:de: 84:cb:d1:3f:73:69:c4:a2:9f:c5:53:8d:0f:af:1e:6e: 31:40:6d:cd:49:f2:67:23:dd:7a:67:93:7c:b1:f5:e5: 9e:b1:f2:65:a6:83:af:cb:7b:e6:82:33:c8:9a:2a:95: 06:ba:b2:2e:1b:55:e9:bb:43:ec:e2:0c:8e:42:fa:ea: 2d:5a:52:2a:3e:0f:64:46:53:f7:02:3e:43:0d:df:cb: 2f:5f:b7:5e:63:b0:af:9a:29:5b:56:d7:83:fa:22:13: ef:ad:1a:0d:16:62:b4:8e:8e:73:f0:23:9b:f4:73:79: d2:a4:fa:2a:f0:73:2e:f5:1a:5f:ce:f2:85:59:96:22: 51:9c:c4:ca:b3:3e:3a:72:34:ec:37:7c:d2:99:a2:e2: 59:01:73:4e:15:4b:04:78:f2:99:54:c3:ae:13:9b:7b: 0f:1f:27:e6:23:7a:61:3c:56:a5:cc:e4:7c:76:8f:24 Fingerprint (SHA-256): F1:5A:A7:B7:95:C4:48:E2:F3:78:9A:E6:3C:2F:97:F5:FF:8C:2C:02:71:6A:66:47:27:1C:B8:47:E8:CC:61:38 Fingerprint (SHA1): E8:EA:5E:EA:38:22:46:88:06:F6:B8:35:CD:A2:A5:68:CF:23:9E:16 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #991: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034260 (0x3750add4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Sep 28 04:00:03 2022 Not After : Tue Sep 28 04:00:03 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:99:77:84:05:ec:f9:52:5c:9a:be:9d:99:53:f0:78: 98:00:3d:f5:e8:5a:27:e4:c6:d6:54:ff:72:e5:01:2b: 72:2d:1d:7d:59:07:9a:dd:dd:24:30:e1:78:c1:d8:31: 80:92:6d:b7:74:33:07:78:ef:47:3a:11:b9:79:dc:f2: 61:76:c7:84:a7:97:bd:ee:ca:6d:ba:70:6e:25:b0:90: ce:fd:79:26:55:4d:e3:0a:87:84:02:25:a0:1c:08:5a: 83:4c:f1:41:bf:da:65:a6:35:c2:0e:bb:f3:75:1b:b9: e6:ac:fe:91:1c:ff:fd:a6:3d:e2:4a:52:a8:f9:f8:c4: d5:9b:f7:c1:86:29:23:e7:19:ea:67:a2:5b:58:d4:90: 87:3c:05:e5:1d:e9:4d:0b:b4:f7:2a:b9:03:5b:43:72: 45:3e:7b:53:2c:07:ba:c3:e9:91:2a:34:a5:c0:c3:f8: 0f:e2:87:ed:89:46:9e:b5:6b:17:d0:e8:cb:f1:7c:d7: d3:21:17:f1:6b:98:37:9e:78:e4:a7:a9:e5:78:a6:3d: 77:fe:a5:c5:2e:8c:46:03:ff:24:ea:c4:e7:02:67:66: bf:be:fd:2b:49:a3:83:9c:f2:7a:cb:09:be:c6:68:7a: 98:6e:8e:e0:e1:1a:78:50:a7:19:46:1e:b9:91:03:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:e0:31:e2:cb:7d:27:43:56:7b:58:4f:2b:a5:28:8d: c1:b3:c1:14:53:a8:71:b6:7c:0a:3b:81:1d:83:35:bd: 2a:e3:e6:15:1e:ec:45:1a:43:ca:8c:e5:4e:f7:b7:ef: 99:bb:a0:5f:7d:51:08:2f:d9:9c:8e:fc:31:4f:5a:84: 8b:ea:51:81:3c:71:32:13:83:f3:b5:c6:82:8e:1d:64: cf:d6:05:41:74:f4:15:09:85:7c:09:73:89:7a:54:07: d8:af:d1:41:dc:df:05:0a:70:c6:7a:8a:4c:19:41:4c: ad:b1:62:3e:20:09:1a:a5:d2:57:91:34:5c:a9:1b:8c: 76:53:40:9b:ea:24:50:a7:ec:d8:9a:f8:16:70:0f:07: 09:7b:c0:96:cf:98:55:1e:cc:45:f4:ec:91:20:13:23: 93:17:ec:c1:b4:28:68:da:7f:76:f6:94:ed:3c:25:57: 27:98:e4:fd:e9:d1:69:e3:66:6f:bd:c1:c7:25:88:b4: 22:4a:8b:3f:ce:1c:20:3b:cd:6e:1b:96:6a:e8:a5:f0: 8a:7f:74:21:33:4c:64:a0:f3:fb:81:8c:83:65:92:26: 38:10:62:56:05:9e:80:0b:fb:3d:84:fc:53:4e:b4:cb: da:6b:58:78:24:bc:ff:39:33:3b:88:a2:cf:98:e8:c2 Fingerprint (SHA-256): 7B:F8:24:D1:CD:08:D8:EA:7F:AC:A1:7B:F0:39:D7:7A:55:74:0B:BE:8C:B8:6E:BC:B5:EB:33:F2:FF:1E:EB:D8 Fingerprint (SHA1): 41:A8:64:C9:6F:DF:B8:E6:D2:3F:25:AE:5B:47:24:24:A9:CC:79:8A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #992: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #993: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #994: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #995: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034258 (0x3750add2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 03:59:52 2022 Not After : Wed Sep 28 03:59:52 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:a3:b1:95:0c:93:54:54:94:00:f6:f8:78:6a:7e:86: f2:b6:a1:68:65:dd:2a:c8:7a:a9:b6:66:bb:b2:57:20: b3:66:6f:31:35:ea:68:26:07:a3:c5:e7:c7:b9:72:13: 48:9d:1c:15:97:10:7c:24:54:57:ef:c6:ae:26:b0:fb: da:6d:ac:8a:ba:42:86:ed:2b:6a:dc:24:ee:38:f6:ae: e6:fc:7f:f0:fb:e5:71:75:d3:09:8a:03:ca:bd:bc:a4: a8:06:cb:be:3c:b0:d7:1a:fd:79:e0:eb:96:cb:0a:7a: c4:14:be:d3:55:f2:08:52:13:cf:02:d0:63:98:ba:70: c6:6f:b9:46:fc:32:7a:6d:b8:32:e0:c4:92:66:b2:dc: cc:1d:98:38:57:c6:71:a4:e6:79:71:13:65:91:25:c0: e0:bc:fd:34:a9:24:77:9d:ac:83:98:a1:ac:b0:24:b5: cf:c4:03:98:72:62:4b:13:e5:15:0e:1b:50:84:7b:29: c3:77:0c:49:b2:64:6a:d8:2c:22:9d:1a:60:1c:3c:34: 56:a1:d6:a3:4e:5d:c7:91:66:a1:c3:c5:96:02:e8:f0: b4:0b:65:ca:89:42:92:72:26:3a:0e:f9:1b:c8:48:04: 65:b1:1c:7c:2b:96:17:a1:2b:e8:49:03:c1:08:99:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6c:62:aa:47:7f:4d:72:75:af:28:31:f8:bb:9d:a1:48: 87:65:49:c9:92:61:37:9e:83:f6:2f:db:51:1d:33:2d: ba:24:90:7e:38:95:1c:16:5f:2f:7b:a9:55:87:48:84: a2:ea:df:4a:8f:ff:49:95:91:ae:46:85:e8:c2:3b:1d: ee:5e:2b:36:cd:e1:a3:f5:2a:c1:ec:9e:d5:46:60:de: 84:cb:d1:3f:73:69:c4:a2:9f:c5:53:8d:0f:af:1e:6e: 31:40:6d:cd:49:f2:67:23:dd:7a:67:93:7c:b1:f5:e5: 9e:b1:f2:65:a6:83:af:cb:7b:e6:82:33:c8:9a:2a:95: 06:ba:b2:2e:1b:55:e9:bb:43:ec:e2:0c:8e:42:fa:ea: 2d:5a:52:2a:3e:0f:64:46:53:f7:02:3e:43:0d:df:cb: 2f:5f:b7:5e:63:b0:af:9a:29:5b:56:d7:83:fa:22:13: ef:ad:1a:0d:16:62:b4:8e:8e:73:f0:23:9b:f4:73:79: d2:a4:fa:2a:f0:73:2e:f5:1a:5f:ce:f2:85:59:96:22: 51:9c:c4:ca:b3:3e:3a:72:34:ec:37:7c:d2:99:a2:e2: 59:01:73:4e:15:4b:04:78:f2:99:54:c3:ae:13:9b:7b: 0f:1f:27:e6:23:7a:61:3c:56:a5:cc:e4:7c:76:8f:24 Fingerprint (SHA-256): F1:5A:A7:B7:95:C4:48:E2:F3:78:9A:E6:3C:2F:97:F5:FF:8C:2C:02:71:6A:66:47:27:1C:B8:47:E8:CC:61:38 Fingerprint (SHA1): E8:EA:5E:EA:38:22:46:88:06:F6:B8:35:CD:A2:A5:68:CF:23:9E:16 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #996: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034262 (0x3750add6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Sep 28 04:00:15 2022 Not After : Wed Sep 28 04:00:15 2072 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:04:1c:14:64:7d:f7:86:a1:d4:9a:c1:4c:dd:3e:f9: b3:73:a8:ac:17:a8:73:a7:20:cf:60:0c:85:d8:57:8a: 05:f4:dd:10:68:1b:46:95:49:af:56:d1:71:ec:98:b6: 04:8f:75:1d:73:29:3b:e2:e6:45:b4:bf:39:12:72:a2: 2d:6e:35:4a:61:03:ba:f3:be:b1:c2:cb:86:27:33:be: 11:61:52:d4:a7:83:a1:c2:1a:6d:1d:b2:81:38:e8:dc: db:48:73:f5:ef:ba:33:b7:49:6c:0a:84:af:07:95:ac: 95:69:36:f6:96:3d:35:67:cf:b4:ee:2b:f9:2a:a7:2a: 0f:4e:07:65:ea:ff:6f:24:23:57:db:4c:b9:aa:3c:ca: b6:20:9f:35:4a:1b:ff:db:f5:3b:1e:dd:10:73:cb:52: aa:03:3f:2e:4d:a9:92:d4:c0:25:7d:06:b4:f7:9a:10: 3f:05:73:ac:12:6d:2d:26:7d:0e:2a:63:61:1f:da:df: b6:43:14:ac:81:c5:a0:6d:08:46:9c:c4:63:db:05:b2: e8:54:af:c1:ff:9b:df:cf:e5:5d:23:ee:60:fa:60:a5: 62:05:31:0e:c3:93:d4:0a:4f:32:13:0c:5f:ac:44:5d: d7:f9:24:49:81:b8:17:fa:21:d6:9b:d1:fc:df:f8:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:9b:fc:d9:58:e5:0e:43:89:38:54:a1:9d:4c:36:d3: c7:b8:cc:8a:d8:e6:ef:94:07:27:e0:f0:05:b0:16:39: ec:a4:1b:19:b7:7f:c3:a3:d4:1d:a3:23:94:a0:d1:17: f6:4f:d0:0b:3a:99:e6:c5:8f:ab:f8:c6:88:88:4a:5e: e9:cd:7a:0a:ee:64:d0:7d:8d:2c:9e:e4:4c:8c:a0:ce: 8a:78:b7:3e:3b:be:b9:89:08:82:8f:85:98:ed:ad:e5: 39:5e:2c:15:37:71:43:5e:d6:95:83:59:57:77:cc:28: f9:9f:08:65:1e:22:0c:b6:98:28:0f:05:a9:fb:f6:92: 58:b1:da:87:66:1f:3f:d0:46:dc:9d:85:41:06:c2:a7: bd:74:9d:54:df:3f:5d:f8:f8:06:92:61:65:18:2d:56: 83:03:07:6a:b0:26:26:13:37:21:9b:16:71:51:11:88: 57:0f:e4:f6:26:06:d7:b0:95:69:92:ee:84:44:9c:f6: f9:37:69:3f:a8:fd:0f:1c:20:6d:47:04:d1:2a:4f:e2: a7:99:37:26:5a:56:2c:5d:db:67:1e:0f:cf:91:10:0f: ab:52:c6:33:75:f3:70:ae:4b:bf:93:cc:19:ac:fe:0f: cd:4a:a2:46:9a:c3:db:86:50:bc:bf:5b:e9:67:59:48 Fingerprint (SHA-256): 5C:1E:19:8E:B4:7B:50:12:7C:F0:13:84:A9:3C:17:17:A4:73:DE:FD:97:7F:23:7D:9A:73:10:79:D0:5F:5A:48 Fingerprint (SHA1): 0C:7C:92:3A:74:9D:2A:9E:D9:D5:28:2C:36:7F:FA:A2:E5:71:31:D6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #997: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034258 (0x3750add2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 03:59:52 2022 Not After : Wed Sep 28 03:59:52 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:a3:b1:95:0c:93:54:54:94:00:f6:f8:78:6a:7e:86: f2:b6:a1:68:65:dd:2a:c8:7a:a9:b6:66:bb:b2:57:20: b3:66:6f:31:35:ea:68:26:07:a3:c5:e7:c7:b9:72:13: 48:9d:1c:15:97:10:7c:24:54:57:ef:c6:ae:26:b0:fb: da:6d:ac:8a:ba:42:86:ed:2b:6a:dc:24:ee:38:f6:ae: e6:fc:7f:f0:fb:e5:71:75:d3:09:8a:03:ca:bd:bc:a4: a8:06:cb:be:3c:b0:d7:1a:fd:79:e0:eb:96:cb:0a:7a: c4:14:be:d3:55:f2:08:52:13:cf:02:d0:63:98:ba:70: c6:6f:b9:46:fc:32:7a:6d:b8:32:e0:c4:92:66:b2:dc: cc:1d:98:38:57:c6:71:a4:e6:79:71:13:65:91:25:c0: e0:bc:fd:34:a9:24:77:9d:ac:83:98:a1:ac:b0:24:b5: cf:c4:03:98:72:62:4b:13:e5:15:0e:1b:50:84:7b:29: c3:77:0c:49:b2:64:6a:d8:2c:22:9d:1a:60:1c:3c:34: 56:a1:d6:a3:4e:5d:c7:91:66:a1:c3:c5:96:02:e8:f0: b4:0b:65:ca:89:42:92:72:26:3a:0e:f9:1b:c8:48:04: 65:b1:1c:7c:2b:96:17:a1:2b:e8:49:03:c1:08:99:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6c:62:aa:47:7f:4d:72:75:af:28:31:f8:bb:9d:a1:48: 87:65:49:c9:92:61:37:9e:83:f6:2f:db:51:1d:33:2d: ba:24:90:7e:38:95:1c:16:5f:2f:7b:a9:55:87:48:84: a2:ea:df:4a:8f:ff:49:95:91:ae:46:85:e8:c2:3b:1d: ee:5e:2b:36:cd:e1:a3:f5:2a:c1:ec:9e:d5:46:60:de: 84:cb:d1:3f:73:69:c4:a2:9f:c5:53:8d:0f:af:1e:6e: 31:40:6d:cd:49:f2:67:23:dd:7a:67:93:7c:b1:f5:e5: 9e:b1:f2:65:a6:83:af:cb:7b:e6:82:33:c8:9a:2a:95: 06:ba:b2:2e:1b:55:e9:bb:43:ec:e2:0c:8e:42:fa:ea: 2d:5a:52:2a:3e:0f:64:46:53:f7:02:3e:43:0d:df:cb: 2f:5f:b7:5e:63:b0:af:9a:29:5b:56:d7:83:fa:22:13: ef:ad:1a:0d:16:62:b4:8e:8e:73:f0:23:9b:f4:73:79: d2:a4:fa:2a:f0:73:2e:f5:1a:5f:ce:f2:85:59:96:22: 51:9c:c4:ca:b3:3e:3a:72:34:ec:37:7c:d2:99:a2:e2: 59:01:73:4e:15:4b:04:78:f2:99:54:c3:ae:13:9b:7b: 0f:1f:27:e6:23:7a:61:3c:56:a5:cc:e4:7c:76:8f:24 Fingerprint (SHA-256): F1:5A:A7:B7:95:C4:48:E2:F3:78:9A:E6:3C:2F:97:F5:FF:8C:2C:02:71:6A:66:47:27:1C:B8:47:E8:CC:61:38 Fingerprint (SHA1): E8:EA:5E:EA:38:22:46:88:06:F6:B8:35:CD:A2:A5:68:CF:23:9E:16 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #998: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #999: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1000: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1001: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1002: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1003: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034263 (0x3750add7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Sep 28 04:00:20 2022 Not After : Tue Sep 28 04:00:20 2027 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:78:a4:83:0e:2a:57:4b:a4:a0:d9:4d:42:f2:a2:96: 30:b2:bf:d3:25:96:38:55:91:7a:98:4b:fd:23:de:6e: 77:ae:31:6f:8d:a9:c6:5f:41:28:c2:2f:f9:eb:1f:35: f8:3c:3e:cc:c7:46:b8:3c:e9:55:d3:2c:e3:f2:12:a6: a4:94:3f:cc:2c:fc:90:a6:e1:04:47:de:1d:38:2a:2e: 2d:02:e1:ca:bf:7c:f3:12:0b:fb:bd:6a:6c:82:0f:4e: b2:93:9b:0e:d2:35:5f:8c:14:1e:51:e5:a9:89:5a:96: 15:e4:97:28:ea:77:fe:63:a0:f6:51:bc:3e:5e:e6:14: 3d:02:ab:ad:4f:9e:3e:92:41:e0:d1:c7:7a:2d:c5:1f: 3d:95:84:61:d7:05:e5:38:94:eb:72:59:e1:68:a2:a5: 5b:74:61:0d:b0:a5:9a:d9:0d:74:c2:dc:37:c0:c8:ca: d0:02:10:08:b3:81:47:1b:23:3c:61:28:b9:6f:51:ea: cd:99:48:aa:69:b6:a5:e5:28:2a:b7:db:e0:eb:8a:84: b8:fe:14:c0:42:4f:0c:ec:49:db:dc:60:9c:dd:ca:cc: ad:fa:86:db:a4:1f:8c:a4:a5:9d:18:49:26:2d:79:72: 6b:c8:d7:94:9a:aa:cd:cd:e8:1c:26:0e:f1:01:b2:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:70:46:6a:3c:cc:1b:bd:96:1b:9b:dc:90:fe:d0:bd: 65:92:72:f3:e5:fc:56:b2:f0:67:fa:d5:19:f0:aa:b0: 33:71:7d:c9:e1:89:a3:0d:f0:ba:c3:e9:6c:ac:1f:50: 5e:98:fd:0c:b7:4e:18:70:9f:d1:6b:1a:90:6c:a6:50: a6:e6:fe:45:80:7d:81:d3:64:87:c0:0f:37:11:37:66: 03:5b:26:fb:a4:e3:bd:fb:fc:81:12:a7:80:07:15:cb: 2d:d4:2c:bc:f9:6d:93:91:19:8b:73:7b:6b:9d:7e:27: 7a:f4:b8:1c:78:39:ee:6a:70:38:c7:b2:6c:cf:42:3c: 12:6b:f3:ad:96:fc:96:e4:13:45:99:28:89:19:32:3d: 65:8c:9b:c7:75:07:c6:5e:38:22:e6:56:f0:1c:32:64: db:9f:ad:f7:9d:30:15:8e:9e:3f:4d:ac:5f:da:85:16: 86:29:33:2f:02:79:b1:a4:a9:7d:1c:f2:e2:4f:d9:e3: 9b:17:64:9f:7e:7b:47:d1:ed:5e:f1:30:20:1f:7b:40: 7a:dd:e9:e8:3e:8e:16:55:33:e1:0f:a9:37:41:a7:be: 96:2d:0d:dd:ba:d0:3e:f1:54:6a:ac:7f:68:c9:bf:9f: ee:ad:9c:d4:c4:0f:25:fd:ca:b0:f1:50:c3:78:b7:22 Fingerprint (SHA-256): D5:4C:10:5F:B7:26:22:86:B7:E3:F4:83:64:9E:82:57:B3:21:53:9D:E5:D2:62:24:84:A6:D9:56:B4:EB:6C:24 Fingerprint (SHA1): 3B:EE:87:17:6C:10:E2:65:BD:43:03:AD:B1:EB:2E:7C:EA:62:01:99 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1004: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1005: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1006: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1007: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1008: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1009: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1010: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1011: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1012: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1013: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1014: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1015: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1016: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1017: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1018: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1019: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1020: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1021: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1022: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1023: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1024: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1025: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1026: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1027: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1028: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1029: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 18783 at Wed Sep 28 04:00:52 UTC 2022 kill -USR1 18783 httpserv: normal termination httpserv -b -p 9233 2>/dev/null; httpserv with PID 18783 killed at Wed Sep 28 04:00:52 UTC 2022 httpserv starting at Wed Sep 28 04:00:52 UTC 2022 httpserv -D -p 9233 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.3122 & trying to connect to httpserv at Wed Sep 28 04:00:52 UTC 2022 tstclnt -4 -p 9233 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9233 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 31334 >/dev/null 2>/dev/null httpserv with PID 31334 found at Wed Sep 28 04:00:53 UTC 2022 httpserv with PID 31334 started at Wed Sep 28 04:00:53 UTC 2022 chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 vfychain -d trustanchorsDB -pp -vv -u 12 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1030: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1031: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034265 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1032: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1033: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1034: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034266 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1035: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1036: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1037: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1038: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 928034267 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1039: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1040: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 928034268 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1041: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1042: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1043: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1044: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1045: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 928034269 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1046: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1047: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1048: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #1049: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #1050: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034266 (0x3750adda) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Sep 28 04:01:02 2022 Not After : Wed Sep 28 04:01:02 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:b7:44:d5:ae:28:9f:97:e9:8b:fc:df:87:14:25:c0: fc:39:f5:7e:26:63:6b:21:c5:52:4d:62:b6:67:fd:f8: 6d:10:56:b3:bc:f4:c0:71:f1:3c:c0:3a:e0:09:dd:c1: 9e:89:3d:fe:7c:41:a4:30:39:0b:0a:01:6c:1c:e5:94: 43:ac:f0:48:1d:47:14:5e:d5:63:67:b8:eb:5e:6a:1d: cb:c6:5c:5f:66:cb:b9:01:00:cf:d1:15:57:61:dd:c6: 05:5a:85:bf:0b:76:54:f0:19:0f:88:6d:b5:da:40:dd: 35:be:e7:87:7b:73:9a:83:c5:59:a8:f1:50:37:7c:a6: fd:a7:78:6f:8a:26:8d:cf:15:6e:b8:8d:fb:1d:76:4b: dc:4d:35:7c:a0:c9:19:eb:f8:1e:91:0e:e5:85:32:da: b0:d1:42:04:b7:e0:c0:9d:1c:eb:fb:dc:30:46:87:e3: e9:2f:0f:47:c1:d0:77:6d:00:1e:68:5b:49:e7:de:ef: 88:6a:23:97:ce:ca:a1:48:b3:60:9f:31:4c:d2:35:18: 49:4f:19:64:36:9d:89:35:40:a4:be:ca:b5:af:2b:0c: 01:26:3a:37:a9:7b:15:1a:23:2e:ca:20:c4:c8:75:0d: ed:d7:ff:48:0e:a2:90:fd:4d:ca:a9:d3:d3:37:4b:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:a7:91:6b:e9:17:25:5c:2e:db:25:47:49:08:01:b8: 6e:88:93:66:00:f8:81:b6:8f:1d:9f:8a:db:58:51:07: e7:ca:b7:93:49:8b:04:07:65:c1:a3:ea:37:b2:81:b4: 2b:15:0d:84:97:e8:53:84:1f:03:80:1c:46:41:57:b7: 72:9e:d8:e4:b3:e1:4d:d7:14:87:71:70:f2:05:c8:0e: 9d:1b:08:70:5d:04:f0:ba:b1:b4:83:56:20:83:de:1b: 06:74:61:15:54:a2:81:0d:9c:c2:a5:29:b8:55:ee:92: 12:cb:14:03:8a:20:49:75:e5:8f:0f:4f:ea:ee:27:17: 9b:96:30:79:7c:d9:2f:81:b0:c9:eb:6c:2d:1f:eb:a1: b3:2a:09:94:f4:33:14:c9:37:70:c8:3f:c2:e4:4f:92: 7a:2c:6c:9b:f8:0c:b1:5f:86:af:17:4f:b2:ae:08:64: a7:51:39:50:fc:26:38:26:81:63:9f:a1:78:c6:79:27: f1:47:77:52:83:ff:ed:c9:e6:22:55:ab:00:99:0d:db: 60:6e:f8:de:b3:9f:d3:19:d9:7c:b6:ba:c6:50:f8:ed: 44:0d:91:b4:8e:1b:c8:4e:5d:4f:bc:20:9a:24:03:ff: 12:4b:34:c0:0e:61:ff:b4:6a:0b:a0:47:80:ab:d4:b9 Fingerprint (SHA-256): D5:84:D3:9D:D4:47:7D:2B:3C:D0:25:F3:7F:1C:30:F1:8C:79:3D:99:72:1D:2A:C7:79:DF:5E:FB:E5:7A:12:A9 Fingerprint (SHA1): B6:72:C7:20:FD:96:72:AA:C4:6E:3C:3B:84:3B:F4:B6:98:C5:F8:C4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1051: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034265 (0x3750add9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Sep 28 04:00:57 2022 Not After : Wed Sep 28 04:00:57 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:ce:8c:38:6d:66:a7:d1:f2:07:e9:3f:02:c0:c0:94: 36:0b:44:db:89:45:c0:45:c8:e0:8e:e6:52:48:81:d1: 90:20:77:26:38:62:96:c2:84:67:93:90:ce:a3:50:b8: c6:bf:e0:df:80:ee:f9:ce:64:7f:95:8c:3f:20:9c:24: ee:aa:38:1d:64:2e:f6:09:2a:7f:e0:23:fa:6f:13:e2: 84:7e:b5:74:c5:77:33:00:d9:f0:ff:44:65:f2:98:fa: 89:9e:0a:7e:bc:aa:a0:bb:5b:ff:c6:03:dc:0d:00:f8: e9:6b:a1:48:85:43:0b:d6:a1:7d:dc:1e:33:ed:a8:03: 07:69:45:04:42:6c:c1:ce:c8:26:86:46:df:cf:a3:df: dd:9b:4d:64:8a:b2:b8:9d:1f:ef:22:c3:39:d7:22:63: 3c:03:30:99:d7:b1:ae:86:a4:5d:3d:32:46:83:e6:0e: a4:01:c7:a3:1d:5c:72:09:59:cc:42:78:b5:83:69:31: ef:45:af:e9:69:f4:5f:69:94:a9:74:b8:df:da:a0:1e: 54:4d:c9:83:f6:46:da:c1:dc:f4:4e:2b:bd:7a:6d:66: fc:61:f2:a6:8a:c6:a2:75:40:71:f4:6d:ed:ff:5e:48: 27:74:3f:a3:d6:84:e4:20:80:a1:eb:a7:18:f2:c2:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:4d:6a:f3:51:40:b5:03:41:a6:03:c7:1e:c7:ec:30: 15:5b:a3:52:85:eb:bf:4b:fc:0e:d3:df:22:9e:5d:0c: e3:b1:14:7c:23:e6:5b:81:67:ce:24:02:06:d9:96:cc: b6:19:fc:bb:08:c3:16:63:28:07:24:dd:c4:40:3d:cb: 48:f0:2b:89:dc:48:1f:0c:e5:64:01:81:39:0d:ea:0b: 33:31:67:e5:2a:51:0c:e7:35:18:dd:67:98:95:37:b8: c5:9b:a0:29:89:2e:dc:a7:3b:28:53:90:3e:c4:f5:0b: ee:9a:da:76:87:c4:c6:e1:33:99:a1:50:8a:7c:43:eb: 97:9d:1c:fe:5c:05:18:c8:ca:74:50:27:d4:5c:2a:a3: 81:3d:80:bb:9d:21:18:15:17:ad:aa:40:7d:78:a8:f7: 07:59:df:8c:ae:08:7d:83:84:82:74:68:be:9e:71:02: e0:6c:5c:6d:35:4a:23:7c:e5:53:1d:d0:cc:cf:84:33: d5:91:47:62:82:56:15:05:27:f3:1a:06:76:20:1e:2f: e6:d9:9d:50:1c:a4:ea:77:0e:b5:10:0a:db:02:a3:9a: 78:cf:11:53:5c:1c:5d:c7:b4:0f:26:10:38:07:a5:27: 09:84:8b:30:70:d3:e8:73:de:f6:ff:f5:84:40:e8:c5 Fingerprint (SHA-256): 9E:C7:DB:48:42:38:66:01:8D:A6:60:A6:2C:4D:69:6C:4A:90:67:6F:66:56:0D:8A:17:CA:46:06:08:FF:47:5F Fingerprint (SHA1): 8F:AB:66:21:28:C3:B1:16:DF:FF:DA:6F:BF:12:1C:37:54:BE:97:26 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1052: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1053: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #1054: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #1055: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034265 (0x3750add9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Sep 28 04:00:57 2022 Not After : Wed Sep 28 04:00:57 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:ce:8c:38:6d:66:a7:d1:f2:07:e9:3f:02:c0:c0:94: 36:0b:44:db:89:45:c0:45:c8:e0:8e:e6:52:48:81:d1: 90:20:77:26:38:62:96:c2:84:67:93:90:ce:a3:50:b8: c6:bf:e0:df:80:ee:f9:ce:64:7f:95:8c:3f:20:9c:24: ee:aa:38:1d:64:2e:f6:09:2a:7f:e0:23:fa:6f:13:e2: 84:7e:b5:74:c5:77:33:00:d9:f0:ff:44:65:f2:98:fa: 89:9e:0a:7e:bc:aa:a0:bb:5b:ff:c6:03:dc:0d:00:f8: e9:6b:a1:48:85:43:0b:d6:a1:7d:dc:1e:33:ed:a8:03: 07:69:45:04:42:6c:c1:ce:c8:26:86:46:df:cf:a3:df: dd:9b:4d:64:8a:b2:b8:9d:1f:ef:22:c3:39:d7:22:63: 3c:03:30:99:d7:b1:ae:86:a4:5d:3d:32:46:83:e6:0e: a4:01:c7:a3:1d:5c:72:09:59:cc:42:78:b5:83:69:31: ef:45:af:e9:69:f4:5f:69:94:a9:74:b8:df:da:a0:1e: 54:4d:c9:83:f6:46:da:c1:dc:f4:4e:2b:bd:7a:6d:66: fc:61:f2:a6:8a:c6:a2:75:40:71:f4:6d:ed:ff:5e:48: 27:74:3f:a3:d6:84:e4:20:80:a1:eb:a7:18:f2:c2:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:4d:6a:f3:51:40:b5:03:41:a6:03:c7:1e:c7:ec:30: 15:5b:a3:52:85:eb:bf:4b:fc:0e:d3:df:22:9e:5d:0c: e3:b1:14:7c:23:e6:5b:81:67:ce:24:02:06:d9:96:cc: b6:19:fc:bb:08:c3:16:63:28:07:24:dd:c4:40:3d:cb: 48:f0:2b:89:dc:48:1f:0c:e5:64:01:81:39:0d:ea:0b: 33:31:67:e5:2a:51:0c:e7:35:18:dd:67:98:95:37:b8: c5:9b:a0:29:89:2e:dc:a7:3b:28:53:90:3e:c4:f5:0b: ee:9a:da:76:87:c4:c6:e1:33:99:a1:50:8a:7c:43:eb: 97:9d:1c:fe:5c:05:18:c8:ca:74:50:27:d4:5c:2a:a3: 81:3d:80:bb:9d:21:18:15:17:ad:aa:40:7d:78:a8:f7: 07:59:df:8c:ae:08:7d:83:84:82:74:68:be:9e:71:02: e0:6c:5c:6d:35:4a:23:7c:e5:53:1d:d0:cc:cf:84:33: d5:91:47:62:82:56:15:05:27:f3:1a:06:76:20:1e:2f: e6:d9:9d:50:1c:a4:ea:77:0e:b5:10:0a:db:02:a3:9a: 78:cf:11:53:5c:1c:5d:c7:b4:0f:26:10:38:07:a5:27: 09:84:8b:30:70:d3:e8:73:de:f6:ff:f5:84:40:e8:c5 Fingerprint (SHA-256): 9E:C7:DB:48:42:38:66:01:8D:A6:60:A6:2C:4D:69:6C:4A:90:67:6F:66:56:0D:8A:17:CA:46:06:08:FF:47:5F Fingerprint (SHA1): 8F:AB:66:21:28:C3:B1:16:DF:FF:DA:6F:BF:12:1C:37:54:BE:97:26 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1056: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034266 (0x3750adda) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Sep 28 04:01:02 2022 Not After : Wed Sep 28 04:01:02 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:b7:44:d5:ae:28:9f:97:e9:8b:fc:df:87:14:25:c0: fc:39:f5:7e:26:63:6b:21:c5:52:4d:62:b6:67:fd:f8: 6d:10:56:b3:bc:f4:c0:71:f1:3c:c0:3a:e0:09:dd:c1: 9e:89:3d:fe:7c:41:a4:30:39:0b:0a:01:6c:1c:e5:94: 43:ac:f0:48:1d:47:14:5e:d5:63:67:b8:eb:5e:6a:1d: cb:c6:5c:5f:66:cb:b9:01:00:cf:d1:15:57:61:dd:c6: 05:5a:85:bf:0b:76:54:f0:19:0f:88:6d:b5:da:40:dd: 35:be:e7:87:7b:73:9a:83:c5:59:a8:f1:50:37:7c:a6: fd:a7:78:6f:8a:26:8d:cf:15:6e:b8:8d:fb:1d:76:4b: dc:4d:35:7c:a0:c9:19:eb:f8:1e:91:0e:e5:85:32:da: b0:d1:42:04:b7:e0:c0:9d:1c:eb:fb:dc:30:46:87:e3: e9:2f:0f:47:c1:d0:77:6d:00:1e:68:5b:49:e7:de:ef: 88:6a:23:97:ce:ca:a1:48:b3:60:9f:31:4c:d2:35:18: 49:4f:19:64:36:9d:89:35:40:a4:be:ca:b5:af:2b:0c: 01:26:3a:37:a9:7b:15:1a:23:2e:ca:20:c4:c8:75:0d: ed:d7:ff:48:0e:a2:90:fd:4d:ca:a9:d3:d3:37:4b:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:a7:91:6b:e9:17:25:5c:2e:db:25:47:49:08:01:b8: 6e:88:93:66:00:f8:81:b6:8f:1d:9f:8a:db:58:51:07: e7:ca:b7:93:49:8b:04:07:65:c1:a3:ea:37:b2:81:b4: 2b:15:0d:84:97:e8:53:84:1f:03:80:1c:46:41:57:b7: 72:9e:d8:e4:b3:e1:4d:d7:14:87:71:70:f2:05:c8:0e: 9d:1b:08:70:5d:04:f0:ba:b1:b4:83:56:20:83:de:1b: 06:74:61:15:54:a2:81:0d:9c:c2:a5:29:b8:55:ee:92: 12:cb:14:03:8a:20:49:75:e5:8f:0f:4f:ea:ee:27:17: 9b:96:30:79:7c:d9:2f:81:b0:c9:eb:6c:2d:1f:eb:a1: b3:2a:09:94:f4:33:14:c9:37:70:c8:3f:c2:e4:4f:92: 7a:2c:6c:9b:f8:0c:b1:5f:86:af:17:4f:b2:ae:08:64: a7:51:39:50:fc:26:38:26:81:63:9f:a1:78:c6:79:27: f1:47:77:52:83:ff:ed:c9:e6:22:55:ab:00:99:0d:db: 60:6e:f8:de:b3:9f:d3:19:d9:7c:b6:ba:c6:50:f8:ed: 44:0d:91:b4:8e:1b:c8:4e:5d:4f:bc:20:9a:24:03:ff: 12:4b:34:c0:0e:61:ff:b4:6a:0b:a0:47:80:ab:d4:b9 Fingerprint (SHA-256): D5:84:D3:9D:D4:47:7D:2B:3C:D0:25:F3:7F:1C:30:F1:8C:79:3D:99:72:1D:2A:C7:79:DF:5E:FB:E5:7A:12:A9 Fingerprint (SHA1): B6:72:C7:20:FD:96:72:AA:C4:6E:3C:3B:84:3B:F4:B6:98:C5:F8:C4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1057: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #1058: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #1059: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1060: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1061: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1062: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034266 (0x3750adda) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Sep 28 04:01:02 2022 Not After : Wed Sep 28 04:01:02 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:b7:44:d5:ae:28:9f:97:e9:8b:fc:df:87:14:25:c0: fc:39:f5:7e:26:63:6b:21:c5:52:4d:62:b6:67:fd:f8: 6d:10:56:b3:bc:f4:c0:71:f1:3c:c0:3a:e0:09:dd:c1: 9e:89:3d:fe:7c:41:a4:30:39:0b:0a:01:6c:1c:e5:94: 43:ac:f0:48:1d:47:14:5e:d5:63:67:b8:eb:5e:6a:1d: cb:c6:5c:5f:66:cb:b9:01:00:cf:d1:15:57:61:dd:c6: 05:5a:85:bf:0b:76:54:f0:19:0f:88:6d:b5:da:40:dd: 35:be:e7:87:7b:73:9a:83:c5:59:a8:f1:50:37:7c:a6: fd:a7:78:6f:8a:26:8d:cf:15:6e:b8:8d:fb:1d:76:4b: dc:4d:35:7c:a0:c9:19:eb:f8:1e:91:0e:e5:85:32:da: b0:d1:42:04:b7:e0:c0:9d:1c:eb:fb:dc:30:46:87:e3: e9:2f:0f:47:c1:d0:77:6d:00:1e:68:5b:49:e7:de:ef: 88:6a:23:97:ce:ca:a1:48:b3:60:9f:31:4c:d2:35:18: 49:4f:19:64:36:9d:89:35:40:a4:be:ca:b5:af:2b:0c: 01:26:3a:37:a9:7b:15:1a:23:2e:ca:20:c4:c8:75:0d: ed:d7:ff:48:0e:a2:90:fd:4d:ca:a9:d3:d3:37:4b:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:a7:91:6b:e9:17:25:5c:2e:db:25:47:49:08:01:b8: 6e:88:93:66:00:f8:81:b6:8f:1d:9f:8a:db:58:51:07: e7:ca:b7:93:49:8b:04:07:65:c1:a3:ea:37:b2:81:b4: 2b:15:0d:84:97:e8:53:84:1f:03:80:1c:46:41:57:b7: 72:9e:d8:e4:b3:e1:4d:d7:14:87:71:70:f2:05:c8:0e: 9d:1b:08:70:5d:04:f0:ba:b1:b4:83:56:20:83:de:1b: 06:74:61:15:54:a2:81:0d:9c:c2:a5:29:b8:55:ee:92: 12:cb:14:03:8a:20:49:75:e5:8f:0f:4f:ea:ee:27:17: 9b:96:30:79:7c:d9:2f:81:b0:c9:eb:6c:2d:1f:eb:a1: b3:2a:09:94:f4:33:14:c9:37:70:c8:3f:c2:e4:4f:92: 7a:2c:6c:9b:f8:0c:b1:5f:86:af:17:4f:b2:ae:08:64: a7:51:39:50:fc:26:38:26:81:63:9f:a1:78:c6:79:27: f1:47:77:52:83:ff:ed:c9:e6:22:55:ab:00:99:0d:db: 60:6e:f8:de:b3:9f:d3:19:d9:7c:b6:ba:c6:50:f8:ed: 44:0d:91:b4:8e:1b:c8:4e:5d:4f:bc:20:9a:24:03:ff: 12:4b:34:c0:0e:61:ff:b4:6a:0b:a0:47:80:ab:d4:b9 Fingerprint (SHA-256): D5:84:D3:9D:D4:47:7D:2B:3C:D0:25:F3:7F:1C:30:F1:8C:79:3D:99:72:1D:2A:C7:79:DF:5E:FB:E5:7A:12:A9 Fingerprint (SHA1): B6:72:C7:20:FD:96:72:AA:C4:6E:3C:3B:84:3B:F4:B6:98:C5:F8:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1063: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034266 (0x3750adda) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Sep 28 04:01:02 2022 Not After : Wed Sep 28 04:01:02 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:b7:44:d5:ae:28:9f:97:e9:8b:fc:df:87:14:25:c0: fc:39:f5:7e:26:63:6b:21:c5:52:4d:62:b6:67:fd:f8: 6d:10:56:b3:bc:f4:c0:71:f1:3c:c0:3a:e0:09:dd:c1: 9e:89:3d:fe:7c:41:a4:30:39:0b:0a:01:6c:1c:e5:94: 43:ac:f0:48:1d:47:14:5e:d5:63:67:b8:eb:5e:6a:1d: cb:c6:5c:5f:66:cb:b9:01:00:cf:d1:15:57:61:dd:c6: 05:5a:85:bf:0b:76:54:f0:19:0f:88:6d:b5:da:40:dd: 35:be:e7:87:7b:73:9a:83:c5:59:a8:f1:50:37:7c:a6: fd:a7:78:6f:8a:26:8d:cf:15:6e:b8:8d:fb:1d:76:4b: dc:4d:35:7c:a0:c9:19:eb:f8:1e:91:0e:e5:85:32:da: b0:d1:42:04:b7:e0:c0:9d:1c:eb:fb:dc:30:46:87:e3: e9:2f:0f:47:c1:d0:77:6d:00:1e:68:5b:49:e7:de:ef: 88:6a:23:97:ce:ca:a1:48:b3:60:9f:31:4c:d2:35:18: 49:4f:19:64:36:9d:89:35:40:a4:be:ca:b5:af:2b:0c: 01:26:3a:37:a9:7b:15:1a:23:2e:ca:20:c4:c8:75:0d: ed:d7:ff:48:0e:a2:90:fd:4d:ca:a9:d3:d3:37:4b:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:a7:91:6b:e9:17:25:5c:2e:db:25:47:49:08:01:b8: 6e:88:93:66:00:f8:81:b6:8f:1d:9f:8a:db:58:51:07: e7:ca:b7:93:49:8b:04:07:65:c1:a3:ea:37:b2:81:b4: 2b:15:0d:84:97:e8:53:84:1f:03:80:1c:46:41:57:b7: 72:9e:d8:e4:b3:e1:4d:d7:14:87:71:70:f2:05:c8:0e: 9d:1b:08:70:5d:04:f0:ba:b1:b4:83:56:20:83:de:1b: 06:74:61:15:54:a2:81:0d:9c:c2:a5:29:b8:55:ee:92: 12:cb:14:03:8a:20:49:75:e5:8f:0f:4f:ea:ee:27:17: 9b:96:30:79:7c:d9:2f:81:b0:c9:eb:6c:2d:1f:eb:a1: b3:2a:09:94:f4:33:14:c9:37:70:c8:3f:c2:e4:4f:92: 7a:2c:6c:9b:f8:0c:b1:5f:86:af:17:4f:b2:ae:08:64: a7:51:39:50:fc:26:38:26:81:63:9f:a1:78:c6:79:27: f1:47:77:52:83:ff:ed:c9:e6:22:55:ab:00:99:0d:db: 60:6e:f8:de:b3:9f:d3:19:d9:7c:b6:ba:c6:50:f8:ed: 44:0d:91:b4:8e:1b:c8:4e:5d:4f:bc:20:9a:24:03:ff: 12:4b:34:c0:0e:61:ff:b4:6a:0b:a0:47:80:ab:d4:b9 Fingerprint (SHA-256): D5:84:D3:9D:D4:47:7D:2B:3C:D0:25:F3:7F:1C:30:F1:8C:79:3D:99:72:1D:2A:C7:79:DF:5E:FB:E5:7A:12:A9 Fingerprint (SHA1): B6:72:C7:20:FD:96:72:AA:C4:6E:3C:3B:84:3B:F4:B6:98:C5:F8:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1064: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #1065: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #1066: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1067: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1068: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1069: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034265 (0x3750add9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Sep 28 04:00:57 2022 Not After : Wed Sep 28 04:00:57 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:ce:8c:38:6d:66:a7:d1:f2:07:e9:3f:02:c0:c0:94: 36:0b:44:db:89:45:c0:45:c8:e0:8e:e6:52:48:81:d1: 90:20:77:26:38:62:96:c2:84:67:93:90:ce:a3:50:b8: c6:bf:e0:df:80:ee:f9:ce:64:7f:95:8c:3f:20:9c:24: ee:aa:38:1d:64:2e:f6:09:2a:7f:e0:23:fa:6f:13:e2: 84:7e:b5:74:c5:77:33:00:d9:f0:ff:44:65:f2:98:fa: 89:9e:0a:7e:bc:aa:a0:bb:5b:ff:c6:03:dc:0d:00:f8: e9:6b:a1:48:85:43:0b:d6:a1:7d:dc:1e:33:ed:a8:03: 07:69:45:04:42:6c:c1:ce:c8:26:86:46:df:cf:a3:df: dd:9b:4d:64:8a:b2:b8:9d:1f:ef:22:c3:39:d7:22:63: 3c:03:30:99:d7:b1:ae:86:a4:5d:3d:32:46:83:e6:0e: a4:01:c7:a3:1d:5c:72:09:59:cc:42:78:b5:83:69:31: ef:45:af:e9:69:f4:5f:69:94:a9:74:b8:df:da:a0:1e: 54:4d:c9:83:f6:46:da:c1:dc:f4:4e:2b:bd:7a:6d:66: fc:61:f2:a6:8a:c6:a2:75:40:71:f4:6d:ed:ff:5e:48: 27:74:3f:a3:d6:84:e4:20:80:a1:eb:a7:18:f2:c2:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:4d:6a:f3:51:40:b5:03:41:a6:03:c7:1e:c7:ec:30: 15:5b:a3:52:85:eb:bf:4b:fc:0e:d3:df:22:9e:5d:0c: e3:b1:14:7c:23:e6:5b:81:67:ce:24:02:06:d9:96:cc: b6:19:fc:bb:08:c3:16:63:28:07:24:dd:c4:40:3d:cb: 48:f0:2b:89:dc:48:1f:0c:e5:64:01:81:39:0d:ea:0b: 33:31:67:e5:2a:51:0c:e7:35:18:dd:67:98:95:37:b8: c5:9b:a0:29:89:2e:dc:a7:3b:28:53:90:3e:c4:f5:0b: ee:9a:da:76:87:c4:c6:e1:33:99:a1:50:8a:7c:43:eb: 97:9d:1c:fe:5c:05:18:c8:ca:74:50:27:d4:5c:2a:a3: 81:3d:80:bb:9d:21:18:15:17:ad:aa:40:7d:78:a8:f7: 07:59:df:8c:ae:08:7d:83:84:82:74:68:be:9e:71:02: e0:6c:5c:6d:35:4a:23:7c:e5:53:1d:d0:cc:cf:84:33: d5:91:47:62:82:56:15:05:27:f3:1a:06:76:20:1e:2f: e6:d9:9d:50:1c:a4:ea:77:0e:b5:10:0a:db:02:a3:9a: 78:cf:11:53:5c:1c:5d:c7:b4:0f:26:10:38:07:a5:27: 09:84:8b:30:70:d3:e8:73:de:f6:ff:f5:84:40:e8:c5 Fingerprint (SHA-256): 9E:C7:DB:48:42:38:66:01:8D:A6:60:A6:2C:4D:69:6C:4A:90:67:6F:66:56:0D:8A:17:CA:46:06:08:FF:47:5F Fingerprint (SHA1): 8F:AB:66:21:28:C3:B1:16:DF:FF:DA:6F:BF:12:1C:37:54:BE:97:26 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1070: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034265 (0x3750add9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Sep 28 04:00:57 2022 Not After : Wed Sep 28 04:00:57 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:ce:8c:38:6d:66:a7:d1:f2:07:e9:3f:02:c0:c0:94: 36:0b:44:db:89:45:c0:45:c8:e0:8e:e6:52:48:81:d1: 90:20:77:26:38:62:96:c2:84:67:93:90:ce:a3:50:b8: c6:bf:e0:df:80:ee:f9:ce:64:7f:95:8c:3f:20:9c:24: ee:aa:38:1d:64:2e:f6:09:2a:7f:e0:23:fa:6f:13:e2: 84:7e:b5:74:c5:77:33:00:d9:f0:ff:44:65:f2:98:fa: 89:9e:0a:7e:bc:aa:a0:bb:5b:ff:c6:03:dc:0d:00:f8: e9:6b:a1:48:85:43:0b:d6:a1:7d:dc:1e:33:ed:a8:03: 07:69:45:04:42:6c:c1:ce:c8:26:86:46:df:cf:a3:df: dd:9b:4d:64:8a:b2:b8:9d:1f:ef:22:c3:39:d7:22:63: 3c:03:30:99:d7:b1:ae:86:a4:5d:3d:32:46:83:e6:0e: a4:01:c7:a3:1d:5c:72:09:59:cc:42:78:b5:83:69:31: ef:45:af:e9:69:f4:5f:69:94:a9:74:b8:df:da:a0:1e: 54:4d:c9:83:f6:46:da:c1:dc:f4:4e:2b:bd:7a:6d:66: fc:61:f2:a6:8a:c6:a2:75:40:71:f4:6d:ed:ff:5e:48: 27:74:3f:a3:d6:84:e4:20:80:a1:eb:a7:18:f2:c2:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:4d:6a:f3:51:40:b5:03:41:a6:03:c7:1e:c7:ec:30: 15:5b:a3:52:85:eb:bf:4b:fc:0e:d3:df:22:9e:5d:0c: e3:b1:14:7c:23:e6:5b:81:67:ce:24:02:06:d9:96:cc: b6:19:fc:bb:08:c3:16:63:28:07:24:dd:c4:40:3d:cb: 48:f0:2b:89:dc:48:1f:0c:e5:64:01:81:39:0d:ea:0b: 33:31:67:e5:2a:51:0c:e7:35:18:dd:67:98:95:37:b8: c5:9b:a0:29:89:2e:dc:a7:3b:28:53:90:3e:c4:f5:0b: ee:9a:da:76:87:c4:c6:e1:33:99:a1:50:8a:7c:43:eb: 97:9d:1c:fe:5c:05:18:c8:ca:74:50:27:d4:5c:2a:a3: 81:3d:80:bb:9d:21:18:15:17:ad:aa:40:7d:78:a8:f7: 07:59:df:8c:ae:08:7d:83:84:82:74:68:be:9e:71:02: e0:6c:5c:6d:35:4a:23:7c:e5:53:1d:d0:cc:cf:84:33: d5:91:47:62:82:56:15:05:27:f3:1a:06:76:20:1e:2f: e6:d9:9d:50:1c:a4:ea:77:0e:b5:10:0a:db:02:a3:9a: 78:cf:11:53:5c:1c:5d:c7:b4:0f:26:10:38:07:a5:27: 09:84:8b:30:70:d3:e8:73:de:f6:ff:f5:84:40:e8:c5 Fingerprint (SHA-256): 9E:C7:DB:48:42:38:66:01:8D:A6:60:A6:2C:4D:69:6C:4A:90:67:6F:66:56:0D:8A:17:CA:46:06:08:FF:47:5F Fingerprint (SHA1): 8F:AB:66:21:28:C3:B1:16:DF:FF:DA:6F:BF:12:1C:37:54:BE:97:26 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1071: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #1072: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034270 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1073: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #1074: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #1075: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034271 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1076: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #1077: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #1078: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034272 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1079: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #1080: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #1081: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034273 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1082: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #1083: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #1084: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034274 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1085: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #1086: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #1087: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034275 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1088: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #1089: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #1090: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034276 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1091: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #1092: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #1093: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034277 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1094: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #1095: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #1096: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034278 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1097: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #1098: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #1099: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1100: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 928034279 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1101: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1102: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 928034280 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1103: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1104: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 928034281 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1105: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1106: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #1107: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #1108: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1109: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 928034282 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1110: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1111: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 928034283 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1112: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1113: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 928034284 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1114: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1115: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #1116: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #1117: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1118: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 928034285 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1119: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1120: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 928034286 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1121: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1122: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 928034287 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1123: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1124: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #1125: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #1126: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1127: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 928034288 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1128: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1129: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 928034289 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1130: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1131: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 928034290 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1132: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1133: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #1134: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1135: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1136: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 928034291 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1137: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1138: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1139: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1140: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 928034292 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1141: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1142: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034270 (0x3750adde) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Wed Sep 28 04:01:31 2022 Not After : Wed Sep 28 04:01:31 2072 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:96:e4:d5:c1:a1:61:b1:6f:2b:a8:be:6e:6d:e7:75: 72:59:1b:cd:ad:db:4e:f7:0a:54:eb:15:c4:91:75:84: c0:50:ec:44:21:72:81:d0:c8:60:b0:d6:a9:bb:0d:54: 92:71:63:fe:7a:20:73:f1:82:cd:16:1e:72:eb:c9:99: 02:72:bf:bc:a2:88:57:46:f6:3b:a0:0e:0b:7f:e4:02: 4e:ef:e8:1f:b7:12:9d:49:f4:cc:23:8b:90:58:33:f8: 20:a1:57:8d:a3:40:5b:5c:95:9b:6c:80:7f:7c:d3:e9: 6b:cc:43:1e:86:fa:93:3a:c8:c9:58:5d:1f:93:57:a7: 2c:b2:ac:32:1d:b5:ba:24:78:db:5a:cc:0e:59:d6:73: e7:e4:02:62:59:63:2d:cf:d5:7b:91:75:48:50:fb:a3: 16:43:25:f3:95:48:87:35:66:ab:e9:4f:60:c6:b7:d0: 69:4f:fc:93:18:94:ba:7d:e5:a3:1a:c7:bb:b2:c0:d5: 60:ab:a3:5b:e4:2e:fe:e1:d0:28:be:77:17:48:01:a0: c2:f1:77:a4:c9:a9:bc:5e:b9:0f:73:b2:a8:43:b8:ef: 48:a4:d9:bb:1e:86:40:d8:ad:45:75:c5:97:b5:b4:6a: d9:a4:ce:57:a4:12:0c:6d:28:30:6c:5e:59:8f:b2:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:85:e6:c5:4a:af:c9:2b:a0:65:9c:e0:9f:7c:e7:90: 5f:5e:8c:fb:fe:4d:1d:14:80:f3:1b:8c:ae:7a:a9:26: e2:e6:be:c9:20:65:80:2a:bf:fd:7e:e6:f9:f0:f0:8c: fe:fc:37:92:0e:ee:08:6e:8b:8f:18:fb:40:0c:de:fb: 9a:c0:4a:11:8d:05:bd:22:94:15:a6:07:e9:51:80:22: 59:a8:fb:4b:3d:d8:f0:d0:b0:aa:e6:61:46:c1:51:48: 40:86:14:e0:14:69:d8:dc:ff:7f:a2:c0:ac:e0:c4:90: 3f:1b:b7:bb:cc:ec:ef:07:11:7e:46:12:8f:9d:b7:15: bb:5b:10:89:42:2f:55:c1:0e:a8:6e:be:f2:31:34:0c: 7e:e3:b7:fd:02:63:61:0d:44:d4:13:ba:ca:e2:88:a0: 24:d4:43:3e:57:b9:60:87:8c:e6:24:5c:c4:19:92:bc: 9a:a7:83:33:e0:59:4b:7a:bb:d8:cc:2f:15:d5:d6:04: c9:03:ee:81:46:0b:8d:d8:28:06:a9:52:db:8e:27:bb: a4:10:6d:fc:71:8f:61:d7:fe:4c:ce:ce:52:95:66:95: 59:7a:f8:bb:27:7a:01:b3:2f:d8:fb:bf:0c:84:39:07: 6d:dc:7c:a0:d5:2a:08:ce:07:52:d2:ee:bc:b2:fb:6c Fingerprint (SHA-256): 85:FE:14:05:46:8A:9B:E6:60:B5:00:31:B3:70:D7:91:5F:07:1D:57:98:BE:23:0A:96:F2:58:C9:4E:E5:26:8C Fingerprint (SHA1): 5E:D5:88:85:07:CF:D4:C5:51:E7:9F:93:93:A4:93:72:EA:42:41:1B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1143: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034271 (0x3750addf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Wed Sep 28 04:01:35 2022 Not After : Wed Sep 28 04:01:35 2072 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:22:23:7e:51:98:c5:36:ee:b5:93:1d:93:2b:85:24: e9:f6:c5:58:46:df:3a:4a:a3:f0:a9:65:69:4c:c6:ee: df:ed:b9:48:ef:be:34:b1:ad:07:f2:94:30:91:f9:4e: 80:b5:bd:a1:e7:fd:b0:30:08:08:a9:68:f2:eb:e3:f7: 1f:dd:a8:2c:cb:ea:69:8f:15:50:27:09:ae:a7:62:3d: 38:38:dd:69:f2:ce:ae:ac:f4:f6:f9:cb:89:4c:d2:af: 67:9b:3a:10:06:b2:58:7d:28:06:10:10:19:25:12:da: de:b0:5b:cc:b9:d3:0e:b1:4e:71:31:4a:93:e1:bb:cd: 92:d3:df:f7:7c:c8:5a:be:9b:fc:c2:32:37:72:b2:e7: 5b:01:1d:47:3d:bc:cd:6d:7b:8d:f7:1e:3f:0a:fe:8e: 36:65:fc:43:66:62:65:7b:f6:84:71:b6:02:1f:0d:01: 0a:69:b3:74:b0:3a:2b:a2:90:75:78:aa:ae:84:13:ac: 9d:3d:47:77:7d:97:04:07:97:2c:09:36:08:25:93:fc: 06:46:bf:fd:cc:42:7d:7b:e2:9c:db:77:09:a1:70:8c: d0:a8:7f:d4:78:e9:e3:88:67:01:c0:e3:11:ba:da:1f: 24:57:7e:01:0d:b3:30:69:6b:7f:1a:07:c1:fe:8b:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:50:78:5f:e4:31:df:4f:9e:e7:3c:fd:9b:f1:ab:23: 55:4e:4c:2a:fe:eb:77:4d:06:3e:aa:8b:eb:75:2f:e2: ff:8e:9f:a6:22:8b:bb:4b:24:fe:d3:a2:56:db:6f:30: f1:28:c5:2b:73:05:10:91:07:98:e0:6e:e4:9b:cc:cd: 8f:89:fe:a2:41:b1:5d:af:91:7e:26:8b:08:1b:21:ef: 5d:fb:4b:b7:7d:c3:7d:b7:fc:e2:98:f2:42:36:cf:bc: 12:a8:1a:d1:23:24:8d:53:c6:f3:c6:32:ba:aa:2a:2a: 34:b3:a6:ca:df:21:ef:c3:5c:40:24:d6:57:d6:cb:e2: c0:3e:b8:18:f6:22:1f:ef:0f:31:19:2f:7c:c0:a4:ae: 08:5c:d9:a7:4a:a5:70:a8:10:71:07:f0:13:72:89:7f: 15:78:aa:1c:6a:86:fa:17:d3:93:64:0e:de:64:89:86: 00:ea:fa:74:8d:bb:c0:c6:52:84:e3:fd:3e:33:53:ad: 4b:45:09:18:25:20:1a:f9:65:bc:42:83:96:0a:ba:58: 72:2e:c1:2a:ac:51:fe:d0:e3:80:8c:59:dd:5d:d4:9d: 38:00:1f:e5:53:0a:1a:78:83:bf:d9:06:fd:ba:1a:37: 3d:e6:06:24:39:3a:53:26:5f:37:0d:27:a4:87:c0:83 Fingerprint (SHA-256): F6:3F:06:B2:0E:76:69:2C:9E:66:49:8B:B4:2C:64:06:E8:4D:6A:6E:E8:49:70:CA:96:B5:A3:29:F7:39:B4:B4 Fingerprint (SHA1): C2:6A:0D:05:50:54:40:45:AB:65:0D:C8:ED:6B:A9:FC:90:0E:28:D4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1144: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034272 (0x3750ade0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Wed Sep 28 04:01:39 2022 Not After : Wed Sep 28 04:01:39 2072 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:51:69:c6:9f:f5:b4:d6:58:be:37:dc:4a:2d:e0:bd: 45:27:f8:20:40:87:3b:52:0e:02:ee:f9:e2:cb:5b:9e: 82:03:83:72:67:95:3f:e6:05:71:5c:61:46:60:22:79: 5f:d9:55:6a:f9:3a:70:74:47:69:18:dd:47:b3:19:ea: a0:2b:ca:b4:1a:fa:c8:dc:8a:ae:ed:7d:6a:4f:44:a5: 6c:9f:50:98:4e:b9:27:40:0a:90:e9:30:ee:e8:97:72: f3:88:5b:59:4a:8b:0f:30:bb:38:30:44:10:d3:c1:c6: 20:b8:c2:fb:3e:a0:90:8f:91:3e:80:da:e2:bb:1e:cd: fc:84:21:56:ab:bb:d9:b8:00:4d:b1:52:16:28:ae:40: 3e:f7:3f:87:a1:a0:94:aa:18:4b:4e:a3:54:df:7e:1f: 0a:8b:ea:d5:66:0e:24:33:eb:5e:47:55:3c:6d:21:1e: f3:0e:b7:db:a3:99:fa:cd:fe:0c:db:f0:40:1a:67:98: 3f:d3:a4:d0:6a:b7:77:d4:52:f8:49:81:6f:eb:a6:8c: 94:f0:17:5d:6d:71:28:67:32:17:9d:37:76:17:00:1e: 7e:43:00:e6:4b:6a:18:b7:cb:91:8c:0b:5a:96:78:1e: bf:05:42:eb:cd:f4:4b:b2:d0:38:3c:91:8d:42:84:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:f3:e8:b5:bb:bd:63:c2:df:58:53:38:43:91:66:a5: ab:fc:20:9b:79:68:d0:fa:8b:4c:5c:9a:1c:82:e3:82: 35:db:a4:60:87:5d:27:5d:f5:5b:9f:e0:70:5d:da:a5: 55:a3:1a:0d:f7:55:da:c6:45:e3:dc:92:35:dd:7a:4a: 4d:f5:37:a6:f3:c3:19:68:1f:24:41:89:93:4b:df:cd: 84:d3:c3:0b:39:78:b2:38:c1:0c:a6:2e:c3:17:b4:ef: ab:8e:fc:2a:01:fb:d9:8b:1a:8e:56:9c:33:88:0b:42: 7f:de:d9:91:55:3f:da:ca:82:d2:52:6a:3b:24:dc:3d: 9b:a2:24:f0:3a:a5:d9:99:65:2f:dc:e2:9d:39:51:7e: c7:ae:a0:30:83:86:b7:f3:58:f6:e1:e5:e1:64:30:ae: b7:d0:19:f2:c3:6d:ac:1d:ae:03:a1:06:c5:6d:7a:c2: 62:30:4d:b3:36:11:bf:d6:cd:e8:b6:9d:d8:9f:2a:1c: d2:43:07:4d:7f:08:1a:11:89:8b:b0:95:07:bb:2e:61: cf:28:43:f7:95:73:aa:08:8b:65:7b:94:5c:c2:2e:90: 7f:b2:db:50:e4:00:ec:09:47:d8:3f:90:5d:22:a4:a0: 26:15:eb:20:09:db:09:c0:b8:9c:28:69:ba:ad:fe:c8 Fingerprint (SHA-256): C4:9D:18:D6:E6:4F:37:D2:0C:2B:7C:33:7F:EC:8F:79:C7:11:5B:74:FB:C1:BE:CD:5E:4B:E5:EE:C9:4C:01:06 Fingerprint (SHA1): EB:69:2F:03:4F:55:2A:36:B2:32:DD:67:6D:B4:45:03:A5:C2:EE:FC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1145: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034273 (0x3750ade1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Wed Sep 28 04:01:44 2022 Not After : Wed Sep 28 04:01:44 2072 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f3:0e:ca:c9:72:95:14:67:0f:1a:02:cd:d6:4e:31:eb: 0d:13:2a:c5:fa:f8:d8:de:44:20:1a:ec:59:a9:74:fc: 2c:3f:25:d1:11:32:48:88:80:5a:f6:1d:49:81:45:a9: f6:ea:4f:96:92:57:23:a0:98:e6:07:68:43:95:19:e3: 70:37:25:2a:d7:d4:6b:ac:6d:83:70:22:26:b8:bf:47: bb:10:78:52:93:fa:a7:23:6f:83:7f:91:71:cd:7d:2f: 34:45:24:0e:24:50:25:4b:90:5f:c2:07:49:14:5a:d3: 23:ce:1a:a9:b7:96:c9:47:75:39:17:98:aa:c9:2e:a1: 76:38:70:90:ba:3e:02:9e:a4:b5:27:c4:d1:93:b3:c5: 76:eb:b6:49:54:63:9d:e0:21:42:7a:80:a9:50:f0:71: d8:07:7f:2e:ac:28:0b:5c:1c:48:24:c9:a3:1e:ea:ca: c6:c8:e6:d0:8c:97:eb:56:92:4d:4b:fe:cf:a4:b7:88: 1b:11:2c:c6:ed:3e:61:87:9c:de:3b:85:41:fe:12:a6: 63:df:d8:a6:32:af:be:e1:23:ad:24:b5:33:99:76:82: b7:2d:81:86:78:06:1c:eb:68:79:81:c6:e1:3d:52:3b: f3:a1:67:e5:d7:b6:fc:cc:a3:10:16:4c:13:a7:ea:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 63:b4:b6:3d:09:e5:49:43:84:8d:87:b5:0d:ca:20:c8: bb:24:43:58:e4:0e:cd:6e:7b:a2:3d:94:bd:f9:a4:20: a2:88:9f:df:46:b9:f7:19:61:26:ca:1a:5e:20:20:9f: 2d:be:ba:73:ef:56:bb:98:61:31:0e:eb:00:23:a2:93: 7d:52:0c:86:58:55:3c:42:5e:4f:17:ac:ba:ed:ed:5e: 77:08:4a:5b:1d:c1:41:d5:d4:88:3d:aa:f0:d8:7d:83: bd:76:f6:20:88:3e:1b:19:1e:32:4a:06:3d:30:b5:9a: 7d:11:4e:0a:87:95:0a:21:6c:b9:a0:9b:b7:56:f5:a9: f7:4a:d6:fd:85:4b:0f:13:11:be:17:bd:32:83:7d:bb: df:64:2a:39:57:4c:96:b9:83:9c:a5:ce:26:20:7d:46: 98:4d:73:6e:44:df:89:42:61:31:71:7b:ad:83:70:99: e6:24:5a:f1:78:da:af:ac:d2:6c:21:9a:8a:4c:ba:d5: f9:8b:97:78:3b:9d:e8:d0:39:b7:53:6c:b7:8c:d0:bf: 7b:0c:70:b8:3d:b9:fd:05:43:15:7a:92:70:c1:ee:1e: 4e:25:bc:79:5b:e4:72:5d:16:c2:15:a3:7e:12:80:32: 09:6d:d7:9b:46:cb:d3:ec:30:b9:9b:37:ec:69:39:2f Fingerprint (SHA-256): B7:C7:F4:D3:52:F7:9A:F8:86:4F:D6:93:92:E1:43:13:CC:F9:7B:93:9C:05:8C:FF:65:CB:9D:17:73:15:41:81 Fingerprint (SHA1): 9D:FE:58:A7:14:79:9A:0D:2F:3B:FC:6F:A9:5F:E4:0F:A9:17:AE:8A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1146: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034274 (0x3750ade2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Wed Sep 28 04:01:48 2022 Not After : Wed Sep 28 04:01:48 2072 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:20:3b:bf:cf:d8:25:2a:cd:06:b0:6d:1e:0b:35:b6: a0:93:6c:57:fe:b0:86:c4:e7:74:c5:d1:48:dc:d2:bc: 6e:81:ea:70:57:65:d1:da:32:4e:b7:9a:35:db:d6:24: f6:99:f5:f0:61:4c:0b:0a:e4:51:4f:de:ac:75:4c:db: fc:6a:07:d6:5d:18:24:14:cf:1d:ed:d1:ec:0e:e7:fa: e7:6a:d1:ad:80:af:56:e5:61:c5:cf:09:96:1d:55:dd: 8a:b1:77:c9:ae:b1:6b:93:5e:95:1e:e6:04:95:36:2c: 71:af:e6:84:79:69:db:c7:13:66:76:99:9f:fa:b9:2d: 5a:e9:a9:02:0d:72:62:19:65:93:ae:25:c0:92:88:f2: c6:69:90:7a:42:df:02:1c:d3:66:18:8c:b5:eb:12:12: 0e:90:ba:68:a1:06:75:87:18:f7:d2:23:92:7f:32:47: ed:33:1c:59:5a:33:38:08:8a:49:86:46:c7:5d:51:16: 21:f7:4d:39:a1:90:21:2a:d3:9a:19:f2:fb:f3:cd:1d: 92:90:25:1e:db:9e:19:6a:43:2f:b9:8d:5c:be:50:f6: 8b:ec:0a:f1:97:79:ed:a5:87:a2:81:06:48:63:20:2b: a5:fe:b7:48:b6:dd:92:bb:6e:96:45:8e:b6:b1:21:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:5f:59:b3:95:bc:1e:0f:3a:a9:a1:4f:08:15:22:18: 50:bc:56:69:4d:5a:83:10:8a:f3:a7:65:32:55:e6:ae: 87:a4:98:e5:af:5a:aa:56:a8:e5:f9:de:59:55:46:af: b6:4a:11:44:21:6a:79:db:4f:99:cb:38:52:c9:d8:94: 4c:4c:5c:49:b5:33:3f:f7:84:e1:a6:29:85:73:28:e5: 61:78:57:f4:94:3e:e6:aa:6e:1b:5a:7e:da:b9:73:c7: 2d:59:07:fc:05:aa:30:7a:fe:bf:e0:4d:43:0a:37:97: ef:65:07:72:b8:27:8a:29:46:6d:75:cc:bc:c1:d2:fd: 7f:ea:bd:c8:f1:16:23:88:f2:d7:1f:28:8d:31:ff:ce: 3a:32:46:a0:af:7c:6c:19:e6:89:78:e9:d9:6e:17:c0: dd:71:e7:f2:c5:05:4b:2e:fc:c0:49:0f:55:6b:7c:f4: 6a:59:9b:31:ae:83:0e:fa:f3:4a:5b:58:12:27:32:7e: 41:08:b7:e6:95:50:cf:3f:ee:8e:4d:1d:66:49:3b:b7: 7d:a8:37:99:dd:28:16:5c:b6:43:73:b0:ff:50:b7:d1: 53:be:4e:0f:f9:d0:f6:07:77:a3:b5:79:15:7a:c5:b2: ab:44:ca:68:7e:a6:08:df:79:d4:c0:78:14:51:f4:6e Fingerprint (SHA-256): DD:54:7E:A3:36:DC:E2:53:F0:EA:63:A1:92:FB:16:B5:37:2B:E2:68:83:1D:6B:BB:E6:9D:F3:4D:78:99:9D:84 Fingerprint (SHA1): E6:F9:18:E8:F7:06:82:63:59:BB:87:6D:90:06:2B:36:F2:91:8A:F7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1147: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034275 (0x3750ade3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Wed Sep 28 04:01:53 2022 Not After : Wed Sep 28 04:01:53 2072 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:b8:c7:58:cb:60:0a:a5:27:39:03:ad:7d:00:33:44: aa:57:2d:bf:e1:ff:3e:13:1d:0f:e6:cd:dd:03:bb:3b: 2d:e3:2d:61:9d:bf:7e:ff:36:65:b9:2e:b2:35:d0:ed: 76:92:2c:8b:e4:a9:9e:e8:67:62:bf:25:0c:7d:1d:88: e9:f4:93:de:27:ab:f6:1d:e0:ae:64:8c:af:7e:4a:17: 57:da:66:e1:4f:07:3d:20:46:7e:a8:07:a6:d2:05:c2: df:f4:5a:b8:d1:d3:f8:e0:5c:de:4d:4f:36:31:22:a4: b2:33:c1:a2:09:6e:bc:16:e7:1f:9a:0e:ef:23:99:0e: d6:5e:d5:12:fd:0e:af:28:56:12:7d:b6:0d:7b:24:1e: c3:da:6b:15:ae:85:b1:3b:3f:71:62:25:19:f8:fc:06: 2b:cd:64:38:31:be:93:01:bd:ed:6d:b9:20:c8:cf:34: 4d:a3:f9:1c:e8:96:70:dd:8d:3a:f2:9f:e1:e7:37:6b: 47:08:ee:b6:89:6b:7e:18:e5:00:3e:d5:68:b4:28:66: b2:25:44:1f:c8:46:68:ed:b9:2a:55:f2:52:c3:1d:7b: 72:cd:2f:75:6a:fb:32:7b:5e:cd:3d:6f:99:e5:e5:52: fe:d8:87:60:eb:fe:04:17:55:b7:7a:95:37:dd:70:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:5b:36:2c:73:21:ab:e9:c6:f2:dc:3e:3d:ea:2d:6b: cc:db:67:32:7a:9f:2d:b5:a9:60:d4:5b:d6:bf:df:07: 8c:74:be:6a:d4:88:3d:75:54:af:03:da:1b:b9:ed:35: 79:ac:94:c0:e6:1d:16:6a:57:16:16:49:72:0c:04:2f: fb:6d:91:df:ba:cd:80:82:c6:16:81:17:0d:ab:5d:84: 62:58:59:49:71:cb:f8:ff:52:8c:31:f6:6c:e6:69:e8: 3f:60:73:35:d0:80:a1:5a:a6:ed:fd:79:66:84:fa:c2: 04:df:dd:87:69:79:c7:11:99:3a:7d:90:e1:95:3f:c7: a3:66:d6:9b:96:20:d4:d8:33:07:ac:30:ac:1f:0e:6a: 83:45:9e:46:1b:b3:0f:30:bb:c5:95:ef:7a:b8:ec:12: b7:10:69:70:be:ee:1d:d5:5c:02:9b:3c:0f:ee:d3:17: 56:d3:ae:ac:62:90:22:41:1e:bf:ff:db:7b:58:1b:57: 87:8e:84:cf:05:a5:a6:a4:c9:de:04:12:cc:a9:f9:57: fe:71:89:3c:c0:e0:5d:62:d4:4c:52:71:11:ec:ea:da: b9:f3:7f:e7:6b:44:34:db:9e:f1:7c:63:18:5c:d6:38: ac:3a:45:bd:9a:09:4f:5e:fb:ee:5a:e1:16:1b:e2:d3 Fingerprint (SHA-256): B6:04:AF:1C:80:DF:D8:8B:D2:07:78:21:64:76:72:EC:98:21:82:81:FE:9D:4B:DB:2B:7A:CB:63:7B:30:4E:66 Fingerprint (SHA1): B9:53:5C:D9:2F:1A:9E:E7:D2:25:9C:59:B6:CD:76:9E:38:34:76:B4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1148: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034276 (0x3750ade4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Wed Sep 28 04:01:59 2022 Not After : Wed Sep 28 04:01:59 2072 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:31:76:f7:5f:a4:ff:cf:1e:d6:69:82:79:85:f7:77: 36:b5:e5:5e:c0:84:c1:94:ff:4e:e4:03:3b:42:6c:07: 98:28:41:54:7a:f5:bb:8c:bb:f0:6a:da:77:38:b4:b2: 1f:3a:91:65:2d:4b:4e:6c:22:d8:df:4d:f3:c1:c9:e3: 4d:aa:bb:01:4b:c0:45:c1:ec:74:35:9e:ca:87:f9:b9: 61:d4:1a:06:78:63:47:d3:70:27:19:6e:dc:21:82:07: b4:0e:7f:34:2c:af:6e:16:48:52:71:0a:b0:4e:89:aa: d1:19:ff:b2:e4:10:71:64:72:47:ec:9d:f4:fb:de:54: c6:5b:d6:a2:df:f1:e4:51:61:f2:af:ea:90:24:9b:ae: 01:40:2e:a8:22:55:b1:58:c9:35:84:cc:22:51:84:57: 68:2b:6e:63:df:15:e1:62:23:72:d3:05:89:fb:e3:58: fb:73:91:d5:e9:81:75:b4:76:d3:dc:ed:78:95:53:dd: 90:d1:ec:8a:f2:75:29:fc:cd:93:70:1a:ff:46:74:36: 00:f1:a3:ed:33:c9:bf:f5:80:b6:49:fe:75:a2:fd:0c: e9:dd:9d:af:2a:df:19:27:f3:8c:12:b0:f5:09:a1:56: 64:d6:ea:56:00:de:5c:d5:a0:f6:d4:92:14:8c:75:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:3c:9f:3b:e2:b2:06:0c:7e:1b:0e:ca:91:b7:c7:f7: 87:8e:52:a8:1d:03:05:07:89:36:b7:86:9b:85:15:1b: be:d0:86:94:a8:36:72:1b:4e:c7:f3:3f:2a:36:ad:97: 3c:3d:c4:4b:27:24:11:08:16:51:0e:aa:5b:d6:f5:ca: c9:0a:40:4d:d0:a5:e1:ef:c3:42:d6:31:50:82:5d:d7: e5:2e:44:59:f3:0f:58:76:6a:73:e3:68:fc:4a:30:21: 6d:c8:00:c8:9b:7e:a6:7d:22:14:ed:16:ca:d1:9a:09: 31:14:88:fa:ff:ad:a7:d3:72:7d:7e:af:36:a5:c0:fd: f6:16:b5:24:d8:1e:38:07:19:15:81:b4:96:ba:b2:a2: 74:ff:92:70:3f:b3:de:67:3b:ee:20:22:2e:77:35:6c: c6:6f:73:8c:68:e8:90:57:97:29:9a:60:bc:1d:67:61: 6f:1b:e5:ef:53:60:78:5f:41:1c:05:83:16:d6:02:57: 0b:7b:63:8d:7c:45:6e:c2:60:d0:f6:bb:c8:26:75:29: c9:be:c6:ac:cd:23:4a:95:11:6d:6b:d6:c5:30:ce:49: 80:ef:4a:65:8c:ff:f8:54:6f:d5:60:51:91:2c:ce:f6: 8c:47:f7:ba:6f:dd:5b:cc:3f:f1:41:88:ab:45:25:02 Fingerprint (SHA-256): B7:AB:CC:B6:D9:5C:DD:B3:ED:C5:B6:94:32:3C:28:66:35:5C:DC:CF:C6:A3:77:23:3A:7E:4E:AF:36:88:52:E5 Fingerprint (SHA1): BC:C0:8F:21:93:78:9C:94:87:5B:33:56:76:87:9B:AD:21:9E:E5:B6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1149: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034277 (0x3750ade5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Wed Sep 28 04:02:04 2022 Not After : Wed Sep 28 04:02:04 2072 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:7f:0b:66:6a:6c:37:70:6b:18:ff:de:6c:48:f3:2e: 1d:a3:df:ce:8c:bd:fb:be:03:bb:97:73:4a:80:09:7e: 68:01:ba:6e:1c:c8:9f:2e:65:54:5f:9a:2a:7d:97:80: ba:aa:46:e3:ae:ee:33:0e:bc:15:27:33:7b:3a:69:02: cc:27:2d:49:5c:d7:b1:37:52:bf:a4:d8:0e:96:77:65: e4:ef:c9:4c:fc:d1:28:33:de:91:be:d5:39:a4:63:ed: 6b:b6:d0:a8:2e:4c:58:f3:70:22:a4:76:24:24:2b:e2: 16:db:1a:4e:83:9a:9d:c1:87:62:a9:d8:ce:68:b5:ea: 47:e3:8a:4b:e2:e2:b4:a4:ff:c2:8f:9c:48:8f:10:92: dc:3f:97:b7:86:19:81:1f:db:18:38:6f:41:08:52:5a: 5f:01:1c:ab:00:65:2f:75:9c:d1:34:69:98:88:bc:d1: 73:33:ba:b8:94:75:cb:83:c8:10:0f:85:4c:14:7a:65: 08:cc:66:2a:3d:03:c4:4e:88:d2:89:02:09:10:3c:a6: e5:8c:5a:8f:f4:2a:17:7f:52:63:b1:b7:77:a0:b4:95: 1c:fa:70:4d:b3:21:c0:7a:a2:05:86:ff:3d:60:be:66: aa:d5:49:df:3a:92:f0:d9:05:cb:24:d1:c3:a6:45:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cb:56:14:ce:c2:9f:b8:a2:bd:b3:2a:97:92:d0:53:83: fe:56:93:ca:d1:33:ee:e5:60:94:79:c4:a0:a2:c1:92: d8:cc:cc:ec:c8:a8:05:f6:98:8a:a2:85:f8:5b:15:e7: 59:40:30:7b:34:dd:df:eb:e4:e5:52:d1:e7:1b:a1:2f: bc:ad:6a:85:8f:4d:06:35:b3:bb:a7:c5:e3:df:03:97: 1c:9c:c8:4f:ec:09:14:f8:42:c8:ae:37:dc:39:cf:9c: 06:c0:38:13:77:5c:75:c8:29:f2:f5:b0:83:fd:35:a0: 6a:3f:a5:73:3d:38:4f:8e:e8:7a:d5:f7:50:b6:12:e2: 1a:76:f3:8a:79:02:ac:8b:c4:53:ae:f1:19:3d:8d:1d: 35:b7:f4:b6:d7:52:f1:4b:03:00:ab:79:45:be:c6:bd: a1:ca:f6:a1:33:24:dc:c7:b4:0f:1e:01:db:3f:97:37: 11:46:ad:28:2a:ef:62:64:f9:d6:d2:1e:92:9d:45:e7: 82:51:19:99:cd:43:f5:78:0a:e5:a9:6e:57:bf:de:72: 4d:5b:8d:65:24:91:da:5a:47:64:a2:47:6d:33:f4:00: 22:c0:05:10:23:de:30:56:3d:1f:43:28:a9:6c:d1:23: c9:4e:c4:c9:f5:d5:71:f2:f7:7e:c9:55:98:d0:38:29 Fingerprint (SHA-256): FC:77:C9:38:7B:85:7C:2C:0B:25:EC:28:5B:90:AB:30:38:1C:C8:AC:2E:31:18:3C:55:47:5F:B2:B9:D7:2C:BA Fingerprint (SHA1): 8A:61:33:A7:8B:E1:4F:75:56:B0:EF:87:FC:01:D8:91:F1:59:B5:8A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1150: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034278 (0x3750ade6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Wed Sep 28 04:02:08 2022 Not After : Wed Sep 28 04:02:08 2072 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:01:f6:d9:ed:68:2b:6a:32:c0:b8:70:5b:d1:f0:48: f2:66:69:02:68:c8:18:09:ce:52:25:73:24:76:82:69: 21:f7:0b:9a:a4:1d:59:b4:23:e4:3a:af:d5:6b:aa:af: 3a:f8:08:cb:b3:8c:5b:bf:76:92:60:74:92:57:70:b7: 4f:23:35:71:b9:02:93:51:fe:3b:ff:f2:e1:28:76:b4: 82:fb:ab:0b:e1:38:c2:e5:a5:57:78:81:ce:0c:88:9d: 68:33:f8:9e:d0:d9:71:5f:4b:1e:0f:97:05:29:ef:fc: 06:d3:f2:b5:93:1e:62:8d:e3:17:a5:bd:bd:67:d6:1f: 03:b1:38:02:da:69:7c:fb:11:d1:90:e1:df:83:22:c2: 27:01:7c:0d:c5:4e:be:8b:7b:49:26:2e:a9:4d:d7:d3: 21:b9:c2:7c:6f:b5:fb:52:58:15:70:d0:34:ad:0b:95: 32:13:59:87:f2:dd:46:f8:0f:d3:dc:fd:7f:9b:08:24: f7:6a:e4:15:38:ac:dd:5b:19:5f:c2:fe:45:ad:85:17: b4:de:1f:36:ff:2f:23:21:96:68:9d:f3:ac:f9:8d:21: a2:72:f8:0f:43:b6:e7:2f:b2:2d:f8:ed:1e:3a:a5:7e: 66:8b:ca:f4:64:1b:41:a8:e6:16:66:40:4f:4d:d5:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:76:56:96:43:ec:e8:c1:e8:1f:b5:6c:33:33:4f:33: 3b:a1:d0:39:cd:74:f4:23:8c:1f:49:d1:81:d2:e9:8d: 9e:c8:79:bf:c8:b9:e5:cc:92:38:70:7c:1e:bd:81:86: d8:83:8a:aa:4b:96:ce:dc:14:92:6a:82:00:12:1d:b2: 77:d9:23:01:0e:16:bc:46:7b:8a:be:b0:14:9f:12:32: 3a:a8:62:94:df:7f:d6:5d:53:71:ec:45:24:22:a0:45: 40:1a:2e:3d:fb:ab:75:86:e5:6e:bb:e3:6f:73:fd:34: 84:13:00:79:2d:5d:aa:68:5b:31:c9:02:88:5b:33:33: 61:d7:0b:69:e3:10:46:16:a1:82:cd:f6:23:e4:40:5b: e1:de:6b:2d:30:1c:19:1b:1c:b7:c3:65:c0:a7:ff:1b: 17:8f:96:d8:d7:e7:a6:3c:1b:96:50:73:b4:b0:d0:c5: c5:52:2a:5d:3b:7e:6e:14:e5:ff:d0:33:44:00:ee:a2: f2:ff:70:77:9a:9d:10:6b:d3:bb:f5:44:fb:ed:f6:c1: c3:89:49:b7:36:63:09:fa:73:8a:01:25:93:a2:d7:62: 8d:bc:c5:92:56:1c:22:0c:ef:f5:06:66:11:37:3e:d1: 62:00:f8:04:e0:d0:40:20:0b:05:49:53:12:9d:00:cc Fingerprint (SHA-256): 45:A5:03:2D:57:E3:98:C7:FD:0E:9E:0C:69:B5:C5:5E:5A:A8:7D:E4:73:32:67:E4:32:A0:86:0D:DF:23:16:AE Fingerprint (SHA1): 69:36:7D:86:09:BE:1A:4B:D3:DB:DF:E6:E2:0E:3C:15:A7:A9:FD:8B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1151: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1152: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034293 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1153: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1154: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1155: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1156: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 928034294 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1157: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1158: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1159: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1160: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 928034295 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1161: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1162: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1163: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1164: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 928034296 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1165: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1166: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1167: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034293 (0x3750adf5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:03:09 2022 Not After : Wed Sep 28 04:03:09 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:60:34:e1:74:95:43:6c:6f:8e:5d:63:c1:31:3a:a5: 99:69:bd:e3:70:15:6a:1f:30:09:18:ef:1a:de:05:97: b4:9a:c2:b2:a9:5c:41:68:44:7e:e6:49:bd:66:70:cf: 8d:56:33:6a:e9:9d:c7:05:d1:4e:3f:db:a1:62:ba:4f: 8e:98:67:33:cb:55:23:57:41:a5:c8:df:dd:32:37:9f: a3:04:4a:5c:30:e2:74:44:ef:48:1a:38:e5:b9:b4:ef: 6e:f7:63:96:f4:3a:c5:59:e8:e8:90:09:22:79:df:99: f5:7f:b7:8e:d9:53:a3:e8:2b:21:92:4f:4c:30:d0:eb: 74:ec:f9:b0:73:34:c8:73:63:92:37:09:16:4c:5f:ad: 16:18:eb:ba:69:64:07:3c:e3:c1:53:ff:bd:17:0d:e8: ee:90:9f:21:2d:f6:40:b4:67:ad:9a:fa:e5:4a:c7:a2: d7:9e:f8:7e:15:7c:ca:80:e2:d0:4c:5c:f5:f5:e2:11: ee:dd:10:09:c2:4d:93:ed:c8:67:32:85:b7:6b:e8:36: 24:8b:eb:57:71:9e:31:51:69:d5:16:b2:37:4c:a0:e7: ee:77:a4:3a:17:77:80:79:5a:89:dd:f1:43:e7:d7:84: 17:22:ad:c4:96:0b:23:fc:af:fd:bf:27:3b:2b:c5:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:50:6d:17:b9:f8:88:3b:8b:6e:63:d1:ba:c8:b0:c5: c2:72:18:28:ba:fe:12:26:eb:35:b2:d8:ff:d0:cb:6f: cd:5f:85:7d:6f:15:d5:bb:a9:1f:10:1b:af:29:20:44: 95:2e:82:cd:bb:b8:9e:ce:e3:fb:f4:10:33:e7:e8:ad: 90:14:1b:b9:5e:e1:db:8e:c7:69:d8:a4:9e:3a:f4:a2: 10:6b:66:ea:be:b1:76:be:d5:b3:91:d4:b9:b0:86:f7: 0a:29:59:47:eb:ae:d4:13:ae:cd:ee:45:41:68:14:a9: c3:c7:fd:10:72:2f:d1:d6:01:d3:f2:7d:c9:ca:6a:89: 04:43:8d:e6:7c:4c:50:21:da:e0:69:72:77:42:b0:2b: ba:1c:7e:a5:bd:ee:79:97:23:8b:8c:a0:7a:61:0b:6f: 1c:26:5b:cf:b5:14:d6:c8:8f:22:e9:99:8c:5f:f3:8a: 80:a0:48:a3:d3:1f:70:97:8b:a8:00:3b:36:ad:5e:72: a5:f7:6e:db:23:a5:d3:36:c6:b9:2e:8d:b6:bc:de:25: 07:95:66:4e:ef:77:d6:47:73:83:60:1d:b8:1a:dd:7b: e3:1a:fd:24:33:54:a1:30:2d:3f:ec:46:8e:2e:f2:59: ae:4c:22:81:ee:69:22:a6:9f:82:d4:ce:dd:0b:4a:b1 Fingerprint (SHA-256): 40:45:74:54:F7:D6:ED:CD:2F:52:A0:A6:63:00:6B:E6:E7:D5:A9:AC:35:BC:0D:55:32:BC:C7:1B:74:73:98:E7 Fingerprint (SHA1): 03:5C:E4:EE:47:9D:CE:F5:3D:9C:AF:AA:16:7B:84:4F:B7:B7:14:54 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1168: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1169: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034294 (0x3750adf6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:03:14 2022 Not After : Tue Sep 28 04:03:14 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:44:51:32:bf:45:e9:d8:39:68:e6:ce:6e:30:44:68: b6:89:a6:ef:75:37:b5:ba:09:98:ab:08:25:1f:f0:17: 8a:c2:95:2a:ae:13:3d:7e:22:80:9f:41:c0:32:7d:9f: 1f:d8:b8:f0:5b:b8:80:a0:c6:84:bf:85:5e:81:ea:7f: ce:4d:c0:96:6a:12:a4:84:fb:e9:af:e6:ec:44:62:af: bd:f4:73:54:30:08:ed:2b:1d:40:8a:d5:40:63:c3:d3: f0:4d:5b:dd:30:3f:88:68:69:ca:37:2c:96:89:48:c3: 9f:3f:98:2e:0c:57:33:58:5b:10:c4:a4:83:ee:71:6f: 5c:8d:0a:c5:62:aa:d3:58:29:29:77:e3:fa:47:60:20: ca:c3:96:02:98:ed:85:cd:56:43:95:8b:0e:8b:b1:97: 8d:e1:0b:24:e1:43:37:e8:0a:0f:35:02:47:c6:ec:b1: 0c:b7:5d:a1:a7:26:a9:a3:e4:67:22:53:cb:ad:5f:d0: 41:e1:78:cd:75:01:cc:1a:55:fc:94:ff:8e:32:57:ed: bf:47:1f:73:9f:bb:94:79:5a:80:03:69:c8:26:9e:32: a7:7e:83:40:8d:ae:52:54:af:e8:9f:d6:d8:ee:2d:8f: 99:0d:d1:7e:1c:a2:0e:2b:8c:a5:68:ec:e1:8e:26:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:1f:49:84:ab:84:2f:44:fc:c3:d3:20:ce:e8:47:b1: d2:9a:58:4f:e8:b0:ec:13:c8:44:55:87:1b:13:12:44: 7b:7a:57:6c:ef:e2:e1:be:b5:ef:0e:bf:d3:54:fe:d2: 1f:db:b1:27:6d:db:ea:a0:fb:98:35:8c:58:5e:59:c4: d9:b8:b0:d2:5c:d0:47:af:da:55:f2:1c:f5:75:e3:67: 35:0b:1e:76:2f:8d:c7:24:b4:10:27:00:a4:b8:d1:14: 54:1d:96:5f:16:2c:0e:a8:65:a9:1d:5b:99:0a:db:a4: 15:bc:d5:d9:26:c1:24:bf:6d:c1:c6:53:69:a3:fe:bc: 39:16:e6:9d:76:fa:8c:6e:92:5b:ca:43:5d:20:f9:5a: 2f:89:93:95:c1:4f:e8:36:fa:a7:3f:e3:21:f2:f8:65: cf:b1:08:6a:5c:d1:94:e6:1c:dc:48:26:f3:c0:26:2c: a3:3c:60:6e:e1:a4:4e:7f:48:05:dc:72:e2:5b:a6:ec: d1:04:8b:4f:43:c4:61:1f:ce:85:e2:4a:26:b4:06:98: a6:9e:14:38:cd:23:e1:83:a7:f7:9b:cb:62:38:9a:4a: 23:02:c7:b5:db:54:a5:f9:e8:e5:83:41:9b:78:ec:1e: c8:f5:4f:c6:03:db:10:20:d3:54:c6:36:3a:0f:d0:63 Fingerprint (SHA-256): C3:84:48:14:5D:04:EA:96:99:82:2C:72:B4:90:6D:C4:1E:14:1A:F7:E2:A9:1A:C1:93:8A:D8:3C:68:B1:F4:BE Fingerprint (SHA1): 52:E8:8C:2A:96:18:63:75:2C:47:77:98:E5:83:BE:4F:F4:5D:19:0B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1170: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1171: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034295 (0x3750adf7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Sep 28 04:03:19 2022 Not After : Tue Sep 28 04:03:19 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:b3:52:b9:04:a1:d1:ff:2a:f1:3a:67:39:50:13:f9: 8e:02:23:13:1a:4b:96:66:ac:cf:ef:04:9c:63:c2:74: 88:ba:09:1b:07:d6:64:08:1b:a4:2f:c7:2d:58:94:02: 0a:77:11:a8:10:b0:16:96:ee:fd:36:89:b1:60:7f:7c: 05:48:c4:7e:b0:91:a7:d4:b8:c7:55:7f:e8:f7:f4:f4: aa:da:e9:94:5b:90:39:99:cd:97:ba:e9:3f:0c:1b:2e: 7c:86:52:56:ff:95:4c:dd:60:5c:ee:7f:89:03:09:1b: 79:87:ee:9e:bb:76:42:77:78:a7:27:76:1f:48:81:54: d0:71:23:d5:ca:f5:fc:a5:9e:40:c0:05:77:fe:c6:b9: 77:0d:70:fb:da:41:3e:19:67:2f:f5:b2:40:4d:63:c3: 7c:05:bf:66:6d:8f:19:fd:c0:e7:4d:89:b4:b7:cb:5a: 5c:1a:c5:c7:1e:99:b9:63:db:55:77:a8:c1:2c:b3:05: c2:0b:7e:02:02:1a:ea:5d:e7:db:79:85:29:79:94:8e: f6:ce:e7:b4:01:b7:f3:c5:f0:fb:80:18:bc:e3:8b:94: b4:73:2b:c9:f8:8c:ad:c2:51:7b:99:45:a5:b3:2b:01: 65:25:68:f7:2c:ce:c9:63:cd:dc:ec:ba:73:bd:2d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a0:18:67:a6:7e:76:73:ad:0a:e1:84:64:80:7f:81:18: e0:17:a2:64:d3:75:86:d0:83:51:24:13:01:a2:5f:34: 6e:ba:4e:20:ae:30:a1:4b:4b:38:a1:aa:e4:a7:96:81: 67:f8:53:5d:d9:1b:a8:e5:ac:29:03:c4:0c:10:15:b4: 00:07:3d:bf:01:47:e0:2e:69:9d:8c:17:c2:48:69:39: da:b3:63:a9:bd:dc:07:57:f6:0e:2f:fb:1a:c9:f2:c9: 9e:58:41:9b:e9:9e:55:a8:d8:d0:84:a6:e6:ca:cd:4e: 4a:1e:1e:3f:eb:99:e2:a7:fb:26:3a:37:49:3d:9b:63: cd:ea:e6:64:ef:f9:90:db:d0:79:95:95:1b:90:61:57: bb:a2:ff:a7:e7:20:1f:98:0d:fd:5a:58:dd:23:c5:e2: d6:32:57:ef:68:af:77:35:f7:c2:e7:64:9f:bc:1d:6c: a8:ad:86:7a:96:50:db:71:c0:a3:63:ba:a9:42:e9:aa: ba:8f:b7:0e:96:4f:9c:de:1f:5a:e1:9a:ce:43:cc:bf: bc:5b:c0:b2:98:bf:85:76:e6:56:a7:7e:e4:76:b9:28: 6a:a3:da:ef:1b:4b:b6:52:67:f5:71:51:7e:c7:f3:2a: 7a:68:4b:d4:19:4b:19:88:43:30:0b:c5:c1:9f:bc:88 Fingerprint (SHA-256): 21:7C:9A:F3:59:74:17:EB:9E:FC:45:1F:39:A0:A0:45:22:D5:06:02:CE:58:F1:00:3E:09:BC:28:96:65:26:14 Fingerprint (SHA1): C9:39:2E:B8:11:93:67:EC:FB:95:86:67:4F:D0:09:D6:E1:14:5C:69 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1172: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1173: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1174: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1175: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1176: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034293 (0x3750adf5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:03:09 2022 Not After : Wed Sep 28 04:03:09 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:60:34:e1:74:95:43:6c:6f:8e:5d:63:c1:31:3a:a5: 99:69:bd:e3:70:15:6a:1f:30:09:18:ef:1a:de:05:97: b4:9a:c2:b2:a9:5c:41:68:44:7e:e6:49:bd:66:70:cf: 8d:56:33:6a:e9:9d:c7:05:d1:4e:3f:db:a1:62:ba:4f: 8e:98:67:33:cb:55:23:57:41:a5:c8:df:dd:32:37:9f: a3:04:4a:5c:30:e2:74:44:ef:48:1a:38:e5:b9:b4:ef: 6e:f7:63:96:f4:3a:c5:59:e8:e8:90:09:22:79:df:99: f5:7f:b7:8e:d9:53:a3:e8:2b:21:92:4f:4c:30:d0:eb: 74:ec:f9:b0:73:34:c8:73:63:92:37:09:16:4c:5f:ad: 16:18:eb:ba:69:64:07:3c:e3:c1:53:ff:bd:17:0d:e8: ee:90:9f:21:2d:f6:40:b4:67:ad:9a:fa:e5:4a:c7:a2: d7:9e:f8:7e:15:7c:ca:80:e2:d0:4c:5c:f5:f5:e2:11: ee:dd:10:09:c2:4d:93:ed:c8:67:32:85:b7:6b:e8:36: 24:8b:eb:57:71:9e:31:51:69:d5:16:b2:37:4c:a0:e7: ee:77:a4:3a:17:77:80:79:5a:89:dd:f1:43:e7:d7:84: 17:22:ad:c4:96:0b:23:fc:af:fd:bf:27:3b:2b:c5:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:50:6d:17:b9:f8:88:3b:8b:6e:63:d1:ba:c8:b0:c5: c2:72:18:28:ba:fe:12:26:eb:35:b2:d8:ff:d0:cb:6f: cd:5f:85:7d:6f:15:d5:bb:a9:1f:10:1b:af:29:20:44: 95:2e:82:cd:bb:b8:9e:ce:e3:fb:f4:10:33:e7:e8:ad: 90:14:1b:b9:5e:e1:db:8e:c7:69:d8:a4:9e:3a:f4:a2: 10:6b:66:ea:be:b1:76:be:d5:b3:91:d4:b9:b0:86:f7: 0a:29:59:47:eb:ae:d4:13:ae:cd:ee:45:41:68:14:a9: c3:c7:fd:10:72:2f:d1:d6:01:d3:f2:7d:c9:ca:6a:89: 04:43:8d:e6:7c:4c:50:21:da:e0:69:72:77:42:b0:2b: ba:1c:7e:a5:bd:ee:79:97:23:8b:8c:a0:7a:61:0b:6f: 1c:26:5b:cf:b5:14:d6:c8:8f:22:e9:99:8c:5f:f3:8a: 80:a0:48:a3:d3:1f:70:97:8b:a8:00:3b:36:ad:5e:72: a5:f7:6e:db:23:a5:d3:36:c6:b9:2e:8d:b6:bc:de:25: 07:95:66:4e:ef:77:d6:47:73:83:60:1d:b8:1a:dd:7b: e3:1a:fd:24:33:54:a1:30:2d:3f:ec:46:8e:2e:f2:59: ae:4c:22:81:ee:69:22:a6:9f:82:d4:ce:dd:0b:4a:b1 Fingerprint (SHA-256): 40:45:74:54:F7:D6:ED:CD:2F:52:A0:A6:63:00:6B:E6:E7:D5:A9:AC:35:BC:0D:55:32:BC:C7:1B:74:73:98:E7 Fingerprint (SHA1): 03:5C:E4:EE:47:9D:CE:F5:3D:9C:AF:AA:16:7B:84:4F:B7:B7:14:54 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1177: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1178: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034294 (0x3750adf6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:03:14 2022 Not After : Tue Sep 28 04:03:14 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:44:51:32:bf:45:e9:d8:39:68:e6:ce:6e:30:44:68: b6:89:a6:ef:75:37:b5:ba:09:98:ab:08:25:1f:f0:17: 8a:c2:95:2a:ae:13:3d:7e:22:80:9f:41:c0:32:7d:9f: 1f:d8:b8:f0:5b:b8:80:a0:c6:84:bf:85:5e:81:ea:7f: ce:4d:c0:96:6a:12:a4:84:fb:e9:af:e6:ec:44:62:af: bd:f4:73:54:30:08:ed:2b:1d:40:8a:d5:40:63:c3:d3: f0:4d:5b:dd:30:3f:88:68:69:ca:37:2c:96:89:48:c3: 9f:3f:98:2e:0c:57:33:58:5b:10:c4:a4:83:ee:71:6f: 5c:8d:0a:c5:62:aa:d3:58:29:29:77:e3:fa:47:60:20: ca:c3:96:02:98:ed:85:cd:56:43:95:8b:0e:8b:b1:97: 8d:e1:0b:24:e1:43:37:e8:0a:0f:35:02:47:c6:ec:b1: 0c:b7:5d:a1:a7:26:a9:a3:e4:67:22:53:cb:ad:5f:d0: 41:e1:78:cd:75:01:cc:1a:55:fc:94:ff:8e:32:57:ed: bf:47:1f:73:9f:bb:94:79:5a:80:03:69:c8:26:9e:32: a7:7e:83:40:8d:ae:52:54:af:e8:9f:d6:d8:ee:2d:8f: 99:0d:d1:7e:1c:a2:0e:2b:8c:a5:68:ec:e1:8e:26:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:1f:49:84:ab:84:2f:44:fc:c3:d3:20:ce:e8:47:b1: d2:9a:58:4f:e8:b0:ec:13:c8:44:55:87:1b:13:12:44: 7b:7a:57:6c:ef:e2:e1:be:b5:ef:0e:bf:d3:54:fe:d2: 1f:db:b1:27:6d:db:ea:a0:fb:98:35:8c:58:5e:59:c4: d9:b8:b0:d2:5c:d0:47:af:da:55:f2:1c:f5:75:e3:67: 35:0b:1e:76:2f:8d:c7:24:b4:10:27:00:a4:b8:d1:14: 54:1d:96:5f:16:2c:0e:a8:65:a9:1d:5b:99:0a:db:a4: 15:bc:d5:d9:26:c1:24:bf:6d:c1:c6:53:69:a3:fe:bc: 39:16:e6:9d:76:fa:8c:6e:92:5b:ca:43:5d:20:f9:5a: 2f:89:93:95:c1:4f:e8:36:fa:a7:3f:e3:21:f2:f8:65: cf:b1:08:6a:5c:d1:94:e6:1c:dc:48:26:f3:c0:26:2c: a3:3c:60:6e:e1:a4:4e:7f:48:05:dc:72:e2:5b:a6:ec: d1:04:8b:4f:43:c4:61:1f:ce:85:e2:4a:26:b4:06:98: a6:9e:14:38:cd:23:e1:83:a7:f7:9b:cb:62:38:9a:4a: 23:02:c7:b5:db:54:a5:f9:e8:e5:83:41:9b:78:ec:1e: c8:f5:4f:c6:03:db:10:20:d3:54:c6:36:3a:0f:d0:63 Fingerprint (SHA-256): C3:84:48:14:5D:04:EA:96:99:82:2C:72:B4:90:6D:C4:1E:14:1A:F7:E2:A9:1A:C1:93:8A:D8:3C:68:B1:F4:BE Fingerprint (SHA1): 52:E8:8C:2A:96:18:63:75:2C:47:77:98:E5:83:BE:4F:F4:5D:19:0B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1179: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1180: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034295 (0x3750adf7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Sep 28 04:03:19 2022 Not After : Tue Sep 28 04:03:19 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:b3:52:b9:04:a1:d1:ff:2a:f1:3a:67:39:50:13:f9: 8e:02:23:13:1a:4b:96:66:ac:cf:ef:04:9c:63:c2:74: 88:ba:09:1b:07:d6:64:08:1b:a4:2f:c7:2d:58:94:02: 0a:77:11:a8:10:b0:16:96:ee:fd:36:89:b1:60:7f:7c: 05:48:c4:7e:b0:91:a7:d4:b8:c7:55:7f:e8:f7:f4:f4: aa:da:e9:94:5b:90:39:99:cd:97:ba:e9:3f:0c:1b:2e: 7c:86:52:56:ff:95:4c:dd:60:5c:ee:7f:89:03:09:1b: 79:87:ee:9e:bb:76:42:77:78:a7:27:76:1f:48:81:54: d0:71:23:d5:ca:f5:fc:a5:9e:40:c0:05:77:fe:c6:b9: 77:0d:70:fb:da:41:3e:19:67:2f:f5:b2:40:4d:63:c3: 7c:05:bf:66:6d:8f:19:fd:c0:e7:4d:89:b4:b7:cb:5a: 5c:1a:c5:c7:1e:99:b9:63:db:55:77:a8:c1:2c:b3:05: c2:0b:7e:02:02:1a:ea:5d:e7:db:79:85:29:79:94:8e: f6:ce:e7:b4:01:b7:f3:c5:f0:fb:80:18:bc:e3:8b:94: b4:73:2b:c9:f8:8c:ad:c2:51:7b:99:45:a5:b3:2b:01: 65:25:68:f7:2c:ce:c9:63:cd:dc:ec:ba:73:bd:2d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a0:18:67:a6:7e:76:73:ad:0a:e1:84:64:80:7f:81:18: e0:17:a2:64:d3:75:86:d0:83:51:24:13:01:a2:5f:34: 6e:ba:4e:20:ae:30:a1:4b:4b:38:a1:aa:e4:a7:96:81: 67:f8:53:5d:d9:1b:a8:e5:ac:29:03:c4:0c:10:15:b4: 00:07:3d:bf:01:47:e0:2e:69:9d:8c:17:c2:48:69:39: da:b3:63:a9:bd:dc:07:57:f6:0e:2f:fb:1a:c9:f2:c9: 9e:58:41:9b:e9:9e:55:a8:d8:d0:84:a6:e6:ca:cd:4e: 4a:1e:1e:3f:eb:99:e2:a7:fb:26:3a:37:49:3d:9b:63: cd:ea:e6:64:ef:f9:90:db:d0:79:95:95:1b:90:61:57: bb:a2:ff:a7:e7:20:1f:98:0d:fd:5a:58:dd:23:c5:e2: d6:32:57:ef:68:af:77:35:f7:c2:e7:64:9f:bc:1d:6c: a8:ad:86:7a:96:50:db:71:c0:a3:63:ba:a9:42:e9:aa: ba:8f:b7:0e:96:4f:9c:de:1f:5a:e1:9a:ce:43:cc:bf: bc:5b:c0:b2:98:bf:85:76:e6:56:a7:7e:e4:76:b9:28: 6a:a3:da:ef:1b:4b:b6:52:67:f5:71:51:7e:c7:f3:2a: 7a:68:4b:d4:19:4b:19:88:43:30:0b:c5:c1:9f:bc:88 Fingerprint (SHA-256): 21:7C:9A:F3:59:74:17:EB:9E:FC:45:1F:39:A0:A0:45:22:D5:06:02:CE:58:F1:00:3E:09:BC:28:96:65:26:14 Fingerprint (SHA1): C9:39:2E:B8:11:93:67:EC:FB:95:86:67:4F:D0:09:D6:E1:14:5C:69 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1181: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1182: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1183: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034297 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1184: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1185: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1186: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1187: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 928034298 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1188: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1189: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1190: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1191: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 928034299 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1192: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1193: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1194: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1195: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 928034300 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1196: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1197: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1198: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1199: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 928034301 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1200: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1201: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1202: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034297 (0x3750adf9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:03:36 2022 Not After : Wed Sep 28 04:03:36 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:4d:ec:47:df:13:83:61:78:74:c3:0f:55:3c:f4:9b: 08:dc:6b:5c:9b:38:fb:7c:21:ec:fe:af:b3:da:d7:e1: 87:95:ea:6f:56:a1:42:71:2e:f8:61:14:7d:95:4f:b8: 74:36:71:4f:91:d0:01:3e:7a:a8:83:de:1f:a1:16:5b: 9d:61:09:75:13:da:82:ef:fb:ba:64:a2:0b:04:a9:48: 0e:20:6c:62:de:86:d4:b3:1e:6b:1b:ac:d9:08:4d:1c: 57:18:2e:21:da:ba:da:be:f4:ad:9f:85:09:cc:14:ec: 0c:8f:4e:b2:e5:95:8f:da:9a:70:92:85:61:d2:9e:20: 4d:db:6c:8b:19:f3:9a:94:4a:e3:c8:ec:ba:cf:00:2c: 22:38:bd:1c:f5:7f:7c:f4:88:f4:b2:bd:d2:95:72:8b: 9f:bf:1b:c7:c8:e9:49:7e:28:fb:d2:e3:3f:90:86:e0: cc:84:fe:58:02:2c:18:80:2d:8c:79:68:32:80:7d:61: cf:47:26:21:0d:23:a0:49:d3:4d:4e:85:5d:d0:19:5b: 2b:57:3e:a3:af:50:f5:ee:d4:a1:cb:ea:b6:05:ce:17: 89:ed:d7:46:c5:7b:98:8b:a7:04:e9:0f:f4:04:17:db: 35:a3:14:c1:8f:e8:7b:40:90:d6:24:e6:22:ee:53:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:ef:05:ff:50:fa:9b:2a:d4:7d:56:35:91:ca:bc:ed: 91:05:e4:4e:3b:fb:9f:8e:8e:17:7c:8b:81:ea:4c:42: 9d:03:f3:1b:91:a5:59:91:1e:05:9d:b9:d5:22:79:91: ba:4d:24:14:7f:95:7a:da:73:19:89:9b:60:b5:36:81: ab:dd:73:a3:17:5c:d7:c5:73:02:e5:c0:c3:16:4f:50: 3b:fa:96:d5:0c:77:15:6e:10:d8:ab:1e:6c:b2:36:50: 5d:89:6c:06:7a:41:8f:38:4c:cc:a3:1f:ba:45:04:b1: e1:70:14:ae:fd:77:e7:c6:56:73:47:e3:07:cb:30:c9: 4a:c9:67:c0:5b:ac:cf:07:30:81:2a:94:87:a3:08:ec: 69:ea:20:42:35:e9:42:4a:d6:9a:be:68:e6:e3:10:9f: 7f:bf:e7:94:31:d9:32:ce:cf:e9:fc:cb:7c:73:8c:ad: 75:e7:a4:50:14:93:04:d0:a9:e3:b6:cd:8e:84:91:c8: 2f:8c:44:93:a6:df:40:38:5f:79:04:89:42:69:6d:1a: 9e:87:f9:3f:09:ca:48:26:d9:bf:f7:33:70:3a:23:bb: 2d:56:b2:6a:85:0a:0a:94:af:a5:33:1e:61:92:2e:72: 7e:29:f1:24:46:4a:df:9c:18:81:0c:98:2e:2b:cd:1f Fingerprint (SHA-256): 4C:87:C8:3E:07:02:05:CF:9C:38:36:65:D0:B8:99:72:F5:A5:E7:0F:31:C5:F0:BB:AE:6F:B2:AD:9B:FA:56:AB Fingerprint (SHA1): CA:30:5A:15:69:CA:5C:79:CF:9C:0B:49:24:FD:12:2E:AA:FF:82:E1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1203: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1204: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034298 (0x3750adfa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:03:40 2022 Not After : Tue Sep 28 04:03:40 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:92:6f:e7:16:09:74:0f:6f:07:62:af:51:26:93:66: 85:75:8a:05:5b:7e:44:0c:48:f1:4a:eb:33:88:de:55: 80:55:0f:50:62:19:2c:58:6d:31:a5:49:31:7b:7f:14: b3:2d:84:7d:11:90:a1:d2:c3:a0:b4:79:3c:f2:f6:56: d9:ef:f1:12:f3:80:c2:05:a4:99:5b:61:15:04:08:b3: 7c:03:29:5a:f4:1a:63:be:e9:84:90:11:ce:7d:59:9f: 55:87:8a:2d:5a:8d:6f:18:4c:21:36:7c:4a:04:54:ab: ea:90:57:29:73:39:53:ff:d1:26:40:8d:bf:70:1b:43: 64:ba:ee:4a:ed:76:4f:ee:56:21:f2:e1:fb:57:07:86: 96:8e:a8:5e:7c:28:ec:68:1a:a7:4c:60:3a:e4:e6:22: 1e:ed:d6:fd:50:8a:00:ee:85:94:e4:6e:e0:f5:8c:b7: 65:f3:85:af:9b:56:93:d2:79:26:9b:98:d2:ee:39:6e: d7:df:0b:2c:55:cc:38:66:46:f8:b9:af:78:20:b5:aa: b0:e6:e9:e0:65:7f:6c:d5:47:21:e1:85:d7:05:d9:93: c8:5c:0d:41:7f:6d:d9:ab:a4:3e:68:43:64:8c:ef:d1: 15:34:32:b8:d3:97:f7:d6:95:89:1c:83:e5:7a:b4:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a3:74:4d:b1:50:52:de:3f:4f:42:35:77:a8:68:36:91: da:e1:2c:ce:13:6a:c5:ab:5d:89:8f:3d:31:bd:8a:79: a9:b8:3e:7b:f7:da:cd:45:0b:59:2d:d3:2d:a2:0f:07: db:3e:a3:8c:ae:72:8c:2b:ee:84:f0:89:9c:b3:28:f1: d4:be:e2:49:af:ab:74:7a:ab:a6:fe:37:91:b1:39:a1: a0:79:f6:55:77:45:93:04:13:5c:a8:84:ab:4d:28:13: cd:58:b8:38:54:da:bb:1d:67:1f:2c:f4:87:7c:8e:35: db:98:88:b8:10:71:d9:c1:be:8b:11:2d:f9:99:2a:77: 74:a0:c3:d1:5e:f7:c2:d5:69:56:85:db:d6:58:f0:61: 20:84:b4:ea:e1:00:dc:c1:15:c7:9a:ec:fb:cf:9c:a4: ca:5d:f7:58:61:cd:99:bb:14:a8:8b:bd:b0:2f:c8:a9: 95:45:6a:c9:bc:80:00:f0:08:37:79:46:01:30:47:3a: 8c:28:9d:d1:85:70:21:57:a3:3c:b6:60:f7:62:26:aa: 8d:6e:58:0b:1a:29:88:39:c8:9e:00:bd:26:a4:04:9d: 2a:ee:82:a0:70:d0:70:3e:65:61:dd:75:1f:9f:57:1a: 27:f8:21:6f:68:57:ae:69:90:e1:ce:f8:ff:e2:69:3a Fingerprint (SHA-256): 8B:9B:AB:3A:E8:5F:27:87:B7:6A:C3:76:37:CF:1E:38:A0:F7:A4:32:5C:BD:3B:A5:92:04:65:E7:B5:9A:E8:BE Fingerprint (SHA1): D8:8F:E7:3E:68:FC:F1:FD:83:9C:AE:A9:A2:B9:C8:39:3F:4E:99:AF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1205: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1206: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034299 (0x3750adfb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Sep 28 04:03:46 2022 Not After : Tue Sep 28 04:03:46 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:2e:e9:a9:01:11:f0:25:be:4f:ff:37:af:13:1f:b3: 30:bd:4b:3e:db:3f:15:89:15:37:63:c7:8d:60:1c:45: c7:7a:8c:5a:c5:5b:9f:5d:3a:56:55:77:1b:10:44:05: c0:f1:4d:9e:c5:b4:aa:e0:50:fa:33:12:91:59:f0:d8: 8b:04:3c:a3:c8:10:b9:a6:61:86:43:29:73:0c:75:9c: 84:2c:4e:aa:3e:33:da:c5:ab:a7:bc:9f:be:3a:9d:8d: 0b:6d:b4:51:57:18:54:e0:99:96:42:72:05:13:e8:90: ce:2f:2f:6a:71:e4:c6:87:5e:6c:55:66:da:5f:ab:5c: 8c:5a:be:1e:6b:0d:2b:b9:b9:54:65:62:e0:ad:c3:f7: 71:89:6c:23:7a:77:89:47:0c:45:17:2f:8e:79:43:0f: aa:f8:10:7e:ad:d9:68:89:83:f2:96:74:17:6a:fc:0e: 5f:68:7f:73:0f:c7:22:7e:05:28:46:38:26:83:46:47: 9c:c6:26:0d:cf:59:d9:8d:ab:0b:1d:98:1f:e5:18:90: 40:4d:7b:9b:3e:4f:ce:91:98:88:71:38:cb:2c:95:14: 16:2f:74:2c:7d:71:6c:af:4e:98:4f:82:ad:bd:44:b8: 94:3e:ea:21:08:a6:7d:be:3d:59:c3:5c:92:74:19:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:1f:07:f4:c7:a3:3a:f1:b4:3b:fe:54:41:c7:45:b2: 5b:42:d2:b4:11:8b:73:b4:39:04:30:1d:0d:8e:86:3a: 1a:c3:6d:5e:ae:81:36:5b:b0:00:f4:d1:3b:4c:a1:e2: a3:32:3d:ee:48:45:3d:e8:8a:fd:e3:8e:ac:1b:24:70: 00:00:e1:cb:a4:b7:20:91:c9:40:34:c4:c9:ea:ab:df: 16:cc:8d:aa:4e:3b:ae:e8:9c:f2:7b:28:fd:bb:4a:f4: bf:12:33:c5:22:e4:32:a1:2d:8e:68:e3:a2:c9:b8:bd: bb:75:af:ae:e3:4d:ba:6a:cf:41:15:d2:9c:17:7a:a7: cb:39:51:65:fd:80:58:4a:b7:11:0d:4d:fa:49:8d:ac: b1:e3:24:df:ad:3a:6a:f6:f0:9b:37:d2:ed:1f:37:07: 9e:78:22:33:e6:e8:22:e1:84:22:c1:c7:01:90:c5:88: 6d:92:e1:a7:bd:e4:62:92:6c:0e:0f:20:41:76:29:b4: a1:31:49:4f:39:f3:26:70:b8:ae:e6:15:f8:6e:ff:1e: 3b:ed:f4:aa:5c:bd:ad:b9:9d:95:61:dc:35:dc:06:a7: 3f:95:62:61:21:07:38:2a:65:88:61:0a:ff:aa:a9:0d: 79:b9:1f:67:46:88:d7:92:b2:14:55:b8:4b:76:43:fb Fingerprint (SHA-256): F1:A4:72:60:42:23:FE:DB:31:C2:67:A8:43:5A:70:D1:57:0D:7C:7D:3A:BD:2E:35:61:32:EA:B0:95:A2:27:67 Fingerprint (SHA1): 83:26:44:43:A6:1E:59:A2:1D:04:4D:3A:12:F8:DD:33:58:CF:BC:46 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1207: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1208: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1209: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1210: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1211: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034297 (0x3750adf9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:03:36 2022 Not After : Wed Sep 28 04:03:36 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:4d:ec:47:df:13:83:61:78:74:c3:0f:55:3c:f4:9b: 08:dc:6b:5c:9b:38:fb:7c:21:ec:fe:af:b3:da:d7:e1: 87:95:ea:6f:56:a1:42:71:2e:f8:61:14:7d:95:4f:b8: 74:36:71:4f:91:d0:01:3e:7a:a8:83:de:1f:a1:16:5b: 9d:61:09:75:13:da:82:ef:fb:ba:64:a2:0b:04:a9:48: 0e:20:6c:62:de:86:d4:b3:1e:6b:1b:ac:d9:08:4d:1c: 57:18:2e:21:da:ba:da:be:f4:ad:9f:85:09:cc:14:ec: 0c:8f:4e:b2:e5:95:8f:da:9a:70:92:85:61:d2:9e:20: 4d:db:6c:8b:19:f3:9a:94:4a:e3:c8:ec:ba:cf:00:2c: 22:38:bd:1c:f5:7f:7c:f4:88:f4:b2:bd:d2:95:72:8b: 9f:bf:1b:c7:c8:e9:49:7e:28:fb:d2:e3:3f:90:86:e0: cc:84:fe:58:02:2c:18:80:2d:8c:79:68:32:80:7d:61: cf:47:26:21:0d:23:a0:49:d3:4d:4e:85:5d:d0:19:5b: 2b:57:3e:a3:af:50:f5:ee:d4:a1:cb:ea:b6:05:ce:17: 89:ed:d7:46:c5:7b:98:8b:a7:04:e9:0f:f4:04:17:db: 35:a3:14:c1:8f:e8:7b:40:90:d6:24:e6:22:ee:53:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:ef:05:ff:50:fa:9b:2a:d4:7d:56:35:91:ca:bc:ed: 91:05:e4:4e:3b:fb:9f:8e:8e:17:7c:8b:81:ea:4c:42: 9d:03:f3:1b:91:a5:59:91:1e:05:9d:b9:d5:22:79:91: ba:4d:24:14:7f:95:7a:da:73:19:89:9b:60:b5:36:81: ab:dd:73:a3:17:5c:d7:c5:73:02:e5:c0:c3:16:4f:50: 3b:fa:96:d5:0c:77:15:6e:10:d8:ab:1e:6c:b2:36:50: 5d:89:6c:06:7a:41:8f:38:4c:cc:a3:1f:ba:45:04:b1: e1:70:14:ae:fd:77:e7:c6:56:73:47:e3:07:cb:30:c9: 4a:c9:67:c0:5b:ac:cf:07:30:81:2a:94:87:a3:08:ec: 69:ea:20:42:35:e9:42:4a:d6:9a:be:68:e6:e3:10:9f: 7f:bf:e7:94:31:d9:32:ce:cf:e9:fc:cb:7c:73:8c:ad: 75:e7:a4:50:14:93:04:d0:a9:e3:b6:cd:8e:84:91:c8: 2f:8c:44:93:a6:df:40:38:5f:79:04:89:42:69:6d:1a: 9e:87:f9:3f:09:ca:48:26:d9:bf:f7:33:70:3a:23:bb: 2d:56:b2:6a:85:0a:0a:94:af:a5:33:1e:61:92:2e:72: 7e:29:f1:24:46:4a:df:9c:18:81:0c:98:2e:2b:cd:1f Fingerprint (SHA-256): 4C:87:C8:3E:07:02:05:CF:9C:38:36:65:D0:B8:99:72:F5:A5:E7:0F:31:C5:F0:BB:AE:6F:B2:AD:9B:FA:56:AB Fingerprint (SHA1): CA:30:5A:15:69:CA:5C:79:CF:9C:0B:49:24:FD:12:2E:AA:FF:82:E1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1212: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1213: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034298 (0x3750adfa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:03:40 2022 Not After : Tue Sep 28 04:03:40 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:92:6f:e7:16:09:74:0f:6f:07:62:af:51:26:93:66: 85:75:8a:05:5b:7e:44:0c:48:f1:4a:eb:33:88:de:55: 80:55:0f:50:62:19:2c:58:6d:31:a5:49:31:7b:7f:14: b3:2d:84:7d:11:90:a1:d2:c3:a0:b4:79:3c:f2:f6:56: d9:ef:f1:12:f3:80:c2:05:a4:99:5b:61:15:04:08:b3: 7c:03:29:5a:f4:1a:63:be:e9:84:90:11:ce:7d:59:9f: 55:87:8a:2d:5a:8d:6f:18:4c:21:36:7c:4a:04:54:ab: ea:90:57:29:73:39:53:ff:d1:26:40:8d:bf:70:1b:43: 64:ba:ee:4a:ed:76:4f:ee:56:21:f2:e1:fb:57:07:86: 96:8e:a8:5e:7c:28:ec:68:1a:a7:4c:60:3a:e4:e6:22: 1e:ed:d6:fd:50:8a:00:ee:85:94:e4:6e:e0:f5:8c:b7: 65:f3:85:af:9b:56:93:d2:79:26:9b:98:d2:ee:39:6e: d7:df:0b:2c:55:cc:38:66:46:f8:b9:af:78:20:b5:aa: b0:e6:e9:e0:65:7f:6c:d5:47:21:e1:85:d7:05:d9:93: c8:5c:0d:41:7f:6d:d9:ab:a4:3e:68:43:64:8c:ef:d1: 15:34:32:b8:d3:97:f7:d6:95:89:1c:83:e5:7a:b4:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a3:74:4d:b1:50:52:de:3f:4f:42:35:77:a8:68:36:91: da:e1:2c:ce:13:6a:c5:ab:5d:89:8f:3d:31:bd:8a:79: a9:b8:3e:7b:f7:da:cd:45:0b:59:2d:d3:2d:a2:0f:07: db:3e:a3:8c:ae:72:8c:2b:ee:84:f0:89:9c:b3:28:f1: d4:be:e2:49:af:ab:74:7a:ab:a6:fe:37:91:b1:39:a1: a0:79:f6:55:77:45:93:04:13:5c:a8:84:ab:4d:28:13: cd:58:b8:38:54:da:bb:1d:67:1f:2c:f4:87:7c:8e:35: db:98:88:b8:10:71:d9:c1:be:8b:11:2d:f9:99:2a:77: 74:a0:c3:d1:5e:f7:c2:d5:69:56:85:db:d6:58:f0:61: 20:84:b4:ea:e1:00:dc:c1:15:c7:9a:ec:fb:cf:9c:a4: ca:5d:f7:58:61:cd:99:bb:14:a8:8b:bd:b0:2f:c8:a9: 95:45:6a:c9:bc:80:00:f0:08:37:79:46:01:30:47:3a: 8c:28:9d:d1:85:70:21:57:a3:3c:b6:60:f7:62:26:aa: 8d:6e:58:0b:1a:29:88:39:c8:9e:00:bd:26:a4:04:9d: 2a:ee:82:a0:70:d0:70:3e:65:61:dd:75:1f:9f:57:1a: 27:f8:21:6f:68:57:ae:69:90:e1:ce:f8:ff:e2:69:3a Fingerprint (SHA-256): 8B:9B:AB:3A:E8:5F:27:87:B7:6A:C3:76:37:CF:1E:38:A0:F7:A4:32:5C:BD:3B:A5:92:04:65:E7:B5:9A:E8:BE Fingerprint (SHA1): D8:8F:E7:3E:68:FC:F1:FD:83:9C:AE:A9:A2:B9:C8:39:3F:4E:99:AF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1214: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1215: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034299 (0x3750adfb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Sep 28 04:03:46 2022 Not After : Tue Sep 28 04:03:46 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:2e:e9:a9:01:11:f0:25:be:4f:ff:37:af:13:1f:b3: 30:bd:4b:3e:db:3f:15:89:15:37:63:c7:8d:60:1c:45: c7:7a:8c:5a:c5:5b:9f:5d:3a:56:55:77:1b:10:44:05: c0:f1:4d:9e:c5:b4:aa:e0:50:fa:33:12:91:59:f0:d8: 8b:04:3c:a3:c8:10:b9:a6:61:86:43:29:73:0c:75:9c: 84:2c:4e:aa:3e:33:da:c5:ab:a7:bc:9f:be:3a:9d:8d: 0b:6d:b4:51:57:18:54:e0:99:96:42:72:05:13:e8:90: ce:2f:2f:6a:71:e4:c6:87:5e:6c:55:66:da:5f:ab:5c: 8c:5a:be:1e:6b:0d:2b:b9:b9:54:65:62:e0:ad:c3:f7: 71:89:6c:23:7a:77:89:47:0c:45:17:2f:8e:79:43:0f: aa:f8:10:7e:ad:d9:68:89:83:f2:96:74:17:6a:fc:0e: 5f:68:7f:73:0f:c7:22:7e:05:28:46:38:26:83:46:47: 9c:c6:26:0d:cf:59:d9:8d:ab:0b:1d:98:1f:e5:18:90: 40:4d:7b:9b:3e:4f:ce:91:98:88:71:38:cb:2c:95:14: 16:2f:74:2c:7d:71:6c:af:4e:98:4f:82:ad:bd:44:b8: 94:3e:ea:21:08:a6:7d:be:3d:59:c3:5c:92:74:19:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:1f:07:f4:c7:a3:3a:f1:b4:3b:fe:54:41:c7:45:b2: 5b:42:d2:b4:11:8b:73:b4:39:04:30:1d:0d:8e:86:3a: 1a:c3:6d:5e:ae:81:36:5b:b0:00:f4:d1:3b:4c:a1:e2: a3:32:3d:ee:48:45:3d:e8:8a:fd:e3:8e:ac:1b:24:70: 00:00:e1:cb:a4:b7:20:91:c9:40:34:c4:c9:ea:ab:df: 16:cc:8d:aa:4e:3b:ae:e8:9c:f2:7b:28:fd:bb:4a:f4: bf:12:33:c5:22:e4:32:a1:2d:8e:68:e3:a2:c9:b8:bd: bb:75:af:ae:e3:4d:ba:6a:cf:41:15:d2:9c:17:7a:a7: cb:39:51:65:fd:80:58:4a:b7:11:0d:4d:fa:49:8d:ac: b1:e3:24:df:ad:3a:6a:f6:f0:9b:37:d2:ed:1f:37:07: 9e:78:22:33:e6:e8:22:e1:84:22:c1:c7:01:90:c5:88: 6d:92:e1:a7:bd:e4:62:92:6c:0e:0f:20:41:76:29:b4: a1:31:49:4f:39:f3:26:70:b8:ae:e6:15:f8:6e:ff:1e: 3b:ed:f4:aa:5c:bd:ad:b9:9d:95:61:dc:35:dc:06:a7: 3f:95:62:61:21:07:38:2a:65:88:61:0a:ff:aa:a9:0d: 79:b9:1f:67:46:88:d7:92:b2:14:55:b8:4b:76:43:fb Fingerprint (SHA-256): F1:A4:72:60:42:23:FE:DB:31:C2:67:A8:43:5A:70:D1:57:0D:7C:7D:3A:BD:2E:35:61:32:EA:B0:95:A2:27:67 Fingerprint (SHA1): 83:26:44:43:A6:1E:59:A2:1D:04:4D:3A:12:F8:DD:33:58:CF:BC:46 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1216: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1217: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034297 (0x3750adf9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:03:36 2022 Not After : Wed Sep 28 04:03:36 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:4d:ec:47:df:13:83:61:78:74:c3:0f:55:3c:f4:9b: 08:dc:6b:5c:9b:38:fb:7c:21:ec:fe:af:b3:da:d7:e1: 87:95:ea:6f:56:a1:42:71:2e:f8:61:14:7d:95:4f:b8: 74:36:71:4f:91:d0:01:3e:7a:a8:83:de:1f:a1:16:5b: 9d:61:09:75:13:da:82:ef:fb:ba:64:a2:0b:04:a9:48: 0e:20:6c:62:de:86:d4:b3:1e:6b:1b:ac:d9:08:4d:1c: 57:18:2e:21:da:ba:da:be:f4:ad:9f:85:09:cc:14:ec: 0c:8f:4e:b2:e5:95:8f:da:9a:70:92:85:61:d2:9e:20: 4d:db:6c:8b:19:f3:9a:94:4a:e3:c8:ec:ba:cf:00:2c: 22:38:bd:1c:f5:7f:7c:f4:88:f4:b2:bd:d2:95:72:8b: 9f:bf:1b:c7:c8:e9:49:7e:28:fb:d2:e3:3f:90:86:e0: cc:84:fe:58:02:2c:18:80:2d:8c:79:68:32:80:7d:61: cf:47:26:21:0d:23:a0:49:d3:4d:4e:85:5d:d0:19:5b: 2b:57:3e:a3:af:50:f5:ee:d4:a1:cb:ea:b6:05:ce:17: 89:ed:d7:46:c5:7b:98:8b:a7:04:e9:0f:f4:04:17:db: 35:a3:14:c1:8f:e8:7b:40:90:d6:24:e6:22:ee:53:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:ef:05:ff:50:fa:9b:2a:d4:7d:56:35:91:ca:bc:ed: 91:05:e4:4e:3b:fb:9f:8e:8e:17:7c:8b:81:ea:4c:42: 9d:03:f3:1b:91:a5:59:91:1e:05:9d:b9:d5:22:79:91: ba:4d:24:14:7f:95:7a:da:73:19:89:9b:60:b5:36:81: ab:dd:73:a3:17:5c:d7:c5:73:02:e5:c0:c3:16:4f:50: 3b:fa:96:d5:0c:77:15:6e:10:d8:ab:1e:6c:b2:36:50: 5d:89:6c:06:7a:41:8f:38:4c:cc:a3:1f:ba:45:04:b1: e1:70:14:ae:fd:77:e7:c6:56:73:47:e3:07:cb:30:c9: 4a:c9:67:c0:5b:ac:cf:07:30:81:2a:94:87:a3:08:ec: 69:ea:20:42:35:e9:42:4a:d6:9a:be:68:e6:e3:10:9f: 7f:bf:e7:94:31:d9:32:ce:cf:e9:fc:cb:7c:73:8c:ad: 75:e7:a4:50:14:93:04:d0:a9:e3:b6:cd:8e:84:91:c8: 2f:8c:44:93:a6:df:40:38:5f:79:04:89:42:69:6d:1a: 9e:87:f9:3f:09:ca:48:26:d9:bf:f7:33:70:3a:23:bb: 2d:56:b2:6a:85:0a:0a:94:af:a5:33:1e:61:92:2e:72: 7e:29:f1:24:46:4a:df:9c:18:81:0c:98:2e:2b:cd:1f Fingerprint (SHA-256): 4C:87:C8:3E:07:02:05:CF:9C:38:36:65:D0:B8:99:72:F5:A5:E7:0F:31:C5:F0:BB:AE:6F:B2:AD:9B:FA:56:AB Fingerprint (SHA1): CA:30:5A:15:69:CA:5C:79:CF:9C:0B:49:24:FD:12:2E:AA:FF:82:E1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1218: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034297 (0x3750adf9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:03:36 2022 Not After : Wed Sep 28 04:03:36 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:4d:ec:47:df:13:83:61:78:74:c3:0f:55:3c:f4:9b: 08:dc:6b:5c:9b:38:fb:7c:21:ec:fe:af:b3:da:d7:e1: 87:95:ea:6f:56:a1:42:71:2e:f8:61:14:7d:95:4f:b8: 74:36:71:4f:91:d0:01:3e:7a:a8:83:de:1f:a1:16:5b: 9d:61:09:75:13:da:82:ef:fb:ba:64:a2:0b:04:a9:48: 0e:20:6c:62:de:86:d4:b3:1e:6b:1b:ac:d9:08:4d:1c: 57:18:2e:21:da:ba:da:be:f4:ad:9f:85:09:cc:14:ec: 0c:8f:4e:b2:e5:95:8f:da:9a:70:92:85:61:d2:9e:20: 4d:db:6c:8b:19:f3:9a:94:4a:e3:c8:ec:ba:cf:00:2c: 22:38:bd:1c:f5:7f:7c:f4:88:f4:b2:bd:d2:95:72:8b: 9f:bf:1b:c7:c8:e9:49:7e:28:fb:d2:e3:3f:90:86:e0: cc:84:fe:58:02:2c:18:80:2d:8c:79:68:32:80:7d:61: cf:47:26:21:0d:23:a0:49:d3:4d:4e:85:5d:d0:19:5b: 2b:57:3e:a3:af:50:f5:ee:d4:a1:cb:ea:b6:05:ce:17: 89:ed:d7:46:c5:7b:98:8b:a7:04:e9:0f:f4:04:17:db: 35:a3:14:c1:8f:e8:7b:40:90:d6:24:e6:22:ee:53:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:ef:05:ff:50:fa:9b:2a:d4:7d:56:35:91:ca:bc:ed: 91:05:e4:4e:3b:fb:9f:8e:8e:17:7c:8b:81:ea:4c:42: 9d:03:f3:1b:91:a5:59:91:1e:05:9d:b9:d5:22:79:91: ba:4d:24:14:7f:95:7a:da:73:19:89:9b:60:b5:36:81: ab:dd:73:a3:17:5c:d7:c5:73:02:e5:c0:c3:16:4f:50: 3b:fa:96:d5:0c:77:15:6e:10:d8:ab:1e:6c:b2:36:50: 5d:89:6c:06:7a:41:8f:38:4c:cc:a3:1f:ba:45:04:b1: e1:70:14:ae:fd:77:e7:c6:56:73:47:e3:07:cb:30:c9: 4a:c9:67:c0:5b:ac:cf:07:30:81:2a:94:87:a3:08:ec: 69:ea:20:42:35:e9:42:4a:d6:9a:be:68:e6:e3:10:9f: 7f:bf:e7:94:31:d9:32:ce:cf:e9:fc:cb:7c:73:8c:ad: 75:e7:a4:50:14:93:04:d0:a9:e3:b6:cd:8e:84:91:c8: 2f:8c:44:93:a6:df:40:38:5f:79:04:89:42:69:6d:1a: 9e:87:f9:3f:09:ca:48:26:d9:bf:f7:33:70:3a:23:bb: 2d:56:b2:6a:85:0a:0a:94:af:a5:33:1e:61:92:2e:72: 7e:29:f1:24:46:4a:df:9c:18:81:0c:98:2e:2b:cd:1f Fingerprint (SHA-256): 4C:87:C8:3E:07:02:05:CF:9C:38:36:65:D0:B8:99:72:F5:A5:E7:0F:31:C5:F0:BB:AE:6F:B2:AD:9B:FA:56:AB Fingerprint (SHA1): CA:30:5A:15:69:CA:5C:79:CF:9C:0B:49:24:FD:12:2E:AA:FF:82:E1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1219: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034298 (0x3750adfa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:03:40 2022 Not After : Tue Sep 28 04:03:40 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:92:6f:e7:16:09:74:0f:6f:07:62:af:51:26:93:66: 85:75:8a:05:5b:7e:44:0c:48:f1:4a:eb:33:88:de:55: 80:55:0f:50:62:19:2c:58:6d:31:a5:49:31:7b:7f:14: b3:2d:84:7d:11:90:a1:d2:c3:a0:b4:79:3c:f2:f6:56: d9:ef:f1:12:f3:80:c2:05:a4:99:5b:61:15:04:08:b3: 7c:03:29:5a:f4:1a:63:be:e9:84:90:11:ce:7d:59:9f: 55:87:8a:2d:5a:8d:6f:18:4c:21:36:7c:4a:04:54:ab: ea:90:57:29:73:39:53:ff:d1:26:40:8d:bf:70:1b:43: 64:ba:ee:4a:ed:76:4f:ee:56:21:f2:e1:fb:57:07:86: 96:8e:a8:5e:7c:28:ec:68:1a:a7:4c:60:3a:e4:e6:22: 1e:ed:d6:fd:50:8a:00:ee:85:94:e4:6e:e0:f5:8c:b7: 65:f3:85:af:9b:56:93:d2:79:26:9b:98:d2:ee:39:6e: d7:df:0b:2c:55:cc:38:66:46:f8:b9:af:78:20:b5:aa: b0:e6:e9:e0:65:7f:6c:d5:47:21:e1:85:d7:05:d9:93: c8:5c:0d:41:7f:6d:d9:ab:a4:3e:68:43:64:8c:ef:d1: 15:34:32:b8:d3:97:f7:d6:95:89:1c:83:e5:7a:b4:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a3:74:4d:b1:50:52:de:3f:4f:42:35:77:a8:68:36:91: da:e1:2c:ce:13:6a:c5:ab:5d:89:8f:3d:31:bd:8a:79: a9:b8:3e:7b:f7:da:cd:45:0b:59:2d:d3:2d:a2:0f:07: db:3e:a3:8c:ae:72:8c:2b:ee:84:f0:89:9c:b3:28:f1: d4:be:e2:49:af:ab:74:7a:ab:a6:fe:37:91:b1:39:a1: a0:79:f6:55:77:45:93:04:13:5c:a8:84:ab:4d:28:13: cd:58:b8:38:54:da:bb:1d:67:1f:2c:f4:87:7c:8e:35: db:98:88:b8:10:71:d9:c1:be:8b:11:2d:f9:99:2a:77: 74:a0:c3:d1:5e:f7:c2:d5:69:56:85:db:d6:58:f0:61: 20:84:b4:ea:e1:00:dc:c1:15:c7:9a:ec:fb:cf:9c:a4: ca:5d:f7:58:61:cd:99:bb:14:a8:8b:bd:b0:2f:c8:a9: 95:45:6a:c9:bc:80:00:f0:08:37:79:46:01:30:47:3a: 8c:28:9d:d1:85:70:21:57:a3:3c:b6:60:f7:62:26:aa: 8d:6e:58:0b:1a:29:88:39:c8:9e:00:bd:26:a4:04:9d: 2a:ee:82:a0:70:d0:70:3e:65:61:dd:75:1f:9f:57:1a: 27:f8:21:6f:68:57:ae:69:90:e1:ce:f8:ff:e2:69:3a Fingerprint (SHA-256): 8B:9B:AB:3A:E8:5F:27:87:B7:6A:C3:76:37:CF:1E:38:A0:F7:A4:32:5C:BD:3B:A5:92:04:65:E7:B5:9A:E8:BE Fingerprint (SHA1): D8:8F:E7:3E:68:FC:F1:FD:83:9C:AE:A9:A2:B9:C8:39:3F:4E:99:AF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1220: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034298 (0x3750adfa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:03:40 2022 Not After : Tue Sep 28 04:03:40 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:92:6f:e7:16:09:74:0f:6f:07:62:af:51:26:93:66: 85:75:8a:05:5b:7e:44:0c:48:f1:4a:eb:33:88:de:55: 80:55:0f:50:62:19:2c:58:6d:31:a5:49:31:7b:7f:14: b3:2d:84:7d:11:90:a1:d2:c3:a0:b4:79:3c:f2:f6:56: d9:ef:f1:12:f3:80:c2:05:a4:99:5b:61:15:04:08:b3: 7c:03:29:5a:f4:1a:63:be:e9:84:90:11:ce:7d:59:9f: 55:87:8a:2d:5a:8d:6f:18:4c:21:36:7c:4a:04:54:ab: ea:90:57:29:73:39:53:ff:d1:26:40:8d:bf:70:1b:43: 64:ba:ee:4a:ed:76:4f:ee:56:21:f2:e1:fb:57:07:86: 96:8e:a8:5e:7c:28:ec:68:1a:a7:4c:60:3a:e4:e6:22: 1e:ed:d6:fd:50:8a:00:ee:85:94:e4:6e:e0:f5:8c:b7: 65:f3:85:af:9b:56:93:d2:79:26:9b:98:d2:ee:39:6e: d7:df:0b:2c:55:cc:38:66:46:f8:b9:af:78:20:b5:aa: b0:e6:e9:e0:65:7f:6c:d5:47:21:e1:85:d7:05:d9:93: c8:5c:0d:41:7f:6d:d9:ab:a4:3e:68:43:64:8c:ef:d1: 15:34:32:b8:d3:97:f7:d6:95:89:1c:83:e5:7a:b4:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a3:74:4d:b1:50:52:de:3f:4f:42:35:77:a8:68:36:91: da:e1:2c:ce:13:6a:c5:ab:5d:89:8f:3d:31:bd:8a:79: a9:b8:3e:7b:f7:da:cd:45:0b:59:2d:d3:2d:a2:0f:07: db:3e:a3:8c:ae:72:8c:2b:ee:84:f0:89:9c:b3:28:f1: d4:be:e2:49:af:ab:74:7a:ab:a6:fe:37:91:b1:39:a1: a0:79:f6:55:77:45:93:04:13:5c:a8:84:ab:4d:28:13: cd:58:b8:38:54:da:bb:1d:67:1f:2c:f4:87:7c:8e:35: db:98:88:b8:10:71:d9:c1:be:8b:11:2d:f9:99:2a:77: 74:a0:c3:d1:5e:f7:c2:d5:69:56:85:db:d6:58:f0:61: 20:84:b4:ea:e1:00:dc:c1:15:c7:9a:ec:fb:cf:9c:a4: ca:5d:f7:58:61:cd:99:bb:14:a8:8b:bd:b0:2f:c8:a9: 95:45:6a:c9:bc:80:00:f0:08:37:79:46:01:30:47:3a: 8c:28:9d:d1:85:70:21:57:a3:3c:b6:60:f7:62:26:aa: 8d:6e:58:0b:1a:29:88:39:c8:9e:00:bd:26:a4:04:9d: 2a:ee:82:a0:70:d0:70:3e:65:61:dd:75:1f:9f:57:1a: 27:f8:21:6f:68:57:ae:69:90:e1:ce:f8:ff:e2:69:3a Fingerprint (SHA-256): 8B:9B:AB:3A:E8:5F:27:87:B7:6A:C3:76:37:CF:1E:38:A0:F7:A4:32:5C:BD:3B:A5:92:04:65:E7:B5:9A:E8:BE Fingerprint (SHA1): D8:8F:E7:3E:68:FC:F1:FD:83:9C:AE:A9:A2:B9:C8:39:3F:4E:99:AF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1221: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034299 (0x3750adfb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Sep 28 04:03:46 2022 Not After : Tue Sep 28 04:03:46 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:2e:e9:a9:01:11:f0:25:be:4f:ff:37:af:13:1f:b3: 30:bd:4b:3e:db:3f:15:89:15:37:63:c7:8d:60:1c:45: c7:7a:8c:5a:c5:5b:9f:5d:3a:56:55:77:1b:10:44:05: c0:f1:4d:9e:c5:b4:aa:e0:50:fa:33:12:91:59:f0:d8: 8b:04:3c:a3:c8:10:b9:a6:61:86:43:29:73:0c:75:9c: 84:2c:4e:aa:3e:33:da:c5:ab:a7:bc:9f:be:3a:9d:8d: 0b:6d:b4:51:57:18:54:e0:99:96:42:72:05:13:e8:90: ce:2f:2f:6a:71:e4:c6:87:5e:6c:55:66:da:5f:ab:5c: 8c:5a:be:1e:6b:0d:2b:b9:b9:54:65:62:e0:ad:c3:f7: 71:89:6c:23:7a:77:89:47:0c:45:17:2f:8e:79:43:0f: aa:f8:10:7e:ad:d9:68:89:83:f2:96:74:17:6a:fc:0e: 5f:68:7f:73:0f:c7:22:7e:05:28:46:38:26:83:46:47: 9c:c6:26:0d:cf:59:d9:8d:ab:0b:1d:98:1f:e5:18:90: 40:4d:7b:9b:3e:4f:ce:91:98:88:71:38:cb:2c:95:14: 16:2f:74:2c:7d:71:6c:af:4e:98:4f:82:ad:bd:44:b8: 94:3e:ea:21:08:a6:7d:be:3d:59:c3:5c:92:74:19:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:1f:07:f4:c7:a3:3a:f1:b4:3b:fe:54:41:c7:45:b2: 5b:42:d2:b4:11:8b:73:b4:39:04:30:1d:0d:8e:86:3a: 1a:c3:6d:5e:ae:81:36:5b:b0:00:f4:d1:3b:4c:a1:e2: a3:32:3d:ee:48:45:3d:e8:8a:fd:e3:8e:ac:1b:24:70: 00:00:e1:cb:a4:b7:20:91:c9:40:34:c4:c9:ea:ab:df: 16:cc:8d:aa:4e:3b:ae:e8:9c:f2:7b:28:fd:bb:4a:f4: bf:12:33:c5:22:e4:32:a1:2d:8e:68:e3:a2:c9:b8:bd: bb:75:af:ae:e3:4d:ba:6a:cf:41:15:d2:9c:17:7a:a7: cb:39:51:65:fd:80:58:4a:b7:11:0d:4d:fa:49:8d:ac: b1:e3:24:df:ad:3a:6a:f6:f0:9b:37:d2:ed:1f:37:07: 9e:78:22:33:e6:e8:22:e1:84:22:c1:c7:01:90:c5:88: 6d:92:e1:a7:bd:e4:62:92:6c:0e:0f:20:41:76:29:b4: a1:31:49:4f:39:f3:26:70:b8:ae:e6:15:f8:6e:ff:1e: 3b:ed:f4:aa:5c:bd:ad:b9:9d:95:61:dc:35:dc:06:a7: 3f:95:62:61:21:07:38:2a:65:88:61:0a:ff:aa:a9:0d: 79:b9:1f:67:46:88:d7:92:b2:14:55:b8:4b:76:43:fb Fingerprint (SHA-256): F1:A4:72:60:42:23:FE:DB:31:C2:67:A8:43:5A:70:D1:57:0D:7C:7D:3A:BD:2E:35:61:32:EA:B0:95:A2:27:67 Fingerprint (SHA1): 83:26:44:43:A6:1E:59:A2:1D:04:4D:3A:12:F8:DD:33:58:CF:BC:46 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1222: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034299 (0x3750adfb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Sep 28 04:03:46 2022 Not After : Tue Sep 28 04:03:46 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:2e:e9:a9:01:11:f0:25:be:4f:ff:37:af:13:1f:b3: 30:bd:4b:3e:db:3f:15:89:15:37:63:c7:8d:60:1c:45: c7:7a:8c:5a:c5:5b:9f:5d:3a:56:55:77:1b:10:44:05: c0:f1:4d:9e:c5:b4:aa:e0:50:fa:33:12:91:59:f0:d8: 8b:04:3c:a3:c8:10:b9:a6:61:86:43:29:73:0c:75:9c: 84:2c:4e:aa:3e:33:da:c5:ab:a7:bc:9f:be:3a:9d:8d: 0b:6d:b4:51:57:18:54:e0:99:96:42:72:05:13:e8:90: ce:2f:2f:6a:71:e4:c6:87:5e:6c:55:66:da:5f:ab:5c: 8c:5a:be:1e:6b:0d:2b:b9:b9:54:65:62:e0:ad:c3:f7: 71:89:6c:23:7a:77:89:47:0c:45:17:2f:8e:79:43:0f: aa:f8:10:7e:ad:d9:68:89:83:f2:96:74:17:6a:fc:0e: 5f:68:7f:73:0f:c7:22:7e:05:28:46:38:26:83:46:47: 9c:c6:26:0d:cf:59:d9:8d:ab:0b:1d:98:1f:e5:18:90: 40:4d:7b:9b:3e:4f:ce:91:98:88:71:38:cb:2c:95:14: 16:2f:74:2c:7d:71:6c:af:4e:98:4f:82:ad:bd:44:b8: 94:3e:ea:21:08:a6:7d:be:3d:59:c3:5c:92:74:19:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:1f:07:f4:c7:a3:3a:f1:b4:3b:fe:54:41:c7:45:b2: 5b:42:d2:b4:11:8b:73:b4:39:04:30:1d:0d:8e:86:3a: 1a:c3:6d:5e:ae:81:36:5b:b0:00:f4:d1:3b:4c:a1:e2: a3:32:3d:ee:48:45:3d:e8:8a:fd:e3:8e:ac:1b:24:70: 00:00:e1:cb:a4:b7:20:91:c9:40:34:c4:c9:ea:ab:df: 16:cc:8d:aa:4e:3b:ae:e8:9c:f2:7b:28:fd:bb:4a:f4: bf:12:33:c5:22:e4:32:a1:2d:8e:68:e3:a2:c9:b8:bd: bb:75:af:ae:e3:4d:ba:6a:cf:41:15:d2:9c:17:7a:a7: cb:39:51:65:fd:80:58:4a:b7:11:0d:4d:fa:49:8d:ac: b1:e3:24:df:ad:3a:6a:f6:f0:9b:37:d2:ed:1f:37:07: 9e:78:22:33:e6:e8:22:e1:84:22:c1:c7:01:90:c5:88: 6d:92:e1:a7:bd:e4:62:92:6c:0e:0f:20:41:76:29:b4: a1:31:49:4f:39:f3:26:70:b8:ae:e6:15:f8:6e:ff:1e: 3b:ed:f4:aa:5c:bd:ad:b9:9d:95:61:dc:35:dc:06:a7: 3f:95:62:61:21:07:38:2a:65:88:61:0a:ff:aa:a9:0d: 79:b9:1f:67:46:88:d7:92:b2:14:55:b8:4b:76:43:fb Fingerprint (SHA-256): F1:A4:72:60:42:23:FE:DB:31:C2:67:A8:43:5A:70:D1:57:0D:7C:7D:3A:BD:2E:35:61:32:EA:B0:95:A2:27:67 Fingerprint (SHA1): 83:26:44:43:A6:1E:59:A2:1D:04:4D:3A:12:F8:DD:33:58:CF:BC:46 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1223: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1224: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034302 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1225: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1226: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1227: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1228: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 928034303 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1229: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1230: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1231: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1232: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 928034304 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1233: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1234: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1235: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1236: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 928034305 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1237: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1238: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1239: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1240: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 928034306 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1241: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1242: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1243: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1244: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 928034307 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1245: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1246: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #1247: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1248: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 928034308 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1249: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1250: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1251: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #1252: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #1253: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1254: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #1255: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034302 (0x3750adfe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 04:04:10 2022 Not After : Wed Sep 28 04:04:10 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:f1:07:8e:94:a5:69:82:91:e4:44:0d:f8:0b:f8:e2: 6a:56:68:0f:b6:be:8e:46:d6:03:da:0e:63:47:66:76: 44:a8:33:4b:0b:b3:fa:38:89:09:86:25:94:64:72:e1: 54:2d:89:8c:c6:40:cc:3c:d1:bf:57:18:57:af:57:91: 86:89:d2:14:6e:3a:1f:4c:78:d5:f6:d5:07:f0:c0:a1: 60:06:88:a5:b0:10:e0:0e:93:48:64:da:3d:c4:df:bb: d0:cd:a1:56:b5:f5:b2:18:d1:47:b3:ec:80:b2:57:8b: 71:9e:b1:fb:4e:fa:26:07:2e:e4:9f:10:84:76:f0:b0: 50:4c:01:cd:c6:5e:9b:ac:94:43:3f:62:46:f0:cd:19: 36:8c:f9:f6:bf:aa:22:0d:8f:5b:a7:15:b4:0f:04:7e: 2e:6b:5e:21:59:d3:25:cb:9e:27:bc:e1:d2:04:41:63: 48:bc:4b:2e:9e:3e:bd:1c:e5:4d:33:a9:be:c8:fa:c3: 76:7b:04:0d:ac:e3:0c:51:6d:c1:0f:84:d3:33:c6:d6: 7d:79:3b:83:5c:29:f9:c1:a6:7c:56:c3:f5:c9:8e:08: af:66:c8:58:33:58:75:cd:d1:95:82:27:48:4c:0f:46: 00:f5:53:02:46:fc:6f:40:64:3b:46:05:80:77:5a:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:65:29:1c:07:4a:83:50:dd:1e:0f:3a:fb:1d:20:e9: 19:bb:09:f2:92:5e:44:51:1a:6b:82:7e:ad:39:7d:3a: 52:2d:81:78:14:e2:ea:7c:b2:42:96:6b:33:82:41:82: 6c:97:c6:ad:42:e3:3b:60:d1:2a:2b:84:63:e4:b8:1e: 40:d0:5c:3b:48:53:82:5c:b7:10:38:17:7f:34:05:55: f9:9f:4f:18:85:7e:06:b9:bd:e1:b3:08:23:e6:89:25: a1:da:a0:58:5f:e3:9b:35:92:fc:ac:e1:9d:b3:40:92: 5b:50:89:c8:11:e2:a4:d7:77:f9:fa:c9:1b:11:7b:47: 36:17:3c:64:e4:76:19:32:95:de:93:2b:c1:cc:8a:00: de:63:f1:00:fd:3e:1f:4f:aa:db:5a:70:33:14:6b:37: b4:e0:9d:89:e3:95:0a:fa:e9:39:69:3b:50:b1:43:8a: f4:18:c5:1f:b7:ed:fe:0f:b7:f1:0e:c9:d5:14:53:ed: 8e:c1:0e:af:f7:d8:ee:92:fd:6c:e3:e5:ce:98:92:07: 06:9b:12:a7:08:40:bd:0c:0e:cc:f1:db:38:e5:7a:71: a3:2a:e2:4e:aa:00:d6:b4:00:d6:46:b0:43:a5:73:65: f8:4b:e3:19:79:3f:a5:94:9c:27:ff:97:9e:e1:9b:ad Fingerprint (SHA-256): E0:D0:6B:9E:66:98:54:DA:CA:45:37:11:5B:72:83:96:01:C8:DE:74:DF:6B:37:CD:C8:C5:AC:E6:D5:5F:4A:71 Fingerprint (SHA1): 46:02:E9:87:C1:C8:60:AF:9D:F8:47:FA:6E:7E:BC:5A:B1:86:E5:F9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1256: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1257: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1258: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1259: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034302 (0x3750adfe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 04:04:10 2022 Not After : Wed Sep 28 04:04:10 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:f1:07:8e:94:a5:69:82:91:e4:44:0d:f8:0b:f8:e2: 6a:56:68:0f:b6:be:8e:46:d6:03:da:0e:63:47:66:76: 44:a8:33:4b:0b:b3:fa:38:89:09:86:25:94:64:72:e1: 54:2d:89:8c:c6:40:cc:3c:d1:bf:57:18:57:af:57:91: 86:89:d2:14:6e:3a:1f:4c:78:d5:f6:d5:07:f0:c0:a1: 60:06:88:a5:b0:10:e0:0e:93:48:64:da:3d:c4:df:bb: d0:cd:a1:56:b5:f5:b2:18:d1:47:b3:ec:80:b2:57:8b: 71:9e:b1:fb:4e:fa:26:07:2e:e4:9f:10:84:76:f0:b0: 50:4c:01:cd:c6:5e:9b:ac:94:43:3f:62:46:f0:cd:19: 36:8c:f9:f6:bf:aa:22:0d:8f:5b:a7:15:b4:0f:04:7e: 2e:6b:5e:21:59:d3:25:cb:9e:27:bc:e1:d2:04:41:63: 48:bc:4b:2e:9e:3e:bd:1c:e5:4d:33:a9:be:c8:fa:c3: 76:7b:04:0d:ac:e3:0c:51:6d:c1:0f:84:d3:33:c6:d6: 7d:79:3b:83:5c:29:f9:c1:a6:7c:56:c3:f5:c9:8e:08: af:66:c8:58:33:58:75:cd:d1:95:82:27:48:4c:0f:46: 00:f5:53:02:46:fc:6f:40:64:3b:46:05:80:77:5a:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:65:29:1c:07:4a:83:50:dd:1e:0f:3a:fb:1d:20:e9: 19:bb:09:f2:92:5e:44:51:1a:6b:82:7e:ad:39:7d:3a: 52:2d:81:78:14:e2:ea:7c:b2:42:96:6b:33:82:41:82: 6c:97:c6:ad:42:e3:3b:60:d1:2a:2b:84:63:e4:b8:1e: 40:d0:5c:3b:48:53:82:5c:b7:10:38:17:7f:34:05:55: f9:9f:4f:18:85:7e:06:b9:bd:e1:b3:08:23:e6:89:25: a1:da:a0:58:5f:e3:9b:35:92:fc:ac:e1:9d:b3:40:92: 5b:50:89:c8:11:e2:a4:d7:77:f9:fa:c9:1b:11:7b:47: 36:17:3c:64:e4:76:19:32:95:de:93:2b:c1:cc:8a:00: de:63:f1:00:fd:3e:1f:4f:aa:db:5a:70:33:14:6b:37: b4:e0:9d:89:e3:95:0a:fa:e9:39:69:3b:50:b1:43:8a: f4:18:c5:1f:b7:ed:fe:0f:b7:f1:0e:c9:d5:14:53:ed: 8e:c1:0e:af:f7:d8:ee:92:fd:6c:e3:e5:ce:98:92:07: 06:9b:12:a7:08:40:bd:0c:0e:cc:f1:db:38:e5:7a:71: a3:2a:e2:4e:aa:00:d6:b4:00:d6:46:b0:43:a5:73:65: f8:4b:e3:19:79:3f:a5:94:9c:27:ff:97:9e:e1:9b:ad Fingerprint (SHA-256): E0:D0:6B:9E:66:98:54:DA:CA:45:37:11:5B:72:83:96:01:C8:DE:74:DF:6B:37:CD:C8:C5:AC:E6:D5:5F:4A:71 Fingerprint (SHA1): 46:02:E9:87:C1:C8:60:AF:9D:F8:47:FA:6E:7E:BC:5A:B1:86:E5:F9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1260: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1261: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1262: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034309 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1263: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1264: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1265: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1266: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 928034310 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1267: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1268: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #1269: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1270: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 928034311 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1271: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1272: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #1273: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1274: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 928034312 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1275: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1276: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1277: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1278: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 928034313 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1279: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1280: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #1281: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1282: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 928034314 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1283: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1284: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #1285: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1286: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 928034315 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1287: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1288: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1289: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1290: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 928034316 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1291: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1292: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #1293: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1294: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 928034317 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1295: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1296: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #1297: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1298: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 928034318 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1299: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1300: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1301: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1302: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 928034319 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1303: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1304: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #1305: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1306: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 928034320 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1307: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1308: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #1309: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1310: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 928034321 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1311: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1312: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1313: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1314: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 928034322 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1315: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1316: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #1317: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1318: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 928034323 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1319: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1320: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #1321: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1322: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 928034324 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1323: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1324: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #1325: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1326: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 928034325 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1327: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1328: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #1329: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1330: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 928034326 --extCP --extIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1331: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1332: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #1333: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1334: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 928034327 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1335: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1336: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #1337: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1338: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 928034328 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1339: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1340: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #1341: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1342: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 928034329 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1343: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1344: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #1345: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1346: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 928034330 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1347: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1348: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #1349: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1350: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 928034331 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1351: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1352: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #1353: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1354: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 928034332 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1355: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1356: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #1357: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1358: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 928034333 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1359: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1360: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #1361: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1362: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 928034334 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1363: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1364: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #1365: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1366: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 928034335 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1367: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1368: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #1369: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1370: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 928034336 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1371: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1372: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #1373: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1374: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 928034337 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1375: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1376: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #1377: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1378: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 928034338 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1379: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1380: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1381: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034309 (0x3750ae05) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 04:04:54 2022 Not After : Wed Sep 28 04:04:54 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:0a:5b:a3:26:7b:74:73:56:2b:6a:7d:d1:f9:ac:35: 03:c5:1f:4c:e2:c6:63:47:d8:73:df:1f:9c:3f:2e:62: 06:90:f7:b1:84:de:c7:3f:b7:85:c6:05:8f:6d:2d:52: da:49:7b:f9:1b:9f:1a:87:92:b6:1d:88:40:ef:00:4f: 75:96:0d:00:cc:b9:df:11:db:a3:58:61:6a:db:78:8c: d8:01:78:5b:c7:2d:21:e8:37:81:09:83:99:e7:4a:fa: e3:80:c9:5e:8a:b9:0e:c8:5a:55:30:18:5b:31:6d:a9: 06:43:a8:42:48:b4:bb:f6:29:d6:8d:19:c5:79:39:cc: 1d:55:73:37:3a:60:33:12:5d:68:87:7b:3b:c9:84:98: 6e:b0:45:55:a1:c7:a2:af:5c:39:1f:7b:66:2d:d6:12: 07:a5:89:16:d6:fb:1e:23:18:59:97:90:92:b6:3b:de: 58:7f:23:51:ef:6e:67:21:a7:9a:bc:a5:aa:18:3f:17: 3e:2b:d1:0e:74:21:95:c7:02:79:24:92:c5:83:24:91: da:aa:81:b2:c7:1f:c4:c9:0c:fc:cd:a8:71:44:08:82: f1:8a:7e:df:d7:9b:c9:d9:18:31:5c:01:a6:06:f0:92: 0b:73:59:86:23:b1:67:a4:4c:ff:11:8b:d0:6f:5f:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:0d:5d:b6:17:f7:39:49:78:6b:96:df:aa:df:31:dd: 6e:55:e1:2b:d5:76:fc:e6:ed:8d:5a:e6:b3:43:2a:c3: d8:43:60:8c:72:7a:d9:a4:f4:9a:2f:12:4e:2b:d1:47: c5:3e:be:66:eb:c6:1a:8f:52:06:42:14:59:1d:e0:87: 74:89:7d:3e:7d:03:23:eb:c9:a2:1f:6a:fa:3c:9d:f4: 22:f3:a4:77:bf:ca:5f:0e:a5:53:c0:4b:06:90:4e:e2: ae:25:3b:9e:ec:65:de:12:2a:4c:a5:36:8d:08:76:6f: 7d:cd:32:5f:93:8c:0e:e1:da:68:31:2a:85:fd:06:52: d2:12:a2:97:5f:ff:1f:ff:91:06:7c:de:19:73:c1:bf: c8:e3:83:b8:43:ed:3b:e5:9b:ca:e7:b2:bd:15:9d:94: 58:0f:08:b0:f7:5b:90:d5:6c:6f:aa:ef:20:9e:be:c4: 86:4d:e6:5b:d0:bb:53:cf:75:14:d2:b5:d6:16:2f:1a: 3b:09:37:14:c1:90:2d:2b:88:34:ec:95:67:f8:3c:41: 7f:fd:5a:59:72:b8:c0:62:10:94:98:92:c9:c8:68:1f: 3e:3a:fc:b9:01:15:ca:69:45:6b:c5:ce:22:93:cf:30: de:bb:4d:3f:2b:34:86:43:15:0e:04:6d:fd:71:12:31 Fingerprint (SHA-256): 18:4B:91:26:F1:B3:60:F7:D3:2D:44:18:9D:EE:E6:38:61:21:D7:F8:3E:57:73:91:7B:36:B6:69:5F:82:C4:F0 Fingerprint (SHA1): 8D:E8:2E:CE:15:59:E9:8A:6D:B2:34:F4:56:6F:43:8E:D8:64:21:2F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1382: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1383: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034309 (0x3750ae05) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 04:04:54 2022 Not After : Wed Sep 28 04:04:54 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:0a:5b:a3:26:7b:74:73:56:2b:6a:7d:d1:f9:ac:35: 03:c5:1f:4c:e2:c6:63:47:d8:73:df:1f:9c:3f:2e:62: 06:90:f7:b1:84:de:c7:3f:b7:85:c6:05:8f:6d:2d:52: da:49:7b:f9:1b:9f:1a:87:92:b6:1d:88:40:ef:00:4f: 75:96:0d:00:cc:b9:df:11:db:a3:58:61:6a:db:78:8c: d8:01:78:5b:c7:2d:21:e8:37:81:09:83:99:e7:4a:fa: e3:80:c9:5e:8a:b9:0e:c8:5a:55:30:18:5b:31:6d:a9: 06:43:a8:42:48:b4:bb:f6:29:d6:8d:19:c5:79:39:cc: 1d:55:73:37:3a:60:33:12:5d:68:87:7b:3b:c9:84:98: 6e:b0:45:55:a1:c7:a2:af:5c:39:1f:7b:66:2d:d6:12: 07:a5:89:16:d6:fb:1e:23:18:59:97:90:92:b6:3b:de: 58:7f:23:51:ef:6e:67:21:a7:9a:bc:a5:aa:18:3f:17: 3e:2b:d1:0e:74:21:95:c7:02:79:24:92:c5:83:24:91: da:aa:81:b2:c7:1f:c4:c9:0c:fc:cd:a8:71:44:08:82: f1:8a:7e:df:d7:9b:c9:d9:18:31:5c:01:a6:06:f0:92: 0b:73:59:86:23:b1:67:a4:4c:ff:11:8b:d0:6f:5f:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:0d:5d:b6:17:f7:39:49:78:6b:96:df:aa:df:31:dd: 6e:55:e1:2b:d5:76:fc:e6:ed:8d:5a:e6:b3:43:2a:c3: d8:43:60:8c:72:7a:d9:a4:f4:9a:2f:12:4e:2b:d1:47: c5:3e:be:66:eb:c6:1a:8f:52:06:42:14:59:1d:e0:87: 74:89:7d:3e:7d:03:23:eb:c9:a2:1f:6a:fa:3c:9d:f4: 22:f3:a4:77:bf:ca:5f:0e:a5:53:c0:4b:06:90:4e:e2: ae:25:3b:9e:ec:65:de:12:2a:4c:a5:36:8d:08:76:6f: 7d:cd:32:5f:93:8c:0e:e1:da:68:31:2a:85:fd:06:52: d2:12:a2:97:5f:ff:1f:ff:91:06:7c:de:19:73:c1:bf: c8:e3:83:b8:43:ed:3b:e5:9b:ca:e7:b2:bd:15:9d:94: 58:0f:08:b0:f7:5b:90:d5:6c:6f:aa:ef:20:9e:be:c4: 86:4d:e6:5b:d0:bb:53:cf:75:14:d2:b5:d6:16:2f:1a: 3b:09:37:14:c1:90:2d:2b:88:34:ec:95:67:f8:3c:41: 7f:fd:5a:59:72:b8:c0:62:10:94:98:92:c9:c8:68:1f: 3e:3a:fc:b9:01:15:ca:69:45:6b:c5:ce:22:93:cf:30: de:bb:4d:3f:2b:34:86:43:15:0e:04:6d:fd:71:12:31 Fingerprint (SHA-256): 18:4B:91:26:F1:B3:60:F7:D3:2D:44:18:9D:EE:E6:38:61:21:D7:F8:3E:57:73:91:7B:36:B6:69:5F:82:C4:F0 Fingerprint (SHA1): 8D:E8:2E:CE:15:59:E9:8A:6D:B2:34:F4:56:6F:43:8E:D8:64:21:2F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1384: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1385: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1386: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1387: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034309 (0x3750ae05) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 04:04:54 2022 Not After : Wed Sep 28 04:04:54 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:0a:5b:a3:26:7b:74:73:56:2b:6a:7d:d1:f9:ac:35: 03:c5:1f:4c:e2:c6:63:47:d8:73:df:1f:9c:3f:2e:62: 06:90:f7:b1:84:de:c7:3f:b7:85:c6:05:8f:6d:2d:52: da:49:7b:f9:1b:9f:1a:87:92:b6:1d:88:40:ef:00:4f: 75:96:0d:00:cc:b9:df:11:db:a3:58:61:6a:db:78:8c: d8:01:78:5b:c7:2d:21:e8:37:81:09:83:99:e7:4a:fa: e3:80:c9:5e:8a:b9:0e:c8:5a:55:30:18:5b:31:6d:a9: 06:43:a8:42:48:b4:bb:f6:29:d6:8d:19:c5:79:39:cc: 1d:55:73:37:3a:60:33:12:5d:68:87:7b:3b:c9:84:98: 6e:b0:45:55:a1:c7:a2:af:5c:39:1f:7b:66:2d:d6:12: 07:a5:89:16:d6:fb:1e:23:18:59:97:90:92:b6:3b:de: 58:7f:23:51:ef:6e:67:21:a7:9a:bc:a5:aa:18:3f:17: 3e:2b:d1:0e:74:21:95:c7:02:79:24:92:c5:83:24:91: da:aa:81:b2:c7:1f:c4:c9:0c:fc:cd:a8:71:44:08:82: f1:8a:7e:df:d7:9b:c9:d9:18:31:5c:01:a6:06:f0:92: 0b:73:59:86:23:b1:67:a4:4c:ff:11:8b:d0:6f:5f:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:0d:5d:b6:17:f7:39:49:78:6b:96:df:aa:df:31:dd: 6e:55:e1:2b:d5:76:fc:e6:ed:8d:5a:e6:b3:43:2a:c3: d8:43:60:8c:72:7a:d9:a4:f4:9a:2f:12:4e:2b:d1:47: c5:3e:be:66:eb:c6:1a:8f:52:06:42:14:59:1d:e0:87: 74:89:7d:3e:7d:03:23:eb:c9:a2:1f:6a:fa:3c:9d:f4: 22:f3:a4:77:bf:ca:5f:0e:a5:53:c0:4b:06:90:4e:e2: ae:25:3b:9e:ec:65:de:12:2a:4c:a5:36:8d:08:76:6f: 7d:cd:32:5f:93:8c:0e:e1:da:68:31:2a:85:fd:06:52: d2:12:a2:97:5f:ff:1f:ff:91:06:7c:de:19:73:c1:bf: c8:e3:83:b8:43:ed:3b:e5:9b:ca:e7:b2:bd:15:9d:94: 58:0f:08:b0:f7:5b:90:d5:6c:6f:aa:ef:20:9e:be:c4: 86:4d:e6:5b:d0:bb:53:cf:75:14:d2:b5:d6:16:2f:1a: 3b:09:37:14:c1:90:2d:2b:88:34:ec:95:67:f8:3c:41: 7f:fd:5a:59:72:b8:c0:62:10:94:98:92:c9:c8:68:1f: 3e:3a:fc:b9:01:15:ca:69:45:6b:c5:ce:22:93:cf:30: de:bb:4d:3f:2b:34:86:43:15:0e:04:6d:fd:71:12:31 Fingerprint (SHA-256): 18:4B:91:26:F1:B3:60:F7:D3:2D:44:18:9D:EE:E6:38:61:21:D7:F8:3E:57:73:91:7B:36:B6:69:5F:82:C4:F0 Fingerprint (SHA1): 8D:E8:2E:CE:15:59:E9:8A:6D:B2:34:F4:56:6F:43:8E:D8:64:21:2F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1388: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1389: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1390: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1391: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034309 (0x3750ae05) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 04:04:54 2022 Not After : Wed Sep 28 04:04:54 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:0a:5b:a3:26:7b:74:73:56:2b:6a:7d:d1:f9:ac:35: 03:c5:1f:4c:e2:c6:63:47:d8:73:df:1f:9c:3f:2e:62: 06:90:f7:b1:84:de:c7:3f:b7:85:c6:05:8f:6d:2d:52: da:49:7b:f9:1b:9f:1a:87:92:b6:1d:88:40:ef:00:4f: 75:96:0d:00:cc:b9:df:11:db:a3:58:61:6a:db:78:8c: d8:01:78:5b:c7:2d:21:e8:37:81:09:83:99:e7:4a:fa: e3:80:c9:5e:8a:b9:0e:c8:5a:55:30:18:5b:31:6d:a9: 06:43:a8:42:48:b4:bb:f6:29:d6:8d:19:c5:79:39:cc: 1d:55:73:37:3a:60:33:12:5d:68:87:7b:3b:c9:84:98: 6e:b0:45:55:a1:c7:a2:af:5c:39:1f:7b:66:2d:d6:12: 07:a5:89:16:d6:fb:1e:23:18:59:97:90:92:b6:3b:de: 58:7f:23:51:ef:6e:67:21:a7:9a:bc:a5:aa:18:3f:17: 3e:2b:d1:0e:74:21:95:c7:02:79:24:92:c5:83:24:91: da:aa:81:b2:c7:1f:c4:c9:0c:fc:cd:a8:71:44:08:82: f1:8a:7e:df:d7:9b:c9:d9:18:31:5c:01:a6:06:f0:92: 0b:73:59:86:23:b1:67:a4:4c:ff:11:8b:d0:6f:5f:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:0d:5d:b6:17:f7:39:49:78:6b:96:df:aa:df:31:dd: 6e:55:e1:2b:d5:76:fc:e6:ed:8d:5a:e6:b3:43:2a:c3: d8:43:60:8c:72:7a:d9:a4:f4:9a:2f:12:4e:2b:d1:47: c5:3e:be:66:eb:c6:1a:8f:52:06:42:14:59:1d:e0:87: 74:89:7d:3e:7d:03:23:eb:c9:a2:1f:6a:fa:3c:9d:f4: 22:f3:a4:77:bf:ca:5f:0e:a5:53:c0:4b:06:90:4e:e2: ae:25:3b:9e:ec:65:de:12:2a:4c:a5:36:8d:08:76:6f: 7d:cd:32:5f:93:8c:0e:e1:da:68:31:2a:85:fd:06:52: d2:12:a2:97:5f:ff:1f:ff:91:06:7c:de:19:73:c1:bf: c8:e3:83:b8:43:ed:3b:e5:9b:ca:e7:b2:bd:15:9d:94: 58:0f:08:b0:f7:5b:90:d5:6c:6f:aa:ef:20:9e:be:c4: 86:4d:e6:5b:d0:bb:53:cf:75:14:d2:b5:d6:16:2f:1a: 3b:09:37:14:c1:90:2d:2b:88:34:ec:95:67:f8:3c:41: 7f:fd:5a:59:72:b8:c0:62:10:94:98:92:c9:c8:68:1f: 3e:3a:fc:b9:01:15:ca:69:45:6b:c5:ce:22:93:cf:30: de:bb:4d:3f:2b:34:86:43:15:0e:04:6d:fd:71:12:31 Fingerprint (SHA-256): 18:4B:91:26:F1:B3:60:F7:D3:2D:44:18:9D:EE:E6:38:61:21:D7:F8:3E:57:73:91:7B:36:B6:69:5F:82:C4:F0 Fingerprint (SHA1): 8D:E8:2E:CE:15:59:E9:8A:6D:B2:34:F4:56:6F:43:8E:D8:64:21:2F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1392: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034309 (0x3750ae05) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 04:04:54 2022 Not After : Wed Sep 28 04:04:54 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:0a:5b:a3:26:7b:74:73:56:2b:6a:7d:d1:f9:ac:35: 03:c5:1f:4c:e2:c6:63:47:d8:73:df:1f:9c:3f:2e:62: 06:90:f7:b1:84:de:c7:3f:b7:85:c6:05:8f:6d:2d:52: da:49:7b:f9:1b:9f:1a:87:92:b6:1d:88:40:ef:00:4f: 75:96:0d:00:cc:b9:df:11:db:a3:58:61:6a:db:78:8c: d8:01:78:5b:c7:2d:21:e8:37:81:09:83:99:e7:4a:fa: e3:80:c9:5e:8a:b9:0e:c8:5a:55:30:18:5b:31:6d:a9: 06:43:a8:42:48:b4:bb:f6:29:d6:8d:19:c5:79:39:cc: 1d:55:73:37:3a:60:33:12:5d:68:87:7b:3b:c9:84:98: 6e:b0:45:55:a1:c7:a2:af:5c:39:1f:7b:66:2d:d6:12: 07:a5:89:16:d6:fb:1e:23:18:59:97:90:92:b6:3b:de: 58:7f:23:51:ef:6e:67:21:a7:9a:bc:a5:aa:18:3f:17: 3e:2b:d1:0e:74:21:95:c7:02:79:24:92:c5:83:24:91: da:aa:81:b2:c7:1f:c4:c9:0c:fc:cd:a8:71:44:08:82: f1:8a:7e:df:d7:9b:c9:d9:18:31:5c:01:a6:06:f0:92: 0b:73:59:86:23:b1:67:a4:4c:ff:11:8b:d0:6f:5f:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:0d:5d:b6:17:f7:39:49:78:6b:96:df:aa:df:31:dd: 6e:55:e1:2b:d5:76:fc:e6:ed:8d:5a:e6:b3:43:2a:c3: d8:43:60:8c:72:7a:d9:a4:f4:9a:2f:12:4e:2b:d1:47: c5:3e:be:66:eb:c6:1a:8f:52:06:42:14:59:1d:e0:87: 74:89:7d:3e:7d:03:23:eb:c9:a2:1f:6a:fa:3c:9d:f4: 22:f3:a4:77:bf:ca:5f:0e:a5:53:c0:4b:06:90:4e:e2: ae:25:3b:9e:ec:65:de:12:2a:4c:a5:36:8d:08:76:6f: 7d:cd:32:5f:93:8c:0e:e1:da:68:31:2a:85:fd:06:52: d2:12:a2:97:5f:ff:1f:ff:91:06:7c:de:19:73:c1:bf: c8:e3:83:b8:43:ed:3b:e5:9b:ca:e7:b2:bd:15:9d:94: 58:0f:08:b0:f7:5b:90:d5:6c:6f:aa:ef:20:9e:be:c4: 86:4d:e6:5b:d0:bb:53:cf:75:14:d2:b5:d6:16:2f:1a: 3b:09:37:14:c1:90:2d:2b:88:34:ec:95:67:f8:3c:41: 7f:fd:5a:59:72:b8:c0:62:10:94:98:92:c9:c8:68:1f: 3e:3a:fc:b9:01:15:ca:69:45:6b:c5:ce:22:93:cf:30: de:bb:4d:3f:2b:34:86:43:15:0e:04:6d:fd:71:12:31 Fingerprint (SHA-256): 18:4B:91:26:F1:B3:60:F7:D3:2D:44:18:9D:EE:E6:38:61:21:D7:F8:3E:57:73:91:7B:36:B6:69:5F:82:C4:F0 Fingerprint (SHA1): 8D:E8:2E:CE:15:59:E9:8A:6D:B2:34:F4:56:6F:43:8E:D8:64:21:2F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1393: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1394: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034309 (0x3750ae05) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 04:04:54 2022 Not After : Wed Sep 28 04:04:54 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:0a:5b:a3:26:7b:74:73:56:2b:6a:7d:d1:f9:ac:35: 03:c5:1f:4c:e2:c6:63:47:d8:73:df:1f:9c:3f:2e:62: 06:90:f7:b1:84:de:c7:3f:b7:85:c6:05:8f:6d:2d:52: da:49:7b:f9:1b:9f:1a:87:92:b6:1d:88:40:ef:00:4f: 75:96:0d:00:cc:b9:df:11:db:a3:58:61:6a:db:78:8c: d8:01:78:5b:c7:2d:21:e8:37:81:09:83:99:e7:4a:fa: e3:80:c9:5e:8a:b9:0e:c8:5a:55:30:18:5b:31:6d:a9: 06:43:a8:42:48:b4:bb:f6:29:d6:8d:19:c5:79:39:cc: 1d:55:73:37:3a:60:33:12:5d:68:87:7b:3b:c9:84:98: 6e:b0:45:55:a1:c7:a2:af:5c:39:1f:7b:66:2d:d6:12: 07:a5:89:16:d6:fb:1e:23:18:59:97:90:92:b6:3b:de: 58:7f:23:51:ef:6e:67:21:a7:9a:bc:a5:aa:18:3f:17: 3e:2b:d1:0e:74:21:95:c7:02:79:24:92:c5:83:24:91: da:aa:81:b2:c7:1f:c4:c9:0c:fc:cd:a8:71:44:08:82: f1:8a:7e:df:d7:9b:c9:d9:18:31:5c:01:a6:06:f0:92: 0b:73:59:86:23:b1:67:a4:4c:ff:11:8b:d0:6f:5f:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:0d:5d:b6:17:f7:39:49:78:6b:96:df:aa:df:31:dd: 6e:55:e1:2b:d5:76:fc:e6:ed:8d:5a:e6:b3:43:2a:c3: d8:43:60:8c:72:7a:d9:a4:f4:9a:2f:12:4e:2b:d1:47: c5:3e:be:66:eb:c6:1a:8f:52:06:42:14:59:1d:e0:87: 74:89:7d:3e:7d:03:23:eb:c9:a2:1f:6a:fa:3c:9d:f4: 22:f3:a4:77:bf:ca:5f:0e:a5:53:c0:4b:06:90:4e:e2: ae:25:3b:9e:ec:65:de:12:2a:4c:a5:36:8d:08:76:6f: 7d:cd:32:5f:93:8c:0e:e1:da:68:31:2a:85:fd:06:52: d2:12:a2:97:5f:ff:1f:ff:91:06:7c:de:19:73:c1:bf: c8:e3:83:b8:43:ed:3b:e5:9b:ca:e7:b2:bd:15:9d:94: 58:0f:08:b0:f7:5b:90:d5:6c:6f:aa:ef:20:9e:be:c4: 86:4d:e6:5b:d0:bb:53:cf:75:14:d2:b5:d6:16:2f:1a: 3b:09:37:14:c1:90:2d:2b:88:34:ec:95:67:f8:3c:41: 7f:fd:5a:59:72:b8:c0:62:10:94:98:92:c9:c8:68:1f: 3e:3a:fc:b9:01:15:ca:69:45:6b:c5:ce:22:93:cf:30: de:bb:4d:3f:2b:34:86:43:15:0e:04:6d:fd:71:12:31 Fingerprint (SHA-256): 18:4B:91:26:F1:B3:60:F7:D3:2D:44:18:9D:EE:E6:38:61:21:D7:F8:3E:57:73:91:7B:36:B6:69:5F:82:C4:F0 Fingerprint (SHA1): 8D:E8:2E:CE:15:59:E9:8A:6D:B2:34:F4:56:6F:43:8E:D8:64:21:2F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1395: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1396: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1397: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1398: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034309 (0x3750ae05) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 04:04:54 2022 Not After : Wed Sep 28 04:04:54 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:0a:5b:a3:26:7b:74:73:56:2b:6a:7d:d1:f9:ac:35: 03:c5:1f:4c:e2:c6:63:47:d8:73:df:1f:9c:3f:2e:62: 06:90:f7:b1:84:de:c7:3f:b7:85:c6:05:8f:6d:2d:52: da:49:7b:f9:1b:9f:1a:87:92:b6:1d:88:40:ef:00:4f: 75:96:0d:00:cc:b9:df:11:db:a3:58:61:6a:db:78:8c: d8:01:78:5b:c7:2d:21:e8:37:81:09:83:99:e7:4a:fa: e3:80:c9:5e:8a:b9:0e:c8:5a:55:30:18:5b:31:6d:a9: 06:43:a8:42:48:b4:bb:f6:29:d6:8d:19:c5:79:39:cc: 1d:55:73:37:3a:60:33:12:5d:68:87:7b:3b:c9:84:98: 6e:b0:45:55:a1:c7:a2:af:5c:39:1f:7b:66:2d:d6:12: 07:a5:89:16:d6:fb:1e:23:18:59:97:90:92:b6:3b:de: 58:7f:23:51:ef:6e:67:21:a7:9a:bc:a5:aa:18:3f:17: 3e:2b:d1:0e:74:21:95:c7:02:79:24:92:c5:83:24:91: da:aa:81:b2:c7:1f:c4:c9:0c:fc:cd:a8:71:44:08:82: f1:8a:7e:df:d7:9b:c9:d9:18:31:5c:01:a6:06:f0:92: 0b:73:59:86:23:b1:67:a4:4c:ff:11:8b:d0:6f:5f:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:0d:5d:b6:17:f7:39:49:78:6b:96:df:aa:df:31:dd: 6e:55:e1:2b:d5:76:fc:e6:ed:8d:5a:e6:b3:43:2a:c3: d8:43:60:8c:72:7a:d9:a4:f4:9a:2f:12:4e:2b:d1:47: c5:3e:be:66:eb:c6:1a:8f:52:06:42:14:59:1d:e0:87: 74:89:7d:3e:7d:03:23:eb:c9:a2:1f:6a:fa:3c:9d:f4: 22:f3:a4:77:bf:ca:5f:0e:a5:53:c0:4b:06:90:4e:e2: ae:25:3b:9e:ec:65:de:12:2a:4c:a5:36:8d:08:76:6f: 7d:cd:32:5f:93:8c:0e:e1:da:68:31:2a:85:fd:06:52: d2:12:a2:97:5f:ff:1f:ff:91:06:7c:de:19:73:c1:bf: c8:e3:83:b8:43:ed:3b:e5:9b:ca:e7:b2:bd:15:9d:94: 58:0f:08:b0:f7:5b:90:d5:6c:6f:aa:ef:20:9e:be:c4: 86:4d:e6:5b:d0:bb:53:cf:75:14:d2:b5:d6:16:2f:1a: 3b:09:37:14:c1:90:2d:2b:88:34:ec:95:67:f8:3c:41: 7f:fd:5a:59:72:b8:c0:62:10:94:98:92:c9:c8:68:1f: 3e:3a:fc:b9:01:15:ca:69:45:6b:c5:ce:22:93:cf:30: de:bb:4d:3f:2b:34:86:43:15:0e:04:6d:fd:71:12:31 Fingerprint (SHA-256): 18:4B:91:26:F1:B3:60:F7:D3:2D:44:18:9D:EE:E6:38:61:21:D7:F8:3E:57:73:91:7B:36:B6:69:5F:82:C4:F0 Fingerprint (SHA1): 8D:E8:2E:CE:15:59:E9:8A:6D:B2:34:F4:56:6F:43:8E:D8:64:21:2F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1399: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034309 (0x3750ae05) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 04:04:54 2022 Not After : Wed Sep 28 04:04:54 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:0a:5b:a3:26:7b:74:73:56:2b:6a:7d:d1:f9:ac:35: 03:c5:1f:4c:e2:c6:63:47:d8:73:df:1f:9c:3f:2e:62: 06:90:f7:b1:84:de:c7:3f:b7:85:c6:05:8f:6d:2d:52: da:49:7b:f9:1b:9f:1a:87:92:b6:1d:88:40:ef:00:4f: 75:96:0d:00:cc:b9:df:11:db:a3:58:61:6a:db:78:8c: d8:01:78:5b:c7:2d:21:e8:37:81:09:83:99:e7:4a:fa: e3:80:c9:5e:8a:b9:0e:c8:5a:55:30:18:5b:31:6d:a9: 06:43:a8:42:48:b4:bb:f6:29:d6:8d:19:c5:79:39:cc: 1d:55:73:37:3a:60:33:12:5d:68:87:7b:3b:c9:84:98: 6e:b0:45:55:a1:c7:a2:af:5c:39:1f:7b:66:2d:d6:12: 07:a5:89:16:d6:fb:1e:23:18:59:97:90:92:b6:3b:de: 58:7f:23:51:ef:6e:67:21:a7:9a:bc:a5:aa:18:3f:17: 3e:2b:d1:0e:74:21:95:c7:02:79:24:92:c5:83:24:91: da:aa:81:b2:c7:1f:c4:c9:0c:fc:cd:a8:71:44:08:82: f1:8a:7e:df:d7:9b:c9:d9:18:31:5c:01:a6:06:f0:92: 0b:73:59:86:23:b1:67:a4:4c:ff:11:8b:d0:6f:5f:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:0d:5d:b6:17:f7:39:49:78:6b:96:df:aa:df:31:dd: 6e:55:e1:2b:d5:76:fc:e6:ed:8d:5a:e6:b3:43:2a:c3: d8:43:60:8c:72:7a:d9:a4:f4:9a:2f:12:4e:2b:d1:47: c5:3e:be:66:eb:c6:1a:8f:52:06:42:14:59:1d:e0:87: 74:89:7d:3e:7d:03:23:eb:c9:a2:1f:6a:fa:3c:9d:f4: 22:f3:a4:77:bf:ca:5f:0e:a5:53:c0:4b:06:90:4e:e2: ae:25:3b:9e:ec:65:de:12:2a:4c:a5:36:8d:08:76:6f: 7d:cd:32:5f:93:8c:0e:e1:da:68:31:2a:85:fd:06:52: d2:12:a2:97:5f:ff:1f:ff:91:06:7c:de:19:73:c1:bf: c8:e3:83:b8:43:ed:3b:e5:9b:ca:e7:b2:bd:15:9d:94: 58:0f:08:b0:f7:5b:90:d5:6c:6f:aa:ef:20:9e:be:c4: 86:4d:e6:5b:d0:bb:53:cf:75:14:d2:b5:d6:16:2f:1a: 3b:09:37:14:c1:90:2d:2b:88:34:ec:95:67:f8:3c:41: 7f:fd:5a:59:72:b8:c0:62:10:94:98:92:c9:c8:68:1f: 3e:3a:fc:b9:01:15:ca:69:45:6b:c5:ce:22:93:cf:30: de:bb:4d:3f:2b:34:86:43:15:0e:04:6d:fd:71:12:31 Fingerprint (SHA-256): 18:4B:91:26:F1:B3:60:F7:D3:2D:44:18:9D:EE:E6:38:61:21:D7:F8:3E:57:73:91:7B:36:B6:69:5F:82:C4:F0 Fingerprint (SHA1): 8D:E8:2E:CE:15:59:E9:8A:6D:B2:34:F4:56:6F:43:8E:D8:64:21:2F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1400: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034309 (0x3750ae05) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 04:04:54 2022 Not After : Wed Sep 28 04:04:54 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:0a:5b:a3:26:7b:74:73:56:2b:6a:7d:d1:f9:ac:35: 03:c5:1f:4c:e2:c6:63:47:d8:73:df:1f:9c:3f:2e:62: 06:90:f7:b1:84:de:c7:3f:b7:85:c6:05:8f:6d:2d:52: da:49:7b:f9:1b:9f:1a:87:92:b6:1d:88:40:ef:00:4f: 75:96:0d:00:cc:b9:df:11:db:a3:58:61:6a:db:78:8c: d8:01:78:5b:c7:2d:21:e8:37:81:09:83:99:e7:4a:fa: e3:80:c9:5e:8a:b9:0e:c8:5a:55:30:18:5b:31:6d:a9: 06:43:a8:42:48:b4:bb:f6:29:d6:8d:19:c5:79:39:cc: 1d:55:73:37:3a:60:33:12:5d:68:87:7b:3b:c9:84:98: 6e:b0:45:55:a1:c7:a2:af:5c:39:1f:7b:66:2d:d6:12: 07:a5:89:16:d6:fb:1e:23:18:59:97:90:92:b6:3b:de: 58:7f:23:51:ef:6e:67:21:a7:9a:bc:a5:aa:18:3f:17: 3e:2b:d1:0e:74:21:95:c7:02:79:24:92:c5:83:24:91: da:aa:81:b2:c7:1f:c4:c9:0c:fc:cd:a8:71:44:08:82: f1:8a:7e:df:d7:9b:c9:d9:18:31:5c:01:a6:06:f0:92: 0b:73:59:86:23:b1:67:a4:4c:ff:11:8b:d0:6f:5f:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:0d:5d:b6:17:f7:39:49:78:6b:96:df:aa:df:31:dd: 6e:55:e1:2b:d5:76:fc:e6:ed:8d:5a:e6:b3:43:2a:c3: d8:43:60:8c:72:7a:d9:a4:f4:9a:2f:12:4e:2b:d1:47: c5:3e:be:66:eb:c6:1a:8f:52:06:42:14:59:1d:e0:87: 74:89:7d:3e:7d:03:23:eb:c9:a2:1f:6a:fa:3c:9d:f4: 22:f3:a4:77:bf:ca:5f:0e:a5:53:c0:4b:06:90:4e:e2: ae:25:3b:9e:ec:65:de:12:2a:4c:a5:36:8d:08:76:6f: 7d:cd:32:5f:93:8c:0e:e1:da:68:31:2a:85:fd:06:52: d2:12:a2:97:5f:ff:1f:ff:91:06:7c:de:19:73:c1:bf: c8:e3:83:b8:43:ed:3b:e5:9b:ca:e7:b2:bd:15:9d:94: 58:0f:08:b0:f7:5b:90:d5:6c:6f:aa:ef:20:9e:be:c4: 86:4d:e6:5b:d0:bb:53:cf:75:14:d2:b5:d6:16:2f:1a: 3b:09:37:14:c1:90:2d:2b:88:34:ec:95:67:f8:3c:41: 7f:fd:5a:59:72:b8:c0:62:10:94:98:92:c9:c8:68:1f: 3e:3a:fc:b9:01:15:ca:69:45:6b:c5:ce:22:93:cf:30: de:bb:4d:3f:2b:34:86:43:15:0e:04:6d:fd:71:12:31 Fingerprint (SHA-256): 18:4B:91:26:F1:B3:60:F7:D3:2D:44:18:9D:EE:E6:38:61:21:D7:F8:3E:57:73:91:7B:36:B6:69:5F:82:C4:F0 Fingerprint (SHA1): 8D:E8:2E:CE:15:59:E9:8A:6D:B2:34:F4:56:6F:43:8E:D8:64:21:2F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1401: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034309 (0x3750ae05) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 04:04:54 2022 Not After : Wed Sep 28 04:04:54 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:0a:5b:a3:26:7b:74:73:56:2b:6a:7d:d1:f9:ac:35: 03:c5:1f:4c:e2:c6:63:47:d8:73:df:1f:9c:3f:2e:62: 06:90:f7:b1:84:de:c7:3f:b7:85:c6:05:8f:6d:2d:52: da:49:7b:f9:1b:9f:1a:87:92:b6:1d:88:40:ef:00:4f: 75:96:0d:00:cc:b9:df:11:db:a3:58:61:6a:db:78:8c: d8:01:78:5b:c7:2d:21:e8:37:81:09:83:99:e7:4a:fa: e3:80:c9:5e:8a:b9:0e:c8:5a:55:30:18:5b:31:6d:a9: 06:43:a8:42:48:b4:bb:f6:29:d6:8d:19:c5:79:39:cc: 1d:55:73:37:3a:60:33:12:5d:68:87:7b:3b:c9:84:98: 6e:b0:45:55:a1:c7:a2:af:5c:39:1f:7b:66:2d:d6:12: 07:a5:89:16:d6:fb:1e:23:18:59:97:90:92:b6:3b:de: 58:7f:23:51:ef:6e:67:21:a7:9a:bc:a5:aa:18:3f:17: 3e:2b:d1:0e:74:21:95:c7:02:79:24:92:c5:83:24:91: da:aa:81:b2:c7:1f:c4:c9:0c:fc:cd:a8:71:44:08:82: f1:8a:7e:df:d7:9b:c9:d9:18:31:5c:01:a6:06:f0:92: 0b:73:59:86:23:b1:67:a4:4c:ff:11:8b:d0:6f:5f:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:0d:5d:b6:17:f7:39:49:78:6b:96:df:aa:df:31:dd: 6e:55:e1:2b:d5:76:fc:e6:ed:8d:5a:e6:b3:43:2a:c3: d8:43:60:8c:72:7a:d9:a4:f4:9a:2f:12:4e:2b:d1:47: c5:3e:be:66:eb:c6:1a:8f:52:06:42:14:59:1d:e0:87: 74:89:7d:3e:7d:03:23:eb:c9:a2:1f:6a:fa:3c:9d:f4: 22:f3:a4:77:bf:ca:5f:0e:a5:53:c0:4b:06:90:4e:e2: ae:25:3b:9e:ec:65:de:12:2a:4c:a5:36:8d:08:76:6f: 7d:cd:32:5f:93:8c:0e:e1:da:68:31:2a:85:fd:06:52: d2:12:a2:97:5f:ff:1f:ff:91:06:7c:de:19:73:c1:bf: c8:e3:83:b8:43:ed:3b:e5:9b:ca:e7:b2:bd:15:9d:94: 58:0f:08:b0:f7:5b:90:d5:6c:6f:aa:ef:20:9e:be:c4: 86:4d:e6:5b:d0:bb:53:cf:75:14:d2:b5:d6:16:2f:1a: 3b:09:37:14:c1:90:2d:2b:88:34:ec:95:67:f8:3c:41: 7f:fd:5a:59:72:b8:c0:62:10:94:98:92:c9:c8:68:1f: 3e:3a:fc:b9:01:15:ca:69:45:6b:c5:ce:22:93:cf:30: de:bb:4d:3f:2b:34:86:43:15:0e:04:6d:fd:71:12:31 Fingerprint (SHA-256): 18:4B:91:26:F1:B3:60:F7:D3:2D:44:18:9D:EE:E6:38:61:21:D7:F8:3E:57:73:91:7B:36:B6:69:5F:82:C4:F0 Fingerprint (SHA1): 8D:E8:2E:CE:15:59:E9:8A:6D:B2:34:F4:56:6F:43:8E:D8:64:21:2F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1402: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034309 (0x3750ae05) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 04:04:54 2022 Not After : Wed Sep 28 04:04:54 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:0a:5b:a3:26:7b:74:73:56:2b:6a:7d:d1:f9:ac:35: 03:c5:1f:4c:e2:c6:63:47:d8:73:df:1f:9c:3f:2e:62: 06:90:f7:b1:84:de:c7:3f:b7:85:c6:05:8f:6d:2d:52: da:49:7b:f9:1b:9f:1a:87:92:b6:1d:88:40:ef:00:4f: 75:96:0d:00:cc:b9:df:11:db:a3:58:61:6a:db:78:8c: d8:01:78:5b:c7:2d:21:e8:37:81:09:83:99:e7:4a:fa: e3:80:c9:5e:8a:b9:0e:c8:5a:55:30:18:5b:31:6d:a9: 06:43:a8:42:48:b4:bb:f6:29:d6:8d:19:c5:79:39:cc: 1d:55:73:37:3a:60:33:12:5d:68:87:7b:3b:c9:84:98: 6e:b0:45:55:a1:c7:a2:af:5c:39:1f:7b:66:2d:d6:12: 07:a5:89:16:d6:fb:1e:23:18:59:97:90:92:b6:3b:de: 58:7f:23:51:ef:6e:67:21:a7:9a:bc:a5:aa:18:3f:17: 3e:2b:d1:0e:74:21:95:c7:02:79:24:92:c5:83:24:91: da:aa:81:b2:c7:1f:c4:c9:0c:fc:cd:a8:71:44:08:82: f1:8a:7e:df:d7:9b:c9:d9:18:31:5c:01:a6:06:f0:92: 0b:73:59:86:23:b1:67:a4:4c:ff:11:8b:d0:6f:5f:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:0d:5d:b6:17:f7:39:49:78:6b:96:df:aa:df:31:dd: 6e:55:e1:2b:d5:76:fc:e6:ed:8d:5a:e6:b3:43:2a:c3: d8:43:60:8c:72:7a:d9:a4:f4:9a:2f:12:4e:2b:d1:47: c5:3e:be:66:eb:c6:1a:8f:52:06:42:14:59:1d:e0:87: 74:89:7d:3e:7d:03:23:eb:c9:a2:1f:6a:fa:3c:9d:f4: 22:f3:a4:77:bf:ca:5f:0e:a5:53:c0:4b:06:90:4e:e2: ae:25:3b:9e:ec:65:de:12:2a:4c:a5:36:8d:08:76:6f: 7d:cd:32:5f:93:8c:0e:e1:da:68:31:2a:85:fd:06:52: d2:12:a2:97:5f:ff:1f:ff:91:06:7c:de:19:73:c1:bf: c8:e3:83:b8:43:ed:3b:e5:9b:ca:e7:b2:bd:15:9d:94: 58:0f:08:b0:f7:5b:90:d5:6c:6f:aa:ef:20:9e:be:c4: 86:4d:e6:5b:d0:bb:53:cf:75:14:d2:b5:d6:16:2f:1a: 3b:09:37:14:c1:90:2d:2b:88:34:ec:95:67:f8:3c:41: 7f:fd:5a:59:72:b8:c0:62:10:94:98:92:c9:c8:68:1f: 3e:3a:fc:b9:01:15:ca:69:45:6b:c5:ce:22:93:cf:30: de:bb:4d:3f:2b:34:86:43:15:0e:04:6d:fd:71:12:31 Fingerprint (SHA-256): 18:4B:91:26:F1:B3:60:F7:D3:2D:44:18:9D:EE:E6:38:61:21:D7:F8:3E:57:73:91:7B:36:B6:69:5F:82:C4:F0 Fingerprint (SHA1): 8D:E8:2E:CE:15:59:E9:8A:6D:B2:34:F4:56:6F:43:8E:D8:64:21:2F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1403: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034309 (0x3750ae05) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 04:04:54 2022 Not After : Wed Sep 28 04:04:54 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:0a:5b:a3:26:7b:74:73:56:2b:6a:7d:d1:f9:ac:35: 03:c5:1f:4c:e2:c6:63:47:d8:73:df:1f:9c:3f:2e:62: 06:90:f7:b1:84:de:c7:3f:b7:85:c6:05:8f:6d:2d:52: da:49:7b:f9:1b:9f:1a:87:92:b6:1d:88:40:ef:00:4f: 75:96:0d:00:cc:b9:df:11:db:a3:58:61:6a:db:78:8c: d8:01:78:5b:c7:2d:21:e8:37:81:09:83:99:e7:4a:fa: e3:80:c9:5e:8a:b9:0e:c8:5a:55:30:18:5b:31:6d:a9: 06:43:a8:42:48:b4:bb:f6:29:d6:8d:19:c5:79:39:cc: 1d:55:73:37:3a:60:33:12:5d:68:87:7b:3b:c9:84:98: 6e:b0:45:55:a1:c7:a2:af:5c:39:1f:7b:66:2d:d6:12: 07:a5:89:16:d6:fb:1e:23:18:59:97:90:92:b6:3b:de: 58:7f:23:51:ef:6e:67:21:a7:9a:bc:a5:aa:18:3f:17: 3e:2b:d1:0e:74:21:95:c7:02:79:24:92:c5:83:24:91: da:aa:81:b2:c7:1f:c4:c9:0c:fc:cd:a8:71:44:08:82: f1:8a:7e:df:d7:9b:c9:d9:18:31:5c:01:a6:06:f0:92: 0b:73:59:86:23:b1:67:a4:4c:ff:11:8b:d0:6f:5f:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:0d:5d:b6:17:f7:39:49:78:6b:96:df:aa:df:31:dd: 6e:55:e1:2b:d5:76:fc:e6:ed:8d:5a:e6:b3:43:2a:c3: d8:43:60:8c:72:7a:d9:a4:f4:9a:2f:12:4e:2b:d1:47: c5:3e:be:66:eb:c6:1a:8f:52:06:42:14:59:1d:e0:87: 74:89:7d:3e:7d:03:23:eb:c9:a2:1f:6a:fa:3c:9d:f4: 22:f3:a4:77:bf:ca:5f:0e:a5:53:c0:4b:06:90:4e:e2: ae:25:3b:9e:ec:65:de:12:2a:4c:a5:36:8d:08:76:6f: 7d:cd:32:5f:93:8c:0e:e1:da:68:31:2a:85:fd:06:52: d2:12:a2:97:5f:ff:1f:ff:91:06:7c:de:19:73:c1:bf: c8:e3:83:b8:43:ed:3b:e5:9b:ca:e7:b2:bd:15:9d:94: 58:0f:08:b0:f7:5b:90:d5:6c:6f:aa:ef:20:9e:be:c4: 86:4d:e6:5b:d0:bb:53:cf:75:14:d2:b5:d6:16:2f:1a: 3b:09:37:14:c1:90:2d:2b:88:34:ec:95:67:f8:3c:41: 7f:fd:5a:59:72:b8:c0:62:10:94:98:92:c9:c8:68:1f: 3e:3a:fc:b9:01:15:ca:69:45:6b:c5:ce:22:93:cf:30: de:bb:4d:3f:2b:34:86:43:15:0e:04:6d:fd:71:12:31 Fingerprint (SHA-256): 18:4B:91:26:F1:B3:60:F7:D3:2D:44:18:9D:EE:E6:38:61:21:D7:F8:3E:57:73:91:7B:36:B6:69:5F:82:C4:F0 Fingerprint (SHA1): 8D:E8:2E:CE:15:59:E9:8A:6D:B2:34:F4:56:6F:43:8E:D8:64:21:2F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1404: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1405: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1406: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034339 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1407: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1408: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #1409: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1410: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 928034340 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1411: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1412: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #1413: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1414: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 928034341 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1415: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1416: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #1417: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1418: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 928034342 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1419: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1420: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #1421: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1422: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 928034343 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1423: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1424: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #1425: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1426: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 928034344 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1427: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1428: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #1429: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1430: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 928034345 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1431: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1432: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1433: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034339 (0x3750ae23) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:07:54 2022 Not After : Wed Sep 28 04:07:54 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:5d:2e:2f:3d:d4:a2:cb:69:91:ba:9f:f0:df:f0:73: dd:14:bf:fa:30:b3:0f:40:b0:11:6f:50:9a:fd:12:a6: 34:98:df:c1:1c:38:85:54:a3:79:ad:a9:f0:9d:37:ac: b8:fc:19:b5:cc:de:a0:68:b1:0f:ec:61:7e:55:59:70: 8c:07:d0:28:a3:c8:40:ab:b2:94:36:d5:7d:06:9e:99: c8:86:d0:38:29:9a:42:ec:f0:2f:8c:94:09:0d:1c:b7: 72:ac:bf:4d:23:e0:47:d6:db:25:16:70:83:20:cf:2e: 88:88:9e:47:50:06:a6:e5:b5:2c:d6:ff:27:7e:7c:eb: 32:ec:5a:b6:72:08:31:8f:23:dc:ef:4a:6f:9a:55:5d: e4:79:d1:e5:fb:74:60:6e:41:12:77:8d:d6:e4:16:33: 39:87:7d:1f:06:03:2b:05:9b:4f:74:61:02:30:8f:3a: db:2b:73:d0:2e:f6:4e:0b:7c:dd:f5:92:6b:6c:1f:65: 77:ee:c4:d5:ca:c8:24:01:9d:00:f9:5c:fa:78:20:1b: 04:a4:8b:e3:fd:cf:39:65:aa:e3:63:ab:a3:54:ba:fd: 5d:e8:13:76:34:15:da:90:c6:bf:fc:62:70:fd:06:64: 0f:38:3e:1b:6d:00:a2:bc:be:fb:c7:fb:37:e0:80:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:2f:32:38:0f:07:93:28:00:02:b5:4e:4a:2b:2b:9f: ea:8c:48:07:97:05:4a:42:ec:4d:81:4f:df:a8:d6:0d: 98:5a:8b:a2:4a:2f:2b:37:0f:d6:22:99:2c:f2:22:5f: cd:d3:40:ba:7f:29:b4:31:65:1c:19:f0:3b:98:a0:ad: 9f:71:de:a4:59:21:ec:eb:17:0d:05:74:7f:0c:44:8f: 6d:c7:6f:ef:15:9a:bc:dd:93:e9:d4:da:50:3b:53:38: 80:91:96:16:c3:37:e3:33:d6:3e:67:e7:eb:15:b0:5e: a4:d8:c6:73:e7:3f:7e:d8:0a:dd:a4:47:8f:8a:9a:5d: 88:e9:c6:b4:5d:ef:ad:d4:6f:97:8a:3c:07:fa:fc:e9: 57:f1:76:5f:c2:e7:5d:f8:fa:be:09:5d:0f:30:ae:f3: 05:43:85:fe:c0:f5:2c:e7:1f:6b:21:73:8b:31:68:66: 1c:7f:2c:0b:af:f2:23:7f:41:75:78:53:50:ba:49:cd: a9:57:f0:11:12:06:d2:7d:95:67:c3:a4:98:62:b9:dc: 8b:89:d1:64:02:75:7c:62:45:1e:ef:c6:e1:63:dc:b9: df:dc:16:13:c7:cf:9b:94:bb:7b:fa:39:b0:d8:10:70: 32:d4:78:e0:13:12:16:0b:1c:16:ca:c1:89:5c:74:ac Fingerprint (SHA-256): 7C:B2:0B:16:B7:B0:AE:0C:4C:F8:24:29:2B:0F:F1:BB:BE:74:AD:A4:7B:0D:4D:75:E9:38:80:80:5D:F6:97:2A Fingerprint (SHA1): C0:B6:CE:A8:1E:3E:3C:45:6F:18:C6:9A:27:C7:2F:21:28:56:C1:98 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1434: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1435: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1436: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1437: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034339 (0x3750ae23) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:07:54 2022 Not After : Wed Sep 28 04:07:54 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:5d:2e:2f:3d:d4:a2:cb:69:91:ba:9f:f0:df:f0:73: dd:14:bf:fa:30:b3:0f:40:b0:11:6f:50:9a:fd:12:a6: 34:98:df:c1:1c:38:85:54:a3:79:ad:a9:f0:9d:37:ac: b8:fc:19:b5:cc:de:a0:68:b1:0f:ec:61:7e:55:59:70: 8c:07:d0:28:a3:c8:40:ab:b2:94:36:d5:7d:06:9e:99: c8:86:d0:38:29:9a:42:ec:f0:2f:8c:94:09:0d:1c:b7: 72:ac:bf:4d:23:e0:47:d6:db:25:16:70:83:20:cf:2e: 88:88:9e:47:50:06:a6:e5:b5:2c:d6:ff:27:7e:7c:eb: 32:ec:5a:b6:72:08:31:8f:23:dc:ef:4a:6f:9a:55:5d: e4:79:d1:e5:fb:74:60:6e:41:12:77:8d:d6:e4:16:33: 39:87:7d:1f:06:03:2b:05:9b:4f:74:61:02:30:8f:3a: db:2b:73:d0:2e:f6:4e:0b:7c:dd:f5:92:6b:6c:1f:65: 77:ee:c4:d5:ca:c8:24:01:9d:00:f9:5c:fa:78:20:1b: 04:a4:8b:e3:fd:cf:39:65:aa:e3:63:ab:a3:54:ba:fd: 5d:e8:13:76:34:15:da:90:c6:bf:fc:62:70:fd:06:64: 0f:38:3e:1b:6d:00:a2:bc:be:fb:c7:fb:37:e0:80:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:2f:32:38:0f:07:93:28:00:02:b5:4e:4a:2b:2b:9f: ea:8c:48:07:97:05:4a:42:ec:4d:81:4f:df:a8:d6:0d: 98:5a:8b:a2:4a:2f:2b:37:0f:d6:22:99:2c:f2:22:5f: cd:d3:40:ba:7f:29:b4:31:65:1c:19:f0:3b:98:a0:ad: 9f:71:de:a4:59:21:ec:eb:17:0d:05:74:7f:0c:44:8f: 6d:c7:6f:ef:15:9a:bc:dd:93:e9:d4:da:50:3b:53:38: 80:91:96:16:c3:37:e3:33:d6:3e:67:e7:eb:15:b0:5e: a4:d8:c6:73:e7:3f:7e:d8:0a:dd:a4:47:8f:8a:9a:5d: 88:e9:c6:b4:5d:ef:ad:d4:6f:97:8a:3c:07:fa:fc:e9: 57:f1:76:5f:c2:e7:5d:f8:fa:be:09:5d:0f:30:ae:f3: 05:43:85:fe:c0:f5:2c:e7:1f:6b:21:73:8b:31:68:66: 1c:7f:2c:0b:af:f2:23:7f:41:75:78:53:50:ba:49:cd: a9:57:f0:11:12:06:d2:7d:95:67:c3:a4:98:62:b9:dc: 8b:89:d1:64:02:75:7c:62:45:1e:ef:c6:e1:63:dc:b9: df:dc:16:13:c7:cf:9b:94:bb:7b:fa:39:b0:d8:10:70: 32:d4:78:e0:13:12:16:0b:1c:16:ca:c1:89:5c:74:ac Fingerprint (SHA-256): 7C:B2:0B:16:B7:B0:AE:0C:4C:F8:24:29:2B:0F:F1:BB:BE:74:AD:A4:7B:0D:4D:75:E9:38:80:80:5D:F6:97:2A Fingerprint (SHA1): C0:B6:CE:A8:1E:3E:3C:45:6F:18:C6:9A:27:C7:2F:21:28:56:C1:98 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1438: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1439: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1440: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1441: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034346 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1442: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1443: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1444: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1445: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 928034347 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1446: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1447: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1448: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1449: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 928034348 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1450: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1451: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1452: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1453: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 928034349 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1454: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1455: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1456: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1457: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1458: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1459: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034346 (0x3750ae2a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:08:39 2022 Not After : Wed Sep 28 04:08:39 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:f3:b9:69:3a:0a:9a:4b:61:e4:6b:e6:9a:68:8c:7d: ee:9e:f7:7f:63:07:d0:7c:cb:b8:63:6d:9d:ec:28:16: 88:ff:d1:72:f4:ef:20:48:d1:3e:1e:34:ec:f4:82:fa: f3:a3:c3:58:36:fe:8e:14:18:c4:f9:05:90:fd:9c:55: 0d:d7:15:96:b8:e8:5b:23:56:0a:19:91:01:de:64:69: 31:d1:9c:73:88:c8:25:c6:63:2a:e6:3c:44:0d:55:08: 4e:85:6e:86:11:f2:da:02:2b:27:64:02:f5:16:fc:95: 7c:6d:85:52:7f:9e:9e:30:75:3f:bc:3c:57:1e:e9:79: e8:8c:87:f2:48:2e:f8:c3:22:ae:fe:81:b1:31:04:b9: 2c:e8:96:fe:ed:9a:6e:0b:14:53:b2:4a:dd:69:0b:cb: 36:07:21:43:fe:34:a9:ef:86:4a:b1:9a:2b:a2:e9:57: 69:3d:19:39:ca:65:d3:81:b6:01:25:94:7c:75:8a:28: 5c:1a:18:f4:e6:cc:6e:2e:f0:e5:7f:0b:da:41:06:39: 66:dc:1e:cf:89:d1:a5:70:0e:77:fe:dc:0e:61:e9:42: 11:98:3c:5b:32:23:a7:7f:ae:25:d7:60:29:bf:1b:f1: bf:db:02:ce:2f:c5:dc:aa:4b:e8:8a:b9:ac:08:c1:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 55:4b:5a:f4:a2:15:df:58:b5:69:55:76:5a:2e:87:40: c6:31:ba:c1:ef:81:52:54:a9:4c:e7:7e:e0:25:f6:1d: 3d:9b:3e:ac:9c:6a:57:ba:22:6d:b1:fb:cd:62:35:7f: cd:37:a6:d8:84:0f:a9:fd:32:5c:4f:8c:01:74:85:97: 6b:97:44:41:22:da:9d:f5:0f:cb:01:92:94:27:ea:2a: 42:46:72:a8:b0:7f:a3:07:a8:86:ca:d6:93:6d:54:b0: 4d:58:31:6c:a1:94:ce:29:40:b8:ac:c8:fd:24:d5:7b: 3b:11:e0:1d:b3:84:1d:30:c5:85:06:27:35:be:f3:13: 24:92:2c:5e:9d:d1:c3:08:47:5a:0d:41:ca:22:9b:70: 46:d0:05:f0:db:73:e0:34:b8:46:93:82:da:ed:d3:06: cd:cf:8b:5d:77:13:00:85:1d:50:e5:1d:71:1b:ea:d4: 3b:58:68:36:af:1b:80:2b:58:bf:25:93:70:2c:98:ee: fb:64:67:f7:98:7c:a1:7e:da:e9:35:56:cb:e5:46:7f: c5:2b:f3:d9:2a:94:ff:6a:8c:1e:f6:2f:59:c4:22:cc: 41:aa:97:2f:9b:22:1a:ad:a0:69:3c:c2:bf:38:2b:f4: 0d:47:4b:c1:26:64:24:ab:89:ab:0e:4f:3e:a2:6c:7d Fingerprint (SHA-256): 9A:A7:5F:DB:A3:B9:49:4B:14:98:BF:6E:2A:E9:58:9B:A4:06:9D:A9:71:1B:9B:05:FF:E3:43:C8:47:E1:30:98 Fingerprint (SHA1): DC:DD:2A:2D:C5:8E:B0:B7:DD:37:F0:3E:83:12:AE:42:F0:12:4A:61 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1460: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1461: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1462: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034347 (0x3750ae2b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:08:44 2022 Not After : Tue Sep 28 04:08:44 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:db:8f:f0:6d:a0:19:b8:c6:bc:a2:8a:dc:62:f9:4a: 1e:6c:6c:65:22:76:2b:97:7a:d5:c8:a3:9f:29:e7:c7: 22:48:23:9c:9f:fe:04:05:c3:49:6f:af:4f:f9:1e:83: 30:f8:17:16:ab:a9:09:11:f4:46:db:24:43:82:d7:6f: 97:8d:c9:bf:26:36:4e:c7:53:fc:ba:16:e1:14:1d:3c: 16:fd:90:4f:43:09:dc:a4:de:77:8f:64:b6:c9:ed:de: ab:c1:70:d8:dd:26:3e:a3:3a:2b:d3:a4:d4:fe:97:28: ca:c4:c3:16:f0:0c:3a:49:db:f1:81:22:fd:3e:da:51: 31:fe:c4:73:a3:f1:c2:b7:9e:99:b7:8c:1f:fd:31:4d: bb:17:52:a1:17:ce:3d:fc:04:8c:72:ec:f5:a2:1c:e8: 3b:8e:e2:cb:69:a0:df:27:d8:29:f1:cf:70:c9:6f:ed: 58:cf:cc:6c:4b:25:1e:b6:59:29:ca:19:13:17:55:06: 82:24:75:33:27:32:14:b2:95:3e:5d:bb:99:52:3a:8a: 58:94:55:ea:ac:b6:b3:af:ff:18:04:f5:11:d4:a5:af: 52:05:7f:0c:79:3a:c0:2c:80:7d:91:2c:f1:1c:df:c2: 17:03:6d:3e:88:db:1f:d2:78:8c:9a:93:14:0e:69:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:6a:e3:3d:83:a5:cc:e2:b7:1e:4b:ff:aa:1c:d4:e9: 03:f3:7f:ee:7d:08:99:c8:61:41:bf:c5:c5:03:60:6c: db:23:c3:4b:13:5e:5d:d9:fd:4c:3f:97:b5:25:52:94: 3a:73:bc:0a:30:a9:87:85:65:ea:73:49:6e:81:f0:17: 37:4a:b2:5a:37:9a:4c:05:b9:3b:83:77:38:31:e2:55: 0e:66:56:74:5c:6b:ef:ff:86:e0:b4:4a:bd:2d:90:1f: e4:79:92:05:53:68:12:de:41:08:4c:12:79:99:86:57: 61:07:c9:4d:75:cc:43:ef:62:9c:2e:57:78:8c:3a:3e: 19:91:e3:13:a6:43:dc:91:4a:51:e4:ad:7d:56:cb:f6: 25:29:96:c0:75:2d:d5:5f:67:af:da:8e:31:02:50:22: 60:7e:c6:f5:93:2f:3f:13:5c:b0:ea:a3:e5:ba:89:63: 61:29:82:2f:f6:64:94:44:6e:6b:ac:8a:2e:aa:e2:f9: b3:c7:52:96:6b:fb:2e:14:59:70:0a:8e:c9:89:a5:76: 5e:cd:70:ce:42:51:6e:73:c4:96:1a:22:3a:31:39:cc: e7:bc:59:4b:51:98:20:cd:42:5c:6a:f9:03:77:b5:ca: ac:ef:d2:dd:a0:c3:71:19:db:7a:c0:e7:5d:7f:07:96 Fingerprint (SHA-256): 31:69:0E:30:4B:EE:59:F5:04:D3:6E:19:6A:24:37:6E:D6:90:4A:C7:B5:61:C6:FC:D4:57:0A:22:BC:A1:39:92 Fingerprint (SHA1): C9:D8:83:02:8F:69:4E:8E:BF:29:96:37:D8:3D:C3:52:ED:46:74:58 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1463: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1464: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034348 (0x3750ae2c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Sep 28 04:08:49 2022 Not After : Tue Sep 28 04:08:49 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:b8:a9:cd:9a:b6:0f:41:a1:99:49:f4:50:fc:21:44: b6:74:66:a8:53:9c:8e:c8:82:6e:4e:69:eb:fa:4d:12: 4c:1f:69:73:a2:c2:05:a5:53:d3:2b:28:aa:43:89:e4: 20:26:f4:f6:1f:87:1f:59:a8:62:d4:9f:8a:f3:88:dc: 1a:bd:a3:3a:f7:a9:04:83:c8:f4:31:96:76:8e:2a:4c: 2f:48:3b:1c:0b:2a:94:8a:a7:42:3d:56:db:20:c9:64: a1:bd:26:26:de:97:46:29:ea:e4:9c:a6:96:24:19:36: 1d:ff:72:99:dd:78:3f:02:f6:f1:fa:e7:c2:84:23:bd: 8a:e8:da:f0:75:c1:68:04:8a:90:f9:a9:4b:f3:ae:6f: 8b:5a:11:4c:fc:a1:92:94:ee:85:da:25:4a:63:bc:74: 63:94:ab:57:22:a6:52:d5:dd:fe:0b:18:24:2a:0e:f8: 85:39:c3:01:4c:5c:44:fd:7a:e7:16:de:4f:e2:73:97: e9:82:ca:cb:18:db:1a:a1:67:46:bb:6a:4b:f5:9a:56: ad:39:9d:20:37:35:6f:d7:3f:41:e0:9c:ac:7d:75:20: 79:7f:d3:59:eb:bf:51:71:23:da:c8:f1:6a:64:78:3e: 90:f1:1e:a4:3c:b8:f9:63:63:62:65:7a:74:06:5f:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:27:c9:ff:5d:b7:68:e1:ad:4f:a0:d3:54:cd:a9:f3: 62:39:66:32:f7:2d:75:40:95:1e:1f:1a:7f:9c:de:b9: f1:42:c9:cf:f3:1e:23:2f:81:e8:8b:49:38:86:e3:22: 42:34:27:bf:4c:b8:55:a0:23:8d:e0:49:ca:09:04:e7: bc:25:24:ae:8f:7f:df:66:59:88:53:fb:dc:83:50:3a: 14:12:89:26:df:5c:76:b4:35:a1:9e:e7:c9:e5:d5:fe: 56:0d:82:03:e5:e1:f3:b0:59:a4:29:ee:19:23:78:55: 89:83:76:e4:77:ac:27:dc:69:58:d9:2f:93:56:c7:0c: a7:7a:8a:65:06:02:59:de:73:df:20:76:07:af:52:7e: 7f:45:84:74:c2:c8:4e:88:76:55:69:fe:1a:2a:15:ec: 93:61:3c:69:49:84:d8:ec:e1:e2:9b:92:6b:91:59:18: d5:8a:49:b6:e2:79:4c:82:99:78:a3:a1:31:64:d8:5a: 82:67:72:dc:0f:71:80:13:4a:54:b1:51:0f:53:97:48: c8:f9:91:c2:d2:ab:22:74:9a:d2:dd:ab:b3:2d:a2:4a: 6d:70:85:33:19:73:09:e0:e1:ab:18:fc:7e:05:b4:25: 04:57:3f:70:08:d8:5c:1c:e7:2c:8f:b3:4a:53:63:b0 Fingerprint (SHA-256): 70:08:B7:2B:4D:B1:AE:66:29:16:74:70:C1:9E:79:78:0B:19:CF:91:23:92:93:60:70:70:1E:63:D6:31:5B:D9 Fingerprint (SHA1): A9:64:24:BA:CF:0F:84:D6:A9:10:BE:F1:AB:DA:08:89:A4:47:16:C2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1465: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1466: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034350 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1467: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1468: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1469: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1470: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 928034351 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1471: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1472: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1473: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1474: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 928034352 --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1475: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1476: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1477: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1478: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 928034353 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1479: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1480: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1481: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1482: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 928034354 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1483: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1484: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1485: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1486: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1487: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1488: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #1489: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034350 (0x3750ae2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:09:04 2022 Not After : Wed Sep 28 04:09:04 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:19:f1:11:5f:34:8e:84:b6:75:18:9b:54:c2:be:ee: b8:74:ce:cd:ee:66:19:56:9d:60:9b:c4:dd:ab:cd:91: fe:00:0a:03:41:88:bd:dc:04:6c:d2:d4:47:9d:f6:4a: 92:00:d1:3e:0d:9e:00:4d:1a:39:ce:d3:d3:1f:04:a4: ae:c7:29:89:25:6a:6c:81:d4:84:ec:e8:92:e3:fe:a9: b0:9f:e7:27:1c:a3:b6:95:bf:23:c6:49:5b:97:d0:85: 09:cb:00:1e:b8:61:0b:7f:8f:e9:ae:23:45:7b:76:7a: d9:07:67:24:8c:a1:ae:3d:93:60:86:d2:78:ec:3a:05: 30:72:33:be:c0:dc:b8:25:c7:7b:22:d4:27:99:23:eb: c4:95:11:5a:76:7b:c9:25:21:c0:2f:6e:0c:5c:a1:75: 20:0a:e6:16:69:69:2a:21:b9:9c:49:8e:50:29:29:38: d5:30:2d:13:e0:75:9b:76:6a:71:c2:76:d1:13:21:62: b0:0d:8b:17:86:a4:d5:c8:a7:12:85:7b:eb:14:81:fa: e2:22:5e:0f:be:c7:e5:6f:7b:c7:c4:85:96:40:70:bc: b3:06:27:a3:af:7d:7c:a6:b9:47:a5:c1:23:3b:7d:ac: 4b:b2:0c:7d:dd:e6:d8:16:c4:d6:77:78:06:5c:32:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:2d:06:2b:c4:67:a2:a9:30:20:05:4d:7d:15:57:18: a2:65:ff:78:be:60:09:6a:d9:87:51:5f:7e:a3:f2:29: da:53:1c:37:75:2b:20:f3:ff:47:df:e7:a6:d3:88:4e: 15:44:73:d3:4e:58:6b:6e:92:44:3f:9b:21:a9:59:84: 4d:42:30:23:eb:d7:d7:da:8f:3e:d1:10:97:01:78:90: 1d:1e:37:7a:89:45:a0:27:35:4c:23:b1:3b:81:c3:33: b5:19:a5:3e:6f:f3:03:3b:2f:b4:ae:d9:1a:13:e5:52: a5:f7:8a:34:6a:b2:f7:8b:d3:68:64:f8:14:59:8b:93: e4:d4:46:86:19:be:38:1f:83:3f:13:8d:99:14:eb:52: a4:32:72:0f:4a:75:a3:48:62:57:94:0b:84:48:9b:0a: 2d:80:a3:fa:f1:30:3e:3b:ff:db:55:1a:6f:3c:27:f2: 0c:f2:2d:1e:de:2d:bf:63:ca:2f:4a:df:12:73:31:30: 26:63:27:d5:c2:2e:58:81:07:1f:46:c5:1b:36:aa:7c: 1e:de:3e:a5:7e:d6:ca:a0:01:cf:b8:1e:7d:e2:67:b0: f8:2e:38:58:82:cb:fd:7e:3b:92:cb:86:55:72:6b:d5: d6:bd:a2:ae:a2:79:54:17:65:1e:bc:80:85:eb:c2:8c Fingerprint (SHA-256): F2:8B:0C:6B:23:F4:71:4F:94:45:A6:DA:61:E6:E7:80:A4:77:FB:5C:2E:44:C4:4B:6A:9D:24:68:9E:FA:D7:64 Fingerprint (SHA1): 56:1F:F8:37:38:31:3B:85:93:EF:3F:AF:B0:4A:C9:66:70:25:F2:48 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1490: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1491: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034351 (0x3750ae2f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:09:08 2022 Not After : Tue Sep 28 04:09:08 2027 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:6c:45:38:41:6b:9c:3b:94:43:84:fa:62:7c:8d:16: 06:53:a0:3b:35:52:d8:4f:d0:fa:6b:61:3e:d8:da:0e: 96:b5:58:c3:1f:b8:2a:b6:26:1f:11:4b:53:77:48:fe: 25:f3:52:89:16:d2:e1:18:a2:b5:d7:c7:82:64:d1:4e: 5a:36:38:00:58:a4:d4:67:bb:cf:55:82:d1:22:0c:de: ae:71:e5:c1:a4:a5:6c:ae:96:8c:8b:e0:94:9e:89:a3: da:58:9c:89:30:e6:2a:fb:63:d0:8d:63:cc:35:a4:54: b3:77:fc:54:7c:7f:3b:e0:2a:b4:dd:f4:3e:18:43:43: ce:32:a8:32:ff:66:68:eb:56:33:21:fb:18:c3:93:f6: 17:55:73:e2:56:ee:88:06:aa:55:a9:b0:c0:c3:ed:d0: 30:3f:10:17:0d:71:da:53:f2:05:34:8a:f3:40:5f:8b: 1d:a6:37:f9:66:b0:79:8c:44:fe:04:66:1c:02:fa:2d: 96:f3:fc:30:bc:ba:3f:83:80:95:fa:74:a3:7e:53:62: f3:67:16:54:f1:f5:1a:36:9c:4d:0b:95:7b:df:2d:c4: 99:a1:55:6c:89:b4:34:8d:5a:07:be:8d:ed:f4:7b:a8: 83:24:aa:ed:aa:3e:4c:3e:81:4d:4c:bd:36:da:dc:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:25:86:fe:ae:2a:77:9f:ca:90:c5:fc:bf:e6:68:8d: e5:06:1c:79:e4:0b:22:69:5f:be:6f:9c:67:9f:11:6e: 81:ee:ec:bd:e8:bc:60:f5:6a:65:3f:74:09:69:95:b1: 18:27:fd:c3:07:f1:79:ef:cf:43:ab:fd:ae:c5:84:f3: b2:b0:9c:dd:b7:ee:78:96:ab:e7:91:62:ac:0b:bf:cd: 01:7a:71:da:b8:d5:f0:13:82:13:6c:cc:b0:68:2e:f7: f6:72:e6:59:b2:8b:f4:06:f6:90:ea:1a:27:cf:9c:ef: 8a:2e:73:17:6a:72:a7:71:e5:36:5f:2f:80:ff:b1:71: 81:22:e1:57:dc:05:2c:9f:59:25:d5:e5:38:68:e1:de: 29:58:79:10:4f:4b:e4:bb:3f:71:3c:31:55:05:e9:cb: 65:97:c9:ea:0e:5b:52:95:1e:90:1d:c8:e8:2c:fc:db: c3:80:33:5e:ad:6e:73:bb:bd:e7:d8:b2:b4:14:c7:ea: c9:32:74:d7:40:2e:f4:04:e2:75:de:4a:87:fc:e8:b8: ae:2b:86:2a:57:e6:65:88:8b:d5:87:e2:dd:74:9a:0d: c1:73:8f:38:d3:e1:76:01:f5:13:dd:73:2c:48:34:8f: 6b:cf:5d:26:88:e7:ae:53:57:4f:ba:80:db:31:3c:a8 Fingerprint (SHA-256): B9:68:63:C1:8B:D7:67:95:EC:4E:02:87:A4:89:35:CB:09:94:BF:C6:1B:02:6C:D3:95:2E:83:B3:9A:C3:15:B4 Fingerprint (SHA1): 2F:88:90:AD:35:53:D8:F6:E2:E3:9E:7F:A7:C7:22:74:AC:95:0F:53 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1492: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1493: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1494: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034352 (0x3750ae30) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Sep 28 04:09:13 2022 Not After : Tue Sep 28 04:09:13 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:2a:95:d4:62:52:0d:11:79:00:d7:85:6e:e6:fc:92: 5e:3c:7d:9d:e0:38:b5:08:0c:ee:6d:3d:b0:5c:31:11: 80:da:7a:c7:59:da:b9:c3:9c:6b:f0:40:10:14:b5:44: d4:52:21:f2:ef:e6:39:81:21:60:dd:68:24:cc:d0:41: b8:0e:c0:78:46:1b:3e:99:1d:4d:ee:89:a7:b6:d7:6c: 02:14:98:5b:41:7c:55:53:df:d8:ee:4b:9c:5c:62:c6: d1:10:c5:b0:b7:87:28:ec:c8:76:90:e3:41:86:7c:8d: 7b:50:de:89:9b:da:59:b7:11:72:51:36:c1:a0:44:59: 69:3b:94:ac:ff:1d:8f:53:7d:f5:cc:a9:01:17:db:d4: 70:eb:b4:b4:f2:78:7a:66:2f:b5:bc:86:5b:e9:78:af: 0f:51:94:64:75:5e:1f:dd:66:ed:6f:9d:36:97:98:5f: 58:8a:6a:cf:f4:22:08:eb:da:e0:0d:97:05:73:6b:e9: ee:18:8a:1a:64:08:17:5d:9b:e5:e6:cb:da:67:40:4d: 4b:c0:fa:72:5d:6a:6c:03:1d:9b:61:66:c8:cb:1b:1f: 22:63:8b:02:b1:a8:35:17:95:65:2c:d8:41:4d:64:82: 36:e3:f6:f8:22:2f:23:cd:cd:37:18:27:9b:1b:a3:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:33:ff:9e:b3:00:d6:00:b4:5c:8b:1d:85:5f:ef:00: ca:0d:e5:6b:08:3d:24:01:d4:3c:8b:23:04:10:db:e1: 70:cd:b2:ce:cf:55:b9:c2:0f:9d:22:8e:39:1e:56:b4: 3c:b0:9b:de:f4:78:f6:60:bf:43:b4:e4:dd:d6:2d:76: ee:d5:dd:3e:39:c0:71:7d:01:36:01:a1:b1:a1:c1:e2: 89:ba:96:bc:90:9e:39:f3:0c:02:85:81:ca:1d:72:ba: ab:76:33:36:98:77:8a:d9:c4:52:9e:e1:ec:22:6d:ef: b5:1c:d4:9f:85:22:be:df:e7:72:08:dc:7d:b3:9d:c3: 55:bf:4b:b1:c7:87:3c:3c:e2:9c:0e:d0:46:d2:e2:33: 01:29:31:14:ab:d3:32:a0:08:69:61:b3:7e:91:69:14: 7b:0d:ef:70:eb:46:65:bc:9d:05:79:8d:c3:94:33:20: c5:15:75:14:af:53:9d:d4:73:03:3f:b3:c4:e7:10:40: 7a:28:de:8b:d5:1e:6b:bc:f9:da:7a:81:27:77:bf:7d: ee:72:31:21:cb:47:51:6a:02:73:aa:b2:0b:f3:c8:75: 0b:ff:9f:fa:9f:21:19:7f:73:db:fe:9e:17:f1:00:fc: 71:c1:c5:27:47:a8:f7:d6:91:fe:de:9d:81:e9:84:22 Fingerprint (SHA-256): E6:27:3E:AB:C0:6F:BE:02:B2:ED:AF:DC:FD:D1:52:ED:7D:87:EA:C0:01:40:8B:DB:32:5E:D1:99:51:9B:17:3D Fingerprint (SHA1): 1F:BF:93:65:7D:7E:13:D0:81:40:B7:C5:87:69:A4:71:2E:EF:2D:E3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1495: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1496: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034355 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1497: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1498: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1499: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1500: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 928034356 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1501: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1502: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1503: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1504: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 928034357 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA1Root-928034118.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1505: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1506: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1507: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1508: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 928034358 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1509: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1510: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #1511: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034355 (0x3750ae33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:09:34 2022 Not After : Wed Sep 28 04:09:34 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:e9:bf:ab:fb:de:c8:99:4a:13:bb:59:50:10:31:73: d2:cc:54:f4:4c:c0:2d:d9:8a:84:36:18:92:54:b0:c5: 14:41:a7:1a:ab:b6:fb:53:b8:82:2d:79:3a:bc:0d:0e: 77:f9:2d:df:99:d2:fd:f9:b5:29:6c:56:c2:f8:ad:f2: c6:86:e7:04:56:ee:45:e0:ec:75:ef:4c:2e:9f:28:66: a4:84:1a:05:ed:09:67:67:d9:98:71:ee:b9:0b:e8:92: 17:09:2b:7a:16:1e:f0:b8:7e:e2:a9:ab:9b:74:17:72: 00:e3:a6:e8:80:4d:73:42:46:8b:fb:35:8b:a4:5b:77: 99:89:da:f9:e5:71:85:1c:27:09:7b:98:66:99:07:48: 25:e4:bb:1a:49:66:5d:bc:bf:84:fa:21:9d:cf:a0:59: 57:e9:37:ff:0d:d1:da:a7:96:b2:02:7d:ec:f4:e8:ca: 6b:8f:00:3c:0e:2e:c7:68:bf:c6:e1:98:64:6d:26:65: 67:af:a1:f2:45:36:3a:76:d9:7d:bd:d4:aa:c9:25:9c: a4:4c:3c:a6:ff:b5:38:6f:2f:48:53:6e:4c:da:13:23: d0:80:cf:b9:bf:75:d4:5a:4d:97:d1:ed:6c:ad:3f:3d: 89:9f:8c:1b:d3:ec:7f:ad:77:77:d4:1a:64:e6:ad:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:aa:9d:48:7e:96:6b:38:59:7f:3d:84:6e:14:5e:b8: 07:42:d4:c5:47:11:d2:5a:c8:62:6e:b4:69:8a:53:ba: d6:ac:f5:e3:b8:76:e5:a9:da:ab:c3:7a:73:f0:f7:c8: 38:ad:f6:bf:aa:1c:a3:59:ab:02:3f:ef:5a:72:b3:01: ce:db:60:3e:9d:d2:4f:fb:5f:fb:df:e1:76:d1:e4:27: 8f:ca:f1:d0:07:82:e9:5e:29:e1:dc:a1:e4:33:f8:a0: 4d:f8:0e:cf:be:8a:03:ea:ad:93:27:84:2d:f9:b0:13: 63:d5:2c:c0:6e:19:dc:ab:17:47:cb:b1:cc:3c:4e:43: 90:36:a3:87:58:d3:13:63:52:b7:a3:dd:24:e6:2c:f9: 0f:90:62:66:e8:b7:72:29:14:32:3c:b6:97:9c:c3:54: 53:1e:04:df:fa:1c:08:e5:76:89:8d:e0:70:d0:e7:d9: 85:ed:67:2e:1a:f2:3a:44:83:4f:2c:55:18:20:fe:2b: 8c:b9:ae:a6:b7:e8:8a:03:d6:3a:fc:87:c4:10:71:f8: 76:04:90:b9:ab:79:34:e0:5e:16:6e:4d:4c:4e:f0:99: 5d:05:8a:45:32:58:e4:8e:73:e7:78:62:32:56:3e:a8: 59:8d:88:12:3d:44:1e:21:eb:a6:f9:26:af:b9:53:47 Fingerprint (SHA-256): 12:70:32:FA:61:65:F1:BE:AA:3A:7C:CE:FD:36:14:E6:C3:8C:CF:88:C1:0E:57:60:CF:F3:5A:82:14:7C:5A:A4 Fingerprint (SHA1): 77:5B:2F:F9:9B:74:19:AE:DF:B0:67:BA:49:FF:2C:DB:04:D7:5D:CC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1512: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1513: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034359 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1514: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1515: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1516: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034360 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1517: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1518: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1519: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1520: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 928034361 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1521: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1522: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 928034362 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1523: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1524: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1525: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1526: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1527: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 928034363 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-Bridge-928034119.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1528: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1529: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1530: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1531: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 928034364 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1532: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1533: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1534: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034359 (0x3750ae37) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Sep 28 04:09:56 2022 Not After : Wed Sep 28 04:09:56 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:17:a6:ee:e1:36:70:5f:4f:0d:93:bd:8c:22:a3:13: 06:6e:5b:55:93:e1:b4:1e:eb:15:45:c7:1d:e3:3d:99: c7:80:97:96:2b:c3:cc:da:85:89:05:9b:7a:dd:72:d0: 42:ea:96:44:47:06:55:1d:65:23:0d:08:1a:60:ba:0c: 63:c7:f6:51:ee:f4:41:41:60:fb:b6:2f:11:64:eb:be: 7b:06:0f:33:7d:99:68:ce:6d:d2:f9:0a:8c:35:0a:6e: b1:76:73:7d:12:34:3c:ff:e9:f2:0e:5b:fe:cd:db:55: 0c:7d:90:74:66:31:ae:d7:e0:6a:5a:0d:e2:09:65:94: fa:6e:b9:af:11:5e:6e:87:87:7e:5e:f4:66:ac:97:fd: 06:cf:57:93:d9:64:fe:f9:1b:ba:cf:1a:e5:fb:56:19: 61:3a:b0:48:44:a9:f5:cb:4b:a1:0f:60:68:73:7e:81: 35:c9:4f:be:8e:d5:9e:eb:ea:83:a1:a3:56:52:30:df: 7f:6f:34:9c:00:fd:5a:b8:50:ae:0e:c7:b8:00:8e:98: 60:49:b6:9b:88:07:05:db:0c:35:e0:5f:db:7d:07:97: 35:66:c6:17:1c:69:62:82:fe:be:4e:85:40:39:f9:8b: 73:a7:ef:ec:b1:a5:a3:6c:99:b2:74:5b:d4:38:aa:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:06:22:0e:fe:ea:d8:11:3c:43:36:9a:40:fe:dd:43: fd:9a:59:48:d1:91:94:23:90:f0:55:19:0a:e0:1e:0f: 6a:6e:8e:93:c8:95:bf:89:15:bd:dd:4c:8c:20:94:0b: 4b:42:89:ca:7d:25:9e:e9:3f:78:c8:f4:d3:63:73:37: c5:02:5e:04:a6:cc:b4:c0:f1:bd:49:f5:a1:4b:db:53: 61:4e:53:2b:b9:02:b0:0c:18:00:38:f8:24:71:33:0c: a6:4d:5b:60:c4:b8:f5:c9:6b:3d:53:63:e9:87:b4:d4: 7f:58:fb:f5:8f:4d:60:13:33:42:46:ef:4d:90:ff:01: 3e:a6:42:8d:56:61:23:ca:40:e5:68:e1:0e:b1:d1:82: f6:f8:65:72:8a:74:a0:c9:ff:5a:28:a1:15:29:f4:b1: dc:24:d8:7e:5d:40:24:e6:89:c5:17:85:dc:42:79:c7: 8d:fe:e5:ac:79:0a:42:87:7a:2c:58:3c:c8:da:8d:e5: 7f:16:36:13:11:2b:cf:a8:8b:b7:fc:68:92:dd:03:1f: bb:4a:1b:68:d9:bc:d3:ad:53:93:f3:66:20:e9:36:eb: b3:05:e2:a7:b0:a1:90:4e:32:06:2c:60:97:74:ed:56: 01:ea:70:b3:f9:2d:69:d9:a9:b1:24:79:a2:b1:98:6c Fingerprint (SHA-256): 08:D3:6A:16:36:7F:5E:24:FA:84:86:C1:EF:4D:C5:54:3D:0A:FA:98:47:F0:9C:17:95:F8:59:C7:A6:92:AB:4F Fingerprint (SHA1): FA:F4:E3:41:21:29:6E:DC:BC:90:66:03:08:D5:1F:BD:75:60:3F:98 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1535: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034360 (0x3750ae38) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Sep 28 04:10:01 2022 Not After : Wed Sep 28 04:10:01 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:a2:6f:0a:4c:25:c5:b9:e3:41:23:70:c5:4e:43:d8: 33:f5:25:6e:5c:74:b9:03:94:09:68:07:a4:db:f7:2d: b3:8f:ce:e0:17:94:53:90:8d:7b:54:64:05:74:7d:e9: 9d:b4:98:13:33:44:86:da:fd:74:37:b4:e2:cf:9c:7c: b5:46:2f:90:3f:b2:30:92:bd:3c:e1:d1:0d:ce:06:cd: aa:72:30:ef:f0:3a:e3:f5:71:a6:93:69:08:5a:98:c5: 7e:28:fc:13:ca:4f:09:e5:08:23:b0:6e:62:0c:aa:b2: 42:2c:ca:df:59:dd:cf:21:a7:f8:a2:1a:a6:23:09:d3: 49:4e:7e:a0:1c:15:b4:0c:26:e2:82:9c:cc:33:b2:c3: 4a:81:15:c0:44:46:09:f0:dc:4f:98:9b:2a:c3:74:8a: bb:cc:3a:4e:80:21:a2:c5:1a:66:85:b8:5a:12:c6:51: 64:0f:30:85:2b:0f:69:dc:81:51:8e:21:db:fa:21:34: bd:33:e8:08:18:f8:cf:e4:21:f6:fc:ad:6e:eb:83:de: cd:13:52:bb:52:28:3f:6a:2e:3c:7b:de:d5:15:0b:8c: 21:86:8b:e7:42:d4:15:40:a5:0a:ea:cf:8a:2b:83:2c: d1:2f:a2:a3:bb:7a:ef:1d:ca:d3:46:af:a8:6e:d7:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:c5:9d:3a:00:a5:57:6b:01:7c:56:14:dd:ef:c0:9c: f6:5d:56:89:92:e6:0d:4a:fb:a5:ed:5c:e0:9e:55:7e: 22:84:a3:76:93:4a:61:1b:0d:c4:2b:16:23:7d:3b:09: b1:ac:46:d3:cc:41:f5:3b:d0:a6:9b:81:e4:4d:e1:dc: e7:4b:a0:c6:5c:34:05:a0:39:38:f9:13:59:95:ec:6c: 11:97:f1:37:1f:05:56:31:0e:0f:67:54:a8:74:bd:3f: 63:85:08:c5:52:a3:e6:cf:ed:5d:2d:f5:67:8c:66:cd: 9e:23:93:4b:ee:c2:07:96:d6:5c:c4:5a:1b:1d:5d:ea: 0f:0d:9d:07:bf:87:a3:34:ce:7c:4b:24:f5:01:2a:c0: 67:76:47:b7:8b:24:fe:60:a3:88:ba:be:21:88:b5:b2: 8a:26:ac:56:43:7a:4c:19:50:f4:c2:5e:fb:f6:5a:8d: 7f:97:7a:5d:02:94:d9:75:87:44:f1:99:8c:b4:97:a2: f0:13:da:f6:81:f0:bf:02:49:f6:e5:ab:ff:7e:fb:f6: 31:c4:83:0d:19:4b:0b:c1:a6:2d:2c:b4:bc:ab:db:ee: 8b:1d:02:5d:d5:44:9e:52:16:ce:a4:34:97:ca:ba:fa: ed:79:f6:6a:10:2f:fe:c0:90:0c:0e:18:84:7f:72:5b Fingerprint (SHA-256): E5:42:26:6B:F7:46:F5:71:E4:02:CF:0B:20:17:35:09:63:C8:56:60:E0:C8:04:32:71:CA:7B:B4:89:C4:75:73 Fingerprint (SHA1): 71:49:20:7D:43:D9:A2:B7:45:B9:E4:4A:9B:F5:11:A4:E0:55:09:EE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1536: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034360 (0x3750ae38) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Sep 28 04:10:01 2022 Not After : Wed Sep 28 04:10:01 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:a2:6f:0a:4c:25:c5:b9:e3:41:23:70:c5:4e:43:d8: 33:f5:25:6e:5c:74:b9:03:94:09:68:07:a4:db:f7:2d: b3:8f:ce:e0:17:94:53:90:8d:7b:54:64:05:74:7d:e9: 9d:b4:98:13:33:44:86:da:fd:74:37:b4:e2:cf:9c:7c: b5:46:2f:90:3f:b2:30:92:bd:3c:e1:d1:0d:ce:06:cd: aa:72:30:ef:f0:3a:e3:f5:71:a6:93:69:08:5a:98:c5: 7e:28:fc:13:ca:4f:09:e5:08:23:b0:6e:62:0c:aa:b2: 42:2c:ca:df:59:dd:cf:21:a7:f8:a2:1a:a6:23:09:d3: 49:4e:7e:a0:1c:15:b4:0c:26:e2:82:9c:cc:33:b2:c3: 4a:81:15:c0:44:46:09:f0:dc:4f:98:9b:2a:c3:74:8a: bb:cc:3a:4e:80:21:a2:c5:1a:66:85:b8:5a:12:c6:51: 64:0f:30:85:2b:0f:69:dc:81:51:8e:21:db:fa:21:34: bd:33:e8:08:18:f8:cf:e4:21:f6:fc:ad:6e:eb:83:de: cd:13:52:bb:52:28:3f:6a:2e:3c:7b:de:d5:15:0b:8c: 21:86:8b:e7:42:d4:15:40:a5:0a:ea:cf:8a:2b:83:2c: d1:2f:a2:a3:bb:7a:ef:1d:ca:d3:46:af:a8:6e:d7:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:c5:9d:3a:00:a5:57:6b:01:7c:56:14:dd:ef:c0:9c: f6:5d:56:89:92:e6:0d:4a:fb:a5:ed:5c:e0:9e:55:7e: 22:84:a3:76:93:4a:61:1b:0d:c4:2b:16:23:7d:3b:09: b1:ac:46:d3:cc:41:f5:3b:d0:a6:9b:81:e4:4d:e1:dc: e7:4b:a0:c6:5c:34:05:a0:39:38:f9:13:59:95:ec:6c: 11:97:f1:37:1f:05:56:31:0e:0f:67:54:a8:74:bd:3f: 63:85:08:c5:52:a3:e6:cf:ed:5d:2d:f5:67:8c:66:cd: 9e:23:93:4b:ee:c2:07:96:d6:5c:c4:5a:1b:1d:5d:ea: 0f:0d:9d:07:bf:87:a3:34:ce:7c:4b:24:f5:01:2a:c0: 67:76:47:b7:8b:24:fe:60:a3:88:ba:be:21:88:b5:b2: 8a:26:ac:56:43:7a:4c:19:50:f4:c2:5e:fb:f6:5a:8d: 7f:97:7a:5d:02:94:d9:75:87:44:f1:99:8c:b4:97:a2: f0:13:da:f6:81:f0:bf:02:49:f6:e5:ab:ff:7e:fb:f6: 31:c4:83:0d:19:4b:0b:c1:a6:2d:2c:b4:bc:ab:db:ee: 8b:1d:02:5d:d5:44:9e:52:16:ce:a4:34:97:ca:ba:fa: ed:79:f6:6a:10:2f:fe:c0:90:0c:0e:18:84:7f:72:5b Fingerprint (SHA-256): E5:42:26:6B:F7:46:F5:71:E4:02:CF:0B:20:17:35:09:63:C8:56:60:E0:C8:04:32:71:CA:7B:B4:89:C4:75:73 Fingerprint (SHA1): 71:49:20:7D:43:D9:A2:B7:45:B9:E4:4A:9B:F5:11:A4:E0:55:09:EE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1537: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1538: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034365 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1539: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1540: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1541: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034366 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1542: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1543: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1544: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1545: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 928034367 -7 Bridge@Army < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1546: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1547: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 928034368 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1548: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1549: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1550: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1551: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1552: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 928034369 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-Bridge-928034120.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1553: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1554: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1555: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1556: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 928034370 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1557: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1558: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1559: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1560: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 928034371 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-BridgeNavy-928034121.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1561: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1562: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1563: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1564: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 928034372 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1565: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1566: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1567: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034365 (0x3750ae3d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Sep 28 04:10:26 2022 Not After : Wed Sep 28 04:10:26 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:fa:3f:d2:d3:05:f9:a5:c6:8a:b9:8d:74:25:7f:ea: a0:5d:83:4c:7b:11:7c:85:3a:91:5c:73:05:63:d0:3d: 6a:a6:c9:1b:c0:f0:51:66:6d:de:a7:62:df:e4:6b:d5: 26:bd:c0:b8:93:59:89:c3:83:d2:0c:60:f0:3a:3d:76: 0a:9f:21:20:97:e6:d0:0f:28:76:19:4b:03:81:2e:6b: 93:89:d8:aa:8e:3f:58:67:e9:37:57:f4:20:82:94:4b: a0:15:38:e6:31:8d:1d:0f:f6:6d:57:28:d5:c5:99:e9: 2b:ce:de:b1:77:8f:21:9b:db:bf:9c:bf:f7:74:a6:26: 37:df:99:df:10:07:e2:3f:d2:51:d8:a9:fd:c9:9b:59: 81:15:a8:25:52:6c:cb:c3:11:a4:35:f7:de:6c:1b:48: e3:e3:03:c9:ef:01:8c:df:a2:d8:e7:32:b6:fa:0c:da: ac:5d:d3:bd:ca:ad:4a:68:95:0f:63:e1:0a:32:89:06: 3f:6d:aa:ce:47:be:9b:35:ca:06:53:a7:54:dd:6c:0e: f0:e0:94:68:02:ee:3c:ec:07:95:09:0a:b7:90:74:9f: 74:56:37:23:b8:0c:79:09:9e:ed:4e:20:ca:bf:bc:fe: df:8b:fb:f4:66:c6:46:46:3d:03:a3:2e:19:b4:10:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:08:35:17:a6:da:19:85:62:3e:2e:bc:86:73:ab:cb: 84:a7:a4:04:3d:4b:2d:13:bd:98:f2:fa:59:9e:73:80: 82:51:3f:49:8b:5f:48:ec:d5:ba:c4:f2:ec:46:17:fe: dd:7c:9c:e1:57:48:f7:65:9e:4d:e6:01:26:68:c1:83: 11:8b:09:56:f0:b4:84:81:7a:85:d3:d1:e5:0f:68:41: 69:34:e5:35:e5:b3:f7:ea:68:14:35:0d:d3:b0:3e:f0: 0b:f3:23:71:11:63:6f:fc:1a:03:a6:89:dc:25:61:65: 0e:17:92:a7:44:6e:93:35:12:8a:b5:9c:38:5a:47:ac: df:b8:f6:3e:5f:77:6c:97:6e:62:62:c1:bc:bd:b1:f1: 17:be:75:af:cc:ab:7e:bb:11:e5:a2:7a:a4:89:2c:a3: 57:ac:da:7d:32:75:a0:96:2e:38:ab:4d:a8:4a:95:c5: 37:70:91:c8:54:b6:67:6c:11:41:b8:a5:1e:70:dc:a1: 8d:10:73:c5:c6:ba:35:02:a3:69:68:69:c5:2d:73:e3: 0a:f2:42:28:23:ec:a1:c2:2e:ec:7d:be:81:30:46:98: d6:f0:31:7a:fd:42:d2:fc:de:b1:ad:8f:b1:61:9a:77: 8d:cb:b8:86:2f:f3:ca:85:ee:73:d2:20:0d:07:23:95 Fingerprint (SHA-256): 01:9B:25:15:3D:A8:E9:31:F1:42:68:2E:B4:BD:2F:5D:67:F9:4C:66:B5:3D:72:F6:BF:58:45:CD:78:26:7B:EF Fingerprint (SHA1): 84:C7:97:FD:57:30:AA:C5:25:76:6A:B0:31:BD:D4:72:9E:EA:54:70 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1568: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034366 (0x3750ae3e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Sep 28 04:10:30 2022 Not After : Wed Sep 28 04:10:30 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:f0:05:f1:a7:ab:d0:ca:b6:cc:ba:11:44:24:83:4a: 48:ee:26:ab:ea:50:4e:a9:dc:9f:a2:d1:6f:d9:cd:2b: 40:ee:67:55:83:4b:77:6d:e4:46:41:97:bc:9f:fc:3b: e7:48:cb:aa:c6:52:ee:a9:72:dc:3f:6d:57:1f:56:b9: d9:6e:0c:06:75:46:09:c7:e3:d8:dc:89:0b:c7:6c:e8: 60:75:68:e9:a1:d6:7a:4e:e1:e9:7a:14:cd:a5:58:0b: ee:1f:6d:29:87:03:bf:76:fb:02:f0:21:d2:86:97:7a: 21:87:a0:0c:aa:91:8c:cb:91:34:73:82:11:55:ec:3c: d7:c7:8f:20:8c:d0:4c:a5:fa:eb:ae:47:1b:63:c1:ac: e9:93:eb:f9:fb:62:cc:bd:1d:7f:1e:d3:70:f2:c6:61: 6a:a4:50:ae:21:d2:19:30:02:85:8c:eb:7c:0c:bc:a6: ff:c4:25:44:ad:ee:53:eb:8f:79:97:01:b9:61:38:e0: a9:11:99:e5:c0:05:22:cb:72:93:e2:87:5f:d9:c0:9e: de:66:9f:43:b7:42:e4:22:a1:d2:be:c3:54:28:10:af: 23:7b:d6:9f:3b:bf:e3:b3:ed:6b:be:22:ae:aa:66:73: b0:fe:93:68:7f:62:45:a7:ad:7f:47:c0:27:9e:ee:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:53:10:89:13:83:20:03:b2:5a:bf:a6:f7:61:6f:dd: 38:6e:9d:6a:83:91:c8:84:25:78:f3:70:c3:eb:ef:01: a2:e1:13:3a:f7:17:8d:c7:1b:44:a4:5c:26:e0:c1:42: 8c:2f:34:cd:f2:10:40:77:eb:60:6e:42:98:a9:43:74: 30:23:a1:85:f4:d5:9a:21:60:97:17:7e:d9:9c:3d:63: 3e:9f:43:f6:d0:a2:35:ef:39:ea:13:2e:52:5d:a1:c3: 23:11:2e:f5:c5:81:18:39:d0:aa:03:4c:21:a1:74:1c: 66:68:02:19:d8:3b:40:af:30:7c:27:ac:27:78:fa:2f: 60:e7:ae:c1:4f:1a:d4:b0:92:46:d0:a6:67:6e:75:d6: 8d:76:1c:84:48:a6:9f:01:d0:8d:1e:5f:44:5a:59:d8: af:71:4d:38:02:7e:3d:b4:74:a1:15:9b:37:18:59:f8: ab:be:1c:7d:b1:22:25:2d:19:8c:be:81:76:dd:49:a5: 9a:8a:af:ad:8c:2f:2a:52:b4:4f:e9:4f:f5:4b:87:f0: e5:bf:b1:0a:2b:44:2e:ec:53:78:82:4c:54:a8:94:c3: bc:9e:fb:12:81:f3:e5:ce:6d:ec:11:b5:ad:23:95:c8: ae:8d:5a:72:50:e4:38:7e:fb:9b:af:5b:22:c5:4a:1c Fingerprint (SHA-256): 23:08:27:66:0A:21:85:D7:F0:39:EE:B5:32:8C:28:56:15:CE:95:31:0D:3B:41:23:E8:95:94:89:E5:4E:62:A6 Fingerprint (SHA1): 5D:01:54:E9:A8:6B:97:F7:81:06:9A:9D:C3:4F:D9:60:DA:52:C3:67 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1569: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034366 (0x3750ae3e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Sep 28 04:10:30 2022 Not After : Wed Sep 28 04:10:30 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:f0:05:f1:a7:ab:d0:ca:b6:cc:ba:11:44:24:83:4a: 48:ee:26:ab:ea:50:4e:a9:dc:9f:a2:d1:6f:d9:cd:2b: 40:ee:67:55:83:4b:77:6d:e4:46:41:97:bc:9f:fc:3b: e7:48:cb:aa:c6:52:ee:a9:72:dc:3f:6d:57:1f:56:b9: d9:6e:0c:06:75:46:09:c7:e3:d8:dc:89:0b:c7:6c:e8: 60:75:68:e9:a1:d6:7a:4e:e1:e9:7a:14:cd:a5:58:0b: ee:1f:6d:29:87:03:bf:76:fb:02:f0:21:d2:86:97:7a: 21:87:a0:0c:aa:91:8c:cb:91:34:73:82:11:55:ec:3c: d7:c7:8f:20:8c:d0:4c:a5:fa:eb:ae:47:1b:63:c1:ac: e9:93:eb:f9:fb:62:cc:bd:1d:7f:1e:d3:70:f2:c6:61: 6a:a4:50:ae:21:d2:19:30:02:85:8c:eb:7c:0c:bc:a6: ff:c4:25:44:ad:ee:53:eb:8f:79:97:01:b9:61:38:e0: a9:11:99:e5:c0:05:22:cb:72:93:e2:87:5f:d9:c0:9e: de:66:9f:43:b7:42:e4:22:a1:d2:be:c3:54:28:10:af: 23:7b:d6:9f:3b:bf:e3:b3:ed:6b:be:22:ae:aa:66:73: b0:fe:93:68:7f:62:45:a7:ad:7f:47:c0:27:9e:ee:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:53:10:89:13:83:20:03:b2:5a:bf:a6:f7:61:6f:dd: 38:6e:9d:6a:83:91:c8:84:25:78:f3:70:c3:eb:ef:01: a2:e1:13:3a:f7:17:8d:c7:1b:44:a4:5c:26:e0:c1:42: 8c:2f:34:cd:f2:10:40:77:eb:60:6e:42:98:a9:43:74: 30:23:a1:85:f4:d5:9a:21:60:97:17:7e:d9:9c:3d:63: 3e:9f:43:f6:d0:a2:35:ef:39:ea:13:2e:52:5d:a1:c3: 23:11:2e:f5:c5:81:18:39:d0:aa:03:4c:21:a1:74:1c: 66:68:02:19:d8:3b:40:af:30:7c:27:ac:27:78:fa:2f: 60:e7:ae:c1:4f:1a:d4:b0:92:46:d0:a6:67:6e:75:d6: 8d:76:1c:84:48:a6:9f:01:d0:8d:1e:5f:44:5a:59:d8: af:71:4d:38:02:7e:3d:b4:74:a1:15:9b:37:18:59:f8: ab:be:1c:7d:b1:22:25:2d:19:8c:be:81:76:dd:49:a5: 9a:8a:af:ad:8c:2f:2a:52:b4:4f:e9:4f:f5:4b:87:f0: e5:bf:b1:0a:2b:44:2e:ec:53:78:82:4c:54:a8:94:c3: bc:9e:fb:12:81:f3:e5:ce:6d:ec:11:b5:ad:23:95:c8: ae:8d:5a:72:50:e4:38:7e:fb:9b:af:5b:22:c5:4a:1c Fingerprint (SHA-256): 23:08:27:66:0A:21:85:D7:F0:39:EE:B5:32:8C:28:56:15:CE:95:31:0D:3B:41:23:E8:95:94:89:E5:4E:62:A6 Fingerprint (SHA1): 5D:01:54:E9:A8:6B:97:F7:81:06:9A:9D:C3:4F:D9:60:DA:52:C3:67 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1570: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #1571: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034365 (0x3750ae3d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Sep 28 04:10:26 2022 Not After : Wed Sep 28 04:10:26 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:fa:3f:d2:d3:05:f9:a5:c6:8a:b9:8d:74:25:7f:ea: a0:5d:83:4c:7b:11:7c:85:3a:91:5c:73:05:63:d0:3d: 6a:a6:c9:1b:c0:f0:51:66:6d:de:a7:62:df:e4:6b:d5: 26:bd:c0:b8:93:59:89:c3:83:d2:0c:60:f0:3a:3d:76: 0a:9f:21:20:97:e6:d0:0f:28:76:19:4b:03:81:2e:6b: 93:89:d8:aa:8e:3f:58:67:e9:37:57:f4:20:82:94:4b: a0:15:38:e6:31:8d:1d:0f:f6:6d:57:28:d5:c5:99:e9: 2b:ce:de:b1:77:8f:21:9b:db:bf:9c:bf:f7:74:a6:26: 37:df:99:df:10:07:e2:3f:d2:51:d8:a9:fd:c9:9b:59: 81:15:a8:25:52:6c:cb:c3:11:a4:35:f7:de:6c:1b:48: e3:e3:03:c9:ef:01:8c:df:a2:d8:e7:32:b6:fa:0c:da: ac:5d:d3:bd:ca:ad:4a:68:95:0f:63:e1:0a:32:89:06: 3f:6d:aa:ce:47:be:9b:35:ca:06:53:a7:54:dd:6c:0e: f0:e0:94:68:02:ee:3c:ec:07:95:09:0a:b7:90:74:9f: 74:56:37:23:b8:0c:79:09:9e:ed:4e:20:ca:bf:bc:fe: df:8b:fb:f4:66:c6:46:46:3d:03:a3:2e:19:b4:10:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:08:35:17:a6:da:19:85:62:3e:2e:bc:86:73:ab:cb: 84:a7:a4:04:3d:4b:2d:13:bd:98:f2:fa:59:9e:73:80: 82:51:3f:49:8b:5f:48:ec:d5:ba:c4:f2:ec:46:17:fe: dd:7c:9c:e1:57:48:f7:65:9e:4d:e6:01:26:68:c1:83: 11:8b:09:56:f0:b4:84:81:7a:85:d3:d1:e5:0f:68:41: 69:34:e5:35:e5:b3:f7:ea:68:14:35:0d:d3:b0:3e:f0: 0b:f3:23:71:11:63:6f:fc:1a:03:a6:89:dc:25:61:65: 0e:17:92:a7:44:6e:93:35:12:8a:b5:9c:38:5a:47:ac: df:b8:f6:3e:5f:77:6c:97:6e:62:62:c1:bc:bd:b1:f1: 17:be:75:af:cc:ab:7e:bb:11:e5:a2:7a:a4:89:2c:a3: 57:ac:da:7d:32:75:a0:96:2e:38:ab:4d:a8:4a:95:c5: 37:70:91:c8:54:b6:67:6c:11:41:b8:a5:1e:70:dc:a1: 8d:10:73:c5:c6:ba:35:02:a3:69:68:69:c5:2d:73:e3: 0a:f2:42:28:23:ec:a1:c2:2e:ec:7d:be:81:30:46:98: d6:f0:31:7a:fd:42:d2:fc:de:b1:ad:8f:b1:61:9a:77: 8d:cb:b8:86:2f:f3:ca:85:ee:73:d2:20:0d:07:23:95 Fingerprint (SHA-256): 01:9B:25:15:3D:A8:E9:31:F1:42:68:2E:B4:BD:2F:5D:67:F9:4C:66:B5:3D:72:F6:BF:58:45:CD:78:26:7B:EF Fingerprint (SHA1): 84:C7:97:FD:57:30:AA:C5:25:76:6A:B0:31:BD:D4:72:9E:EA:54:70 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1572: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034366 (0x3750ae3e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Sep 28 04:10:30 2022 Not After : Wed Sep 28 04:10:30 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:f0:05:f1:a7:ab:d0:ca:b6:cc:ba:11:44:24:83:4a: 48:ee:26:ab:ea:50:4e:a9:dc:9f:a2:d1:6f:d9:cd:2b: 40:ee:67:55:83:4b:77:6d:e4:46:41:97:bc:9f:fc:3b: e7:48:cb:aa:c6:52:ee:a9:72:dc:3f:6d:57:1f:56:b9: d9:6e:0c:06:75:46:09:c7:e3:d8:dc:89:0b:c7:6c:e8: 60:75:68:e9:a1:d6:7a:4e:e1:e9:7a:14:cd:a5:58:0b: ee:1f:6d:29:87:03:bf:76:fb:02:f0:21:d2:86:97:7a: 21:87:a0:0c:aa:91:8c:cb:91:34:73:82:11:55:ec:3c: d7:c7:8f:20:8c:d0:4c:a5:fa:eb:ae:47:1b:63:c1:ac: e9:93:eb:f9:fb:62:cc:bd:1d:7f:1e:d3:70:f2:c6:61: 6a:a4:50:ae:21:d2:19:30:02:85:8c:eb:7c:0c:bc:a6: ff:c4:25:44:ad:ee:53:eb:8f:79:97:01:b9:61:38:e0: a9:11:99:e5:c0:05:22:cb:72:93:e2:87:5f:d9:c0:9e: de:66:9f:43:b7:42:e4:22:a1:d2:be:c3:54:28:10:af: 23:7b:d6:9f:3b:bf:e3:b3:ed:6b:be:22:ae:aa:66:73: b0:fe:93:68:7f:62:45:a7:ad:7f:47:c0:27:9e:ee:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:53:10:89:13:83:20:03:b2:5a:bf:a6:f7:61:6f:dd: 38:6e:9d:6a:83:91:c8:84:25:78:f3:70:c3:eb:ef:01: a2:e1:13:3a:f7:17:8d:c7:1b:44:a4:5c:26:e0:c1:42: 8c:2f:34:cd:f2:10:40:77:eb:60:6e:42:98:a9:43:74: 30:23:a1:85:f4:d5:9a:21:60:97:17:7e:d9:9c:3d:63: 3e:9f:43:f6:d0:a2:35:ef:39:ea:13:2e:52:5d:a1:c3: 23:11:2e:f5:c5:81:18:39:d0:aa:03:4c:21:a1:74:1c: 66:68:02:19:d8:3b:40:af:30:7c:27:ac:27:78:fa:2f: 60:e7:ae:c1:4f:1a:d4:b0:92:46:d0:a6:67:6e:75:d6: 8d:76:1c:84:48:a6:9f:01:d0:8d:1e:5f:44:5a:59:d8: af:71:4d:38:02:7e:3d:b4:74:a1:15:9b:37:18:59:f8: ab:be:1c:7d:b1:22:25:2d:19:8c:be:81:76:dd:49:a5: 9a:8a:af:ad:8c:2f:2a:52:b4:4f:e9:4f:f5:4b:87:f0: e5:bf:b1:0a:2b:44:2e:ec:53:78:82:4c:54:a8:94:c3: bc:9e:fb:12:81:f3:e5:ce:6d:ec:11:b5:ad:23:95:c8: ae:8d:5a:72:50:e4:38:7e:fb:9b:af:5b:22:c5:4a:1c Fingerprint (SHA-256): 23:08:27:66:0A:21:85:D7:F0:39:EE:B5:32:8C:28:56:15:CE:95:31:0D:3B:41:23:E8:95:94:89:E5:4E:62:A6 Fingerprint (SHA1): 5D:01:54:E9:A8:6B:97:F7:81:06:9A:9D:C3:4F:D9:60:DA:52:C3:67 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1573: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034366 (0x3750ae3e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Sep 28 04:10:30 2022 Not After : Wed Sep 28 04:10:30 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:f0:05:f1:a7:ab:d0:ca:b6:cc:ba:11:44:24:83:4a: 48:ee:26:ab:ea:50:4e:a9:dc:9f:a2:d1:6f:d9:cd:2b: 40:ee:67:55:83:4b:77:6d:e4:46:41:97:bc:9f:fc:3b: e7:48:cb:aa:c6:52:ee:a9:72:dc:3f:6d:57:1f:56:b9: d9:6e:0c:06:75:46:09:c7:e3:d8:dc:89:0b:c7:6c:e8: 60:75:68:e9:a1:d6:7a:4e:e1:e9:7a:14:cd:a5:58:0b: ee:1f:6d:29:87:03:bf:76:fb:02:f0:21:d2:86:97:7a: 21:87:a0:0c:aa:91:8c:cb:91:34:73:82:11:55:ec:3c: d7:c7:8f:20:8c:d0:4c:a5:fa:eb:ae:47:1b:63:c1:ac: e9:93:eb:f9:fb:62:cc:bd:1d:7f:1e:d3:70:f2:c6:61: 6a:a4:50:ae:21:d2:19:30:02:85:8c:eb:7c:0c:bc:a6: ff:c4:25:44:ad:ee:53:eb:8f:79:97:01:b9:61:38:e0: a9:11:99:e5:c0:05:22:cb:72:93:e2:87:5f:d9:c0:9e: de:66:9f:43:b7:42:e4:22:a1:d2:be:c3:54:28:10:af: 23:7b:d6:9f:3b:bf:e3:b3:ed:6b:be:22:ae:aa:66:73: b0:fe:93:68:7f:62:45:a7:ad:7f:47:c0:27:9e:ee:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:53:10:89:13:83:20:03:b2:5a:bf:a6:f7:61:6f:dd: 38:6e:9d:6a:83:91:c8:84:25:78:f3:70:c3:eb:ef:01: a2:e1:13:3a:f7:17:8d:c7:1b:44:a4:5c:26:e0:c1:42: 8c:2f:34:cd:f2:10:40:77:eb:60:6e:42:98:a9:43:74: 30:23:a1:85:f4:d5:9a:21:60:97:17:7e:d9:9c:3d:63: 3e:9f:43:f6:d0:a2:35:ef:39:ea:13:2e:52:5d:a1:c3: 23:11:2e:f5:c5:81:18:39:d0:aa:03:4c:21:a1:74:1c: 66:68:02:19:d8:3b:40:af:30:7c:27:ac:27:78:fa:2f: 60:e7:ae:c1:4f:1a:d4:b0:92:46:d0:a6:67:6e:75:d6: 8d:76:1c:84:48:a6:9f:01:d0:8d:1e:5f:44:5a:59:d8: af:71:4d:38:02:7e:3d:b4:74:a1:15:9b:37:18:59:f8: ab:be:1c:7d:b1:22:25:2d:19:8c:be:81:76:dd:49:a5: 9a:8a:af:ad:8c:2f:2a:52:b4:4f:e9:4f:f5:4b:87:f0: e5:bf:b1:0a:2b:44:2e:ec:53:78:82:4c:54:a8:94:c3: bc:9e:fb:12:81:f3:e5:ce:6d:ec:11:b5:ad:23:95:c8: ae:8d:5a:72:50:e4:38:7e:fb:9b:af:5b:22:c5:4a:1c Fingerprint (SHA-256): 23:08:27:66:0A:21:85:D7:F0:39:EE:B5:32:8C:28:56:15:CE:95:31:0D:3B:41:23:E8:95:94:89:E5:4E:62:A6 Fingerprint (SHA1): 5D:01:54:E9:A8:6B:97:F7:81:06:9A:9D:C3:4F:D9:60:DA:52:C3:67 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1574: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1575: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034373 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1576: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1577: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1578: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034374 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1579: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1580: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #1581: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1582: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 928034375 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1583: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1584: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #1585: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1586: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 928034376 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1587: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1588: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1589: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1590: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 928034377 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1591: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1592: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 928034378 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1593: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1594: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #1595: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1596: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1597: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 928034379 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1598: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1599: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1600: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1601: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 928034380 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1602: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1603: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1604: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1605: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 928034381 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1606: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1607: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1608: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1609: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 928034382 --extCP < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1610: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1611: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1612: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034373 (0x3750ae45) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Sep 28 04:11:08 2022 Not After : Wed Sep 28 04:11:08 2072 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:d0:c5:78:35:26:ba:63:73:ad:ea:a7:70:9d:f3:38: 57:0a:5d:36:75:ce:aa:e3:db:38:f8:bd:47:d3:d8:8e: 32:83:7b:52:02:65:03:2c:7d:e3:0e:c1:3a:7b:45:d3: a4:f9:e4:f7:a7:62:13:5a:ea:81:7a:74:89:d2:de:03: a6:00:43:36:8f:26:25:a1:69:ed:6b:fc:b4:c7:3a:d6: 67:15:77:d1:d7:b7:4e:e9:76:f9:84:10:29:82:09:b4: 8f:38:91:f1:31:ce:5c:54:d8:03:0b:b0:39:b2:53:c3: c6:94:6c:8f:d5:f6:19:ff:bd:e8:2f:98:a5:35:1e:87: 67:0f:2e:da:52:8e:a1:2a:93:8f:05:7b:22:6a:a5:bd: 19:b6:ce:24:d7:88:f6:6e:34:fb:a2:ac:5f:dc:d4:a3: 5b:65:98:bc:6c:c8:c2:d3:c5:97:04:f6:92:95:57:f5: f5:e9:de:74:65:c7:ac:67:84:79:29:a8:40:5c:d7:d1: e9:9b:ab:2d:5f:23:d0:6f:71:de:5c:d7:f1:0c:ad:8d: 55:a8:08:64:6c:1a:c4:1f:60:9a:e3:92:fc:ed:e9:32: 3f:13:1e:47:ac:51:27:85:22:21:5c:80:7c:1a:d7:3c: d3:84:6a:bd:fe:f2:bf:37:11:63:b4:fd:0c:63:d8:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:c0:9d:ec:ef:4d:07:6a:af:6e:dc:d3:51:ee:d0:7f: 09:f6:6a:ba:3e:38:82:aa:f0:5c:59:05:b1:b0:cf:11: d6:48:97:31:bf:63:05:0f:e7:14:dd:73:08:fe:c3:90: 2a:8f:83:f9:44:4a:44:fc:19:94:f0:22:82:55:36:ca: 42:ec:d4:ee:8b:b4:c7:0d:e3:52:dc:18:66:6d:74:08: 1e:28:ca:16:34:12:ac:3b:65:08:d7:5c:d6:6a:e0:1d: cc:d3:c4:60:2b:0d:02:ac:1d:8b:a9:9d:b2:76:cb:2b: d6:44:1e:df:3a:ad:a6:66:a2:12:c6:18:3b:65:10:4f: 4e:5a:c2:eb:dc:74:66:47:c5:17:79:b9:6f:fe:04:b1: 35:07:e8:6a:27:f2:10:0b:46:2e:48:1d:20:04:0a:d4: c0:a0:53:96:07:03:73:5f:12:7f:cc:39:89:23:83:ce: c3:b9:42:7d:89:d6:ea:c9:01:ee:14:da:6c:fc:ff:45: 3e:77:6a:a8:1c:53:45:87:9a:e0:f1:44:37:3c:85:de: de:cd:41:e2:1f:c1:ee:e4:b3:5d:7c:9e:58:72:8c:81: 3b:06:06:85:0e:f0:50:88:8c:48:74:89:91:13:aa:19: 45:58:64:4c:ef:7e:5a:5d:b1:1b:cc:78:f1:70:26:78 Fingerprint (SHA-256): 81:68:B6:16:C6:8D:60:A2:92:5B:20:AD:24:95:44:E8:5E:59:37:A1:17:EB:EF:22:A7:1F:E4:B5:0F:66:8D:F7 Fingerprint (SHA1): C9:57:EA:2C:BD:D8:59:EB:F1:3A:E9:F4:64:67:4C:AF:E7:F0:25:64 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #1613: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1614: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1615: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1616: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1617: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1618: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1619: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1620: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1621: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034374 (0x3750ae46) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Sep 28 04:11:12 2022 Not After : Wed Sep 28 04:11:12 2072 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:cc:41:42:de:48:33:95:89:c8:fc:6d:6b:bb:6d:b9: 2a:7e:46:87:16:a9:ed:8a:d3:1e:85:c3:55:d3:42:c6: 38:75:a7:4a:85:e4:76:e9:ba:49:ec:89:7c:7f:63:07: de:b1:91:f0:d7:d7:1b:14:ed:7f:25:1a:88:f8:1b:2d: b3:af:6e:2d:18:3e:38:84:a5:78:60:b2:75:ca:92:ea: df:ed:ec:4a:df:6b:8c:75:a7:fa:0d:ef:da:da:c1:6e: 0e:33:cd:51:28:80:be:ef:ca:ec:e9:f8:ce:f7:44:07: 30:a9:3b:27:db:f5:89:1c:c4:ff:8d:94:fe:24:34:02: c7:e8:bd:22:a6:74:bf:59:78:4f:4a:83:1b:5c:ab:2e: 55:b4:d0:2a:23:2f:12:6f:35:8e:e8:a3:59:30:3a:6a: 00:29:84:c5:45:61:da:4d:dd:61:17:b0:ea:3c:46:69: 01:bd:bf:10:52:e3:f6:3d:ef:12:9d:c3:83:56:27:f5: f3:b4:33:53:16:d7:df:91:52:f6:1a:02:4a:da:ec:a0: 5b:f0:bd:a5:2a:f8:65:a9:67:91:00:df:93:ca:cd:33: 5f:2c:4d:78:84:d6:e0:ea:58:00:aa:fa:e6:b0:96:d2: c4:26:61:82:dc:33:19:8a:d0:7c:04:e1:35:e7:f5:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:9b:65:2d:70:7e:6b:86:e3:d9:12:9d:f6:0e:4e:bc: 56:dd:84:be:6e:81:9f:6c:29:ff:79:82:77:2b:f1:fb: c6:83:3c:5a:b8:60:8e:d2:ec:b4:cd:3e:48:94:31:1d: bc:44:df:ff:60:67:0e:e0:71:4b:98:7d:b1:85:3b:2d: 3f:1e:a0:de:ce:e4:05:17:59:b1:7b:81:d9:4d:97:a0: bd:20:dc:3e:08:9f:98:cb:7e:0b:09:cc:8b:d6:45:36: d7:29:80:36:f7:b0:4f:05:22:f4:f9:83:e1:72:29:99: b0:b9:19:dd:7f:95:3c:4a:c8:4b:55:47:9d:15:d3:3b: 73:c6:2f:4e:43:c3:4b:74:49:a1:9d:f8:8a:93:af:52: 6f:c8:c2:3c:f6:ce:0e:77:ba:a3:3d:37:0b:ab:3a:f9: 14:f3:7a:ea:e5:46:1f:ea:e4:93:16:86:c6:1e:40:51: 63:fc:b3:b7:6b:7f:12:f4:f7:ae:8d:86:7e:4b:43:f5: cf:a2:23:2d:50:03:5e:73:e0:3b:72:59:e5:8f:09:2e: cf:2e:61:c9:fc:e8:64:c8:8d:bc:16:a5:56:87:36:86: 82:50:84:9b:1b:e3:c4:d7:b2:78:e9:1e:ef:66:b6:fb: f6:16:e4:54:a2:59:01:a2:64:5f:e1:6c:95:a8:6e:29 Fingerprint (SHA-256): 48:DA:15:DA:2C:18:E1:64:4E:7A:89:36:ED:8B:3D:8C:68:9E:1E:F3:58:61:CE:C5:2D:F9:D2:EA:79:04:80:37 Fingerprint (SHA1): A5:18:83:A8:7F:20:6B:31:FC:4A:6D:7F:1B:8D:E3:BF:86:BE:15:99 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #1622: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1623: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1624: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1625: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1626: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1627: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1628: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #1629: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #1630: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #1631: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #1632: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #1633: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #1634: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #1635: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1636: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1637: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #1638: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1639: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1640: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034383 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1641: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1642: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1643: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1644: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 928034384 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1645: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1646: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1647: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1648: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 928034385 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1649: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1650: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1651: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1652: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 928034386 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1653: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1654: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1655: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1656: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 928034387 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1657: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1658: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1659: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1660: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 928034388 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1661: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1662: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1663: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1664: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 928034389 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1665: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1666: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #1667: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1668: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 928034390 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1669: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1670: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1671: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1672: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 928034391 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1673: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1674: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1675: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034383 (0x3750ae4f) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:12:07 2022 Not After : Wed Sep 28 04:12:07 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 45:54:e6:22:1c:fc:fc:3f:45:72:11:73:6e:27:78:4a: 0c:2a:8d:a5:c3:79:32:aa:95:cf:4d:3e:b2:1a:0c:35: 8c:03:94:91:da:7c:95:74:41:11:92:e4:4c:8e:62:69: f7:e6:73:63:9f:e5:ff:d4:60:b9:c9:3d:78:43:9c:17: 08:e2:d6:b5:b0:9a:f8:4f:dd:9c:43:b9:57:55:a0:35: 38:f3:ae:dd:52:39:4e:e6:86:38:6c:be:c6:90:66:b0: 1d:fe:92:09:1d:c7:e3:bc:a2:38:fb:5c:a7:73:39:68: 8f:c4:1c:df:4a:cc:a4:1a:72:2d:db:82:e2:d9:04:df: 21:50:42:f1:a4:48:23:ff:d4:9c:f4:31:43:60:1e:3d: 94:e7:ea:29:28:46:3e:5a:a9:bc:b0:f7:f8:8a:8d:1d: b9:ee:e6:0d:13:36:01:c5:99:4e:42:80:77:64:ed:16: 22:40:19:f5:f6:20:00:1d:0c:9c:3c:fd:c8:43:9d:2f: 99:97:eb:45:7f:62:cd:ca:fc:df:11:bb:e1:cb:2d:ec: b6:19:95:19:5f:e0:0f:59:23:c4:b4:fd:06:1d:9e:56: 14:06:77:3e:7c:9f:00:fc:50:d1:21:21:90:d1:32:34: 32:fd:1b:04:9d:6b:a2:09:9f:11:e5:24:28:13:29:a9 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:8a:a8:58:7f:d2:49:14:c0:ba:49:6f: db:44:ea:11:58:98:8a:64:8a:e3:a5:8b:08:e6:e8:61: 94:02:1c:75:64:63:8e:16:2b:ea:08:ec:ad:5d:5f:4e: 73:32:e9:18:96:08:05:7f:f5:8e:fe:33:2f:cd:53 Fingerprint (SHA-256): 47:D1:4F:62:B1:6A:34:1E:85:8F:97:1E:B8:13:25:A9:F5:28:21:D3:2D:A4:BB:6A:57:FD:AB:A9:8E:D2:EA:CA Fingerprint (SHA1): 6C:23:4E:37:64:54:5D:B9:5B:CA:DE:B0:25:CF:2B:3E:89:BE:FD:F1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1676: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034383 (0x3750ae4f) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:12:07 2022 Not After : Wed Sep 28 04:12:07 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 45:54:e6:22:1c:fc:fc:3f:45:72:11:73:6e:27:78:4a: 0c:2a:8d:a5:c3:79:32:aa:95:cf:4d:3e:b2:1a:0c:35: 8c:03:94:91:da:7c:95:74:41:11:92:e4:4c:8e:62:69: f7:e6:73:63:9f:e5:ff:d4:60:b9:c9:3d:78:43:9c:17: 08:e2:d6:b5:b0:9a:f8:4f:dd:9c:43:b9:57:55:a0:35: 38:f3:ae:dd:52:39:4e:e6:86:38:6c:be:c6:90:66:b0: 1d:fe:92:09:1d:c7:e3:bc:a2:38:fb:5c:a7:73:39:68: 8f:c4:1c:df:4a:cc:a4:1a:72:2d:db:82:e2:d9:04:df: 21:50:42:f1:a4:48:23:ff:d4:9c:f4:31:43:60:1e:3d: 94:e7:ea:29:28:46:3e:5a:a9:bc:b0:f7:f8:8a:8d:1d: b9:ee:e6:0d:13:36:01:c5:99:4e:42:80:77:64:ed:16: 22:40:19:f5:f6:20:00:1d:0c:9c:3c:fd:c8:43:9d:2f: 99:97:eb:45:7f:62:cd:ca:fc:df:11:bb:e1:cb:2d:ec: b6:19:95:19:5f:e0:0f:59:23:c4:b4:fd:06:1d:9e:56: 14:06:77:3e:7c:9f:00:fc:50:d1:21:21:90:d1:32:34: 32:fd:1b:04:9d:6b:a2:09:9f:11:e5:24:28:13:29:a9 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:8a:a8:58:7f:d2:49:14:c0:ba:49:6f: db:44:ea:11:58:98:8a:64:8a:e3:a5:8b:08:e6:e8:61: 94:02:1c:75:64:63:8e:16:2b:ea:08:ec:ad:5d:5f:4e: 73:32:e9:18:96:08:05:7f:f5:8e:fe:33:2f:cd:53 Fingerprint (SHA-256): 47:D1:4F:62:B1:6A:34:1E:85:8F:97:1E:B8:13:25:A9:F5:28:21:D3:2D:A4:BB:6A:57:FD:AB:A9:8E:D2:EA:CA Fingerprint (SHA1): 6C:23:4E:37:64:54:5D:B9:5B:CA:DE:B0:25:CF:2B:3E:89:BE:FD:F1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1677: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034383 (0x3750ae4f) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:12:07 2022 Not After : Wed Sep 28 04:12:07 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 45:54:e6:22:1c:fc:fc:3f:45:72:11:73:6e:27:78:4a: 0c:2a:8d:a5:c3:79:32:aa:95:cf:4d:3e:b2:1a:0c:35: 8c:03:94:91:da:7c:95:74:41:11:92:e4:4c:8e:62:69: f7:e6:73:63:9f:e5:ff:d4:60:b9:c9:3d:78:43:9c:17: 08:e2:d6:b5:b0:9a:f8:4f:dd:9c:43:b9:57:55:a0:35: 38:f3:ae:dd:52:39:4e:e6:86:38:6c:be:c6:90:66:b0: 1d:fe:92:09:1d:c7:e3:bc:a2:38:fb:5c:a7:73:39:68: 8f:c4:1c:df:4a:cc:a4:1a:72:2d:db:82:e2:d9:04:df: 21:50:42:f1:a4:48:23:ff:d4:9c:f4:31:43:60:1e:3d: 94:e7:ea:29:28:46:3e:5a:a9:bc:b0:f7:f8:8a:8d:1d: b9:ee:e6:0d:13:36:01:c5:99:4e:42:80:77:64:ed:16: 22:40:19:f5:f6:20:00:1d:0c:9c:3c:fd:c8:43:9d:2f: 99:97:eb:45:7f:62:cd:ca:fc:df:11:bb:e1:cb:2d:ec: b6:19:95:19:5f:e0:0f:59:23:c4:b4:fd:06:1d:9e:56: 14:06:77:3e:7c:9f:00:fc:50:d1:21:21:90:d1:32:34: 32:fd:1b:04:9d:6b:a2:09:9f:11:e5:24:28:13:29:a9 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:8a:a8:58:7f:d2:49:14:c0:ba:49:6f: db:44:ea:11:58:98:8a:64:8a:e3:a5:8b:08:e6:e8:61: 94:02:1c:75:64:63:8e:16:2b:ea:08:ec:ad:5d:5f:4e: 73:32:e9:18:96:08:05:7f:f5:8e:fe:33:2f:cd:53 Fingerprint (SHA-256): 47:D1:4F:62:B1:6A:34:1E:85:8F:97:1E:B8:13:25:A9:F5:28:21:D3:2D:A4:BB:6A:57:FD:AB:A9:8E:D2:EA:CA Fingerprint (SHA1): 6C:23:4E:37:64:54:5D:B9:5B:CA:DE:B0:25:CF:2B:3E:89:BE:FD:F1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1678: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034383 (0x3750ae4f) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:12:07 2022 Not After : Wed Sep 28 04:12:07 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 45:54:e6:22:1c:fc:fc:3f:45:72:11:73:6e:27:78:4a: 0c:2a:8d:a5:c3:79:32:aa:95:cf:4d:3e:b2:1a:0c:35: 8c:03:94:91:da:7c:95:74:41:11:92:e4:4c:8e:62:69: f7:e6:73:63:9f:e5:ff:d4:60:b9:c9:3d:78:43:9c:17: 08:e2:d6:b5:b0:9a:f8:4f:dd:9c:43:b9:57:55:a0:35: 38:f3:ae:dd:52:39:4e:e6:86:38:6c:be:c6:90:66:b0: 1d:fe:92:09:1d:c7:e3:bc:a2:38:fb:5c:a7:73:39:68: 8f:c4:1c:df:4a:cc:a4:1a:72:2d:db:82:e2:d9:04:df: 21:50:42:f1:a4:48:23:ff:d4:9c:f4:31:43:60:1e:3d: 94:e7:ea:29:28:46:3e:5a:a9:bc:b0:f7:f8:8a:8d:1d: b9:ee:e6:0d:13:36:01:c5:99:4e:42:80:77:64:ed:16: 22:40:19:f5:f6:20:00:1d:0c:9c:3c:fd:c8:43:9d:2f: 99:97:eb:45:7f:62:cd:ca:fc:df:11:bb:e1:cb:2d:ec: b6:19:95:19:5f:e0:0f:59:23:c4:b4:fd:06:1d:9e:56: 14:06:77:3e:7c:9f:00:fc:50:d1:21:21:90:d1:32:34: 32:fd:1b:04:9d:6b:a2:09:9f:11:e5:24:28:13:29:a9 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:8a:a8:58:7f:d2:49:14:c0:ba:49:6f: db:44:ea:11:58:98:8a:64:8a:e3:a5:8b:08:e6:e8:61: 94:02:1c:75:64:63:8e:16:2b:ea:08:ec:ad:5d:5f:4e: 73:32:e9:18:96:08:05:7f:f5:8e:fe:33:2f:cd:53 Fingerprint (SHA-256): 47:D1:4F:62:B1:6A:34:1E:85:8F:97:1E:B8:13:25:A9:F5:28:21:D3:2D:A4:BB:6A:57:FD:AB:A9:8E:D2:EA:CA Fingerprint (SHA1): 6C:23:4E:37:64:54:5D:B9:5B:CA:DE:B0:25:CF:2B:3E:89:BE:FD:F1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #1679: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1680: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 10 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1681: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1682: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1683: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1684: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1685: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1686: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1687: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1688: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1689: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1690: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1691: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1692: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1693: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1694: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #1695: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1696: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1697: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1698: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1699: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1700: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1701: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1702: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1703: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1704: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1705: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1706: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20220928041315Z nextupdate=20230928041315Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Sep 28 04:13:15 2022 Next Update: Thu Sep 28 04:13:15 2023 CRL Extensions: chains.sh: #1707: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220928041317Z nextupdate=20230928041317Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Sep 28 04:13:17 2022 Next Update: Thu Sep 28 04:13:17 2023 CRL Extensions: chains.sh: #1708: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20220928041319Z nextupdate=20230928041319Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Sep 28 04:13:19 2022 Next Update: Thu Sep 28 04:13:19 2023 CRL Extensions: chains.sh: #1709: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20220928041321Z nextupdate=20230928041321Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Sep 28 04:13:21 2022 Next Update: Thu Sep 28 04:13:21 2023 CRL Extensions: chains.sh: #1710: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20220928041323Z addcert 14 20220928041323Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Sep 28 04:13:23 2022 Next Update: Thu Sep 28 04:13:19 2023 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Wed Sep 28 04:13:23 2022 CRL Extensions: chains.sh: #1711: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220928041325Z addcert 15 20220928041325Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Sep 28 04:13:25 2022 Next Update: Thu Sep 28 04:13:17 2023 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Wed Sep 28 04:13:25 2022 CRL Extensions: chains.sh: #1712: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1713: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1714: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1715: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #1716: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #1717: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #1718: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #1719: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #1720: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #1721: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:12:41 2022 Not After : Wed Sep 28 04:12:41 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:84:ee:b9:69:f2:74:d9:b1:94:b0:fa:53:fd:e8:fa: 4c:8b:58:1d:82:c7:43:a8:a5:35:b6:9f:1f:fd:de:e7: b7:3f:cf:61:d9:da:7c:6c:06:9a:6d:4b:a2:9b:81:ba: eb:a0:c3:29:77:d2:a8:d9:07:db:25:00:6f:4e:47:cb: df:a4:60:55:98:c4:0e:54:a3:53:7e:42:8f:f6:d5:3d: cb:a7:46:2d:dd:1c:bf:99:ac:c1:52:a6:92:b0:0f:a2: 1f:96:11:4f:9f:4b:64:22:2f:f2:ab:88:75:86:ec:32: fa:f2:62:07:75:87:6b:d5:39:9b:e2:4a:f2:9f:24:24: 43:08:15:af:f6:96:18:22:86:8c:1d:34:59:dc:bc:44: 4a:14:27:a0:d3:2d:b6:be:12:01:77:6c:ec:2b:67:ae: 62:25:26:78:e1:53:6e:e5:77:bb:01:18:d8:c9:d9:71: 20:39:bc:2b:17:61:51:e7:3d:8d:e4:61:80:b4:fb:03: ed:08:f4:b8:be:03:67:fc:be:64:4a:e2:10:cc:39:02: 5c:07:8c:42:ba:58:46:dc:2f:b8:5a:d2:63:36:7c:50: 58:ab:3b:fd:d8:45:3d:61:ee:36:73:7f:ec:25:34:e6: 38:7d:67:2f:3d:79:37:3b:7c:af:09:ab:d0:be:f1:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bd:20:a9:d9:4f:96:f2:b2:6d:db:25:f1:43:aa:72:dd: 2c:67:26:45:fc:4b:24:6a:79:f2:b0:76:78:7a:41:65: 89:d9:4f:d8:70:d6:11:2e:62:22:db:43:d2:67:49:18: c1:98:f1:16:c3:43:df:df:5b:38:28:9e:1a:4f:5d:d7: c9:16:30:ee:77:59:a4:be:1a:3d:b1:36:42:76:95:9b: f4:58:1e:4c:41:fa:27:ca:af:96:e8:a7:62:23:f9:16: 61:c5:d1:c8:10:12:a6:94:81:95:08:9b:0a:c7:8c:e2: 79:c1:40:7f:6b:c1:0e:c5:45:ed:c6:1c:bd:e5:7f:8b: 29:62:3c:19:35:6b:c3:56:dc:56:5a:ac:60:ac:a9:6f: 1f:a3:f8:70:e0:4f:48:1d:78:2b:24:49:9e:8d:4b:e3: b1:da:6e:f5:be:23:6a:c3:44:0c:a1:b9:b4:3f:24:ee: 78:44:62:0d:99:02:ce:03:fc:5f:17:35:b7:2f:36:af: e3:24:9e:01:7b:eb:4c:63:36:54:0c:79:f5:4e:c0:bc: 25:34:59:e3:90:61:f4:16:0f:d0:6f:27:3d:2b:79:47: 9d:77:11:57:ed:95:a5:bb:a2:68:14:b1:0b:db:aa:75: e8:53:06:44:e0:da:5a:86:96:44:5d:f4:8b:68:1e:29 Fingerprint (SHA-256): 0C:4C:6F:F0:3F:E7:62:B9:DE:9F:35:C3:E2:6A:9E:FE:51:02:93:01:31:34:AD:8E:B7:01:AD:2D:7D:09:BC:6E Fingerprint (SHA1): C5:64:E9:D8:EB:C0:59:25:61:20:93:14:48:A2:74:B6:DB:D7:14:6D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1722: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1723: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:12:41 2022 Not After : Wed Sep 28 04:12:41 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:84:ee:b9:69:f2:74:d9:b1:94:b0:fa:53:fd:e8:fa: 4c:8b:58:1d:82:c7:43:a8:a5:35:b6:9f:1f:fd:de:e7: b7:3f:cf:61:d9:da:7c:6c:06:9a:6d:4b:a2:9b:81:ba: eb:a0:c3:29:77:d2:a8:d9:07:db:25:00:6f:4e:47:cb: df:a4:60:55:98:c4:0e:54:a3:53:7e:42:8f:f6:d5:3d: cb:a7:46:2d:dd:1c:bf:99:ac:c1:52:a6:92:b0:0f:a2: 1f:96:11:4f:9f:4b:64:22:2f:f2:ab:88:75:86:ec:32: fa:f2:62:07:75:87:6b:d5:39:9b:e2:4a:f2:9f:24:24: 43:08:15:af:f6:96:18:22:86:8c:1d:34:59:dc:bc:44: 4a:14:27:a0:d3:2d:b6:be:12:01:77:6c:ec:2b:67:ae: 62:25:26:78:e1:53:6e:e5:77:bb:01:18:d8:c9:d9:71: 20:39:bc:2b:17:61:51:e7:3d:8d:e4:61:80:b4:fb:03: ed:08:f4:b8:be:03:67:fc:be:64:4a:e2:10:cc:39:02: 5c:07:8c:42:ba:58:46:dc:2f:b8:5a:d2:63:36:7c:50: 58:ab:3b:fd:d8:45:3d:61:ee:36:73:7f:ec:25:34:e6: 38:7d:67:2f:3d:79:37:3b:7c:af:09:ab:d0:be:f1:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bd:20:a9:d9:4f:96:f2:b2:6d:db:25:f1:43:aa:72:dd: 2c:67:26:45:fc:4b:24:6a:79:f2:b0:76:78:7a:41:65: 89:d9:4f:d8:70:d6:11:2e:62:22:db:43:d2:67:49:18: c1:98:f1:16:c3:43:df:df:5b:38:28:9e:1a:4f:5d:d7: c9:16:30:ee:77:59:a4:be:1a:3d:b1:36:42:76:95:9b: f4:58:1e:4c:41:fa:27:ca:af:96:e8:a7:62:23:f9:16: 61:c5:d1:c8:10:12:a6:94:81:95:08:9b:0a:c7:8c:e2: 79:c1:40:7f:6b:c1:0e:c5:45:ed:c6:1c:bd:e5:7f:8b: 29:62:3c:19:35:6b:c3:56:dc:56:5a:ac:60:ac:a9:6f: 1f:a3:f8:70:e0:4f:48:1d:78:2b:24:49:9e:8d:4b:e3: b1:da:6e:f5:be:23:6a:c3:44:0c:a1:b9:b4:3f:24:ee: 78:44:62:0d:99:02:ce:03:fc:5f:17:35:b7:2f:36:af: e3:24:9e:01:7b:eb:4c:63:36:54:0c:79:f5:4e:c0:bc: 25:34:59:e3:90:61:f4:16:0f:d0:6f:27:3d:2b:79:47: 9d:77:11:57:ed:95:a5:bb:a2:68:14:b1:0b:db:aa:75: e8:53:06:44:e0:da:5a:86:96:44:5d:f4:8b:68:1e:29 Fingerprint (SHA-256): 0C:4C:6F:F0:3F:E7:62:B9:DE:9F:35:C3:E2:6A:9E:FE:51:02:93:01:31:34:AD:8E:B7:01:AD:2D:7D:09:BC:6E Fingerprint (SHA1): C5:64:E9:D8:EB:C0:59:25:61:20:93:14:48:A2:74:B6:DB:D7:14:6D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1724: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1725: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1726: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034392 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1727: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1728: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1729: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1730: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 928034393 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1731: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1732: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1733: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-928034149.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1734: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-928034122.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1735: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1736: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1737: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-928034149.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1738: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 928034394 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1739: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1740: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1741: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-928034149.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1742: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-928034123.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1743: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1744: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1745: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1746: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 928034395 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1747: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1748: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1749: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-928034149.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1750: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-928034124.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1751: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1752: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1753: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9233/localhost-3122-CA0-928034149.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1754: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9233/localhost-3122-CA0Root-928034125.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1755: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1756: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20220928041420Z nextupdate=20230928041420Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Sep 28 04:14:20 2022 Next Update: Thu Sep 28 04:14:20 2023 CRL Extensions: chains.sh: #1757: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220928041422Z nextupdate=20230928041422Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Sep 28 04:14:22 2022 Next Update: Thu Sep 28 04:14:22 2023 CRL Extensions: chains.sh: #1758: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20220928041424Z nextupdate=20230928041424Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Sep 28 04:14:24 2022 Next Update: Thu Sep 28 04:14:24 2023 CRL Extensions: chains.sh: #1759: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20220928041426Z nextupdate=20230928041426Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Sep 28 04:14:26 2022 Next Update: Thu Sep 28 04:14:26 2023 CRL Extensions: chains.sh: #1760: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220928041428Z addcert 20 20220928041428Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Sep 28 04:14:28 2022 Next Update: Thu Sep 28 04:14:22 2023 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Sep 28 04:14:28 2022 CRL Extensions: chains.sh: #1761: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20220928041430Z addcert 40 20220928041430Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Sep 28 04:14:30 2022 Next Update: Thu Sep 28 04:14:22 2023 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Sep 28 04:14:28 2022 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Wed Sep 28 04:14:30 2022 CRL Extensions: chains.sh: #1762: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1763: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1764: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1765: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034392 (0x3750ae58) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:13:37 2022 Not After : Wed Sep 28 04:13:37 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:9c:4a:04:f9:b1:4f:aa:37:4d:b4:3f:f7:62:93:ab: a6:7c:c0:05:cb:05:99:01:40:cd:13:04:c8:35:8f:49: c5:26:f4:2d:e3:85:2c:f1:51:f0:13:28:b7:c4:87:3d: 7d:2b:62:cd:13:ea:a6:27:50:e4:3a:c3:60:cf:33:31: db:9c:b8:47:f4:e5:4a:80:b2:3a:fd:89:54:70:3f:32: de:e1:0b:45:67:26:e2:37:29:27:3b:89:8b:de:f4:d6: e9:3b:c0:3c:fe:69:16:fa:e0:da:55:db:49:cb:55:24: 44:a6:3b:fc:91:17:22:34:67:a8:cd:50:91:88:80:a5: b2:3a:2a:38:90:30:f1:80:86:8c:8f:2a:1e:4f:84:5b: f5:2b:49:99:f3:83:e3:2e:3d:b9:03:07:81:10:7e:bb: 99:26:ea:65:24:14:b0:0f:85:4c:3c:15:d9:b1:47:8c: 00:49:f1:fd:7f:47:63:91:07:15:b6:0e:76:aa:ff:c6: 11:2a:27:82:82:d1:ec:81:d3:2b:03:e5:e9:f3:b9:78: 70:40:46:a0:87:de:e6:9a:dc:68:53:09:09:d7:66:1f: 87:3b:96:4f:76:4f:9a:8f:c8:53:2a:cf:e5:94:ef:d7: b6:ae:30:4a:05:4d:52:67:62:43:59:b1:43:82:b2:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:9b:fe:26:22:fc:8f:bf:7c:92:68:43:03:44:60:d9: 5a:53:04:db:d3:90:6e:9e:4f:70:17:94:2f:b3:7d:09: d5:5f:e1:a1:8b:d7:d4:61:57:ff:55:a5:4e:48:f9:08: 62:06:ad:c3:7a:ef:16:4a:8e:37:ca:37:89:2f:8c:05: 48:3b:55:1f:30:04:55:28:7f:b2:06:6f:f8:4e:a0:1d: 98:8e:e0:08:7f:ee:a2:6e:06:e3:e1:41:c7:fd:63:22: 2e:a6:bf:37:bb:d3:c8:a3:c8:58:0e:ef:4f:e9:b1:77: 02:f4:49:6d:72:e9:56:5f:13:1c:9d:d8:42:82:de:16: 87:19:81:cc:f6:da:71:d6:07:fa:b1:d4:ca:17:98:4c: 1a:c9:6b:f6:32:f3:2f:68:3a:45:af:0f:a8:e9:db:85: 90:e2:91:0a:e3:c5:c8:28:14:7b:ca:a1:86:da:ad:b8: d8:f4:7c:28:af:df:67:b0:8b:4e:2c:c5:87:e9:2c:b0: a4:32:4f:23:a5:f6:4a:46:84:4b:f5:08:60:62:20:38: 50:09:4b:35:78:47:75:4b:c3:06:b4:b9:23:89:be:01: b6:d0:44:91:98:fc:fb:70:3f:12:37:b7:7a:a3:b3:e3: 88:91:3d:b8:39:f8:c2:e1:e9:33:34:bd:a2:57:a5:fb Fingerprint (SHA-256): B6:21:96:27:D1:5A:78:82:39:B5:68:12:E8:29:2F:F8:D3:2B:71:A8:86:4D:2A:A5:71:EC:61:AB:61:DC:3C:81 Fingerprint (SHA1): 5F:80:B6:60:7E:E8:51:89:63:07:4C:A9:E9:2B:42:B7:0F:EC:84:B0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1766: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1767: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034392 (0x3750ae58) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Sep 28 04:13:37 2022 Not After : Wed Sep 28 04:13:37 2072 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:9c:4a:04:f9:b1:4f:aa:37:4d:b4:3f:f7:62:93:ab: a6:7c:c0:05:cb:05:99:01:40:cd:13:04:c8:35:8f:49: c5:26:f4:2d:e3:85:2c:f1:51:f0:13:28:b7:c4:87:3d: 7d:2b:62:cd:13:ea:a6:27:50:e4:3a:c3:60:cf:33:31: db:9c:b8:47:f4:e5:4a:80:b2:3a:fd:89:54:70:3f:32: de:e1:0b:45:67:26:e2:37:29:27:3b:89:8b:de:f4:d6: e9:3b:c0:3c:fe:69:16:fa:e0:da:55:db:49:cb:55:24: 44:a6:3b:fc:91:17:22:34:67:a8:cd:50:91:88:80:a5: b2:3a:2a:38:90:30:f1:80:86:8c:8f:2a:1e:4f:84:5b: f5:2b:49:99:f3:83:e3:2e:3d:b9:03:07:81:10:7e:bb: 99:26:ea:65:24:14:b0:0f:85:4c:3c:15:d9:b1:47:8c: 00:49:f1:fd:7f:47:63:91:07:15:b6:0e:76:aa:ff:c6: 11:2a:27:82:82:d1:ec:81:d3:2b:03:e5:e9:f3:b9:78: 70:40:46:a0:87:de:e6:9a:dc:68:53:09:09:d7:66:1f: 87:3b:96:4f:76:4f:9a:8f:c8:53:2a:cf:e5:94:ef:d7: b6:ae:30:4a:05:4d:52:67:62:43:59:b1:43:82:b2:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:9b:fe:26:22:fc:8f:bf:7c:92:68:43:03:44:60:d9: 5a:53:04:db:d3:90:6e:9e:4f:70:17:94:2f:b3:7d:09: d5:5f:e1:a1:8b:d7:d4:61:57:ff:55:a5:4e:48:f9:08: 62:06:ad:c3:7a:ef:16:4a:8e:37:ca:37:89:2f:8c:05: 48:3b:55:1f:30:04:55:28:7f:b2:06:6f:f8:4e:a0:1d: 98:8e:e0:08:7f:ee:a2:6e:06:e3:e1:41:c7:fd:63:22: 2e:a6:bf:37:bb:d3:c8:a3:c8:58:0e:ef:4f:e9:b1:77: 02:f4:49:6d:72:e9:56:5f:13:1c:9d:d8:42:82:de:16: 87:19:81:cc:f6:da:71:d6:07:fa:b1:d4:ca:17:98:4c: 1a:c9:6b:f6:32:f3:2f:68:3a:45:af:0f:a8:e9:db:85: 90:e2:91:0a:e3:c5:c8:28:14:7b:ca:a1:86:da:ad:b8: d8:f4:7c:28:af:df:67:b0:8b:4e:2c:c5:87:e9:2c:b0: a4:32:4f:23:a5:f6:4a:46:84:4b:f5:08:60:62:20:38: 50:09:4b:35:78:47:75:4b:c3:06:b4:b9:23:89:be:01: b6:d0:44:91:98:fc:fb:70:3f:12:37:b7:7a:a3:b3:e3: 88:91:3d:b8:39:f8:c2:e1:e9:33:34:bd:a2:57:a5:fb Fingerprint (SHA-256): B6:21:96:27:D1:5A:78:82:39:B5:68:12:E8:29:2F:F8:D3:2B:71:A8:86:4D:2A:A5:71:EC:61:AB:61:DC:3C:81 Fingerprint (SHA1): 5F:80:B6:60:7E:E8:51:89:63:07:4C:A9:E9:2B:42:B7:0F:EC:84:B0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1768: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1769: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1770: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034396 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1771: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1772: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1773: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1774: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 928034397 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1775: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1776: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1777: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1778: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 928034398 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1779: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1780: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1781: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1782: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 928034399 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1783: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1784: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #1785: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -m 928034400 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1786: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #1787: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #1788: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1789: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 928034401 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1790: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1791: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1792: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1793: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 928034402 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1794: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1795: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #1796: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #1797: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #1798: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034396 (0x3750ae5c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 04:14:40 2022 Not After : Wed Sep 28 04:14:40 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:be:19:ab:21:9e:8c:46:5b:df:fe:6b:92:a6:4f:e1: c6:15:ee:30:17:67:85:c7:32:ac:40:86:a5:96:9e:47: e2:85:47:ed:54:0d:be:74:3e:16:5d:55:1f:c2:1b:a1: af:bb:54:70:4d:45:69:b4:b5:9f:27:f6:6b:2b:7b:78: ed:25:95:93:5c:c1:ae:99:b9:66:bf:78:ee:a9:9a:4f: d0:36:f9:c8:83:2f:ca:a3:40:13:b7:02:e6:a8:be:4f: 68:af:46:df:61:72:51:5e:8f:a6:4a:d3:c4:c1:db:53: be:27:fe:83:ff:c4:ba:18:ca:54:fd:6a:37:ee:bd:5c: 9e:ee:ab:41:62:fd:7e:5c:aa:86:0e:86:d3:36:c7:cd: 50:c8:5f:cd:80:ee:0b:13:7a:0a:0c:c2:23:3b:cc:1f: 09:30:5c:77:b3:fa:c2:11:10:ff:08:8e:c0:5a:8b:21: 39:42:54:0a:56:61:80:5d:7e:70:2c:04:d9:c5:5b:8a: 1b:5c:2d:1b:eb:87:48:e6:d0:1b:f5:a2:ae:b0:fa:0a: 35:a8:d5:ce:3e:7d:07:46:be:54:60:f9:a9:73:f8:7d: 08:cb:10:b1:79:2f:5b:10:7a:25:6a:e1:72:8b:cf:08: 98:94:e7:56:68:57:a4:6e:47:b8:05:5c:80:6e:21:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:9e:b4:ef:a2:31:e5:f1:21:3a:c7:70:36:98:97:39: 1d:33:b9:91:e3:7f:2e:78:80:68:1d:51:f0:2a:1a:76: 89:32:af:f5:d5:8d:e5:9b:64:b9:60:5d:93:63:05:b0: 87:4c:ec:05:6c:b3:51:b2:70:b5:1b:2f:74:8d:3b:46: 4c:ef:eb:c5:f7:a3:72:3d:2a:fd:52:fc:33:c5:c9:7f: 63:48:d2:6f:41:fd:21:95:f8:73:21:1e:01:06:6d:3a: a1:07:7a:83:cd:23:39:57:6a:e6:2a:e7:fe:ea:e2:0e: ef:48:e8:17:ad:c7:18:b5:b9:e2:c7:16:47:13:d4:39: 0d:9e:f8:3a:9e:41:4c:01:67:cf:1b:14:96:16:de:f0: 95:f8:64:2d:3e:f1:cd:cf:b6:8d:49:07:89:31:e5:ce: 15:0f:de:d5:a1:c3:36:90:83:cc:03:c7:02:13:b5:99: a8:8b:3b:8d:de:57:1b:4a:c0:c0:7d:bb:3a:84:ad:5f: 30:46:8d:52:53:cb:d2:ec:92:25:d0:4e:59:36:2e:5f: 2e:1a:eb:73:aa:c3:e5:c7:40:12:9a:43:51:fa:07:ae: 16:48:f0:e3:21:c3:18:85:94:37:06:05:14:0d:8e:cd: 53:67:ed:1a:78:b5:69:45:75:34:f5:24:02:36:95:53 Fingerprint (SHA-256): 7D:5F:9D:22:15:B1:2E:6F:1C:90:14:9B:50:B3:EA:FA:A4:D9:E2:D1:D2:EA:17:90:89:49:29:71:2A:46:29:84 Fingerprint (SHA1): BA:F5:2B:7A:51:2A:CC:B0:9F:E2:6D:27:08:06:57:59:BA:64:24:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1799: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034398 (0x3750ae5e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Sep 28 04:14:50 2022 Not After : Tue Sep 28 04:14:50 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:d3:a5:48:d6:d8:a3:22:ab:ec:3d:53:88:ba:d3:b1: 33:22:64:fa:5b:d1:15:3a:47:85:7b:f6:ba:ba:d2:b7: bd:83:39:2a:3f:98:b3:e5:47:65:db:63:b0:76:ab:0a: 6d:6e:44:ce:e0:23:02:cf:1c:d9:e5:7c:a7:ae:51:75: ad:49:44:f5:83:13:7f:ed:f6:bf:5f:e2:73:01:09:9b: d1:24:e0:24:d9:22:72:de:73:63:b0:15:a8:26:ac:a6: f1:d8:81:2e:12:ef:f6:c3:0f:88:16:71:d4:cf:6a:7a: 44:46:9b:9e:4e:d7:52:24:50:62:3e:6b:e4:ba:15:b4: 3b:fa:35:dd:51:33:de:93:76:90:21:23:87:ea:1b:7e: 4a:01:74:84:6f:56:31:95:c2:76:50:30:82:88:bb:7f: 5b:d4:56:6a:c3:65:ae:b9:74:58:ef:6c:ba:a4:2c:e3: 39:0b:0e:bd:3e:9a:1a:a6:90:78:fb:38:e5:e4:e6:9c: 38:88:5e:d9:84:2d:a1:b4:0d:a3:0e:c9:f0:42:78:35: fa:cd:a1:21:99:13:b0:13:06:89:bc:b9:cf:e1:52:b9: 2d:f1:8d:a3:89:3e:88:50:7a:a5:d3:b8:a6:36:d8:6b: d5:0b:61:71:0e:50:9e:f1:92:30:49:0e:c9:8b:e2:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 17:f7:c3:41:a0:7e:4e:eb:50:80:c3:ad:41:34:76:9c: 80:fa:65:d9:64:51:1b:0f:00:dd:44:65:dd:24:d9:c1: ee:5c:38:ca:a6:e1:44:8a:86:3a:c4:74:80:b9:29:5d: 41:54:2b:b3:18:52:72:37:20:7c:6a:90:36:aa:39:3e: e0:8d:60:65:a6:2b:c9:95:8c:f1:ac:58:bd:7a:49:73: 62:ee:f5:a9:07:db:5b:1e:bf:77:57:2d:82:ed:97:df: f6:06:c5:9e:b6:74:0c:25:93:98:5b:6b:37:2c:c8:1d: ea:d2:8c:ae:f1:f0:d1:b4:75:87:01:98:4e:e3:9c:61: 1b:a4:e7:39:1d:38:a1:8a:b1:d4:fe:56:f4:a8:ae:f4: cd:ae:44:e0:d9:61:5a:b7:0a:aa:cc:c9:61:ff:7b:32: 6e:81:7f:fa:b3:98:ba:f3:f7:65:cb:10:56:46:05:df: c0:cf:4b:09:1e:dc:92:6c:a2:1c:35:4d:44:18:8f:58: 2b:c9:b5:3c:17:cc:98:1c:f2:01:ae:36:36:a8:1d:f4: 6f:92:cf:bd:73:6d:c3:82:9a:a1:5c:08:c3:a3:51:54: ef:2b:dd:90:26:20:10:da:af:74:31:c6:9d:68:e5:7e: db:ac:6f:0e:98:66:7f:6b:58:bb:f1:6b:66:cc:11:fd Fingerprint (SHA-256): FD:F9:BB:88:6E:02:6D:47:C0:5B:F8:62:F5:13:C1:AC:30:11:8D:A0:EF:9B:11:5F:5B:9F:EA:BC:08:F8:E0:30 Fingerprint (SHA1): D8:B7:4D:73:85:AE:3E:3B:BE:42:94:AB:06:D3:29:34:74:8F:A4:64 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1800: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034396 (0x3750ae5c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 04:14:40 2022 Not After : Wed Sep 28 04:14:40 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:be:19:ab:21:9e:8c:46:5b:df:fe:6b:92:a6:4f:e1: c6:15:ee:30:17:67:85:c7:32:ac:40:86:a5:96:9e:47: e2:85:47:ed:54:0d:be:74:3e:16:5d:55:1f:c2:1b:a1: af:bb:54:70:4d:45:69:b4:b5:9f:27:f6:6b:2b:7b:78: ed:25:95:93:5c:c1:ae:99:b9:66:bf:78:ee:a9:9a:4f: d0:36:f9:c8:83:2f:ca:a3:40:13:b7:02:e6:a8:be:4f: 68:af:46:df:61:72:51:5e:8f:a6:4a:d3:c4:c1:db:53: be:27:fe:83:ff:c4:ba:18:ca:54:fd:6a:37:ee:bd:5c: 9e:ee:ab:41:62:fd:7e:5c:aa:86:0e:86:d3:36:c7:cd: 50:c8:5f:cd:80:ee:0b:13:7a:0a:0c:c2:23:3b:cc:1f: 09:30:5c:77:b3:fa:c2:11:10:ff:08:8e:c0:5a:8b:21: 39:42:54:0a:56:61:80:5d:7e:70:2c:04:d9:c5:5b:8a: 1b:5c:2d:1b:eb:87:48:e6:d0:1b:f5:a2:ae:b0:fa:0a: 35:a8:d5:ce:3e:7d:07:46:be:54:60:f9:a9:73:f8:7d: 08:cb:10:b1:79:2f:5b:10:7a:25:6a:e1:72:8b:cf:08: 98:94:e7:56:68:57:a4:6e:47:b8:05:5c:80:6e:21:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:9e:b4:ef:a2:31:e5:f1:21:3a:c7:70:36:98:97:39: 1d:33:b9:91:e3:7f:2e:78:80:68:1d:51:f0:2a:1a:76: 89:32:af:f5:d5:8d:e5:9b:64:b9:60:5d:93:63:05:b0: 87:4c:ec:05:6c:b3:51:b2:70:b5:1b:2f:74:8d:3b:46: 4c:ef:eb:c5:f7:a3:72:3d:2a:fd:52:fc:33:c5:c9:7f: 63:48:d2:6f:41:fd:21:95:f8:73:21:1e:01:06:6d:3a: a1:07:7a:83:cd:23:39:57:6a:e6:2a:e7:fe:ea:e2:0e: ef:48:e8:17:ad:c7:18:b5:b9:e2:c7:16:47:13:d4:39: 0d:9e:f8:3a:9e:41:4c:01:67:cf:1b:14:96:16:de:f0: 95:f8:64:2d:3e:f1:cd:cf:b6:8d:49:07:89:31:e5:ce: 15:0f:de:d5:a1:c3:36:90:83:cc:03:c7:02:13:b5:99: a8:8b:3b:8d:de:57:1b:4a:c0:c0:7d:bb:3a:84:ad:5f: 30:46:8d:52:53:cb:d2:ec:92:25:d0:4e:59:36:2e:5f: 2e:1a:eb:73:aa:c3:e5:c7:40:12:9a:43:51:fa:07:ae: 16:48:f0:e3:21:c3:18:85:94:37:06:05:14:0d:8e:cd: 53:67:ed:1a:78:b5:69:45:75:34:f5:24:02:36:95:53 Fingerprint (SHA-256): 7D:5F:9D:22:15:B1:2E:6F:1C:90:14:9B:50:B3:EA:FA:A4:D9:E2:D1:D2:EA:17:90:89:49:29:71:2A:46:29:84 Fingerprint (SHA1): BA:F5:2B:7A:51:2A:CC:B0:9F:E2:6D:27:08:06:57:59:BA:64:24:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1801: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #1802: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034396 (0x3750ae5c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 04:14:40 2022 Not After : Wed Sep 28 04:14:40 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:be:19:ab:21:9e:8c:46:5b:df:fe:6b:92:a6:4f:e1: c6:15:ee:30:17:67:85:c7:32:ac:40:86:a5:96:9e:47: e2:85:47:ed:54:0d:be:74:3e:16:5d:55:1f:c2:1b:a1: af:bb:54:70:4d:45:69:b4:b5:9f:27:f6:6b:2b:7b:78: ed:25:95:93:5c:c1:ae:99:b9:66:bf:78:ee:a9:9a:4f: d0:36:f9:c8:83:2f:ca:a3:40:13:b7:02:e6:a8:be:4f: 68:af:46:df:61:72:51:5e:8f:a6:4a:d3:c4:c1:db:53: be:27:fe:83:ff:c4:ba:18:ca:54:fd:6a:37:ee:bd:5c: 9e:ee:ab:41:62:fd:7e:5c:aa:86:0e:86:d3:36:c7:cd: 50:c8:5f:cd:80:ee:0b:13:7a:0a:0c:c2:23:3b:cc:1f: 09:30:5c:77:b3:fa:c2:11:10:ff:08:8e:c0:5a:8b:21: 39:42:54:0a:56:61:80:5d:7e:70:2c:04:d9:c5:5b:8a: 1b:5c:2d:1b:eb:87:48:e6:d0:1b:f5:a2:ae:b0:fa:0a: 35:a8:d5:ce:3e:7d:07:46:be:54:60:f9:a9:73:f8:7d: 08:cb:10:b1:79:2f:5b:10:7a:25:6a:e1:72:8b:cf:08: 98:94:e7:56:68:57:a4:6e:47:b8:05:5c:80:6e:21:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:9e:b4:ef:a2:31:e5:f1:21:3a:c7:70:36:98:97:39: 1d:33:b9:91:e3:7f:2e:78:80:68:1d:51:f0:2a:1a:76: 89:32:af:f5:d5:8d:e5:9b:64:b9:60:5d:93:63:05:b0: 87:4c:ec:05:6c:b3:51:b2:70:b5:1b:2f:74:8d:3b:46: 4c:ef:eb:c5:f7:a3:72:3d:2a:fd:52:fc:33:c5:c9:7f: 63:48:d2:6f:41:fd:21:95:f8:73:21:1e:01:06:6d:3a: a1:07:7a:83:cd:23:39:57:6a:e6:2a:e7:fe:ea:e2:0e: ef:48:e8:17:ad:c7:18:b5:b9:e2:c7:16:47:13:d4:39: 0d:9e:f8:3a:9e:41:4c:01:67:cf:1b:14:96:16:de:f0: 95:f8:64:2d:3e:f1:cd:cf:b6:8d:49:07:89:31:e5:ce: 15:0f:de:d5:a1:c3:36:90:83:cc:03:c7:02:13:b5:99: a8:8b:3b:8d:de:57:1b:4a:c0:c0:7d:bb:3a:84:ad:5f: 30:46:8d:52:53:cb:d2:ec:92:25:d0:4e:59:36:2e:5f: 2e:1a:eb:73:aa:c3:e5:c7:40:12:9a:43:51:fa:07:ae: 16:48:f0:e3:21:c3:18:85:94:37:06:05:14:0d:8e:cd: 53:67:ed:1a:78:b5:69:45:75:34:f5:24:02:36:95:53 Fingerprint (SHA-256): 7D:5F:9D:22:15:B1:2E:6F:1C:90:14:9B:50:B3:EA:FA:A4:D9:E2:D1:D2:EA:17:90:89:49:29:71:2A:46:29:84 Fingerprint (SHA1): BA:F5:2B:7A:51:2A:CC:B0:9F:E2:6D:27:08:06:57:59:BA:64:24:51 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1803: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034398 (0x3750ae5e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Sep 28 04:14:50 2022 Not After : Tue Sep 28 04:14:50 2027 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:d3:a5:48:d6:d8:a3:22:ab:ec:3d:53:88:ba:d3:b1: 33:22:64:fa:5b:d1:15:3a:47:85:7b:f6:ba:ba:d2:b7: bd:83:39:2a:3f:98:b3:e5:47:65:db:63:b0:76:ab:0a: 6d:6e:44:ce:e0:23:02:cf:1c:d9:e5:7c:a7:ae:51:75: ad:49:44:f5:83:13:7f:ed:f6:bf:5f:e2:73:01:09:9b: d1:24:e0:24:d9:22:72:de:73:63:b0:15:a8:26:ac:a6: f1:d8:81:2e:12:ef:f6:c3:0f:88:16:71:d4:cf:6a:7a: 44:46:9b:9e:4e:d7:52:24:50:62:3e:6b:e4:ba:15:b4: 3b:fa:35:dd:51:33:de:93:76:90:21:23:87:ea:1b:7e: 4a:01:74:84:6f:56:31:95:c2:76:50:30:82:88:bb:7f: 5b:d4:56:6a:c3:65:ae:b9:74:58:ef:6c:ba:a4:2c:e3: 39:0b:0e:bd:3e:9a:1a:a6:90:78:fb:38:e5:e4:e6:9c: 38:88:5e:d9:84:2d:a1:b4:0d:a3:0e:c9:f0:42:78:35: fa:cd:a1:21:99:13:b0:13:06:89:bc:b9:cf:e1:52:b9: 2d:f1:8d:a3:89:3e:88:50:7a:a5:d3:b8:a6:36:d8:6b: d5:0b:61:71:0e:50:9e:f1:92:30:49:0e:c9:8b:e2:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 17:f7:c3:41:a0:7e:4e:eb:50:80:c3:ad:41:34:76:9c: 80:fa:65:d9:64:51:1b:0f:00:dd:44:65:dd:24:d9:c1: ee:5c:38:ca:a6:e1:44:8a:86:3a:c4:74:80:b9:29:5d: 41:54:2b:b3:18:52:72:37:20:7c:6a:90:36:aa:39:3e: e0:8d:60:65:a6:2b:c9:95:8c:f1:ac:58:bd:7a:49:73: 62:ee:f5:a9:07:db:5b:1e:bf:77:57:2d:82:ed:97:df: f6:06:c5:9e:b6:74:0c:25:93:98:5b:6b:37:2c:c8:1d: ea:d2:8c:ae:f1:f0:d1:b4:75:87:01:98:4e:e3:9c:61: 1b:a4:e7:39:1d:38:a1:8a:b1:d4:fe:56:f4:a8:ae:f4: cd:ae:44:e0:d9:61:5a:b7:0a:aa:cc:c9:61:ff:7b:32: 6e:81:7f:fa:b3:98:ba:f3:f7:65:cb:10:56:46:05:df: c0:cf:4b:09:1e:dc:92:6c:a2:1c:35:4d:44:18:8f:58: 2b:c9:b5:3c:17:cc:98:1c:f2:01:ae:36:36:a8:1d:f4: 6f:92:cf:bd:73:6d:c3:82:9a:a1:5c:08:c3:a3:51:54: ef:2b:dd:90:26:20:10:da:af:74:31:c6:9d:68:e5:7e: db:ac:6f:0e:98:66:7f:6b:58:bb:f1:6b:66:cc:11:fd Fingerprint (SHA-256): FD:F9:BB:88:6E:02:6D:47:C0:5B:F8:62:F5:13:C1:AC:30:11:8D:A0:EF:9B:11:5F:5B:9F:EA:BC:08:F8:E0:30 Fingerprint (SHA1): D8:B7:4D:73:85:AE:3E:3B:BE:42:94:AB:06:D3:29:34:74:8F:A4:64 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1804: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #1805: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #1806: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #1807: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034396 (0x3750ae5c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 04:14:40 2022 Not After : Wed Sep 28 04:14:40 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:be:19:ab:21:9e:8c:46:5b:df:fe:6b:92:a6:4f:e1: c6:15:ee:30:17:67:85:c7:32:ac:40:86:a5:96:9e:47: e2:85:47:ed:54:0d:be:74:3e:16:5d:55:1f:c2:1b:a1: af:bb:54:70:4d:45:69:b4:b5:9f:27:f6:6b:2b:7b:78: ed:25:95:93:5c:c1:ae:99:b9:66:bf:78:ee:a9:9a:4f: d0:36:f9:c8:83:2f:ca:a3:40:13:b7:02:e6:a8:be:4f: 68:af:46:df:61:72:51:5e:8f:a6:4a:d3:c4:c1:db:53: be:27:fe:83:ff:c4:ba:18:ca:54:fd:6a:37:ee:bd:5c: 9e:ee:ab:41:62:fd:7e:5c:aa:86:0e:86:d3:36:c7:cd: 50:c8:5f:cd:80:ee:0b:13:7a:0a:0c:c2:23:3b:cc:1f: 09:30:5c:77:b3:fa:c2:11:10:ff:08:8e:c0:5a:8b:21: 39:42:54:0a:56:61:80:5d:7e:70:2c:04:d9:c5:5b:8a: 1b:5c:2d:1b:eb:87:48:e6:d0:1b:f5:a2:ae:b0:fa:0a: 35:a8:d5:ce:3e:7d:07:46:be:54:60:f9:a9:73:f8:7d: 08:cb:10:b1:79:2f:5b:10:7a:25:6a:e1:72:8b:cf:08: 98:94:e7:56:68:57:a4:6e:47:b8:05:5c:80:6e:21:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:9e:b4:ef:a2:31:e5:f1:21:3a:c7:70:36:98:97:39: 1d:33:b9:91:e3:7f:2e:78:80:68:1d:51:f0:2a:1a:76: 89:32:af:f5:d5:8d:e5:9b:64:b9:60:5d:93:63:05:b0: 87:4c:ec:05:6c:b3:51:b2:70:b5:1b:2f:74:8d:3b:46: 4c:ef:eb:c5:f7:a3:72:3d:2a:fd:52:fc:33:c5:c9:7f: 63:48:d2:6f:41:fd:21:95:f8:73:21:1e:01:06:6d:3a: a1:07:7a:83:cd:23:39:57:6a:e6:2a:e7:fe:ea:e2:0e: ef:48:e8:17:ad:c7:18:b5:b9:e2:c7:16:47:13:d4:39: 0d:9e:f8:3a:9e:41:4c:01:67:cf:1b:14:96:16:de:f0: 95:f8:64:2d:3e:f1:cd:cf:b6:8d:49:07:89:31:e5:ce: 15:0f:de:d5:a1:c3:36:90:83:cc:03:c7:02:13:b5:99: a8:8b:3b:8d:de:57:1b:4a:c0:c0:7d:bb:3a:84:ad:5f: 30:46:8d:52:53:cb:d2:ec:92:25:d0:4e:59:36:2e:5f: 2e:1a:eb:73:aa:c3:e5:c7:40:12:9a:43:51:fa:07:ae: 16:48:f0:e3:21:c3:18:85:94:37:06:05:14:0d:8e:cd: 53:67:ed:1a:78:b5:69:45:75:34:f5:24:02:36:95:53 Fingerprint (SHA-256): 7D:5F:9D:22:15:B1:2E:6F:1C:90:14:9B:50:B3:EA:FA:A4:D9:E2:D1:D2:EA:17:90:89:49:29:71:2A:46:29:84 Fingerprint (SHA1): BA:F5:2B:7A:51:2A:CC:B0:9F:E2:6D:27:08:06:57:59:BA:64:24:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1808: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034400 (0x3750ae60) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Sep 28 04:15:01 2022 Not After : Wed Sep 28 04:15:01 2072 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:46:3f:67:f5:6f:7a:fb:81:f5:4d:c6:d0:36:a6:15: 58:a3:21:95:1b:52:90:67:57:d4:4d:96:69:28:41:48: 16:f3:42:9c:8d:fa:bc:61:e1:10:e7:d5:3a:cb:e2:37: 06:4c:e1:71:c5:b1:e0:58:97:a8:55:19:66:0d:a9:20: ce:aa:ca:54:7a:1f:c6:58:07:80:23:02:ee:db:e2:1d: 0a:e0:46:f7:f5:b3:53:9b:5b:ac:36:9f:35:85:63:b3: 04:3a:89:e1:b3:62:69:0d:18:09:f0:71:f1:4b:7c:88: aa:9f:b5:3f:56:1d:7d:7e:e1:6e:1d:81:bd:b1:7f:4a: 97:e5:95:d6:9c:9c:2f:b2:56:03:eb:85:4a:1e:ed:06: 88:6f:21:cb:df:dc:44:5f:2b:80:87:de:2a:43:33:0f: 1d:bb:9c:13:ff:5a:49:50:52:38:7f:df:99:d7:9d:30: 13:bf:38:c6:68:25:34:65:73:30:c7:0d:f4:08:57:16: 01:a7:e9:e5:a3:9d:a9:70:f6:a9:ab:53:1f:8a:df:5b: a1:81:ec:63:da:63:b7:c6:a6:96:53:9f:bd:a5:ab:a2: 84:78:9a:61:4e:87:37:1c:d7:f0:ce:59:a3:d9:82:05: 93:ab:fe:20:d9:75:34:6f:6b:06:06:6e:26:77:b4:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:b2:50:2f:fb:aa:71:4e:ea:ad:8a:3d:63:a3:43:a6: 63:74:d3:b4:e8:83:fc:89:81:05:80:e2:d6:ab:65:8f: 15:f6:59:76:9d:99:4c:61:48:08:02:73:a4:3c:3a:af: b8:3f:79:2e:2d:dd:7d:d8:b3:af:07:68:ed:85:18:cd: 26:82:51:62:a4:da:b4:c4:ee:79:58:7b:ec:02:77:40: 82:a2:2b:3f:3d:42:c9:9a:8a:0e:7a:cd:d7:e8:f8:7a: cd:aa:c5:4c:8f:c6:3b:0f:0d:6f:e1:59:cb:e0:fe:03: ae:b6:2c:1d:13:84:76:02:17:65:03:2b:56:58:39:6d: 5c:96:b3:a1:f1:bd:0a:49:eb:f6:1f:b0:ba:b2:a5:9f: 77:df:ca:0f:15:1c:4d:fc:41:24:a0:ec:47:dc:39:77: 4c:79:51:99:e5:09:e1:37:a0:86:18:e2:09:4e:d6:bf: 67:a9:67:00:04:74:e5:fd:25:4d:48:02:81:ed:8a:17: f3:7a:e3:ef:40:55:a8:61:2a:3e:38:2b:41:f4:67:63: b1:c4:d9:ce:05:f0:cd:46:a6:65:a7:a0:9c:12:a7:26: b4:28:2c:79:e8:20:4d:db:73:1c:c6:a3:4b:d4:35:d8: c1:bf:6e:ca:07:b0:99:03:99:a1:bd:66:a5:fb:f6:17 Fingerprint (SHA-256): 56:8D:B7:21:79:0C:A3:BC:60:3E:93:7E:ED:62:7F:38:02:B3:53:31:21:F4:B9:30:9C:F2:0E:A9:2A:A1:31:38 Fingerprint (SHA1): 4A:85:55:D9:74:86:74:49:8A:BA:E3:B8:A0:42:37:5F:5A:59:04:1C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #1809: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034396 (0x3750ae5c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Sep 28 04:14:40 2022 Not After : Wed Sep 28 04:14:40 2072 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:be:19:ab:21:9e:8c:46:5b:df:fe:6b:92:a6:4f:e1: c6:15:ee:30:17:67:85:c7:32:ac:40:86:a5:96:9e:47: e2:85:47:ed:54:0d:be:74:3e:16:5d:55:1f:c2:1b:a1: af:bb:54:70:4d:45:69:b4:b5:9f:27:f6:6b:2b:7b:78: ed:25:95:93:5c:c1:ae:99:b9:66:bf:78:ee:a9:9a:4f: d0:36:f9:c8:83:2f:ca:a3:40:13:b7:02:e6:a8:be:4f: 68:af:46:df:61:72:51:5e:8f:a6:4a:d3:c4:c1:db:53: be:27:fe:83:ff:c4:ba:18:ca:54:fd:6a:37:ee:bd:5c: 9e:ee:ab:41:62:fd:7e:5c:aa:86:0e:86:d3:36:c7:cd: 50:c8:5f:cd:80:ee:0b:13:7a:0a:0c:c2:23:3b:cc:1f: 09:30:5c:77:b3:fa:c2:11:10:ff:08:8e:c0:5a:8b:21: 39:42:54:0a:56:61:80:5d:7e:70:2c:04:d9:c5:5b:8a: 1b:5c:2d:1b:eb:87:48:e6:d0:1b:f5:a2:ae:b0:fa:0a: 35:a8:d5:ce:3e:7d:07:46:be:54:60:f9:a9:73:f8:7d: 08:cb:10:b1:79:2f:5b:10:7a:25:6a:e1:72:8b:cf:08: 98:94:e7:56:68:57:a4:6e:47:b8:05:5c:80:6e:21:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:9e:b4:ef:a2:31:e5:f1:21:3a:c7:70:36:98:97:39: 1d:33:b9:91:e3:7f:2e:78:80:68:1d:51:f0:2a:1a:76: 89:32:af:f5:d5:8d:e5:9b:64:b9:60:5d:93:63:05:b0: 87:4c:ec:05:6c:b3:51:b2:70:b5:1b:2f:74:8d:3b:46: 4c:ef:eb:c5:f7:a3:72:3d:2a:fd:52:fc:33:c5:c9:7f: 63:48:d2:6f:41:fd:21:95:f8:73:21:1e:01:06:6d:3a: a1:07:7a:83:cd:23:39:57:6a:e6:2a:e7:fe:ea:e2:0e: ef:48:e8:17:ad:c7:18:b5:b9:e2:c7:16:47:13:d4:39: 0d:9e:f8:3a:9e:41:4c:01:67:cf:1b:14:96:16:de:f0: 95:f8:64:2d:3e:f1:cd:cf:b6:8d:49:07:89:31:e5:ce: 15:0f:de:d5:a1:c3:36:90:83:cc:03:c7:02:13:b5:99: a8:8b:3b:8d:de:57:1b:4a:c0:c0:7d:bb:3a:84:ad:5f: 30:46:8d:52:53:cb:d2:ec:92:25:d0:4e:59:36:2e:5f: 2e:1a:eb:73:aa:c3:e5:c7:40:12:9a:43:51:fa:07:ae: 16:48:f0:e3:21:c3:18:85:94:37:06:05:14:0d:8e:cd: 53:67:ed:1a:78:b5:69:45:75:34:f5:24:02:36:95:53 Fingerprint (SHA-256): 7D:5F:9D:22:15:B1:2E:6F:1C:90:14:9B:50:B3:EA:FA:A4:D9:E2:D1:D2:EA:17:90:89:49:29:71:2A:46:29:84 Fingerprint (SHA1): BA:F5:2B:7A:51:2A:CC:B0:9F:E2:6D:27:08:06:57:59:BA:64:24:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1810: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #1811: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1812: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1813: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1814: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1815: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 928034401 (0x3750ae61) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Sep 28 04:15:07 2022 Not After : Tue Sep 28 04:15:07 2027 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f9:68:57:e7:46:9b:74:b4:61:6b:f7:3e:1c:2e:42:25: db:78:ac:e7:91:87:1c:25:59:80:ba:43:c9:bc:5b:7a: 2c:1c:2e:5b:51:62:40:09:1e:ae:90:35:d2:7e:89:88: 5a:79:2f:7a:30:76:23:be:4e:45:d3:f4:af:bf:21:aa: 5a:eb:12:6e:4f:d3:1f:e6:70:85:69:19:7c:98:eb:42: 73:17:4a:07:fc:9d:f2:98:58:0e:f4:68:a1:5f:a5:8c: fe:8e:7c:5e:d3:2e:69:a7:ac:32:c6:b1:27:7f:f1:6f: c8:1d:7c:c7:3e:f6:48:61:83:88:40:80:e3:e2:5a:c4: 81:a5:3b:22:c5:b4:8d:5e:59:e4:6a:96:3f:e4:57:ad: 1f:3c:b4:b7:06:65:91:5b:97:2a:b0:96:82:4b:01:b4: da:9d:92:6e:3b:f7:f3:1c:4e:25:9b:d6:f5:98:d3:45: 23:70:39:6c:fc:ba:86:c7:56:fa:cf:20:1b:8d:e5:50: ba:e5:f9:60:78:9b:1d:1c:9f:1c:e1:85:c2:2d:7a:e6: 53:1f:66:f6:01:1f:bb:e6:28:20:f5:71:ef:38:9e:89: ae:be:ba:4d:9c:e8:22:91:45:10:ae:57:9c:e0:c8:56: d6:67:c4:ef:52:95:82:19:f2:74:1b:dc:76:67:e8:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:22:84:f4:11:7f:05:7e:be:47:f2:bb:6a:85:25:8f: c7:88:cf:b4:5d:24:fd:a7:ea:4c:99:76:51:eb:67:7c: 44:a0:b4:0b:ab:4f:f7:c7:4b:fd:ba:82:7b:d0:e8:11: c6:6f:f3:c8:76:8b:f1:20:f0:68:0a:0a:a8:e6:72:87: f8:b9:81:e4:f9:9d:8c:01:a2:ef:5c:63:2e:d4:6d:89: 26:b4:04:b5:d1:6e:e8:df:f2:f5:2b:05:8e:d9:b4:ab: e1:0f:4e:b0:ee:72:ee:c4:2c:d9:0e:eb:7e:e1:27:59: c0:71:32:e5:c3:cf:a9:54:23:b7:98:8f:c8:0f:74:36: 0b:31:53:82:17:3d:21:8b:e6:87:38:b9:ae:04:dc:2d: ff:b5:59:33:49:36:c0:8d:59:f7:45:3c:af:b0:57:18: 7b:6c:80:a8:ec:59:7f:36:27:fc:ba:7b:39:d7:58:1f: 10:16:72:18:e6:8b:c1:6a:6b:30:3b:ff:fa:05:83:64: 9e:7d:e6:8a:83:3a:1e:e5:58:25:b8:1a:50:96:83:85: 0d:3c:ce:dc:73:de:8d:03:0e:5e:e0:d8:16:1e:65:83: f0:3a:fc:14:f8:ae:62:bb:3a:a7:12:49:1e:43:93:b7: b2:a5:f3:b8:ce:33:7e:f6:99:2a:27:c2:fd:06:0b:01 Fingerprint (SHA-256): DD:90:FF:C1:91:5F:0F:8D:50:B8:76:15:E4:AC:FD:A2:6D:29:DF:A9:67:C4:70:42:17:70:66:14:57:85:95:37 Fingerprint (SHA1): BF:D4:F3:CA:BD:A7:D3:FB:E5:D8:89:F7:65:3B:16:CB:54:1E:E8:4B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1816: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1817: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1818: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1819: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1820: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1821: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1822: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1823: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1824: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1825: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1826: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1827: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1828: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1829: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1830: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1831: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1832: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1833: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1834: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1835: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1836: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1837: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1838: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1839: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1840: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.79/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1841: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 31334 at Wed Sep 28 04:15:40 UTC 2022 kill -USR1 31334 httpserv: normal termination httpserv -b -p 9233 2>/dev/null; httpserv with PID 31334 killed at Wed Sep 28 04:15:40 UTC 2022 TIMESTAMP chains END: Wed Sep 28 04:15:40 UTC 2022 Running tests for ec TIMESTAMP ec BEGIN: Wed Sep 28 04:15:40 UTC 2022 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Wed Sep 28 04:15:40 UTC 2022 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #1: ec(perf) test - PASSED TIMESTAMP ecperf END: Wed Sep 28 04:15:40 UTC 2022 Running ec tests for ectest TIMESTAMP ectest BEGIN: Wed Sep 28 04:15:40 UTC 2022 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test curve25519 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #1: ec test certutil keygen - curve25519 - PASSED Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #2: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #3: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #5: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #6: pk11 ec tests - PASSED TIMESTAMP ectest END: Wed Sep 28 04:15:43 UTC 2022 TIMESTAMP ec END: Wed Sep 28 04:15:43 UTC 2022 ec.sh: Testing with non-threadsafe softoken =============================== Running tests for ssl TIMESTAMP ssl BEGIN: Wed Sep 28 04:15:43 UTC 2022 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #79: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-dsa.ca.cert cert.sh: #80: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #81: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #82: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-ec.ca.cert cert.sh: #83: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #84: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA.ca.cert cert.sh: #85: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #86: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #87: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw cert.sh: #88: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #89: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #90: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #91: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #92: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA.ca.cert cert.sh: #93: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #94: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #95: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #96: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-dsa.ca.cert cert.sh: #97: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #98: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #99: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #101: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #102: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-ec.ca.cert cert.sh: #104: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #105: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #106: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #107: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA.ca.cert cert.sh: #108: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #109: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-dsa.ca.cert cert.sh: #110: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #111: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #112: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #113: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #114: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-ec.ca.cert cert.sh: #116: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw cert.sh: #117: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #118: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -i ../CA/TestCA.ca.cert cert.sh: #119: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #120: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -i ../CA/TestCA-ec.ca.cert cert.sh: #121: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #123: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #126: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #128: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #129: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #130: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #131: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #132: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #133: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #134: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #135: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #136: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #137: Generate RSA-PSS Cert Request for TestUser - PASSED cert.sh: Sign TestUser's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30070 -v 60 -d ../CA -i req -o TestUser-rsa-pss.cert -f ../tests.pw cert.sh: #138: Sign TestUser's RSA-PSS Request - PASSED cert.sh: Import TestUser's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #139: Import TestUser's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #140: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #141: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -i ../CA/TestCA.ca.cert cert.sh: #142: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #143: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -i ../CA/TestCA-ec.ca.cert cert.sh: #144: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #149: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #152: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #155: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #158: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #160: Generate RSA-PSS Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30100 -v 60 -d ../CA -i req -o localhost.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #161: Sign localhost.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost.localdomain's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #163: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #164: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #165: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #166: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #167: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #168: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #169: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #170: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #171: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #172: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #173: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #174: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #176: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #177: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost-sni.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #178: Generate RSA-PSS Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #179: Sign localhost-sni.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost-sni.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #180: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost-sni.localdomain's RSA-PSS Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #181: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #182: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #183: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating database for strsclnt no login tests =============== cp -r /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/nologin cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -W -d ../nologin -f ../tests.pw -@ ../tests_empty Password changed successfully. cert.sh: #184: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -k ec -q nistp256 -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server Generating key. This may take a few moments... cert.sh: #185: Create orphan key in serverdir - PASSED cert.sh: Delete orphan key -------------------------- certutil -F -f ../tests.pw -k fd01788bfe5cd55b3d169da37c57778fefd977a2 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server cert.sh: #186: Delete orphan key - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server Generating key. This may take a few moments... cert.sh: #187: Create orphan key in serverdir - PASSED cert.sh: Create cert request for orphan key -------------------------- certutil -R -f ../tests.pw -k b3f2150b4ab1c96cac33f025dc8c12eaba7e76f4 -s CN=orphan -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/orphan.req cert.sh: #188: Create cert request for orphan key - PASSED Certificate Request: Data: Version: 0 (0x0) Subject: "CN=orphan" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:b1:e8:50:2b:df:e2:08:76:3a:6d:95:6f:44:9b:ed: 74:9a:a1:89:97:37:76:98:b4:4c:e9:01:53:03:1c:d9: aa:a6:bd:cf:25:57:95:bb:f3:ed:58:a7:ab:7b:d8:37: f1:d1:f3:bb:4b:4c:ac:1f:9d:24:b7:61:51:be:1e:90: 4b:79:b1:45:89:04:63:79:cd:47:13:de:cd:4f:54:70: 08:c7:00:d8:4d:cb:95:3a:bf:f9:d9:35:fb:cf:71:f5: 06:45:db:d3:99:2c:74:76:f7:98:71:06:d9:3f:09:ee: d1:d2:91:b8:be:53:6e:4a:d7:fd:b9:46:49:0f:1a:d7: 06:6d:86:67:12:7c:68:d6:97:4e:fb:17:52:dc:f9:3c: e8:7b:26:e7:75:71:db:b0:ca:65:2e:23:86:f2:01:f1: 35:4b:3a:1c:f3:21:34:17:be:89:76:9a:1b:50:99:0f: 5a:a2:43:8d:6e:af:fd:13:e8:35:19:19:e2:b8:cd:bd: 3e:77:a1:6f:ce:9c:1e:04:29:c4:e1:24:91:1b:6f:62: 1f:ef:4a:01:02:3d:0a:2d:eb:d2:bd:89:c5:a1:ec:3c: c0:2b:7f:ca:05:9a:f6:87:a0:b8:39:ae:f5:7f:f8:ab: 43:96:bb:f4:8c:5f:34:ff:68:3d:c6:14:e9:fd:7c:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:44:d2:38:3e:57:63:cb:8a:55:f5:04:bc:87:2e:f0: 35:cd:87:ee:27:31:97:2f:0a:57:f7:3f:7a:d0:e3:8d: 28:04:91:07:32:1b:53:fb:fe:be:5d:bb:09:21:68:5e: ab:5b:c8:15:f6:5f:4c:e3:a8:ab:a1:1b:24:42:7d:45: a3:1a:7c:15:20:3b:1e:72:83:54:2e:c0:9f:c1:18:3d: aa:d4:07:28:d4:9b:af:5e:90:1b:48:fb:4d:15:d3:a2: ae:1e:ce:2a:ed:e8:09:aa:c3:77:d8:be:af:27:1a:4e: 2a:a4:1a:98:3a:34:e3:4b:dd:7a:dd:6e:f1:81:17:6b: f6:44:59:e0:0f:94:8c:e1:b5:76:42:9f:e0:a3:b6:9e: 5f:6a:e4:8f:23:b2:e2:44:c7:7b:aa:e4:d0:e4:fe:af: e5:ae:2f:c3:ce:ec:97:2d:76:6e:8f:15:b3:dd:24:67: bb:cc:0d:b0:f4:32:04:f7:d2:91:dc:c1:37:33:94:15: c8:d4:6a:4a:89:2e:21:6b:4a:fc:10:3e:dd:af:27:c6: d6:f0:8d:7d:df:1a:73:95:2a:df:e1:c3:e4:3f:56:f6: df:8b:2e:ac:de:f3:db:c0:7b:b2:21:48:17:d3:11:fd: 8a:33:1c:ae:04:2f:6b:1d:e6:ca:c4:bb:c4:fc:cc:1c Fingerprint (SHA-256): 90:F4:36:83:21:C7:02:E2:6C:DB:28:18:20:ED:09:6E:D1:7C:B9:C3:DE:3C:CD:41:C8:24:8B:80:C9:94:66:ED Fingerprint (SHA1): A1:2A:29:BB:9A:E3:20:45:88:01:63:EE:2E:16:C6:6A:1F:78:D5:CC cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw cert.sh: #189: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #195: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #198: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #204: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created Importing RSA-PSS server certificate Import Alice's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #209: Generate RSA-PSS Cert Request for Alice - PASSED cert.sh: Sign Alice's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30030 -v 60 -d ../CA -i req -o Alice-rsa-pss.cert -f ../tests.pw cert.sh: #210: Sign Alice's RSA-PSS Request - PASSED cert.sh: Import Alice's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Alice-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #211: Import Alice's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Alice's RSA-PSS Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw cert.sh: #212: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #213: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -i ../CA/TestCA.ca.cert cert.sh: #214: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #215: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #216: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #218: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #221: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #224: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #227: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #229: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #230: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #231: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created Importing RSA-PSS server certificate Import Bob's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #232: Generate RSA-PSS Cert Request for Bob - PASSED cert.sh: Sign Bob's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o Bob-rsa-pss.cert -f ../tests.pw cert.sh: #233: Sign Bob's RSA-PSS Request - PASSED cert.sh: Import Bob's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Bob-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #234: Import Bob's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Bob's RSA-PSS Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw cert.sh: #235: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #236: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -i ../CA/TestCA.ca.cert cert.sh: #237: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #238: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #239: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #241: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #244: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #247: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #249: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #250: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #251: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #252: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #253: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #254: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created Importing RSA-PSS server certificate Import Dave's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #255: Generate RSA-PSS Cert Request for Dave - PASSED cert.sh: Sign Dave's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o Dave-rsa-pss.cert -f ../tests.pw cert.sh: #256: Sign Dave's RSA-PSS Request - PASSED cert.sh: Import Dave's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Dave-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Import Dave's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Dave's RSA-PSS Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw cert.sh: #258: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -i ../CA/TestCA.ca.cert cert.sh: #260: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #261: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #262: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #263: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #264: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #265: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #266: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #267: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #268: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #269: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #270: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #271: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #272: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #273: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #274: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #276: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created Importing RSA-PSS server certificate Import Eve's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #278: Generate RSA-PSS Cert Request for Eve - PASSED cert.sh: Sign Eve's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30060 -v 60 -d ../CA -i req -o Eve-rsa-pss.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #279: Sign Eve's RSA-PSS Request - PASSED cert.sh: Import Eve's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Eve-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import Eve's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Eve's RSA-PSS Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #281: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #282: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #283: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #284: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #285: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #286: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #287: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #288: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/fips -f ../tests.fipspw cert.sh: #289: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #290: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #291: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Setting invalid database password in FIPS mode -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/fips -f ../tests.fipspw -@ ../tests.fipsbadpw Failed to change password. certutil: Could not set password for the slot: SEC_ERROR_INVALID_PASSWORD: Password entered is invalid. Please pick a different one. cert.sh: #292: Setting invalid database password in FIPS mode - PASSED cert.sh: Attempt to generate a key with exponent of 3 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 3 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #293: Attempt to generate a key with exponent of 3 (too small) - PASSED cert.sh: Attempt to generate a key with exponent of 17 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 17 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #294: Attempt to generate a key with exponent of 17 (too small) - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@example.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #295: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw cert.sh: #296: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #297: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #298: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #299: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #300: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #301: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #302: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #303: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #304: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #305: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #306: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #307: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw cert.sh: #308: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #309: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #310: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #311: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #312: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #313: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #314: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #315: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #316: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #317: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #318: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #319: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #320: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #321: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #322: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #323: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #324: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #325: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #326: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #327: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created Importing RSA-PSS server certificate Import TestExt's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #328: Generate RSA-PSS Cert Request for TestExt - PASSED cert.sh: Sign TestExt's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30090 -v 60 -d ../CA -i req -o TestExt-rsa-pss.cert -f ../tests.pw cert.sh: #329: Sign TestExt's RSA-PSS Request - PASSED cert.sh: Import TestExt's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestExt-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #330: Import TestExt's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestExt's RSA-PSS Cert Created certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:a1:47 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Sep 28 04:17:34 2022 Not After : Wed Dec 28 04:17:34 2022 Subject: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:d6:cc:99:6a:8e:f9:9d:28:bd:2c:60:6e:19:fb:21: 53:46:fb:6b:6d:7d:79:eb:63:d2:f5:c6:26:14:51:86: 34:b6:0b:5b:f2:13:a1:81:73:55:8e:e7:ce:ed:89:b2: 82:dd:36:a4:93:83:92:28:fb:21:77:d2:59:c1:3f:77: dd:ec:5c:5d:3f:aa:b2:20:1d:67:42:b9:64:f5:02:fc: 49:2e:2a:c7:93:77:2d:85:d0:d2:da:5c:c2:6f:e1:89: 28:c9:9a:a3:01:c4:6e:73:c3:14:92:91:ce:3b:26:20: c5:57:1b:82:94:8c:db:cd:7c:96:93:0b:dd:af:50:3a: 0f:31:07:14:d1:2b:d1:95:2c:73:48:92:8d:10:f7:b6: 75:93:1e:a8:f0:6d:fb:a0:b7:b8:91:14:e8:31:7c:c7: b3:90:cd:74:c6:8f:7f:b3:82:61:3e:21:20:77:30:f4: bb:36:08:a9:df:4d:02:9e:ab:2a:f9:81:bb:b2:59:50: 1f:47:8c:50:f2:99:56:17:d0:ee:a7:84:1f:d1:1f:d5: 84:7b:95:be:14:f0:cc:8d:48:3f:d8:56:30:33:60:c5: 4f:d6:32:5b:23:e7:97:6b:11:de:3f:c8:32:5d:cd:fc: f3:b9:1c:1d:6a:4d:16:37:3b:f8:b3:72:5b:03:91:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 63:ca:b4:ec:80:79:7a:58:4d:c6:ec:3d:2a:39:c5:98: 75:61:6a:71:7a:19:48:cb:cc:6b:5f:29:0e:1e:ff:9a: 2e:d6:c4:cc:a3:cb:e0:27:32:c8:2b:9c:f3:40:92:87: 1f:37:1c:38:a2:21:c8:00:8c:b8:ff:66:db:9b:35:3d: ac:df:5a:38:ce:b3:51:d7:86:00:7a:3d:bd:f3:fb:80: 27:b2:ca:f7:2a:6a:2c:59:09:db:c2:95:04:55:f4:ce: e6:4e:cd:50:30:c4:33:48:02:14:3e:b3:0c:17:42:68: 4b:02:4a:3e:e4:70:d7:a0:8d:38:e0:4d:cf:03:d1:5f: f2:08:7b:dd:0a:77:4a:35:ee:b7:cc:61:89:dd:04:4e: 26:0f:4d:aa:6e:66:97:1b:7b:aa:63:fe:9a:d9:b6:00: 84:95:2c:56:51:b6:1f:be:fd:50:19:e5:93:0a:33:1a: 16:28:0a:15:81:8b:0f:66:45:19:8e:f3:6b:8c:cb:85: 66:85:1f:6f:bf:09:a4:e9:19:a3:14:ff:1b:dd:1b:54: c7:d0:76:4d:3d:87:67:fd:00:9e:b0:c7:32:bc:77:a5: 4b:17:8f:27:5e:0a:9a:f7:32:9c:18:41:2f:34:ac:12: 0c:8d:a2:ab:f0:f9:ad:b8:fe:23:7d:1d:71:43:25:ca Fingerprint (SHA-256): D1:5E:32:CD:58:B6:92:92:45:D3:43:BA:6F:E8:24:00:07:19:BE:A0:8F:48:E4:B7:4F:2F:00:51:FE:E0:43:3A Fingerprint (SHA1): 07:36:06:C5:7B:97:3E:ED:3A:72:33:E5:61:7A:69:AE:C7:60:9F:07 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #331: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:a1:49 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Sep 28 04:17:35 2022 Not After : Wed Dec 28 04:17:35 2022 Subject: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:9e:94:4d:14:ad:d3:4f:55:32:c6:4b:1c:97:17:f9: ad:6b:1b:31:cc:b0:68:d0:7f:97:b0:9b:da:af:ba:11: 63:0d:ac:6a:88:b7:4b:a4:77:f1:3f:ff:0c:95:04:a9: 38:da:f9:55:c7:ab:77:07:47:42:d7:31:73:ed:39:fc: 5f:d7:0b:75:d0:e0:fc:7e:22:36:dc:a6:c4:99:66:43: f2:9a:f0:fc:c9:77:bb:91:17:b7:6d:6f:0e:11:b5:7b: 0b:10:84:22:fe:ea:a4:e7:57:62:8f:99:7e:1d:ad:8a: 35:8e:77:c4:9f:0b:fb:93:d6:ee:36:b6:7b:2d:d0:0a: 49:e5:34:8e:6a:f8:7b:a8:d3:bb:b0:14:df:4c:22:f9: b6:cc:68:a7:b5:26:23:f8:e9:ff:d2:23:2b:47:2f:66: 1c:4a:d9:89:4a:09:e6:89:df:d5:34:65:e3:66:dc:71: 93:cd:cd:5b:a8:76:0f:94:f6:c0:96:81:f8:68:fc:d2: c7:02:90:ac:63:c1:0f:f1:40:55:69:1b:7d:8b:69:c5: ec:ac:ff:aa:fc:0b:2a:71:67:ce:48:27:00:d0:9d:75: 2c:52:3b:76:49:d3:06:f7:53:91:31:18:c7:df:c8:dd: 03:8c:4a:3f:c9:f4:ae:be:47:ed:4f:a7:b8:ba:77:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:50:e5:b5:16:ec:d1:33:79:0e:1e:b9:f1:20:0f:e3: d8:39:40:c9:0c:26:5e:cd:53:c2:8e:a4:c8:15:be:05: fa:f4:b8:60:91:af:e1:d4:05:fd:93:5d:b4:6d:21:7b: ef:46:c2:dc:e9:52:4e:15:6f:9c:65:e3:55:76:ff:a4: 97:38:ca:f3:e8:34:9d:83:a8:32:35:e9:84:36:85:06: 17:13:4b:4b:dc:bb:99:4b:be:db:fa:92:05:6d:b6:b8: d6:a8:a1:a2:2a:95:83:e8:cb:67:9e:54:61:85:a2:fe: 1a:8e:3e:66:78:35:a7:09:2a:40:11:a3:52:2b:b9:72: 7d:2a:8d:f1:33:de:ad:89:d3:39:cf:79:24:46:9a:ef: 3e:01:4d:ed:5a:46:9d:17:23:cf:02:e6:8b:22:29:92: 54:4e:ce:35:4f:55:87:50:a7:4e:fa:04:50:2e:87:35: 65:4c:b1:44:fd:ce:0d:bd:f7:23:5f:89:21:7f:9d:78: 89:35:f7:08:6d:4f:c3:a7:5a:8f:f2:5d:c1:ad:40:2d: 64:36:0f:29:b4:e8:61:95:4e:f9:61:5a:af:3e:15:60: a0:7d:07:74:51:da:7e:54:54:76:d2:8b:b6:3c:45:75: 29:82:63:dd:8e:37:df:fd:76:95:13:76:27:d8:eb:cb Fingerprint (SHA-256): 73:E5:BF:D5:EC:2B:4F:80:5E:A6:18:28:6D:06:90:D8:3C:35:00:9B:82:7B:BE:F2:8E:C3:4F:D1:84:65:E5:10 Fingerprint (SHA1): 2D:D1:77:65:05:76:BA:91:FE:43:5E:EC:D3:15:11:24:AF:EF:99:2C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #332: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:a1:4c Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Sep 28 04:17:36 2022 Not After : Wed Dec 28 04:17:36 2022 Subject: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:63:38:57:3d:9e:37:ac:9b:9c:87:69:42:a4:61:5d: 79:f3:15:09:d0:e8:93:eb:b0:ec:54:77:ad:ee:aa:4c: 17:5e:3a:cc:4c:ba:b2:20:2a:aa:d1:fb:67:b7:40:4e: 0a:a5:2f:ea:23:59:4a:d3:92:13:4f:15:57:a3:63:51: c2:2e:23:00:8f:49:79:7f:d3:e7:ee:ab:f2:b8:5b:30: 31:94:89:c4:d0:47:58:fa:eb:53:45:02:f2:04:d9:1d: f5:42:ba:18:d1:35:2c:be:3b:67:31:36:8f:c9:52:0b: 9d:df:bd:8f:91:e9:a1:d7:2a:e4:84:76:66:18:2f:f3: 33:7d:a1:8a:75:de:2a:35:ec:af:09:0b:54:50:1e:bc: bc:26:d5:b5:39:2a:cf:fa:d9:37:1a:96:39:10:f3:0c: 51:bc:35:05:74:70:e3:e4:4b:f8:9c:58:a1:30:e3:2f: c5:c9:2a:57:4e:ac:50:f4:fc:83:5e:ee:0f:57:90:e8: 61:27:69:d3:32:ae:da:f2:ba:45:75:4d:bc:c1:4c:7d: 5a:c6:d0:b6:ad:14:57:19:83:11:97:05:57:94:b0:c2: 75:6a:b6:50:a5:f0:d9:9f:5e:45:8d:3a:5f:df:ef:ed: 16:c4:ee:a9:f8:8a:51:45:72:b2:4c:00:36:48:9e:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:ae:43:1d:5c:c1:8a:e2:70:5c:ed:81:83:df:f2:d9: f7:45:bf:1c:e6:20:28:b9:b3:7d:c6:a0:51:94:12:bc: cf:f1:cf:fc:99:b1:87:55:a4:b4:b6:98:16:ac:de:6d: f3:ae:af:bd:b9:38:c7:71:d1:d3:2f:17:c6:ab:0b:a4: 96:b1:91:b0:b1:cf:ec:c9:c1:cc:ef:6b:85:f5:d6:7f: e7:e4:26:3e:d4:f0:d6:f3:ea:0e:7d:95:63:3d:31:40: 9a:73:bd:a6:48:bc:d8:3a:fe:25:9e:c5:5b:6f:8e:4a: 28:ac:39:d2:53:e9:f3:ac:67:c1:d9:02:17:22:c5:75: e7:a8:d5:c2:00:2c:6a:cd:6b:e6:ee:89:3b:75:8e:e3: 72:72:66:cd:a4:b3:21:fe:12:f4:17:4e:c0:01:ca:4f: cb:ca:1b:58:0c:12:60:8a:49:02:5d:9d:39:88:c6:a3: 2f:c0:f6:40:ff:2c:41:1f:5f:52:4f:f0:21:f8:ff:c9: 34:4b:b0:b7:e7:e1:8a:e9:29:a8:fd:0a:7e:7a:b6:c3: 3a:50:f2:8a:d2:3d:de:b8:e4:24:57:e4:bf:ac:78:2f: ef:6d:5a:ed:9d:1e:4f:f0:22:bb:24:20:f1:d4:d3:7b: 24:35:1f:49:fd:ed:f9:43:85:8e:db:8f:b6:57:a1:63 Fingerprint (SHA-256): 45:16:03:7A:E7:E1:15:DE:0B:B1:65:41:5E:77:51:99:C1:A6:FB:47:47:EE:38:04:46:E4:81:54:6E:1D:86:69 Fingerprint (SHA1): 94:F6:E3:41:E8:58:28:B1:D1:5F:FB:3A:63:04:5C:40:36:17:88:EB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #333: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:a1:4d Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Sep 28 04:17:37 2022 Not After : Wed Dec 28 04:17:37 2022 Subject: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:34:76:b0:85:12:c4:d1:ae:5d:55:fb:e5:82:29:35: 14:2e:7f:87:ba:b9:45:1a:3e:c5:fd:40:e1:f2:84:b3: 9d:24:4a:a2:09:f0:88:05:b7:33:6c:78:ca:2f:f7:20: 7c:51:38:d5:3a:a5:82:ae:e5:da:e8:3c:88:82:2a:4b: a9:c3:dc:ad:7b:4f:a6:38:b3:37:1f:1c:45:02:1a:90: 8b:c1:c0:a1:f7:85:b0:01:e3:42:fc:a3:76:d0:6e:4a: dd:70:54:2b:aa:e1:fe:17:dd:57:6d:08:e4:b4:2c:de: 62:b4:7e:af:6e:90:94:8d:e2:8a:2c:be:6a:5b:57:78: 2c:eb:28:e1:23:88:35:e6:1a:c2:e1:00:f8:1e:f6:6f: 15:54:bd:19:6f:fc:e4:ce:dd:c4:03:a5:7a:84:25:98: 91:a0:52:eb:78:98:11:dc:1c:bb:69:41:bf:ca:8f:bd: 4f:e7:ef:c2:fb:ce:21:54:b1:c0:32:fc:7b:96:bc:12: 6f:3f:00:7f:26:b2:bd:03:80:49:c7:99:89:d8:70:a7: ec:8d:b5:c7:6a:55:9a:bb:34:a8:56:52:11:16:43:f8: 98:65:f6:ae:7a:3f:22:b1:a9:37:cf:1b:5b:3c:c2:d6: 81:aa:59:45:e6:2e:62:83:03:47:0c:e8:ed:f6:b7:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9b:12:d4:92:1a:73:c1:9a:4b:fb:a1:26:99:fe:70:bb: 85:eb:cf:89:16:02:76:0c:db:a1:a8:c8:5c:42:3d:52: de:68:3b:83:c4:5e:56:c3:50:d3:c9:60:60:64:2a:91: 57:f9:64:43:00:b8:cb:9e:73:9b:23:98:96:84:13:97: d2:03:0c:3c:5d:35:bd:23:13:d2:a8:6a:8f:5b:92:f4: b8:20:59:e9:74:82:d6:5b:18:31:00:b3:15:07:ce:02: 1d:47:d6:4c:ec:72:9b:0e:eb:28:4a:3c:8b:5a:c3:9a: 4c:08:b5:3d:77:37:5c:d7:3e:33:24:43:69:72:15:ed: f2:e4:5e:c4:fa:77:1e:c0:a4:83:0a:0a:36:37:af:66: 9b:06:d6:f1:08:4a:62:a8:86:f7:6a:cd:39:55:4e:a3: e3:46:91:5c:96:dc:f7:a5:c1:91:d5:37:97:96:ff:08: 01:e9:e3:25:71:28:66:2a:71:48:50:80:e9:f8:e3:3e: 95:69:b8:b3:29:dd:a7:53:5c:b2:b2:61:4a:ea:cc:87: 06:94:0a:f1:b0:ca:6f:14:08:79:dc:c5:eb:8f:76:9f: 5d:27:78:37:d7:d5:a8:13:3f:5a:ff:c9:39:f2:77:e2: df:7b:a2:90:cb:0c:eb:4a:39:4f:42:bb:c4:b7:59:ac Fingerprint (SHA-256): 8E:FD:92:33:DC:2B:63:ED:00:60:F2:EC:B8:BE:E2:91:35:1E:24:C8:09:81:25:3E:D3:A7:C8:BB:BD:46:C4:2E Fingerprint (SHA1): 9A:87:1A:01:B7:7C:BF:C9:51:B7:0B:9D:FB:BB:5B:ED:C7:C5:AC:54 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #334: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:a1:50 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Sep 28 04:17:39 2022 Not After : Wed Dec 28 04:17:39 2022 Subject: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:d4:ac:3e:3f:33:ad:2d:dd:60:55:fa:99:5f:bd:72: 24:79:33:0f:dc:0f:54:ba:c1:e1:10:09:f1:72:14:eb: d7:56:a5:32:ec:e9:be:50:71:3d:31:40:57:88:bc:69: bb:e1:9d:b4:e2:69:b6:31:8a:23:a9:f7:ad:45:0d:33: d1:a2:40:b1:22:47:43:2a:96:e8:5f:d9:de:ba:cc:78: eb:e5:f6:92:61:39:5f:3f:91:ce:c4:c7:a9:0f:05:d3: 95:2d:18:c5:71:5f:17:9e:5b:c0:f5:86:f6:de:92:3b: d5:4e:6d:b0:a4:bc:cf:6f:52:ee:1f:bb:71:09:1e:3a: bb:d8:fb:69:a7:a4:6a:f4:a4:c3:34:d6:a0:b5:4c:3c: 32:32:e9:61:d0:e3:a6:42:3b:cf:bf:c4:f1:e5:37:2d: 18:cf:2b:70:21:61:b0:d9:d1:81:14:e4:f4:f1:36:6c: d8:fa:a1:d3:12:17:b9:fa:5f:19:1c:bb:82:81:d5:3e: 21:ec:55:77:79:e5:38:04:e4:29:45:ed:2f:b0:9c:9e: 6b:48:55:90:6c:e7:36:72:a1:69:d3:d4:85:f7:27:ef: 1b:65:c3:86:4c:cb:b9:fc:f1:9d:39:42:e5:37:da:de: 41:66:6c:71:c4:86:cf:0f:7b:77:2a:9f:e6:a0:e7:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6c:2c:10:2c:a9:a5:82:75:25:6c:1f:fd:83:3f:93:90: 64:f6:7e:bd:e4:5b:e4:64:5a:8c:28:cb:d9:bf:14:c8: 4e:ec:f8:74:3b:1c:41:f8:7a:77:f6:73:65:2d:2b:67: 1c:ad:fa:db:40:bc:20:1b:c1:5d:50:19:89:a9:e2:a0: 30:b2:ff:6d:ce:1b:eb:ed:2e:85:3e:bc:54:ff:01:bc: 7b:51:d5:6b:43:fa:09:90:f0:2d:ee:18:34:cd:05:2a: f5:1c:3a:5a:ed:32:15:87:da:97:79:d2:19:53:b2:0e: 49:fc:16:bb:33:7c:e4:05:58:92:3f:c0:4a:66:fa:1c: b3:9c:66:a3:bf:5a:5c:bf:f7:e2:ae:36:f5:eb:19:26: 76:e4:c8:66:d0:2a:44:a6:86:ea:b4:03:b5:f0:f0:c4: 58:a1:0c:4d:79:e5:7b:5f:16:f6:3f:2c:7c:b2:27:5b: 3b:d3:e8:f2:3c:23:37:75:d2:9c:23:ac:d0:86:6b:04: 1f:f6:a2:0b:06:30:d0:2a:12:35:6c:fd:e1:9f:30:0c: e8:88:7e:9a:5f:c3:96:5c:23:a9:30:2e:82:1c:46:b4: d0:e6:60:f5:23:89:59:1d:ae:3c:77:a0:92:51:9d:f6: 33:65:dd:33:ca:6e:f6:48:86:ef:ae:be:60:f9:bb:9a Fingerprint (SHA-256): 8E:9F:BF:15:A3:EF:7D:61:D8:58:7D:6E:89:0D:A6:84:09:25:6B:4D:EB:91:86:77:3A:CD:D5:98:8F:8F:95:8F Fingerprint (SHA1): EC:BF:63:07:7D:11:B5:CD:8D:95:9A:ED:C1:AD:FD:1F:AE:0B:DB:99 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #335: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:a1:53 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Sep 28 04:17:40 2022 Not After : Wed Dec 28 04:17:40 2022 Subject: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:00:dd:d8:19:96:9a:80:f7:fe:f6:f3:c1:e5:78:ad: 7f:4b:bd:97:59:1e:b8:1b:04:69:fa:3b:dc:c0:39:3d: 55:88:7f:5c:c6:75:79:1d:52:46:ce:f8:ea:a9:dd:7d: 6c:1a:a0:f0:44:d0:fb:0e:37:82:42:9f:dd:b1:2f:b7: d8:cd:7b:1e:54:76:74:5d:38:54:b5:41:24:5e:3b:ca: 2f:da:22:d5:11:6c:a2:c3:08:c4:e8:25:fa:75:17:01: d6:dc:4d:6d:63:70:29:a0:1d:53:27:b6:38:d7:d3:22: 5a:f9:bb:e5:c6:e8:5d:15:35:28:1b:10:20:08:81:dd: 06:2f:17:b8:60:dc:9d:c2:be:d4:e3:77:bf:29:bb:d5: c2:49:dd:62:90:d4:d4:9b:20:ed:39:dc:9f:85:fc:bd: a8:94:48:a8:c2:1e:af:a9:5a:88:89:a6:21:c3:f6:c4: 52:7f:41:27:e6:99:5f:14:a6:0e:4c:5b:85:c3:9a:43: 07:27:39:a8:77:15:82:17:43:87:08:bd:e3:fd:8c:cd: fb:50:4a:14:04:09:a0:6e:a1:1c:5a:be:69:75:1f:cf: b5:4d:ff:fd:c3:28:5c:81:e3:d0:4b:36:5f:cd:34:ad: 07:d6:9f:e9:bb:42:e7:d8:4a:b4:a5:74:94:2f:c1:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:37:3b:97:86:e8:5d:ee:31:e6:16:df:9a:cd:eb:4f: 1a:0b:d1:74:4f:fe:5b:69:cd:af:0e:38:15:d0:fa:09: 6b:d6:6c:29:10:b2:42:fe:c7:d2:95:85:a9:47:40:41: ea:6e:68:22:28:34:5c:92:7b:a0:73:d4:8e:8b:67:7e: 9f:fb:98:fb:22:3d:72:47:00:78:1e:19:ef:49:4e:92: 8f:a7:ca:c3:1e:65:88:b8:f8:3e:fe:c3:99:e2:2f:38: 26:45:f6:09:f7:41:8b:42:09:90:fd:e9:95:4e:c1:58: 8b:ac:24:4e:42:23:09:2e:d2:8b:d5:7c:26:f8:29:13: 75:fe:05:e8:81:b3:ca:0e:bc:ff:c0:eb:d9:4c:77:13: 4b:cd:10:41:ff:ed:87:0f:36:ee:75:fc:5e:4b:51:38: 45:3e:8c:e0:55:00:d8:11:4a:06:27:8f:46:fb:fc:12: f1:86:52:16:db:3b:fa:cf:0c:c2:f1:0e:b4:1b:5e:6c: 58:3c:93:d4:49:c9:cb:5c:d9:cc:47:02:eb:41:60:45: 3f:07:45:84:33:3c:0c:69:e7:4e:23:78:8f:20:fa:ec: ac:57:f5:32:9f:a2:d2:79:d2:8f:b0:02:95:8c:84:95: 28:31:81:d0:7d:e6:5a:fb:67:85:c3:a6:8e:8d:ba:f0 Fingerprint (SHA-256): AB:28:A9:BE:77:25:D5:4F:F2:2D:ED:1A:CE:35:5F:6E:A6:60:0B:83:E4:92:A8:69:99:54:3C:71:04:46:73:32 Fingerprint (SHA1): 19:9D:D1:9A:76:E9:A4:6A:A3:42:79:A7:71:AB:20:ED:C9:13:B3:C6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #336: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:a1:55 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Sep 28 04:17:41 2022 Not After : Wed Dec 28 04:17:41 2022 Subject: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:33:b2:75:9c:90:0f:00:ff:d9:2f:92:cc:f5:d5:c0: 57:2d:85:5d:12:2a:0a:8c:17:70:a9:a5:e5:ed:af:3e: ea:4c:79:7c:0e:47:bd:60:8f:bc:3e:4d:39:4e:0d:f1: fb:4d:c3:1f:3f:f9:cb:b5:88:db:0e:f1:09:17:18:a2: 0e:82:fb:f5:1c:4e:d9:33:1c:d4:f1:1a:c9:25:e5:38: ab:7f:a3:ad:9e:7a:e7:36:44:a9:d0:b9:01:1e:c3:d8: e2:33:40:f8:31:ef:35:1f:3b:77:43:26:d6:f6:44:95: e7:56:4c:0b:ce:4c:d3:bc:ff:a1:70:29:ad:14:59:2f: 2f:8d:60:64:fc:9b:23:42:c8:2b:ff:44:a1:1e:6a:0e: 1d:f0:b4:5f:60:bc:dd:6e:94:fc:42:45:30:da:eb:f3: c3:7b:78:d9:d0:20:88:36:54:9a:52:31:88:67:97:4c: db:82:1c:ec:df:15:93:42:42:fb:cf:ef:f3:4b:3d:fb: 69:49:4c:79:9f:08:64:e6:b3:2b:e4:6d:5e:e8:fc:c4: 66:db:48:04:9c:a2:b5:d5:28:38:bc:59:a4:48:cc:9f: 57:0b:45:41:4c:9d:60:5d:d5:ba:89:3f:fd:b6:1e:8c: 56:c7:4e:29:8d:97:85:4c:c2:24:ab:73:3d:fe:9b:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:8c:69:ea:d8:de:9b:73:f5:37:e1:2b:71:38:12:d3: 65:e6:1f:1d:75:66:0a:19:d3:9e:a4:85:14:57:71:e6: 8a:80:3d:5e:4b:7f:f6:e0:47:60:00:31:3b:a8:8e:20: e4:3b:37:6f:8e:25:43:f4:ae:67:65:ee:0d:ea:92:27: 41:9e:43:04:5c:af:fd:66:98:5b:76:49:4f:06:8b:f0: b3:1d:d5:d6:ff:4e:34:78:0b:ea:1a:67:65:57:c6:b0: de:9d:66:68:80:fc:13:8f:38:49:94:28:20:59:12:f8: ad:a0:4b:58:9c:82:6b:67:e8:b8:64:d6:c6:4c:6b:03: 32:0b:01:a9:94:8d:9c:20:09:f6:b5:3d:6b:57:35:31: 31:b0:21:de:ce:86:27:40:21:d8:cd:9c:97:8d:df:d3: b1:19:07:2c:32:fb:50:a6:bd:e3:02:5c:23:74:03:09: 79:80:9e:39:0c:d0:fc:ab:e6:64:fa:7f:22:be:00:16: f4:a0:20:e9:1b:59:5b:cc:64:3b:01:33:5e:01:8f:f9: a3:57:db:e1:60:9b:48:34:02:a1:11:44:21:4d:8e:91: 78:cd:76:ff:8a:1d:8b:54:68:43:d8:f9:77:60:b3:a2: c6:52:b4:ce:3c:5b:31:76:cc:68:3d:7e:fd:87:53:fe Fingerprint (SHA-256): 26:74:12:A0:CA:34:D9:55:D4:2C:C4:F9:01:23:35:5E:9B:3C:BF:E3:6F:25:BE:FD:C1:E6:76:D2:F1:08:C8:C9 Fingerprint (SHA1): DC:9D:F8:5F:48:5F:87:A1:43:5C:C4:26:C0:40:F5:F0:05:E3:B3:D8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #337: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:a1:56 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Sep 28 04:17:42 2022 Not After : Wed Dec 28 04:17:42 2022 Subject: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:81:33:e8:f1:ba:a6:ad:0b:6e:63:6d:b2:f9:f7:96: 86:28:61:9b:8a:2c:28:68:5e:83:89:d6:ed:4c:cb:a7: 6e:65:e8:14:ab:23:65:40:1c:66:95:08:ef:59:aa:9c: 95:45:39:3d:f2:b9:82:9b:38:c5:42:2d:50:46:60:88: b7:2d:e9:a2:79:a1:d4:bf:55:be:db:d1:c5:48:88:a4: d9:60:04:47:b4:54:52:86:07:4e:16:d0:d5:74:e4:ae: d8:ab:4f:d7:ca:6e:0e:b3:ee:bc:30:3f:28:8b:ff:d4: 86:a8:9c:5a:3c:38:71:4f:c2:20:53:6b:3d:fd:86:ea: ad:45:8b:05:52:8c:b4:c9:a1:5b:61:a9:af:2c:07:7b: 83:ee:83:10:6b:9a:13:a7:73:33:a2:28:ba:bc:ae:e8: 56:6e:c4:c9:67:64:d2:20:50:e4:db:78:af:40:44:d4: ed:2a:2a:0c:77:4e:2c:aa:a9:07:a7:7a:76:8c:4e:46: ce:84:ae:a5:03:2e:2c:3e:64:e5:b3:33:93:58:68:fa: ff:0e:ce:98:a4:db:a3:72:c0:d7:e1:ae:ae:7b:6c:97: c5:dc:ee:57:bb:18:4e:00:0c:bd:48:52:5b:6b:18:49: 1a:f7:fe:b5:44:d1:22:1c:87:a3:7d:e6:f5:34:ba:6f Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:4a:64:74:36:be:db:f1:7f:38:c2:6b:49:05:e5:17: 63:59:de:3c:e7:56:cd:21:ac:51:ce:17:3c:73:42:83: dc:b3:ba:04:37:04:8c:3d:26:83:69:b7:79:b0:a2:ba: 3d:88:ea:25:13:39:eb:75:17:c4:f7:55:16:22:30:40: e2:0f:50:7d:41:8f:44:e8:d0:f2:ec:cd:e6:de:dd:bd: 3e:4c:6e:ff:18:ff:3b:bd:fa:e8:3d:2d:9d:0b:7e:90: 1b:20:f2:1d:75:79:30:d4:c2:16:37:04:7d:55:e7:d4: 52:5f:4c:83:18:31:5a:80:67:30:f2:6a:c8:65:d6:a4: 9f:92:01:a3:0e:dd:cb:10:d2:9e:d5:d6:02:63:df:72: 05:92:d5:04:84:0a:e5:50:9c:e9:bb:27:70:bd:20:1e: c2:19:38:2d:49:eb:bc:b0:78:a7:1f:ff:ec:c1:84:b7: 36:ca:35:1f:d7:b0:cd:3b:f3:7c:e2:fb:07:99:b3:55: cc:8e:55:e3:7c:22:18:ad:e3:e8:1e:f5:ac:1c:a7:56: ed:bc:7c:f7:ad:8d:f2:83:45:f6:a8:04:ab:da:3b:e3: f7:d8:73:2b:13:9b:2d:39:15:6f:27:c6:12:3a:45:41: e6:7b:e0:f9:eb:60:a4:44:d6:57:34:55:04:6c:85:d3 Fingerprint (SHA-256): 98:3E:70:13:AE:35:AA:10:34:30:81:0D:E8:FA:D6:12:58:91:02:E6:21:3D:6D:02:2F:A6:4C:71:A6:C1:43:15 Fingerprint (SHA1): 31:79:6D:C2:DD:5A:A2:11:78:34:DE:66:93:0D:9E:7C:F3:A8:FD:B6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #338: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:a1:58 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Sep 28 04:17:43 2022 Not After : Wed Dec 28 04:17:43 2022 Subject: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:ff:1e:ec:35:fd:75:11:b3:fc:02:5e:72:c2:98:6e: 7b:d6:39:11:00:58:1d:a8:3d:66:8f:a6:f4:12:36:45: a6:c7:8d:da:32:74:f0:91:f9:28:e2:82:c3:60:f7:b4: 46:68:20:60:52:bf:38:42:8a:ba:45:d9:13:9e:9b:3b: 71:84:81:5e:73:97:f7:a0:51:99:b0:c4:a6:54:30:10: 42:f0:57:af:ad:66:ec:bb:aa:cc:86:15:71:61:54:d8: 8f:33:a8:92:d7:27:2c:89:37:80:20:ae:c1:1e:5a:72: dc:6d:b6:81:cc:1e:2c:df:01:bf:dd:90:bd:2e:cb:25: 1e:8e:b6:91:e2:3f:52:9e:6d:a7:ed:b7:6f:02:c0:3c: 96:ff:51:22:aa:73:ac:fa:da:b8:54:13:da:14:12:45: b2:62:87:a0:d9:80:63:4a:83:aa:f0:eb:94:62:b8:5c: 0c:59:c3:37:dc:c4:c6:e4:5d:ab:36:76:31:df:80:b6: 56:b2:bb:c7:54:4a:88:a0:4c:15:89:83:92:91:d9:b9: e7:30:95:33:61:62:2f:9a:65:a4:e3:75:43:12:a7:8e: 6b:90:ae:0b:b7:2d:6c:ff:90:46:1c:49:33:bd:be:bc: 70:57:bb:5b:b1:a0:09:32:fb:e3:fa:31:27:73:3f:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:ef:0a:bc:65:d7:df:71:ef:7f:f2:77:48:84:7a:6b: 83:3c:75:d5:0c:0e:60:f7:28:8c:fd:01:86:36:88:cf: 63:32:73:f2:da:19:5d:4e:a3:7d:b7:c8:d7:cd:7f:fa: 04:79:4a:87:b8:17:ae:5d:13:8c:57:95:25:a7:ea:b9: af:23:76:54:ca:83:24:19:67:44:6a:48:96:9b:d3:4b: d2:7a:2d:65:92:05:85:58:38:27:7d:eb:04:f3:4f:f9: ef:0d:fc:54:3b:ce:0d:50:f9:03:11:88:b9:62:20:00: 4a:64:fa:31:df:80:32:00:4e:b5:35:29:fb:fa:3c:6a: a5:c8:6e:9f:a4:11:37:c5:ed:8e:c3:af:67:31:16:2b: 66:b8:e6:7d:d6:25:c0:76:4a:c1:cd:cf:e8:44:d5:1b: 0d:d7:48:8e:b1:3c:61:90:91:5b:65:48:e0:18:b0:c3: f0:69:62:91:a5:06:e5:a3:76:18:3e:30:ff:79:ca:68: e5:27:7b:9b:9b:12:e0:d6:34:60:28:ff:81:a7:83:92: 39:99:f6:04:85:63:32:fa:1b:9d:8f:8f:72:7f:5d:72: 3d:19:9c:7d:af:52:5e:78:4d:9f:7d:28:a0:86:e9:70: 68:12:0d:8c:a9:f0:75:a2:7a:47:2e:f7:98:ff:70:59 Fingerprint (SHA-256): 20:AE:97:61:19:C0:44:6C:C7:FC:A3:41:CC:6C:5D:D9:98:AB:2F:88:F4:4D:EF:2E:07:5A:32:69:A0:5B:E1:47 Fingerprint (SHA1): 2D:E5:14:97:AE:6C:82:08:4B:9A:AC:09:AA:05:27:74:FC:0D:6B:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #339: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:a1:5a Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Wed Sep 28 04:17:44 2022 Not After : Wed Dec 28 04:17:44 2022 Subject: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:db:ed:ef:cf:23:0f:1f:c3:da:04:43:23:44:8e:52: f5:63:68:84:f2:60:ea:89:b9:0e:7a:c6:ee:b4:39:60: 80:74:d5:c8:c5:ea:25:7c:07:47:63:56:5e:24:55:9b: fb:92:f5:33:c0:cf:ce:28:73:3a:dd:d4:26:52:73:e8: 84:24:93:bb:05:bf:3c:3a:b3:38:d9:6b:43:a2:a4:d1: 85:5c:2d:13:78:87:4b:e5:d8:cc:fc:3d:f1:e1:04:06: 6f:ad:00:6d:fc:aa:c2:56:01:c2:d7:30:ff:7e:fb:e1: 58:5f:8b:4b:2a:a4:bf:b5:57:01:67:0c:40:68:9a:dc: 1b:64:de:f1:82:fe:5a:68:77:28:01:89:d2:76:80:79: 9d:45:d8:6b:32:70:73:a7:d3:5a:f9:d1:ff:6c:2c:c3: 9b:cc:df:13:a9:be:ed:56:2d:90:a2:bd:bf:b5:1c:80: a6:ef:6c:07:8b:36:df:c1:9e:f7:5b:8e:05:26:73:1a: 6c:ee:61:8f:fd:ec:e2:80:ce:14:17:9d:1e:75:da:56: d6:01:d1:81:41:f6:f0:93:ad:06:85:27:df:59:d5:ba: 9b:bb:f1:f0:05:08:e9:87:0e:16:ad:e4:7a:03:31:4b: 2a:c2:5e:e3:87:57:28:5c:cb:56:06:dc:47:a7:08:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c1:57:84:2b:90:9b:6d:42:9c:34:ab:73:31:d6:9d:55: f8:7d:6d:80:7c:34:8a:02:23:03:07:e7:38:46:06:5d: b4:0c:28:9f:8e:f5:2b:39:b1:98:f8:f1:61:1d:50:bd: 3f:3b:d7:68:aa:16:73:1b:c6:80:31:02:a5:2f:38:35: 22:1d:ec:0f:28:87:06:aa:26:69:b4:7e:21:2a:f5:42: ca:c4:1a:7e:3e:6f:db:2f:c5:2f:c2:48:09:66:b3:de: da:4a:9e:03:1e:41:dd:32:ae:61:dd:b2:23:f6:61:81: a9:d2:1b:10:47:74:15:17:08:89:16:ea:f6:6c:9b:48: 87:1f:2b:67:01:66:c8:55:1a:08:ac:35:2e:92:03:2f: 58:32:2c:58:8a:4c:7d:5a:7d:3e:1d:aa:91:76:e9:fc: c2:b1:58:30:27:b3:da:cb:24:61:aa:8c:2e:b0:80:47: b5:5f:fa:04:ee:3e:9c:17:77:72:40:23:83:94:08:a4: bb:85:1d:91:84:e1:cd:bd:5f:a9:49:91:96:76:3e:74: f6:e7:11:e5:71:d4:cd:a1:56:45:b2:f8:a7:e2:a6:7a: b2:94:f5:1f:a0:06:81:7c:b5:ce:2e:8f:05:83:6c:a3: 7a:45:a9:a3:03:55:b5:b1:97:5a:38:a0:d6:e5:f5:ea Fingerprint (SHA-256): E7:7B:7E:E9:50:37:4F:39:68:F2:C7:86:F6:DE:51:E7:27:08:F4:B7:75:24:9F:7B:FE:E6:5E:B8:AA:8C:97:3F Fingerprint (SHA1): B5:C7:48:D5:85:DD:03:43:9C:4F:02:1A:C7:F4:D4:73:81:C3:51:7C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #340: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:a1:5d Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Wed Sep 28 04:17:46 2022 Not After : Wed Dec 28 04:17:46 2022 Subject: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:c5:9f:c2:97:5b:50:e3:26:55:c3:08:32:5c:5b:28: 45:22:b6:9d:c8:df:7e:a3:27:a4:76:66:1a:9e:b3:1d: 89:54:60:14:88:33:e9:13:f5:ff:2a:a5:12:b5:f8:b8: f4:4a:81:3c:31:a3:33:42:3c:90:01:b5:25:71:d1:2c: de:57:2e:31:38:79:c0:4e:26:c6:e3:51:5f:c6:d4:e3: 43:9c:5b:f2:74:cd:7e:a9:1c:ac:df:99:7c:99:ae:2f: 3f:e3:83:a2:01:4a:71:81:fc:d2:68:a2:5e:9e:76:02: 88:f5:4b:25:1d:e4:fa:83:47:87:12:86:86:d2:93:cd: 41:52:63:fd:5b:ae:dc:52:12:17:59:0f:0e:63:d7:54: 50:8c:2e:df:ac:d2:ee:9e:7d:3c:c1:5a:ae:72:d3:fb: d9:b3:66:83:31:4d:1d:ec:3d:c0:25:74:ba:c2:8a:65: e0:64:a4:75:fb:37:17:8d:a5:04:d9:64:f7:e2:1f:f8: 4d:ca:c5:e7:2b:44:7b:0b:74:69:f2:64:87:66:8e:e0: a1:64:53:53:9d:23:04:d0:85:70:d2:c9:16:29:6d:08: 03:1c:5d:5b:e5:e8:72:db:0d:a0:55:79:d2:06:c8:4a: 78:a7:82:2c:2d:b4:3c:c6:e6:6d:e1:b9:76:90:5e:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:f4:28:89:f2:89:14:07:50:3e:7c:2c:c2:6e:83:dc: d7:d2:f3:b0:ed:e6:11:c6:18:f0:dd:11:e1:5d:54:e7: 0d:60:9d:b1:ee:76:9f:b0:b2:cb:50:2a:bb:c3:f9:91: ed:38:a5:06:4a:2f:4c:42:5a:05:09:83:92:71:58:53: cb:e2:b5:5f:ff:ce:02:2f:b9:71:f1:78:f4:00:84:3b: 74:07:31:c4:8a:15:50:72:fb:3d:b8:eb:1b:eb:12:1b: 50:da:aa:47:54:f0:66:cb:87:aa:33:ab:93:f1:9b:82: a3:68:85:cf:03:fc:84:97:de:17:12:39:0f:08:6c:10: 34:e0:62:da:95:90:e6:54:54:8d:23:e7:32:5b:68:5c: 7c:2d:96:de:c7:68:f8:2c:7c:2f:62:b3:f1:23:26:6f: 5c:6c:61:52:29:a9:71:bc:39:50:a1:98:a7:51:56:42: a7:fb:8e:26:92:92:2e:2a:7d:36:66:d2:fb:e9:01:f2: f7:6f:8d:d4:1b:c3:52:de:29:2c:b0:ce:19:86:25:68: 5d:f0:fb:8d:c6:2b:70:57:d4:00:cb:6e:72:9e:53:52: 2d:51:76:28:60:0e:45:60:09:e5:05:a6:f4:64:71:81: 08:4f:c2:ad:a2:09:30:c2:d8:ca:83:22:56:6f:0a:54 Fingerprint (SHA-256): AA:61:78:1A:C8:31:FD:32:5E:56:A4:31:48:5F:58:93:8A:1D:C2:C4:34:2D:D3:2D:09:93:27:00:CF:7B:6A:E6 Fingerprint (SHA1): 48:3A:55:E8:51:1A:5F:F6:5F:20:47:7A:F7:BA:0B:C6:B1:9A:D5:82 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #341: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #342: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #343: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #344: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:a1:65 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed Sep 28 04:17:50 2022 Not After : Wed Dec 28 04:17:50 2022 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:8b:45:7d:c7:4b:f7:f2:47:43:1b:b9:5d:24:9b:2c: 11:c2:29:bf:95:3d:3e:d5:d4:16:82:ae:c4:6f:3c:fa: c5:b9:c0:ce:64:50:8b:1f:2c:aa:17:be:11:4f:07:96: 74:fa:02:84:07:a9:b1:5a:55:dd:fc:4a:35:19:08:d4: 5e:79:71:bc:4b:4f:70:65:32:23:74:21:f6:6e:35:8a: 6f:48:ec:ff:15:a7:00:2e:2f:b7:3e:e4:d1:25:56:6d: bd:80:6f:2f:ab:c6:6e:bf:dc:b4:6b:ea:97:92:3f:65: ab:2b:a2:4a:b2:de:8c:c6:9b:b8:7c:4e:b0:10:75:41: 88:58:31:9f:c4:63:64:b8:d9:4b:3f:43:cc:67:d0:7a: f2:63:4e:94:51:75:19:ff:7d:37:2a:2b:0e:f2:e4:ea: 74:da:da:1a:d8:34:f4:d4:b1:44:54:28:75:17:3c:06: d5:ec:9b:7f:08:2a:6e:c6:64:41:57:d5:f7:bf:85:34: 64:11:0d:80:c0:3d:ca:45:15:50:74:c3:90:74:cc:b1: a1:bf:fc:7e:41:fe:e2:fb:7c:97:53:c4:9e:1c:82:da: 64:9f:f9:0a:40:bb:ef:ab:bc:ed:fc:4d:f0:84:fa:5e: d3:9c:30:0b:29:8c:db:1f:8b:79:7b:1d:48:39:09:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:ea:b3:26:0c:76:46:40:fe:ac:67:5f:19:c2:b3:3f: 0b:8d:51:c9:19:9b:a3:a3:83:d7:31:61:61:4f:d9:c6: 16:36:9b:70:5a:55:4a:e7:f6:65:64:23:e3:c0:3c:24: 76:9d:61:fe:85:f3:ac:ed:42:0e:03:86:93:a4:b2:e0: 6c:f8:19:0e:bc:e9:59:25:b9:69:01:20:98:8b:a1:b6: 6b:82:fc:f0:38:cd:94:11:2c:27:5d:29:f7:7f:5c:d2: 2e:88:2f:d2:0f:e8:23:2a:f8:bb:9c:b5:a0:69:72:f1: 06:2d:b4:40:6c:ff:ce:49:dc:f6:2f:41:19:9a:c7:dd: e8:53:79:aa:ea:0d:0c:b0:8a:9e:db:f5:57:e6:e3:42: 6f:1a:c6:31:29:1b:c4:d8:1a:2b:d6:8b:a6:f7:a2:9b: c5:e8:3c:f5:11:7e:90:78:4a:6f:2c:38:3c:5d:91:6d: 31:e1:25:1c:09:0c:df:14:32:1a:4b:db:15:50:0d:e1: e2:5d:6a:bf:d3:fe:b2:83:5a:dd:b3:58:b5:ed:2b:c0: b8:c0:c2:c1:2c:80:13:4b:d7:76:31:16:be:35:11:64: e8:59:30:3b:a3:d4:40:55:19:89:c7:42:81:f1:40:70: 4d:4a:0f:77:f9:66:6d:e0:92:00:42:79:c3:20:ca:7c Fingerprint (SHA-256): DC:9D:BE:B9:B8:35:7C:9D:1D:3C:4C:65:A9:57:07:41:8F:DB:71:30:63:7A:C7:36:E2:CB:E8:AE:0E:DB:BA:8A Fingerprint (SHA1): C2:76:60:7C:E0:5E:F0:54:48:75:37:8D:D0:FF:CA:29:35:9A:2F:F9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #345: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der cert.sh: #346: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #347: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #348: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der: error 0: Success cert.sh: #349: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der: error 0: Success cert.sh: #350: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der: error 0: Success cert.sh: #351: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #352: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:bd:36:a1:6d Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed Sep 28 04:17:54 2022 Not After : Wed Dec 28 04:17:54 2022 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:9b:62:6e:70:ee:6a:40:30:05:63:d8:d2:48:ba:3e: d2:0b:df:46:de:be:c9:41:04:dd:72:e4:2e:56:07:a0: 81:8d:1c:8c:8f:64:b7:a4:bd:9a:d0:d7:ea:84:a0:83: 92:98:c2:f9:cb:d7:60:67:bd:fb:22:a1:4d:fa:2b:6e: 65:f9:08:59:19:95:a5:a3:aa:5f:07:cf:c6:fc:34:e7: 20:b6:a4:61:fa:3d:c7:6f:3d:eb:ee:b1:ca:e8:f4:de: cc:52:bb:d6:59:cb:a0:c5:f3:39:e6:1a:3b:1b:87:73: 83:dd:0a:d4:c6:b4:59:37:9e:a3:7f:a4:43:a4:0e:9a: 54:40:a3:45:5c:37:5a:4d:ea:d8:12:f7:0d:bf:f6:85: f7:dd:2b:c1:d8:bf:84:3c:9c:9e:1a:ed:be:57:b1:e9: f1:8c:07:23:2f:58:fa:a8:62:b9:99:70:dc:56:d5:93: 1b:6e:90:69:3a:d6:d5:74:49:c7:79:88:de:35:ca:95: 64:b7:94:71:81:d0:06:92:13:d2:74:33:df:90:9c:23: 89:86:89:6e:55:e8:45:11:a0:59:4e:b9:6d:41:6d:ef: 20:99:94:40:11:f2:60:46:ac:d0:17:8b:7f:6c:2c:26: 14:36:ae:79:d2:dc:87:5f:fb:7b:63:ef:7d:a3:9c:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:2d:b5:89:24:17:3f:42:5a:34:af:bc:bf:d2:a9:cc: fe:a0:bb:ce:10:47:ef:f3:65:48:9f:f8:0a:2e:9c:ca: f1:9e:58:bf:f9:d1:76:61:d0:83:7f:6c:45:18:2b:30: 2f:90:60:a9:ad:8d:ec:52:17:87:48:60:76:00:f7:bc: 65:98:9e:a9:2f:65:02:f5:3d:30:54:a0:a8:be:f5:3f: 4a:37:36:1e:06:0a:44:8e:1a:5c:51:59:c0:d1:ee:38: 37:9d:0a:7d:0f:76:5a:9e:97:c1:5b:38:73:b4:74:0d: b1:f5:d6:2a:6d:a9:1d:4a:59:71:c4:15:ae:49:0b:61: 69:96:77:e9:b8:c8:3d:89:ca:ef:f4:d8:d2:af:23:e8: 4d:2b:ec:67:f0:84:66:e7:b9:b3:d4:b0:85:11:98:15: cf:df:18:21:d8:6b:6d:8e:ef:15:d7:86:a6:71:1a:16: a3:cb:26:5e:07:45:aa:eb:49:36:14:f0:95:e0:78:cb: f7:dc:ad:71:4e:5b:cc:31:63:d3:3b:17:a2:44:fe:c2: a1:c0:86:60:5d:84:7b:59:e9:56:31:5c:f2:6d:c2:df: 6c:ab:82:3e:28:a6:98:99:6b:55:f6:26:bc:b8:2c:b7: f4:79:ec:2c:a6:1a:09:f2:15:87:51:66:57:66:e7:06 Fingerprint (SHA-256): 4D:F2:F9:CB:F4:41:B0:27:D3:B5:BD:83:73:0A:05:F3:7C:29:FB:99:99:32:3C:04:28:E4:F4:25:10:0B:FD:78 Fingerprint (SHA1): 9F:AC:A9:E9:75:A8:09:99:C3:A6:49:57:53:43:3D:68:20:6E:99:3F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #353: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #354: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #355: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.pw cert.sh: #356: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #357: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #358: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dbpass -o root.cert cert.sh: #359: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #360: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #361: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #362: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw cert.sh: #363: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.79/dist/Linux4.18_aarch64_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #364: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/TestCA.ca.cert cert.sh: #365: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #366: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #367: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #369: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #372: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #375: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #378: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #381: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created Importing RSA-PSS server certificate Import Distrusted's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #383: Generate RSA-PSS Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 32000 -v 60 -d ../CA -i req -o Distrusted-rsa-pss.cert -f ../tests.pw cert.sh: #384: Sign Distrusted's RSA-PSS Request - PASSED cert.sh: Import Distrusted's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Distrusted-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import Distrusted's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Distrusted's RSA-PSS Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw cert.sh: #386: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #387: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -o root.cert cert.sh: #388: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #389: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #390: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #391: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #392: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #393: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #394: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #395: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #396: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #397: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #398: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #399: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #400: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #401: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #402: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #403: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #404: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #405: perform selftest - PASSED cert.sh: Initialize Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw cert.sh: #406: Initialize Cert DB - PASSED cert.sh: Import RSA CA Cert -------------------------- certutil -A -n TestCA -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i ../CA/TestCA.ca.cert cert.sh: #407: Import RSA CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert -------------------------- certutil -A -n TestCA-rsa-pss -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss.ca.cert cert.sh: #408: Import RSA-PSS CA Cert - PASSED cert.sh: Verify RSA-PSS CA Cert -------------------------- certutil -V -u L -e -n TestCA-rsa-pss -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #409: Verify RSA-PSS CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert (SHA1) -------------------------- certutil -A -n TestCA-rsa-pss-sha1 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss-sha1.ca.cert cert.sh: #410: Import RSA-PSS CA Cert (SHA1) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -A -n TestCA-bogus-rsa-pss1 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestCA-bogus-rsa-pss1.crt cert.sh: #411: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss1 -u L -e -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #412: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -A -n TestCA-bogus-rsa-pss2 -t C,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestCA-bogus-rsa-pss2.crt cert.sh: #413: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss2 -u L -e -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #414: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss1 -------------------------- certutil -s "CN=TestUser-rsa-pss1, E=TestUser-rsa-pss1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #415: Generate Cert Request for TestUser-rsa-pss1 - PASSED cert.sh: Sign TestUser-rsa-pss1's Request -------------------------- certutil -C -c TestCA --pss-sign -m 200 -v 60 -d ../CA -i req -o TestUser-rsa-pss1.cert -f ../tests.pw cert.sh: #416: Sign TestUser-rsa-pss1's Request - PASSED cert.sh: Import TestUser-rsa-pss1's Cert -------------------------- certutil -A -n TestUser-rsa-pss1 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss1.cert cert.sh: #417: Import TestUser-rsa-pss1's Cert - PASSED cert.sh: Verify TestUser-rsa-pss1's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #418: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: #419: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss2 -------------------------- certutil -s "CN=TestUser-rsa-pss2, E=TestUser-rsa-pss2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #420: Generate Cert Request for TestUser-rsa-pss2 - PASSED cert.sh: Sign TestUser-rsa-pss2's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA512 -m 201 -v 60 -d ../CA -i req -o TestUser-rsa-pss2.cert -f ../tests.pw cert.sh: #421: Sign TestUser-rsa-pss2's Request - PASSED cert.sh: Import TestUser-rsa-pss2's Cert -------------------------- certutil -A -n TestUser-rsa-pss2 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss2.cert cert.sh: #422: Import TestUser-rsa-pss2's Cert - PASSED cert.sh: Verify TestUser-rsa-pss2's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss2 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #423: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: #424: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss3 -------------------------- certutil -s "CN=TestUser-rsa-pss3, E=TestUser-rsa-pss3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser-rsa-pss3 - PASSED cert.sh: Sign TestUser-rsa-pss3's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 202 -v 60 -d ../CA -i req -o TestUser-rsa-pss3.cert -f ../tests.pw cert.sh: #426: Sign TestUser-rsa-pss3's Request - PASSED cert.sh: Import TestUser-rsa-pss3's Cert -------------------------- certutil -A -n TestUser-rsa-pss3 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss3.cert cert.sh: #427: Import TestUser-rsa-pss3's Cert - PASSED cert.sh: Verify TestUser-rsa-pss3's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss3 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #428: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: #429: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss4 -------------------------- certutil -s "CN=TestUser-rsa-pss4, E=TestUser-rsa-pss4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #430: Generate Cert Request for TestUser-rsa-pss4 - PASSED cert.sh: Sign TestUser-rsa-pss4's Request -------------------------- certutil -C -c TestCA --pss-sign -m 203 -v 60 -d ../CA -i req -o TestUser-rsa-pss4.cert -f ../tests.pw cert.sh: #431: Sign TestUser-rsa-pss4's Request - PASSED cert.sh: Import TestUser-rsa-pss4's Cert -------------------------- certutil -A -n TestUser-rsa-pss4 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss4.cert cert.sh: #432: Import TestUser-rsa-pss4's Cert - PASSED cert.sh: Verify TestUser-rsa-pss4's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss4 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #433: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: #434: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss5 -------------------------- certutil -s "CN=TestUser-rsa-pss5, E=TestUser-rsa-pss5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #435: Generate Cert Request for TestUser-rsa-pss5 - PASSED cert.sh: Sign TestUser-rsa-pss5's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -m 204 -v 60 -d ../CA -i req -o TestUser-rsa-pss5.cert -f ../tests.pw cert.sh: #436: Sign TestUser-rsa-pss5's Request - PASSED cert.sh: Import TestUser-rsa-pss5's Cert -------------------------- certutil -A -n TestUser-rsa-pss5 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss5.cert cert.sh: #437: Import TestUser-rsa-pss5's Cert - PASSED cert.sh: Verify TestUser-rsa-pss5's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss5 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #438: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: #439: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss6 -------------------------- certutil -s "CN=TestUser-rsa-pss6, E=TestUser-rsa-pss6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser-rsa-pss6 - PASSED cert.sh: Sign TestUser-rsa-pss6's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 205 -v 60 -d ../CA -i req -o TestUser-rsa-pss6.cert -f ../tests.pw cert.sh: #441: Sign TestUser-rsa-pss6's Request - PASSED cert.sh: Import TestUser-rsa-pss6's Cert -------------------------- certutil -A -n TestUser-rsa-pss6 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss6.cert cert.sh: #442: Import TestUser-rsa-pss6's Cert - PASSED cert.sh: Verify TestUser-rsa-pss6's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss6 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #443: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: #444: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss7 -------------------------- certutil -s "CN=TestUser-rsa-pss7, E=TestUser-rsa-pss7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #445: Generate Cert Request for TestUser-rsa-pss7 - PASSED cert.sh: Sign TestUser-rsa-pss7's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA512 -m 206 -v 60 -d ../CA -i req -o TestUser-rsa-pss7.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #446: Sign TestUser-rsa-pss7's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss8 -------------------------- certutil -s "CN=TestUser-rsa-pss8, E=TestUser-rsa-pss8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #447: Generate Cert Request for TestUser-rsa-pss8 - PASSED cert.sh: Sign TestUser-rsa-pss8's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA256 -m 207 -v 60 -d ../CA -i req -o TestUser-rsa-pss8.cert -f ../tests.pw cert.sh: #448: Sign TestUser-rsa-pss8's Request - PASSED cert.sh: Import TestUser-rsa-pss8's Cert -------------------------- certutil -A -n TestUser-rsa-pss8 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss8.cert cert.sh: #449: Import TestUser-rsa-pss8's Cert - PASSED cert.sh: Verify TestUser-rsa-pss8's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss8 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #450: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: #451: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss9 -------------------------- certutil -s "CN=TestUser-rsa-pss9, E=TestUser-rsa-pss9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser-rsa-pss9 - PASSED cert.sh: Sign TestUser-rsa-pss9's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 208 -v 60 -d ../CA -i req -o TestUser-rsa-pss9.cert -f ../tests.pw cert.sh: #453: Sign TestUser-rsa-pss9's Request - PASSED cert.sh: Import TestUser-rsa-pss9's Cert -------------------------- certutil -A -n TestUser-rsa-pss9 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss9.cert cert.sh: #454: Import TestUser-rsa-pss9's Cert - PASSED cert.sh: Verify TestUser-rsa-pss9's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss9 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #455: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: #456: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss10 -------------------------- certutil -s "CN=TestUser-rsa-pss10, E=TestUser-rsa-pss10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #457: Generate Cert Request for TestUser-rsa-pss10 - PASSED cert.sh: Sign TestUser-rsa-pss10's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 -m 209 -v 60 -d ../CA -i req -o TestUser-rsa-pss10.cert -f ../tests.pw cert.sh: #458: Sign TestUser-rsa-pss10's Request - PASSED cert.sh: Import TestUser-rsa-pss10's Cert -------------------------- certutil -A -n TestUser-rsa-pss10 -t ,, -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss10.cert cert.sh: #459: Import TestUser-rsa-pss10's Cert - PASSED cert.sh: Verify TestUser-rsa-pss10's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss10 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #460: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: #461: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss11 -------------------------- certutil -s "CN=TestUser-rsa-pss11, E=TestUser-rsa-pss11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #462: Generate Cert Request for TestUser-rsa-pss11 - PASSED cert.sh: Sign TestUser-rsa-pss11's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 --pss-sign -Z SHA256 -m 210 -v 60 -d ../CA -i req -o TestUser-rsa-pss11.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #463: Sign TestUser-rsa-pss11's Request - PASSED cert.sh: specify token with PKCS#11 URI cert.sh: List keys in NSS Certificate DB -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> ec 06dff6c0ae3f081f415f8fbf0f19ed074900b0da NSS Certificate DB:localhost.localdomain-ecmixed < 1> rsa e2f4eb05bae3aa1e0218fd2e6498fa6e88966576 NSS Certificate DB:localhost-sni.localdomain < 2> dsa e27259f921586b34a7ff7d87606e4c7a8ff6e725 NSS Certificate DB:localhost-sni.localdomain-dsa < 3> ec 0763f39b3b77706d714d3da017e72baab309d1ed NSS Certificate DB:localhost-sni.localdomain-ecmixed < 4> ec 8f8b13198a9a33803ec98bc25c5ff9aa70f4d5df NSS Certificate DB:localhost.localdomain-ec < 5> rsa ca75df9632637f07486b5f1b31e55d03e1d449cf TestUser-rsa-pss-interop < 6> rsa b3f2150b4ab1c96cac33f025dc8c12eaba7e76f4 (orphan) < 7> rsa af8d98a768988dfd411e5b6f0a489c48229ed238 NSS Certificate DB:localhost.localdomain < 8> dsa 422473797e250e0f61eeee42c0b0de389d62cd16 NSS Certificate DB:localhost-sni.localdomain-dsamixed < 9> dsa b7c6882ced07b1b9db3be6f46f02250774369976 NSS Certificate DB:localhost.localdomain-dsa <10> dsa de595aa9c8e7fc288cebe2b67f3406991a167599 NSS Certificate DB:localhost.localdomain-dsamixed <11> ec 2c814616627f40b56b004bd7e6e16322ab09ebcb NSS Certificate DB:localhost-sni.localdomain-ec cert.sh: #464: List keys in NSS Certificate DB - PASSED cert.sh: List keys in NSS Builtin Objects -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects" certutil: no keys found cert.sh: #465: List keys in NSS Builtin Objects - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #466: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #467: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #468: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #469: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #470: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #471: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #472: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #473: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #474: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #475: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #476: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #477: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #478: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #479: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #480: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser40's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #481: Generate RSA-PSS Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o TestUser40-rsa-pss.cert -f ../tests.pw cert.sh: #482: Sign TestUser40's RSA-PSS Request - PASSED cert.sh: Import TestUser40's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser40-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #483: Import TestUser40's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser40's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #484: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #485: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #486: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #487: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #488: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #489: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #490: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #491: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #492: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #493: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #494: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #495: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #496: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #497: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #498: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser41's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #499: Generate RSA-PSS Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30041 -v 60 -d ../CA -i req -o TestUser41-rsa-pss.cert -f ../tests.pw cert.sh: #500: Sign TestUser41's RSA-PSS Request - PASSED cert.sh: Import TestUser41's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser41-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #501: Import TestUser41's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser41's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #502: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #503: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #504: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #505: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #506: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #507: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #508: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #509: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #510: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #511: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #512: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #513: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #514: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #515: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #516: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser42's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #517: Generate RSA-PSS Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30042 -v 60 -d ../CA -i req -o TestUser42-rsa-pss.cert -f ../tests.pw cert.sh: #518: Sign TestUser42's RSA-PSS Request - PASSED cert.sh: Import TestUser42's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser42-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #519: Import TestUser42's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser42's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #520: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #521: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #522: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #523: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #524: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #525: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #526: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #527: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #528: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #529: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #530: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #531: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #532: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #533: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #534: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser43's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #535: Generate RSA-PSS Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30043 -v 60 -d ../CA -i req -o TestUser43-rsa-pss.cert -f ../tests.pw cert.sh: #536: Sign TestUser43's RSA-PSS Request - PASSED cert.sh: Import TestUser43's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser43-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #537: Import TestUser43's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser43's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #538: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #539: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #540: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #541: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #542: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #543: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #544: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #545: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #546: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #547: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #548: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #549: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #550: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #551: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #552: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser44's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #553: Generate RSA-PSS Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30044 -v 60 -d ../CA -i req -o TestUser44-rsa-pss.cert -f ../tests.pw cert.sh: #554: Sign TestUser44's RSA-PSS Request - PASSED cert.sh: Import TestUser44's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser44-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #555: Import TestUser44's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser44's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #556: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #557: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #558: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #559: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #560: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #561: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #562: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #563: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #564: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #565: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #566: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #567: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #568: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #569: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #570: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser45's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #571: Generate RSA-PSS Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30045 -v 60 -d ../CA -i req -o TestUser45-rsa-pss.cert -f ../tests.pw cert.sh: #572: Sign TestUser45's RSA-PSS Request - PASSED cert.sh: Import TestUser45's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser45-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #573: Import TestUser45's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser45's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #574: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #575: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #576: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #577: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #578: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #579: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #580: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #581: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #582: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #583: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #584: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #585: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #586: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #587: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #588: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser46's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #589: Generate RSA-PSS Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30046 -v 60 -d ../CA -i req -o TestUser46-rsa-pss.cert -f ../tests.pw cert.sh: #590: Sign TestUser46's RSA-PSS Request - PASSED cert.sh: Import TestUser46's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser46-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #591: Import TestUser46's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser46's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #592: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #593: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #594: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #595: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #596: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #597: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #598: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #599: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #600: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #601: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #602: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #603: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #604: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #605: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #606: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser47's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #607: Generate RSA-PSS Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30047 -v 60 -d ../CA -i req -o TestUser47-rsa-pss.cert -f ../tests.pw cert.sh: #608: Sign TestUser47's RSA-PSS Request - PASSED cert.sh: Import TestUser47's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser47-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #609: Import TestUser47's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser47's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #610: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #611: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #612: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #613: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #614: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #615: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #616: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #617: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #618: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #619: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #620: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #621: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #622: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #623: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #624: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser48's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #625: Generate RSA-PSS Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30048 -v 60 -d ../CA -i req -o TestUser48-rsa-pss.cert -f ../tests.pw cert.sh: #626: Sign TestUser48's RSA-PSS Request - PASSED cert.sh: Import TestUser48's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser48-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #627: Import TestUser48's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser48's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #628: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #629: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #630: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #631: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #632: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #633: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #634: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #635: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #636: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #637: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #638: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #639: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #640: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #641: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #642: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser49's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #643: Generate RSA-PSS Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30049 -v 60 -d ../CA -i req -o TestUser49-rsa-pss.cert -f ../tests.pw cert.sh: #644: Sign TestUser49's RSA-PSS Request - PASSED cert.sh: Import TestUser49's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser49-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #645: Import TestUser49's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser49's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #646: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #647: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #648: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #649: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #650: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #651: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #652: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #653: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #654: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #655: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #656: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #657: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #658: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #659: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #660: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser50's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #661: Generate RSA-PSS Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o TestUser50-rsa-pss.cert -f ../tests.pw cert.sh: #662: Sign TestUser50's RSA-PSS Request - PASSED cert.sh: Import TestUser50's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser50-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #663: Import TestUser50's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser50's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #664: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #665: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #666: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #667: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #668: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #669: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #670: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #671: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #672: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #673: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #674: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #675: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #676: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #677: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #678: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser51's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #679: Generate RSA-PSS Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30051 -v 60 -d ../CA -i req -o TestUser51-rsa-pss.cert -f ../tests.pw cert.sh: #680: Sign TestUser51's RSA-PSS Request - PASSED cert.sh: Import TestUser51's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser51-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #681: Import TestUser51's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser51's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #682: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #683: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #684: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #685: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #686: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #687: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #688: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #689: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #690: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #691: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #692: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #693: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #694: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #695: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #696: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser52's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.79/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #697: Generate RSA-PSS Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30052 -v 60 -d ../CA -i req -o TestUser52-rsa-pss.cert -f ../tests.pw cert.sh: #698: Sign TestUser52's RSA-PSS Request - PASSED cert.sh: Import TestUser52's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser52-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #699: Import TestUser52's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser52's RSA-PSS Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #700: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #701: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #702: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #703: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #704: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #705: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #706: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #707: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #708: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #709: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #710: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #711: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #712: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #713: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #714: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #715: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #716: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1026 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1026 found at Wed Sep 28 04:20:06 UTC 2022 selfserv_9223 with PID 1026 started at Wed Sep 28 04:20:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #717: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1026 at Wed Sep 28 04:20:07 UTC 2022 kill -USR1 1026 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1026 killed at Wed Sep 28 04:20:07 UTC 2022 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1091 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1091 found at Wed Sep 28 04:20:07 UTC 2022 selfserv_9223 with PID 1091 started at Wed Sep 28 04:20:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #718: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1091 at Wed Sep 28 04:20:08 UTC 2022 kill -USR1 1091 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1091 killed at Wed Sep 28 04:20:08 UTC 2022 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1148 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1148 found at Wed Sep 28 04:20:08 UTC 2022 selfserv_9223 with PID 1148 started at Wed Sep 28 04:20:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #719: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1148 at Wed Sep 28 04:20:09 UTC 2022 kill -USR1 1148 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1148 killed at Wed Sep 28 04:20:09 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:20:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1216 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1216 found at Wed Sep 28 04:20:10 UTC 2022 selfserv_9223 with PID 1216 started at Wed Sep 28 04:20:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #720: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1216 at Wed Sep 28 04:20:10 UTC 2022 kill -USR1 1216 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1216 killed at Wed Sep 28 04:20:10 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:20:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1270 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1270 found at Wed Sep 28 04:20:11 UTC 2022 selfserv_9223 with PID 1270 started at Wed Sep 28 04:20:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #721: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1270 at Wed Sep 28 04:20:11 UTC 2022 kill -USR1 1270 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1270 killed at Wed Sep 28 04:20:11 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:20:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1339 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1339 found at Wed Sep 28 04:20:11 UTC 2022 selfserv_9223 with PID 1339 started at Wed Sep 28 04:20:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #722: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1339 at Wed Sep 28 04:20:12 UTC 2022 kill -USR1 1339 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1339 killed at Wed Sep 28 04:20:12 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1411 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1411 found at Wed Sep 28 04:20:12 UTC 2022 selfserv_9223 with PID 1411 started at Wed Sep 28 04:20:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #723: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 1411 at Wed Sep 28 04:20:13 UTC 2022 kill -USR1 1411 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1411 killed at Wed Sep 28 04:20:13 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1467 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1467 found at Wed Sep 28 04:20:13 UTC 2022 selfserv_9223 with PID 1467 started at Wed Sep 28 04:20:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #724: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1467 at Wed Sep 28 04:20:14 UTC 2022 kill -USR1 1467 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1467 killed at Wed Sep 28 04:20:14 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1542 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1542 found at Wed Sep 28 04:20:14 UTC 2022 selfserv_9223 with PID 1542 started at Wed Sep 28 04:20:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #725: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 1542 at Wed Sep 28 04:20:15 UTC 2022 kill -USR1 1542 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1542 killed at Wed Sep 28 04:20:15 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1615 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1615 found at Wed Sep 28 04:20:15 UTC 2022 selfserv_9223 with PID 1615 started at Wed Sep 28 04:20:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #726: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 1615 at Wed Sep 28 04:20:16 UTC 2022 kill -USR1 1615 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1615 killed at Wed Sep 28 04:20:16 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1667 found at Wed Sep 28 04:20:17 UTC 2022 selfserv_9223 with PID 1667 started at Wed Sep 28 04:20:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #727: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 1667 at Wed Sep 28 04:20:17 UTC 2022 kill -USR1 1667 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1667 killed at Wed Sep 28 04:20:17 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1719 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1719 found at Wed Sep 28 04:20:18 UTC 2022 selfserv_9223 with PID 1719 started at Wed Sep 28 04:20:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #728: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 1719 at Wed Sep 28 04:20:18 UTC 2022 kill -USR1 1719 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1719 killed at Wed Sep 28 04:20:19 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:20:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1785 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1785 found at Wed Sep 28 04:20:19 UTC 2022 selfserv_9223 with PID 1785 started at Wed Sep 28 04:20:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #729: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 1785 at Wed Sep 28 04:20:19 UTC 2022 kill -USR1 1785 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1785 killed at Wed Sep 28 04:20:20 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:20:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1846 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1846 found at Wed Sep 28 04:20:20 UTC 2022 selfserv_9223 with PID 1846 started at Wed Sep 28 04:20:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #730: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 1846 at Wed Sep 28 04:20:20 UTC 2022 kill -USR1 1846 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1846 killed at Wed Sep 28 04:20:20 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:20:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1902 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1902 found at Wed Sep 28 04:20:21 UTC 2022 selfserv_9223 with PID 1902 started at Wed Sep 28 04:20:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #731: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 1902 at Wed Sep 28 04:20:21 UTC 2022 kill -USR1 1902 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1902 killed at Wed Sep 28 04:20:21 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1968 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1968 found at Wed Sep 28 04:20:22 UTC 2022 selfserv_9223 with PID 1968 started at Wed Sep 28 04:20:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #732: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 1968 at Wed Sep 28 04:20:22 UTC 2022 kill -USR1 1968 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1968 killed at Wed Sep 28 04:20:22 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2022 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2022 found at Wed Sep 28 04:20:23 UTC 2022 selfserv_9223 with PID 2022 started at Wed Sep 28 04:20:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #733: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2022 at Wed Sep 28 04:20:23 UTC 2022 kill -USR1 2022 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2022 killed at Wed Sep 28 04:20:23 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2074 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2074 found at Wed Sep 28 04:20:24 UTC 2022 selfserv_9223 with PID 2074 started at Wed Sep 28 04:20:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #734: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 2074 at Wed Sep 28 04:20:24 UTC 2022 kill -USR1 2074 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2074 killed at Wed Sep 28 04:20:24 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2140 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2140 found at Wed Sep 28 04:20:25 UTC 2022 selfserv_9223 with PID 2140 started at Wed Sep 28 04:20:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #735: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2140 at Wed Sep 28 04:20:25 UTC 2022 kill -USR1 2140 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2140 killed at Wed Sep 28 04:20:26 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2192 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2192 found at Wed Sep 28 04:20:26 UTC 2022 selfserv_9223 with PID 2192 started at Wed Sep 28 04:20:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #736: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2192 at Wed Sep 28 04:20:26 UTC 2022 kill -USR1 2192 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2192 killed at Wed Sep 28 04:20:27 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2244 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2244 found at Wed Sep 28 04:20:27 UTC 2022 selfserv_9223 with PID 2244 started at Wed Sep 28 04:20:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #737: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2244 at Wed Sep 28 04:20:28 UTC 2022 kill -USR1 2244 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2244 killed at Wed Sep 28 04:20:28 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:20:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2310 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2310 found at Wed Sep 28 04:20:28 UTC 2022 selfserv_9223 with PID 2310 started at Wed Sep 28 04:20:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #738: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2310 at Wed Sep 28 04:20:29 UTC 2022 kill -USR1 2310 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2310 killed at Wed Sep 28 04:20:29 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:20:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2363 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2363 found at Wed Sep 28 04:20:29 UTC 2022 selfserv_9223 with PID 2363 started at Wed Sep 28 04:20:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #739: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2363 at Wed Sep 28 04:20:30 UTC 2022 kill -USR1 2363 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2363 killed at Wed Sep 28 04:20:30 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:20:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2415 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2415 found at Wed Sep 28 04:20:30 UTC 2022 selfserv_9223 with PID 2415 started at Wed Sep 28 04:20:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #740: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2415 at Wed Sep 28 04:20:30 UTC 2022 kill -USR1 2415 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2415 killed at Wed Sep 28 04:20:31 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2481 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2481 found at Wed Sep 28 04:20:31 UTC 2022 selfserv_9223 with PID 2481 started at Wed Sep 28 04:20:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #741: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 2481 at Wed Sep 28 04:20:31 UTC 2022 kill -USR1 2481 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2481 killed at Wed Sep 28 04:20:32 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2533 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2533 found at Wed Sep 28 04:20:32 UTC 2022 selfserv_9223 with PID 2533 started at Wed Sep 28 04:20:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #742: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2533 at Wed Sep 28 04:20:32 UTC 2022 kill -USR1 2533 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2533 killed at Wed Sep 28 04:20:32 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2585 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2585 found at Wed Sep 28 04:20:33 UTC 2022 selfserv_9223 with PID 2585 started at Wed Sep 28 04:20:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #743: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 2585 at Wed Sep 28 04:20:33 UTC 2022 kill -USR1 2585 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2585 killed at Wed Sep 28 04:20:33 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2651 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2651 found at Wed Sep 28 04:20:34 UTC 2022 selfserv_9223 with PID 2651 started at Wed Sep 28 04:20:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #744: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 2651 at Wed Sep 28 04:20:34 UTC 2022 kill -USR1 2651 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2651 killed at Wed Sep 28 04:20:34 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2703 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2703 found at Wed Sep 28 04:20:35 UTC 2022 selfserv_9223 with PID 2703 started at Wed Sep 28 04:20:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #745: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 2703 at Wed Sep 28 04:20:35 UTC 2022 kill -USR1 2703 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2703 killed at Wed Sep 28 04:20:36 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2755 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2755 found at Wed Sep 28 04:20:36 UTC 2022 selfserv_9223 with PID 2755 started at Wed Sep 28 04:20:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #746: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 2755 at Wed Sep 28 04:20:37 UTC 2022 kill -USR1 2755 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2755 killed at Wed Sep 28 04:20:37 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:20:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2836 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2836 found at Wed Sep 28 04:20:37 UTC 2022 selfserv_9223 with PID 2836 started at Wed Sep 28 04:20:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #747: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 2836 at Wed Sep 28 04:20:37 UTC 2022 kill -USR1 2836 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2836 killed at Wed Sep 28 04:20:38 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:20:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2889 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2889 found at Wed Sep 28 04:20:38 UTC 2022 selfserv_9223 with PID 2889 started at Wed Sep 28 04:20:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #748: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 2889 at Wed Sep 28 04:20:38 UTC 2022 kill -USR1 2889 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2889 killed at Wed Sep 28 04:20:38 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:20:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2941 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2941 found at Wed Sep 28 04:20:39 UTC 2022 selfserv_9223 with PID 2941 started at Wed Sep 28 04:20:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #749: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 2941 at Wed Sep 28 04:20:39 UTC 2022 kill -USR1 2941 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2941 killed at Wed Sep 28 04:20:39 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3007 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3007 found at Wed Sep 28 04:20:40 UTC 2022 selfserv_9223 with PID 3007 started at Wed Sep 28 04:20:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #750: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 3007 at Wed Sep 28 04:20:40 UTC 2022 kill -USR1 3007 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3007 killed at Wed Sep 28 04:20:40 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3059 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3059 found at Wed Sep 28 04:20:41 UTC 2022 selfserv_9223 with PID 3059 started at Wed Sep 28 04:20:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #751: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3059 at Wed Sep 28 04:20:41 UTC 2022 kill -USR1 3059 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3059 killed at Wed Sep 28 04:20:41 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3112 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3112 found at Wed Sep 28 04:20:41 UTC 2022 selfserv_9223 with PID 3112 started at Wed Sep 28 04:20:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #752: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 3112 at Wed Sep 28 04:20:42 UTC 2022 kill -USR1 3112 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3112 killed at Wed Sep 28 04:20:42 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3179 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3179 found at Wed Sep 28 04:20:42 UTC 2022 selfserv_9223 with PID 3179 started at Wed Sep 28 04:20:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #753: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3179 at Wed Sep 28 04:20:43 UTC 2022 kill -USR1 3179 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3179 killed at Wed Sep 28 04:20:43 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3232 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3232 found at Wed Sep 28 04:20:44 UTC 2022 selfserv_9223 with PID 3232 started at Wed Sep 28 04:20:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #754: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3232 at Wed Sep 28 04:20:45 UTC 2022 kill -USR1 3232 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3232 killed at Wed Sep 28 04:20:45 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3286 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3286 found at Wed Sep 28 04:20:45 UTC 2022 selfserv_9223 with PID 3286 started at Wed Sep 28 04:20:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #755: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3286 at Wed Sep 28 04:20:46 UTC 2022 kill -USR1 3286 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3286 killed at Wed Sep 28 04:20:46 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:20:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3352 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3352 found at Wed Sep 28 04:20:46 UTC 2022 selfserv_9223 with PID 3352 started at Wed Sep 28 04:20:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #756: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3352 at Wed Sep 28 04:20:47 UTC 2022 kill -USR1 3352 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3352 killed at Wed Sep 28 04:20:47 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:20:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3404 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3404 found at Wed Sep 28 04:20:48 UTC 2022 selfserv_9223 with PID 3404 started at Wed Sep 28 04:20:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #757: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3404 at Wed Sep 28 04:20:48 UTC 2022 kill -USR1 3404 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3404 killed at Wed Sep 28 04:20:48 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:20:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3456 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3456 found at Wed Sep 28 04:20:49 UTC 2022 selfserv_9223 with PID 3456 started at Wed Sep 28 04:20:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #758: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3456 at Wed Sep 28 04:20:49 UTC 2022 kill -USR1 3456 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3456 killed at Wed Sep 28 04:20:49 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3522 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3522 found at Wed Sep 28 04:20:50 UTC 2022 selfserv_9223 with PID 3522 started at Wed Sep 28 04:20:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #759: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3522 at Wed Sep 28 04:20:50 UTC 2022 kill -USR1 3522 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3522 killed at Wed Sep 28 04:20:51 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3574 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3574 found at Wed Sep 28 04:20:51 UTC 2022 selfserv_9223 with PID 3574 started at Wed Sep 28 04:20:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #760: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3574 at Wed Sep 28 04:20:52 UTC 2022 kill -USR1 3574 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3574 killed at Wed Sep 28 04:20:52 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3626 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3626 found at Wed Sep 28 04:20:52 UTC 2022 selfserv_9223 with PID 3626 started at Wed Sep 28 04:20:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #761: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3626 at Wed Sep 28 04:20:53 UTC 2022 kill -USR1 3626 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3626 killed at Wed Sep 28 04:20:53 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3692 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3692 found at Wed Sep 28 04:20:53 UTC 2022 selfserv_9223 with PID 3692 started at Wed Sep 28 04:20:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #762: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3692 at Wed Sep 28 04:20:54 UTC 2022 kill -USR1 3692 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3692 killed at Wed Sep 28 04:20:54 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3744 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3744 found at Wed Sep 28 04:20:54 UTC 2022 selfserv_9223 with PID 3744 started at Wed Sep 28 04:20:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #763: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3744 at Wed Sep 28 04:20:55 UTC 2022 kill -USR1 3744 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3744 killed at Wed Sep 28 04:20:55 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:20:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3796 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3796 found at Wed Sep 28 04:20:56 UTC 2022 selfserv_9223 with PID 3796 started at Wed Sep 28 04:20:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #764: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3796 at Wed Sep 28 04:20:57 UTC 2022 kill -USR1 3796 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3796 killed at Wed Sep 28 04:20:57 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:20:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3862 found at Wed Sep 28 04:20:57 UTC 2022 selfserv_9223 with PID 3862 started at Wed Sep 28 04:20:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #765: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3862 at Wed Sep 28 04:20:58 UTC 2022 kill -USR1 3862 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3862 killed at Wed Sep 28 04:20:58 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:20:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3914 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3914 found at Wed Sep 28 04:20:58 UTC 2022 selfserv_9223 with PID 3914 started at Wed Sep 28 04:20:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #766: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3914 at Wed Sep 28 04:20:59 UTC 2022 kill -USR1 3914 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3914 killed at Wed Sep 28 04:20:59 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:20:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:20:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3966 found at Wed Sep 28 04:20:59 UTC 2022 selfserv_9223 with PID 3966 started at Wed Sep 28 04:20:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #767: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3966 at Wed Sep 28 04:21:00 UTC 2022 kill -USR1 3966 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3966 killed at Wed Sep 28 04:21:00 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4033 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4033 found at Wed Sep 28 04:21:00 UTC 2022 selfserv_9223 with PID 4033 started at Wed Sep 28 04:21:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #768: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4033 at Wed Sep 28 04:21:01 UTC 2022 kill -USR1 4033 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4033 killed at Wed Sep 28 04:21:01 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4085 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4085 found at Wed Sep 28 04:21:02 UTC 2022 selfserv_9223 with PID 4085 started at Wed Sep 28 04:21:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #769: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4085 at Wed Sep 28 04:21:02 UTC 2022 kill -USR1 4085 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4085 killed at Wed Sep 28 04:21:02 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4137 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4137 found at Wed Sep 28 04:21:03 UTC 2022 selfserv_9223 with PID 4137 started at Wed Sep 28 04:21:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #770: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4137 at Wed Sep 28 04:21:03 UTC 2022 kill -USR1 4137 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4137 killed at Wed Sep 28 04:21:03 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4203 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4203 found at Wed Sep 28 04:21:04 UTC 2022 selfserv_9223 with PID 4203 started at Wed Sep 28 04:21:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #771: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4203 at Wed Sep 28 04:21:05 UTC 2022 kill -USR1 4203 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4203 killed at Wed Sep 28 04:21:05 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4255 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4255 found at Wed Sep 28 04:21:05 UTC 2022 selfserv_9223 with PID 4255 started at Wed Sep 28 04:21:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #772: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4255 at Wed Sep 28 04:21:06 UTC 2022 kill -USR1 4255 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4255 killed at Wed Sep 28 04:21:06 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4307 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4307 found at Wed Sep 28 04:21:06 UTC 2022 selfserv_9223 with PID 4307 started at Wed Sep 28 04:21:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #773: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4307 at Wed Sep 28 04:21:07 UTC 2022 kill -USR1 4307 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4307 killed at Wed Sep 28 04:21:08 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:21:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4373 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4373 found at Wed Sep 28 04:21:08 UTC 2022 selfserv_9223 with PID 4373 started at Wed Sep 28 04:21:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #774: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4373 at Wed Sep 28 04:21:08 UTC 2022 kill -USR1 4373 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4373 killed at Wed Sep 28 04:21:09 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:21:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4425 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4425 found at Wed Sep 28 04:21:09 UTC 2022 selfserv_9223 with PID 4425 started at Wed Sep 28 04:21:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #775: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4425 at Wed Sep 28 04:21:10 UTC 2022 kill -USR1 4425 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4425 killed at Wed Sep 28 04:21:10 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:21:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4477 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4477 found at Wed Sep 28 04:21:10 UTC 2022 selfserv_9223 with PID 4477 started at Wed Sep 28 04:21:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #776: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4477 at Wed Sep 28 04:21:11 UTC 2022 kill -USR1 4477 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4477 killed at Wed Sep 28 04:21:11 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4543 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4543 found at Wed Sep 28 04:21:11 UTC 2022 selfserv_9223 with PID 4543 started at Wed Sep 28 04:21:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #777: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4543 at Wed Sep 28 04:21:12 UTC 2022 kill -USR1 4543 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4543 killed at Wed Sep 28 04:21:12 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4595 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4595 found at Wed Sep 28 04:21:12 UTC 2022 selfserv_9223 with PID 4595 started at Wed Sep 28 04:21:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #778: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4595 at Wed Sep 28 04:21:13 UTC 2022 kill -USR1 4595 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4595 killed at Wed Sep 28 04:21:13 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4647 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4647 found at Wed Sep 28 04:21:13 UTC 2022 selfserv_9223 with PID 4647 started at Wed Sep 28 04:21:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #779: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4647 at Wed Sep 28 04:21:14 UTC 2022 kill -USR1 4647 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4647 killed at Wed Sep 28 04:21:14 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4713 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4713 found at Wed Sep 28 04:21:15 UTC 2022 selfserv_9223 with PID 4713 started at Wed Sep 28 04:21:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #780: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4713 at Wed Sep 28 04:21:15 UTC 2022 kill -USR1 4713 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4713 killed at Wed Sep 28 04:21:16 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4765 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4765 found at Wed Sep 28 04:21:16 UTC 2022 selfserv_9223 with PID 4765 started at Wed Sep 28 04:21:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #781: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4765 at Wed Sep 28 04:21:17 UTC 2022 kill -USR1 4765 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4765 killed at Wed Sep 28 04:21:17 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4817 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4817 found at Wed Sep 28 04:21:17 UTC 2022 selfserv_9223 with PID 4817 started at Wed Sep 28 04:21:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #782: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4817 at Wed Sep 28 04:21:18 UTC 2022 kill -USR1 4817 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4817 killed at Wed Sep 28 04:21:18 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:21:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4883 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4883 found at Wed Sep 28 04:21:19 UTC 2022 selfserv_9223 with PID 4883 started at Wed Sep 28 04:21:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #783: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4883 at Wed Sep 28 04:21:19 UTC 2022 kill -USR1 4883 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4883 killed at Wed Sep 28 04:21:19 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:21:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4935 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4935 found at Wed Sep 28 04:21:20 UTC 2022 selfserv_9223 with PID 4935 started at Wed Sep 28 04:21:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #784: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4935 at Wed Sep 28 04:21:20 UTC 2022 kill -USR1 4935 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4935 killed at Wed Sep 28 04:21:20 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:21:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4987 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4987 found at Wed Sep 28 04:21:21 UTC 2022 selfserv_9223 with PID 4987 started at Wed Sep 28 04:21:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #785: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4987 at Wed Sep 28 04:21:21 UTC 2022 kill -USR1 4987 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4987 killed at Wed Sep 28 04:21:22 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5053 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5053 found at Wed Sep 28 04:21:22 UTC 2022 selfserv_9223 with PID 5053 started at Wed Sep 28 04:21:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #786: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5053 at Wed Sep 28 04:21:22 UTC 2022 kill -USR1 5053 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5053 killed at Wed Sep 28 04:21:23 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5106 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5106 found at Wed Sep 28 04:21:23 UTC 2022 selfserv_9223 with PID 5106 started at Wed Sep 28 04:21:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #787: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5106 at Wed Sep 28 04:21:24 UTC 2022 kill -USR1 5106 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5106 killed at Wed Sep 28 04:21:24 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5158 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5158 found at Wed Sep 28 04:21:24 UTC 2022 selfserv_9223 with PID 5158 started at Wed Sep 28 04:21:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #788: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5158 at Wed Sep 28 04:21:25 UTC 2022 kill -USR1 5158 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5158 killed at Wed Sep 28 04:21:25 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5225 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5225 found at Wed Sep 28 04:21:25 UTC 2022 selfserv_9223 with PID 5225 started at Wed Sep 28 04:21:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #789: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5225 at Wed Sep 28 04:21:26 UTC 2022 kill -USR1 5225 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5225 killed at Wed Sep 28 04:21:26 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5277 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5277 found at Wed Sep 28 04:21:27 UTC 2022 selfserv_9223 with PID 5277 started at Wed Sep 28 04:21:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5277 at Wed Sep 28 04:21:27 UTC 2022 kill -USR1 5277 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5277 killed at Wed Sep 28 04:21:27 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5329 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5329 found at Wed Sep 28 04:21:28 UTC 2022 selfserv_9223 with PID 5329 started at Wed Sep 28 04:21:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5329 at Wed Sep 28 04:21:28 UTC 2022 kill -USR1 5329 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5329 killed at Wed Sep 28 04:21:29 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:21:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5395 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5395 found at Wed Sep 28 04:21:29 UTC 2022 selfserv_9223 with PID 5395 started at Wed Sep 28 04:21:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5395 at Wed Sep 28 04:21:29 UTC 2022 kill -USR1 5395 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5395 killed at Wed Sep 28 04:21:30 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:21:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5447 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5447 found at Wed Sep 28 04:21:30 UTC 2022 selfserv_9223 with PID 5447 started at Wed Sep 28 04:21:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #793: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5447 at Wed Sep 28 04:21:30 UTC 2022 kill -USR1 5447 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5447 killed at Wed Sep 28 04:21:31 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:21:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5499 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5499 found at Wed Sep 28 04:21:31 UTC 2022 selfserv_9223 with PID 5499 started at Wed Sep 28 04:21:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #794: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5499 at Wed Sep 28 04:21:31 UTC 2022 kill -USR1 5499 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5499 killed at Wed Sep 28 04:21:32 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5565 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5565 found at Wed Sep 28 04:21:32 UTC 2022 selfserv_9223 with PID 5565 started at Wed Sep 28 04:21:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #795: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5565 at Wed Sep 28 04:21:32 UTC 2022 kill -USR1 5565 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5565 killed at Wed Sep 28 04:21:33 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5617 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5617 found at Wed Sep 28 04:21:33 UTC 2022 selfserv_9223 with PID 5617 started at Wed Sep 28 04:21:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5617 at Wed Sep 28 04:21:33 UTC 2022 kill -USR1 5617 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5617 killed at Wed Sep 28 04:21:34 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5669 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5669 found at Wed Sep 28 04:21:34 UTC 2022 selfserv_9223 with PID 5669 started at Wed Sep 28 04:21:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #797: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5669 at Wed Sep 28 04:21:34 UTC 2022 kill -USR1 5669 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5669 killed at Wed Sep 28 04:21:35 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5743 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5743 found at Wed Sep 28 04:21:35 UTC 2022 selfserv_9223 with PID 5743 started at Wed Sep 28 04:21:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #798: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5743 at Wed Sep 28 04:21:36 UTC 2022 kill -USR1 5743 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5743 killed at Wed Sep 28 04:21:36 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5795 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5795 found at Wed Sep 28 04:21:36 UTC 2022 selfserv_9223 with PID 5795 started at Wed Sep 28 04:21:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #799: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5795 at Wed Sep 28 04:21:37 UTC 2022 kill -USR1 5795 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5795 killed at Wed Sep 28 04:21:37 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5862 found at Wed Sep 28 04:21:37 UTC 2022 selfserv_9223 with PID 5862 started at Wed Sep 28 04:21:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5862 at Wed Sep 28 04:21:38 UTC 2022 kill -USR1 5862 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5862 killed at Wed Sep 28 04:21:38 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:21:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5929 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5929 found at Wed Sep 28 04:21:39 UTC 2022 selfserv_9223 with PID 5929 started at Wed Sep 28 04:21:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #801: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5929 at Wed Sep 28 04:21:39 UTC 2022 kill -USR1 5929 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5929 killed at Wed Sep 28 04:21:39 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:21:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5981 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5981 found at Wed Sep 28 04:21:40 UTC 2022 selfserv_9223 with PID 5981 started at Wed Sep 28 04:21:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #802: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5981 at Wed Sep 28 04:21:40 UTC 2022 kill -USR1 5981 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5981 killed at Wed Sep 28 04:21:40 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:21:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6033 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6033 found at Wed Sep 28 04:21:41 UTC 2022 selfserv_9223 with PID 6033 started at Wed Sep 28 04:21:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #803: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6033 at Wed Sep 28 04:21:41 UTC 2022 kill -USR1 6033 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6033 killed at Wed Sep 28 04:21:41 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6099 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6099 found at Wed Sep 28 04:21:42 UTC 2022 selfserv_9223 with PID 6099 started at Wed Sep 28 04:21:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #804: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6099 at Wed Sep 28 04:21:42 UTC 2022 kill -USR1 6099 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6099 killed at Wed Sep 28 04:21:42 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6151 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6151 found at Wed Sep 28 04:21:43 UTC 2022 selfserv_9223 with PID 6151 started at Wed Sep 28 04:21:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #805: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6151 at Wed Sep 28 04:21:43 UTC 2022 kill -USR1 6151 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6151 killed at Wed Sep 28 04:21:43 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6203 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6203 found at Wed Sep 28 04:21:44 UTC 2022 selfserv_9223 with PID 6203 started at Wed Sep 28 04:21:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #806: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6203 at Wed Sep 28 04:21:44 UTC 2022 kill -USR1 6203 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6203 killed at Wed Sep 28 04:21:44 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6269 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6269 found at Wed Sep 28 04:21:45 UTC 2022 selfserv_9223 with PID 6269 started at Wed Sep 28 04:21:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #807: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6269 at Wed Sep 28 04:21:45 UTC 2022 kill -USR1 6269 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6269 killed at Wed Sep 28 04:21:45 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6321 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6321 found at Wed Sep 28 04:21:45 UTC 2022 selfserv_9223 with PID 6321 started at Wed Sep 28 04:21:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6321 at Wed Sep 28 04:21:46 UTC 2022 kill -USR1 6321 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6321 killed at Wed Sep 28 04:21:46 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6373 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6373 found at Wed Sep 28 04:21:46 UTC 2022 selfserv_9223 with PID 6373 started at Wed Sep 28 04:21:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #809: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6373 at Wed Sep 28 04:21:47 UTC 2022 kill -USR1 6373 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6373 killed at Wed Sep 28 04:21:47 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6439 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6439 found at Wed Sep 28 04:21:47 UTC 2022 selfserv_9223 with PID 6439 started at Wed Sep 28 04:21:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #810: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6439 at Wed Sep 28 04:21:48 UTC 2022 kill -USR1 6439 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6439 killed at Wed Sep 28 04:21:48 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6491 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6491 found at Wed Sep 28 04:21:48 UTC 2022 selfserv_9223 with PID 6491 started at Wed Sep 28 04:21:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #811: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6491 at Wed Sep 28 04:21:49 UTC 2022 kill -USR1 6491 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6491 killed at Wed Sep 28 04:21:49 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6543 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6543 found at Wed Sep 28 04:21:49 UTC 2022 selfserv_9223 with PID 6543 started at Wed Sep 28 04:21:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #812: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6543 at Wed Sep 28 04:21:50 UTC 2022 kill -USR1 6543 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6543 killed at Wed Sep 28 04:21:50 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6610 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6610 found at Wed Sep 28 04:21:50 UTC 2022 selfserv_9223 with PID 6610 started at Wed Sep 28 04:21:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6610 at Wed Sep 28 04:21:51 UTC 2022 kill -USR1 6610 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6610 killed at Wed Sep 28 04:21:51 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6664 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6664 found at Wed Sep 28 04:21:51 UTC 2022 selfserv_9223 with PID 6664 started at Wed Sep 28 04:21:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #814: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6664 at Wed Sep 28 04:21:52 UTC 2022 kill -USR1 6664 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6664 killed at Wed Sep 28 04:21:52 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6716 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6716 found at Wed Sep 28 04:21:52 UTC 2022 selfserv_9223 with PID 6716 started at Wed Sep 28 04:21:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6716 at Wed Sep 28 04:21:53 UTC 2022 kill -USR1 6716 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6716 killed at Wed Sep 28 04:21:53 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6782 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6782 found at Wed Sep 28 04:21:53 UTC 2022 selfserv_9223 with PID 6782 started at Wed Sep 28 04:21:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #816: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6782 at Wed Sep 28 04:21:54 UTC 2022 kill -USR1 6782 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6782 killed at Wed Sep 28 04:21:54 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6834 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6834 found at Wed Sep 28 04:21:55 UTC 2022 selfserv_9223 with PID 6834 started at Wed Sep 28 04:21:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #817: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6834 at Wed Sep 28 04:21:55 UTC 2022 kill -USR1 6834 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6834 killed at Wed Sep 28 04:21:55 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6886 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6886 found at Wed Sep 28 04:21:56 UTC 2022 selfserv_9223 with PID 6886 started at Wed Sep 28 04:21:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #818: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6886 at Wed Sep 28 04:21:56 UTC 2022 kill -USR1 6886 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6886 killed at Wed Sep 28 04:21:57 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 6952 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6952 found at Wed Sep 28 04:21:57 UTC 2022 selfserv_9223 with PID 6952 started at Wed Sep 28 04:21:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #819: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 6952 at Wed Sep 28 04:21:57 UTC 2022 kill -USR1 6952 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6952 killed at Wed Sep 28 04:21:57 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7004 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7004 found at Wed Sep 28 04:21:58 UTC 2022 selfserv_9223 with PID 7004 started at Wed Sep 28 04:21:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7004 at Wed Sep 28 04:21:58 UTC 2022 kill -USR1 7004 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7004 killed at Wed Sep 28 04:21:58 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7056 found at Wed Sep 28 04:21:59 UTC 2022 selfserv_9223 with PID 7056 started at Wed Sep 28 04:21:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #821: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7056 at Wed Sep 28 04:21:59 UTC 2022 kill -USR1 7056 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7056 killed at Wed Sep 28 04:21:59 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:21:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:21:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7122 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7122 found at Wed Sep 28 04:22:00 UTC 2022 selfserv_9223 with PID 7122 started at Wed Sep 28 04:22:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #822: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7122 at Wed Sep 28 04:22:00 UTC 2022 kill -USR1 7122 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7122 killed at Wed Sep 28 04:22:00 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7174 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7174 found at Wed Sep 28 04:22:01 UTC 2022 selfserv_9223 with PID 7174 started at Wed Sep 28 04:22:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #823: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7174 at Wed Sep 28 04:22:01 UTC 2022 kill -USR1 7174 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7174 killed at Wed Sep 28 04:22:01 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7226 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7226 found at Wed Sep 28 04:22:02 UTC 2022 selfserv_9223 with PID 7226 started at Wed Sep 28 04:22:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #824: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7226 at Wed Sep 28 04:22:02 UTC 2022 kill -USR1 7226 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7226 killed at Wed Sep 28 04:22:03 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7292 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7292 found at Wed Sep 28 04:22:03 UTC 2022 selfserv_9223 with PID 7292 started at Wed Sep 28 04:22:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7292 at Wed Sep 28 04:22:03 UTC 2022 kill -USR1 7292 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7292 killed at Wed Sep 28 04:22:04 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7344 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7344 found at Wed Sep 28 04:22:04 UTC 2022 selfserv_9223 with PID 7344 started at Wed Sep 28 04:22:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #826: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7344 at Wed Sep 28 04:22:04 UTC 2022 kill -USR1 7344 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7344 killed at Wed Sep 28 04:22:05 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7396 found at Wed Sep 28 04:22:05 UTC 2022 selfserv_9223 with PID 7396 started at Wed Sep 28 04:22:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7396 at Wed Sep 28 04:22:05 UTC 2022 kill -USR1 7396 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7396 killed at Wed Sep 28 04:22:06 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7462 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7462 found at Wed Sep 28 04:22:06 UTC 2022 selfserv_9223 with PID 7462 started at Wed Sep 28 04:22:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #828: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 7462 at Wed Sep 28 04:22:06 UTC 2022 kill -USR1 7462 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7462 killed at Wed Sep 28 04:22:07 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7515 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7515 found at Wed Sep 28 04:22:07 UTC 2022 selfserv_9223 with PID 7515 started at Wed Sep 28 04:22:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #829: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7515 at Wed Sep 28 04:22:07 UTC 2022 kill -USR1 7515 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7515 killed at Wed Sep 28 04:22:08 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7567 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7567 found at Wed Sep 28 04:22:08 UTC 2022 selfserv_9223 with PID 7567 started at Wed Sep 28 04:22:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #830: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 7567 at Wed Sep 28 04:22:08 UTC 2022 kill -USR1 7567 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7567 killed at Wed Sep 28 04:22:09 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7633 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7633 found at Wed Sep 28 04:22:09 UTC 2022 selfserv_9223 with PID 7633 started at Wed Sep 28 04:22:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #831: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 7633 at Wed Sep 28 04:22:09 UTC 2022 kill -USR1 7633 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7633 killed at Wed Sep 28 04:22:10 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7685 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7685 found at Wed Sep 28 04:22:10 UTC 2022 selfserv_9223 with PID 7685 started at Wed Sep 28 04:22:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #832: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 7685 at Wed Sep 28 04:22:10 UTC 2022 kill -USR1 7685 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7685 killed at Wed Sep 28 04:22:10 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7737 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7737 found at Wed Sep 28 04:22:11 UTC 2022 selfserv_9223 with PID 7737 started at Wed Sep 28 04:22:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #833: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 7737 at Wed Sep 28 04:22:11 UTC 2022 kill -USR1 7737 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7737 killed at Wed Sep 28 04:22:11 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7803 found at Wed Sep 28 04:22:12 UTC 2022 selfserv_9223 with PID 7803 started at Wed Sep 28 04:22:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #834: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 7803 at Wed Sep 28 04:22:12 UTC 2022 kill -USR1 7803 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7803 killed at Wed Sep 28 04:22:12 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7855 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7855 found at Wed Sep 28 04:22:13 UTC 2022 selfserv_9223 with PID 7855 started at Wed Sep 28 04:22:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #835: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7855 at Wed Sep 28 04:22:13 UTC 2022 kill -USR1 7855 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7855 killed at Wed Sep 28 04:22:13 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7907 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7907 found at Wed Sep 28 04:22:14 UTC 2022 selfserv_9223 with PID 7907 started at Wed Sep 28 04:22:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #836: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 7907 at Wed Sep 28 04:22:14 UTC 2022 kill -USR1 7907 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7907 killed at Wed Sep 28 04:22:14 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7973 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7973 found at Wed Sep 28 04:22:15 UTC 2022 selfserv_9223 with PID 7973 started at Wed Sep 28 04:22:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #837: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7973 at Wed Sep 28 04:22:15 UTC 2022 kill -USR1 7973 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7973 killed at Wed Sep 28 04:22:15 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8025 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8025 found at Wed Sep 28 04:22:16 UTC 2022 selfserv_9223 with PID 8025 started at Wed Sep 28 04:22:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #838: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8025 at Wed Sep 28 04:22:16 UTC 2022 kill -USR1 8025 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8025 killed at Wed Sep 28 04:22:16 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8078 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8078 found at Wed Sep 28 04:22:17 UTC 2022 selfserv_9223 with PID 8078 started at Wed Sep 28 04:22:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8078 at Wed Sep 28 04:22:17 UTC 2022 kill -USR1 8078 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8078 killed at Wed Sep 28 04:22:17 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8144 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8144 found at Wed Sep 28 04:22:17 UTC 2022 selfserv_9223 with PID 8144 started at Wed Sep 28 04:22:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #840: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 8144 at Wed Sep 28 04:22:18 UTC 2022 kill -USR1 8144 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8144 killed at Wed Sep 28 04:22:18 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8196 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8196 found at Wed Sep 28 04:22:18 UTC 2022 selfserv_9223 with PID 8196 started at Wed Sep 28 04:22:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #841: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8196 at Wed Sep 28 04:22:19 UTC 2022 kill -USR1 8196 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8196 killed at Wed Sep 28 04:22:19 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8248 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8248 found at Wed Sep 28 04:22:19 UTC 2022 selfserv_9223 with PID 8248 started at Wed Sep 28 04:22:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #842: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 8248 at Wed Sep 28 04:22:20 UTC 2022 kill -USR1 8248 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8248 killed at Wed Sep 28 04:22:20 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8314 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8314 found at Wed Sep 28 04:22:20 UTC 2022 selfserv_9223 with PID 8314 started at Wed Sep 28 04:22:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #843: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 8314 at Wed Sep 28 04:22:21 UTC 2022 kill -USR1 8314 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8314 killed at Wed Sep 28 04:22:21 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8366 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8366 found at Wed Sep 28 04:22:21 UTC 2022 selfserv_9223 with PID 8366 started at Wed Sep 28 04:22:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #844: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 8366 at Wed Sep 28 04:22:21 UTC 2022 kill -USR1 8366 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8366 killed at Wed Sep 28 04:22:22 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8418 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8418 found at Wed Sep 28 04:22:22 UTC 2022 selfserv_9223 with PID 8418 started at Wed Sep 28 04:22:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #845: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 8418 at Wed Sep 28 04:22:22 UTC 2022 kill -USR1 8418 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8418 killed at Wed Sep 28 04:22:23 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8484 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8484 found at Wed Sep 28 04:22:23 UTC 2022 selfserv_9223 with PID 8484 started at Wed Sep 28 04:22:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #846: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 8484 at Wed Sep 28 04:22:23 UTC 2022 kill -USR1 8484 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8484 killed at Wed Sep 28 04:22:23 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8536 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8536 found at Wed Sep 28 04:22:24 UTC 2022 selfserv_9223 with PID 8536 started at Wed Sep 28 04:22:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #847: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8536 at Wed Sep 28 04:22:24 UTC 2022 kill -USR1 8536 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8536 killed at Wed Sep 28 04:22:24 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8588 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8588 found at Wed Sep 28 04:22:25 UTC 2022 selfserv_9223 with PID 8588 started at Wed Sep 28 04:22:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #848: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 8588 at Wed Sep 28 04:22:25 UTC 2022 kill -USR1 8588 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8588 killed at Wed Sep 28 04:22:25 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8654 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8654 found at Wed Sep 28 04:22:26 UTC 2022 selfserv_9223 with PID 8654 started at Wed Sep 28 04:22:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #849: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8654 at Wed Sep 28 04:22:26 UTC 2022 kill -USR1 8654 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8654 killed at Wed Sep 28 04:22:26 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8706 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8706 found at Wed Sep 28 04:22:27 UTC 2022 selfserv_9223 with PID 8706 started at Wed Sep 28 04:22:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #850: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8706 at Wed Sep 28 04:22:27 UTC 2022 kill -USR1 8706 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8706 killed at Wed Sep 28 04:22:28 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8758 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8758 found at Wed Sep 28 04:22:28 UTC 2022 selfserv_9223 with PID 8758 started at Wed Sep 28 04:22:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #851: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8758 at Wed Sep 28 04:22:28 UTC 2022 kill -USR1 8758 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8758 killed at Wed Sep 28 04:22:29 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8824 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8824 found at Wed Sep 28 04:22:29 UTC 2022 selfserv_9223 with PID 8824 started at Wed Sep 28 04:22:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #852: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8824 at Wed Sep 28 04:22:30 UTC 2022 kill -USR1 8824 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8824 killed at Wed Sep 28 04:22:30 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8876 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8876 found at Wed Sep 28 04:22:30 UTC 2022 selfserv_9223 with PID 8876 started at Wed Sep 28 04:22:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #853: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8876 at Wed Sep 28 04:22:31 UTC 2022 kill -USR1 8876 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8876 killed at Wed Sep 28 04:22:31 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8928 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8928 found at Wed Sep 28 04:22:31 UTC 2022 selfserv_9223 with PID 8928 started at Wed Sep 28 04:22:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #854: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8928 at Wed Sep 28 04:22:32 UTC 2022 kill -USR1 8928 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8928 killed at Wed Sep 28 04:22:32 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8994 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8994 found at Wed Sep 28 04:22:32 UTC 2022 selfserv_9223 with PID 8994 started at Wed Sep 28 04:22:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #855: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8994 at Wed Sep 28 04:22:33 UTC 2022 kill -USR1 8994 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8994 killed at Wed Sep 28 04:22:33 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9046 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9046 found at Wed Sep 28 04:22:33 UTC 2022 selfserv_9223 with PID 9046 started at Wed Sep 28 04:22:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #856: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9046 at Wed Sep 28 04:22:34 UTC 2022 kill -USR1 9046 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9046 killed at Wed Sep 28 04:22:34 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9098 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9098 found at Wed Sep 28 04:22:35 UTC 2022 selfserv_9223 with PID 9098 started at Wed Sep 28 04:22:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #857: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9098 at Wed Sep 28 04:22:35 UTC 2022 kill -USR1 9098 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9098 killed at Wed Sep 28 04:22:35 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9164 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9164 found at Wed Sep 28 04:22:36 UTC 2022 selfserv_9223 with PID 9164 started at Wed Sep 28 04:22:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #858: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9164 at Wed Sep 28 04:22:36 UTC 2022 kill -USR1 9164 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9164 killed at Wed Sep 28 04:22:36 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9216 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9216 found at Wed Sep 28 04:22:37 UTC 2022 selfserv_9223 with PID 9216 started at Wed Sep 28 04:22:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #859: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9216 at Wed Sep 28 04:22:37 UTC 2022 kill -USR1 9216 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9216 killed at Wed Sep 28 04:22:38 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9283 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9283 found at Wed Sep 28 04:22:38 UTC 2022 selfserv_9223 with PID 9283 started at Wed Sep 28 04:22:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #860: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9283 at Wed Sep 28 04:22:39 UTC 2022 kill -USR1 9283 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9283 killed at Wed Sep 28 04:22:39 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9349 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9349 found at Wed Sep 28 04:22:39 UTC 2022 selfserv_9223 with PID 9349 started at Wed Sep 28 04:22:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #861: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9349 at Wed Sep 28 04:22:40 UTC 2022 kill -USR1 9349 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9349 killed at Wed Sep 28 04:22:40 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9401 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9401 found at Wed Sep 28 04:22:40 UTC 2022 selfserv_9223 with PID 9401 started at Wed Sep 28 04:22:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #862: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9401 at Wed Sep 28 04:22:41 UTC 2022 kill -USR1 9401 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9401 killed at Wed Sep 28 04:22:41 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9453 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9453 found at Wed Sep 28 04:22:41 UTC 2022 selfserv_9223 with PID 9453 started at Wed Sep 28 04:22:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #863: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9453 at Wed Sep 28 04:22:42 UTC 2022 kill -USR1 9453 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9453 killed at Wed Sep 28 04:22:42 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9519 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9519 found at Wed Sep 28 04:22:42 UTC 2022 selfserv_9223 with PID 9519 started at Wed Sep 28 04:22:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #864: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9519 at Wed Sep 28 04:22:43 UTC 2022 kill -USR1 9519 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9519 killed at Wed Sep 28 04:22:43 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9571 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9571 found at Wed Sep 28 04:22:44 UTC 2022 selfserv_9223 with PID 9571 started at Wed Sep 28 04:22:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #865: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9571 at Wed Sep 28 04:22:44 UTC 2022 kill -USR1 9571 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9571 killed at Wed Sep 28 04:22:44 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9623 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9623 found at Wed Sep 28 04:22:45 UTC 2022 selfserv_9223 with PID 9623 started at Wed Sep 28 04:22:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #866: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9623 at Wed Sep 28 04:22:45 UTC 2022 kill -USR1 9623 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9623 killed at Wed Sep 28 04:22:46 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9689 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9689 found at Wed Sep 28 04:22:46 UTC 2022 selfserv_9223 with PID 9689 started at Wed Sep 28 04:22:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #867: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9689 at Wed Sep 28 04:22:46 UTC 2022 kill -USR1 9689 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9689 killed at Wed Sep 28 04:22:47 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9741 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9741 found at Wed Sep 28 04:22:47 UTC 2022 selfserv_9223 with PID 9741 started at Wed Sep 28 04:22:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #868: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9741 at Wed Sep 28 04:22:48 UTC 2022 kill -USR1 9741 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9741 killed at Wed Sep 28 04:22:48 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9793 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9793 found at Wed Sep 28 04:22:48 UTC 2022 selfserv_9223 with PID 9793 started at Wed Sep 28 04:22:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #869: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9793 at Wed Sep 28 04:22:49 UTC 2022 kill -USR1 9793 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9793 killed at Wed Sep 28 04:22:49 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9860 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9860 found at Wed Sep 28 04:22:49 UTC 2022 selfserv_9223 with PID 9860 started at Wed Sep 28 04:22:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #870: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9860 at Wed Sep 28 04:22:50 UTC 2022 kill -USR1 9860 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9860 killed at Wed Sep 28 04:22:50 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9912 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9912 found at Wed Sep 28 04:22:50 UTC 2022 selfserv_9223 with PID 9912 started at Wed Sep 28 04:22:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #871: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9912 at Wed Sep 28 04:22:51 UTC 2022 kill -USR1 9912 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9912 killed at Wed Sep 28 04:22:51 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9964 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9964 found at Wed Sep 28 04:22:51 UTC 2022 selfserv_9223 with PID 9964 started at Wed Sep 28 04:22:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #872: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9964 at Wed Sep 28 04:22:52 UTC 2022 kill -USR1 9964 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9964 killed at Wed Sep 28 04:22:52 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10030 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10030 found at Wed Sep 28 04:22:53 UTC 2022 selfserv_9223 with PID 10030 started at Wed Sep 28 04:22:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #873: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10030 at Wed Sep 28 04:22:53 UTC 2022 kill -USR1 10030 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10030 killed at Wed Sep 28 04:22:53 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10082 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10082 found at Wed Sep 28 04:22:54 UTC 2022 selfserv_9223 with PID 10082 started at Wed Sep 28 04:22:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #874: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10082 at Wed Sep 28 04:22:54 UTC 2022 kill -USR1 10082 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10082 killed at Wed Sep 28 04:22:54 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10134 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10134 found at Wed Sep 28 04:22:55 UTC 2022 selfserv_9223 with PID 10134 started at Wed Sep 28 04:22:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #875: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10134 at Wed Sep 28 04:22:55 UTC 2022 kill -USR1 10134 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10134 killed at Wed Sep 28 04:22:55 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10200 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10200 found at Wed Sep 28 04:22:56 UTC 2022 selfserv_9223 with PID 10200 started at Wed Sep 28 04:22:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #876: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10200 at Wed Sep 28 04:22:56 UTC 2022 kill -USR1 10200 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10200 killed at Wed Sep 28 04:22:56 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10252 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10252 found at Wed Sep 28 04:22:57 UTC 2022 selfserv_9223 with PID 10252 started at Wed Sep 28 04:22:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #877: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10252 at Wed Sep 28 04:22:57 UTC 2022 kill -USR1 10252 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10252 killed at Wed Sep 28 04:22:57 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:22:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10304 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10304 found at Wed Sep 28 04:22:58 UTC 2022 selfserv_9223 with PID 10304 started at Wed Sep 28 04:22:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #878: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10304 at Wed Sep 28 04:22:58 UTC 2022 kill -USR1 10304 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10304 killed at Wed Sep 28 04:22:58 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10370 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10370 found at Wed Sep 28 04:22:59 UTC 2022 selfserv_9223 with PID 10370 started at Wed Sep 28 04:22:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #879: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10370 at Wed Sep 28 04:22:59 UTC 2022 kill -USR1 10370 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10370 killed at Wed Sep 28 04:22:59 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:22:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:22:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10423 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10423 found at Wed Sep 28 04:23:00 UTC 2022 selfserv_9223 with PID 10423 started at Wed Sep 28 04:23:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #880: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10423 at Wed Sep 28 04:23:00 UTC 2022 kill -USR1 10423 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10423 killed at Wed Sep 28 04:23:00 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:23:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:23:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10475 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10475 found at Wed Sep 28 04:23:01 UTC 2022 selfserv_9223 with PID 10475 started at Wed Sep 28 04:23:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #881: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10475 at Wed Sep 28 04:23:01 UTC 2022 kill -USR1 10475 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10475 killed at Wed Sep 28 04:23:01 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:23:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:23:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10541 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10541 found at Wed Sep 28 04:23:02 UTC 2022 selfserv_9223 with PID 10541 started at Wed Sep 28 04:23:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #882: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10541 at Wed Sep 28 04:23:02 UTC 2022 kill -USR1 10541 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10541 killed at Wed Sep 28 04:23:02 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:23:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:23:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10593 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10593 found at Wed Sep 28 04:23:03 UTC 2022 selfserv_9223 with PID 10593 started at Wed Sep 28 04:23:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #883: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10593 at Wed Sep 28 04:23:03 UTC 2022 kill -USR1 10593 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10593 killed at Wed Sep 28 04:23:03 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:23:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:23:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10645 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10645 found at Wed Sep 28 04:23:04 UTC 2022 selfserv_9223 with PID 10645 started at Wed Sep 28 04:23:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #884: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10645 at Wed Sep 28 04:23:04 UTC 2022 kill -USR1 10645 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10645 killed at Wed Sep 28 04:23:04 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:23:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:23:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10711 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10711 found at Wed Sep 28 04:23:05 UTC 2022 selfserv_9223 with PID 10711 started at Wed Sep 28 04:23:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #885: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10711 at Wed Sep 28 04:23:05 UTC 2022 kill -USR1 10711 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10711 killed at Wed Sep 28 04:23:06 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:23:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:23:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10763 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10763 found at Wed Sep 28 04:23:06 UTC 2022 selfserv_9223 with PID 10763 started at Wed Sep 28 04:23:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #886: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10763 at Wed Sep 28 04:23:07 UTC 2022 kill -USR1 10763 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10763 killed at Wed Sep 28 04:23:07 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:23:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:23:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10815 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10815 found at Wed Sep 28 04:23:07 UTC 2022 selfserv_9223 with PID 10815 started at Wed Sep 28 04:23:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #887: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10815 at Wed Sep 28 04:23:08 UTC 2022 kill -USR1 10815 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10815 killed at Wed Sep 28 04:23:08 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:23:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:23:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10881 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10881 found at Wed Sep 28 04:23:08 UTC 2022 selfserv_9223 with PID 10881 started at Wed Sep 28 04:23:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #888: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10881 at Wed Sep 28 04:23:09 UTC 2022 kill -USR1 10881 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10881 killed at Wed Sep 28 04:23:09 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:23:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:23:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10933 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10933 found at Wed Sep 28 04:23:10 UTC 2022 selfserv_9223 with PID 10933 started at Wed Sep 28 04:23:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #889: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10933 at Wed Sep 28 04:23:10 UTC 2022 kill -USR1 10933 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10933 killed at Wed Sep 28 04:23:10 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:23:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:23:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10985 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10985 found at Wed Sep 28 04:23:11 UTC 2022 selfserv_9223 with PID 10985 started at Wed Sep 28 04:23:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #890: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10985 at Wed Sep 28 04:23:11 UTC 2022 kill -USR1 10985 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10985 killed at Wed Sep 28 04:23:12 UTC 2022 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/authin.tl.tmp 0 selfserv_9223 starting at Wed Sep 28 04:23:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:23:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:12 UTC 2022 selfserv_9223 with PID 11056 started at Wed Sep 28 04:23:12 UTC 2022 Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:12 UTC 2022 ssl.sh: #717: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:13 UTC 2022 ssl.sh: #718: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:13 UTC 2022 ssl.sh: #719: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:14 UTC 2022 ssl.sh: #720: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:14 UTC 2022 ssl.sh: #721: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:14 UTC 2022 ssl.sh: #722: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:15 UTC 2022 ssl.sh: #723: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:15 UTC 2022 ssl.sh: #724: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:16 UTC 2022 ssl.sh: #725: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:16 UTC 2022 ssl.sh: #726: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:17 UTC 2022 ssl.sh: #727: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:17 UTC 2022 ssl.sh: #728: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:17 UTC 2022 ssl.sh: #729: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:18 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #730: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:18 UTC 2022 ssl.sh: #731: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:19 UTC 2022 ssl.sh: #732: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:19 UTC 2022 ssl.sh: #733: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:19 UTC 2022 ssl.sh: #734: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:20 UTC 2022 ssl.sh: #735: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:20 UTC 2022 ssl.sh: #736: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:21 UTC 2022 ssl.sh: #737: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:21 UTC 2022 ssl.sh: #738: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:22 UTC 2022 ssl.sh: #739: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:22 UTC 2022 ssl.sh: #740: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:22 UTC 2022 ssl.sh: #741: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:23 UTC 2022 ssl.sh: #742: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:23 UTC 2022 ssl.sh: #743: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:24 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #744: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:24 UTC 2022 ssl.sh: #745: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:24 UTC 2022 ssl.sh: #746: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:25 UTC 2022 ssl.sh: #747: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:25 UTC 2022 ssl.sh: #748: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:26 UTC 2022 ssl.sh: #749: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:26 UTC 2022 ssl.sh: #750: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:27 UTC 2022 ssl.sh: #751: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:27 UTC 2022 ssl.sh: #752: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:27 UTC 2022 ssl.sh: #753: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:28 UTC 2022 ssl.sh: #754: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:28 UTC 2022 ssl.sh: #755: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:29 UTC 2022 ssl.sh: #756: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11056 found at Wed Sep 28 04:23:29 UTC 2022 ssl.sh: #757: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 11056 at Wed Sep 28 04:23:29 UTC 2022 kill -USR1 11056 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11056 killed at Wed Sep 28 04:23:29 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:23:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:23:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:29 UTC 2022 selfserv_9223 with PID 12317 started at Wed Sep 28 04:23:29 UTC 2022 Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:30 UTC 2022 ssl.sh: #758: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:30 UTC 2022 ssl.sh: #759: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:31 UTC 2022 ssl.sh: #760: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:31 UTC 2022 ssl.sh: #761: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:31 UTC 2022 ssl.sh: #762: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:32 UTC 2022 ssl.sh: #763: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:32 UTC 2022 ssl.sh: #764: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:33 UTC 2022 ssl.sh: #765: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:33 UTC 2022 ssl.sh: #766: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:33 UTC 2022 ssl.sh: #767: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:34 UTC 2022 ssl.sh: #768: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:34 UTC 2022 ssl.sh: #769: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:35 UTC 2022 ssl.sh: #770: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:35 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #771: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:35 UTC 2022 ssl.sh: #772: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:36 UTC 2022 ssl.sh: #773: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:36 UTC 2022 ssl.sh: #774: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:36 UTC 2022 ssl.sh: #775: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:37 UTC 2022 ssl.sh: #776: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:37 UTC 2022 ssl.sh: #777: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:37 UTC 2022 ssl.sh: #778: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:38 UTC 2022 ssl.sh: #779: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:38 UTC 2022 ssl.sh: #780: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:38 UTC 2022 ssl.sh: #781: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:39 UTC 2022 ssl.sh: #782: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:39 UTC 2022 ssl.sh: #783: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:40 UTC 2022 ssl.sh: #784: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:40 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #785: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:40 UTC 2022 ssl.sh: #786: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:41 UTC 2022 ssl.sh: #787: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:41 UTC 2022 ssl.sh: #788: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:41 UTC 2022 ssl.sh: #789: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:42 UTC 2022 ssl.sh: #790: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:42 UTC 2022 ssl.sh: #791: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:42 UTC 2022 ssl.sh: #792: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:43 UTC 2022 ssl.sh: #793: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:43 UTC 2022 ssl.sh: #794: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:43 UTC 2022 ssl.sh: #795: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:44 UTC 2022 ssl.sh: #796: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:44 UTC 2022 ssl.sh: #797: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:23:45 UTC 2022 ssl.sh: #798: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 12317 at Wed Sep 28 04:23:45 UTC 2022 kill -USR1 12317 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12317 killed at Wed Sep 28 04:23:45 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:23:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:23:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:45 UTC 2022 selfserv_9223 with PID 13597 started at Wed Sep 28 04:23:45 UTC 2022 Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:46 UTC 2022 ssl.sh: #799: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:46 UTC 2022 ssl.sh: #800: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:46 UTC 2022 ssl.sh: #801: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:47 UTC 2022 ssl.sh: #802: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:47 UTC 2022 ssl.sh: #803: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:48 UTC 2022 ssl.sh: #804: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:48 UTC 2022 ssl.sh: #805: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:49 UTC 2022 ssl.sh: #806: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:49 UTC 2022 ssl.sh: #807: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:49 UTC 2022 ssl.sh: #808: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:50 UTC 2022 ssl.sh: #809: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:50 UTC 2022 ssl.sh: #810: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:51 UTC 2022 ssl.sh: #811: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:51 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #812: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:52 UTC 2022 ssl.sh: #813: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:52 UTC 2022 ssl.sh: #814: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:52 UTC 2022 ssl.sh: #815: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:53 UTC 2022 ssl.sh: #816: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:53 UTC 2022 ssl.sh: #817: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:54 UTC 2022 ssl.sh: #818: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:54 UTC 2022 ssl.sh: #819: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:55 UTC 2022 ssl.sh: #820: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:55 UTC 2022 ssl.sh: #821: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:55 UTC 2022 ssl.sh: #822: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:56 UTC 2022 ssl.sh: #823: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:56 UTC 2022 ssl.sh: #824: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:57 UTC 2022 ssl.sh: #825: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:57 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #826: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:58 UTC 2022 ssl.sh: #827: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:58 UTC 2022 ssl.sh: #828: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:58 UTC 2022 ssl.sh: #829: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:59 UTC 2022 ssl.sh: #830: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:23:59 UTC 2022 ssl.sh: #831: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:24:00 UTC 2022 ssl.sh: #832: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:24:00 UTC 2022 ssl.sh: #833: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:24:00 UTC 2022 ssl.sh: #834: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:24:01 UTC 2022 ssl.sh: #835: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:24:01 UTC 2022 ssl.sh: #836: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:24:02 UTC 2022 ssl.sh: #837: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:24:02 UTC 2022 ssl.sh: #838: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13597 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13597 found at Wed Sep 28 04:24:02 UTC 2022 ssl.sh: #839: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 13597 at Wed Sep 28 04:24:02 UTC 2022 kill -USR1 13597 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13597 killed at Wed Sep 28 04:24:03 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:24:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:24:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:03 UTC 2022 selfserv_9223 with PID 14862 started at Wed Sep 28 04:24:03 UTC 2022 Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:03 UTC 2022 ssl.sh: #840: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:04 UTC 2022 ssl.sh: #841: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:04 UTC 2022 ssl.sh: #842: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:04 UTC 2022 ssl.sh: #843: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:05 UTC 2022 ssl.sh: #844: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:05 UTC 2022 ssl.sh: #845: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:05 UTC 2022 ssl.sh: #846: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:06 UTC 2022 ssl.sh: #847: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:06 UTC 2022 ssl.sh: #848: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:07 UTC 2022 ssl.sh: #849: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:07 UTC 2022 ssl.sh: #850: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:07 UTC 2022 ssl.sh: #851: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:08 UTC 2022 ssl.sh: #852: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:08 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #853: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:08 UTC 2022 ssl.sh: #854: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:09 UTC 2022 ssl.sh: #855: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:09 UTC 2022 ssl.sh: #856: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:10 UTC 2022 ssl.sh: #857: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:10 UTC 2022 ssl.sh: #858: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:10 UTC 2022 ssl.sh: #859: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:11 UTC 2022 ssl.sh: #860: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:11 UTC 2022 ssl.sh: #861: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:11 UTC 2022 ssl.sh: #862: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:12 UTC 2022 ssl.sh: #863: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:12 UTC 2022 ssl.sh: #864: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:12 UTC 2022 ssl.sh: #865: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:13 UTC 2022 ssl.sh: #866: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:13 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #867: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:13 UTC 2022 ssl.sh: #868: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:14 UTC 2022 ssl.sh: #869: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:14 UTC 2022 ssl.sh: #870: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:14 UTC 2022 ssl.sh: #871: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:15 UTC 2022 ssl.sh: #872: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:15 UTC 2022 ssl.sh: #873: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:15 UTC 2022 ssl.sh: #874: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:16 UTC 2022 ssl.sh: #875: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:16 UTC 2022 ssl.sh: #876: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:16 UTC 2022 ssl.sh: #877: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:17 UTC 2022 ssl.sh: #878: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:17 UTC 2022 ssl.sh: #879: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14862 found at Wed Sep 28 04:24:17 UTC 2022 ssl.sh: #880: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 14862 at Wed Sep 28 04:24:17 UTC 2022 kill -USR1 14862 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14862 killed at Wed Sep 28 04:24:18 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:24:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:24:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16127 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16127 found at Wed Sep 28 04:24:18 UTC 2022 selfserv_9223 with PID 16127 started at Wed Sep 28 04:24:18 UTC 2022 trying to kill selfserv_9223 with PID 16127 at Wed Sep 28 04:24:18 UTC 2022 kill -USR1 16127 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16127 killed at Wed Sep 28 04:24:18 UTC 2022 selfserv_9223 starting at Wed Sep 28 04:24:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:24:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:18 UTC 2022 selfserv_9223 with PID 16169 started at Wed Sep 28 04:24:18 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:19 UTC 2022 ssl.sh: #881: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:20 UTC 2022 ssl.sh: #882: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:20 UTC 2022 ssl.sh: #883: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:21 UTC 2022 ssl.sh: #884: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:21 UTC 2022 ssl.sh: #885: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:22 UTC 2022 ssl.sh: #886: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:22 UTC 2022 ssl.sh: #887: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:23 UTC 2022 ssl.sh: #888: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:23 UTC 2022 ssl.sh: #889: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:24 UTC 2022 ssl.sh: #890: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:25 UTC 2022 ssl.sh: #891: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:25 UTC 2022 ssl.sh: #892: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:26 UTC 2022 ssl.sh: #893: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:26 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #894: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:27 UTC 2022 ssl.sh: #895: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:27 UTC 2022 ssl.sh: #896: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:28 UTC 2022 ssl.sh: #897: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:28 UTC 2022 ssl.sh: #898: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:29 UTC 2022 ssl.sh: #899: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:29 UTC 2022 ssl.sh: #900: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:30 UTC 2022 ssl.sh: #901: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:30 UTC 2022 ssl.sh: #902: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:31 UTC 2022 ssl.sh: #903: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:31 UTC 2022 ssl.sh: #904: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:32 UTC 2022 ssl.sh: #905: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:33 UTC 2022 ssl.sh: #906: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:33 UTC 2022 ssl.sh: #907: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:34 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #908: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:34 UTC 2022 ssl.sh: #909: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:35 UTC 2022 ssl.sh: #910: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:35 UTC 2022 ssl.sh: #911: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:36 UTC 2022 ssl.sh: #912: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:36 UTC 2022 ssl.sh: #913: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:37 UTC 2022 ssl.sh: #914: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:37 UTC 2022 ssl.sh: #915: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:38 UTC 2022 ssl.sh: #916: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:38 UTC 2022 ssl.sh: #917: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:39 UTC 2022 ssl.sh: #918: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:39 UTC 2022 ssl.sh: #919: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:40 UTC 2022 ssl.sh: #920: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16169 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 16169 found at Wed Sep 28 04:24:41 UTC 2022 ssl.sh: #921: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 16169 at Wed Sep 28 04:24:41 UTC 2022 kill -USR1 16169 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 16169 killed at Wed Sep 28 04:24:41 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:24:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:24:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:41 UTC 2022 selfserv_9223 with PID 17446 started at Wed Sep 28 04:24:41 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:42 UTC 2022 ssl.sh: #922: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:42 UTC 2022 ssl.sh: #923: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:43 UTC 2022 ssl.sh: #924: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:43 UTC 2022 ssl.sh: #925: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:44 UTC 2022 ssl.sh: #926: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:45 UTC 2022 ssl.sh: #927: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:45 UTC 2022 ssl.sh: #928: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:46 UTC 2022 ssl.sh: #929: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:46 UTC 2022 ssl.sh: #930: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:47 UTC 2022 ssl.sh: #931: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:48 UTC 2022 ssl.sh: #932: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:48 UTC 2022 ssl.sh: #933: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:49 UTC 2022 ssl.sh: #934: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:49 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #935: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:50 UTC 2022 ssl.sh: #936: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:50 UTC 2022 ssl.sh: #937: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:51 UTC 2022 ssl.sh: #938: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:52 UTC 2022 ssl.sh: #939: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:52 UTC 2022 ssl.sh: #940: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:53 UTC 2022 ssl.sh: #941: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:53 UTC 2022 ssl.sh: #942: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:54 UTC 2022 ssl.sh: #943: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:54 UTC 2022 ssl.sh: #944: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:55 UTC 2022 ssl.sh: #945: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:56 UTC 2022 ssl.sh: #946: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:56 UTC 2022 ssl.sh: #947: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:57 UTC 2022 ssl.sh: #948: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:57 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #949: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:58 UTC 2022 ssl.sh: #950: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:59 UTC 2022 ssl.sh: #951: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:24:59 UTC 2022 ssl.sh: #952: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:25:00 UTC 2022 ssl.sh: #953: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:25:00 UTC 2022 ssl.sh: #954: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:25:01 UTC 2022 ssl.sh: #955: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:25:01 UTC 2022 ssl.sh: #956: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:25:02 UTC 2022 ssl.sh: #957: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:25:03 UTC 2022 ssl.sh: #958: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:25:03 UTC 2022 ssl.sh: #959: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:25:04 UTC 2022 ssl.sh: #960: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:25:04 UTC 2022 ssl.sh: #961: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 17446 found at Wed Sep 28 04:25:05 UTC 2022 ssl.sh: #962: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 17446 at Wed Sep 28 04:25:05 UTC 2022 kill -USR1 17446 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 17446 killed at Wed Sep 28 04:25:05 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:25:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:25:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:05 UTC 2022 selfserv_9223 with PID 18708 started at Wed Sep 28 04:25:05 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:06 UTC 2022 ssl.sh: #963: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:06 UTC 2022 ssl.sh: #964: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:07 UTC 2022 ssl.sh: #965: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:07 UTC 2022 ssl.sh: #966: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:08 UTC 2022 ssl.sh: #967: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:08 UTC 2022 ssl.sh: #968: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:09 UTC 2022 ssl.sh: #969: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:09 UTC 2022 ssl.sh: #970: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:09 UTC 2022 ssl.sh: #971: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:10 UTC 2022 ssl.sh: #972: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:10 UTC 2022 ssl.sh: #973: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:11 UTC 2022 ssl.sh: #974: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:11 UTC 2022 ssl.sh: #975: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:12 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #976: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:12 UTC 2022 ssl.sh: #977: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:13 UTC 2022 ssl.sh: #978: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:13 UTC 2022 ssl.sh: #979: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:14 UTC 2022 ssl.sh: #980: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:14 UTC 2022 ssl.sh: #981: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:14 UTC 2022 ssl.sh: #982: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:15 UTC 2022 ssl.sh: #983: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:15 UTC 2022 ssl.sh: #984: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:16 UTC 2022 ssl.sh: #985: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:16 UTC 2022 ssl.sh: #986: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:17 UTC 2022 ssl.sh: #987: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:17 UTC 2022 ssl.sh: #988: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:18 UTC 2022 ssl.sh: #989: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:18 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #990: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:19 UTC 2022 ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:19 UTC 2022 ssl.sh: #992: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:19 UTC 2022 ssl.sh: #993: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:20 UTC 2022 ssl.sh: #994: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:20 UTC 2022 ssl.sh: #995: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:21 UTC 2022 ssl.sh: #996: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:21 UTC 2022 ssl.sh: #997: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:22 UTC 2022 ssl.sh: #998: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:22 UTC 2022 ssl.sh: #999: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:23 UTC 2022 ssl.sh: #1000: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:23 UTC 2022 ssl.sh: #1001: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:23 UTC 2022 ssl.sh: #1002: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18708 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 18708 found at Wed Sep 28 04:25:24 UTC 2022 ssl.sh: #1003: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 18708 at Wed Sep 28 04:25:24 UTC 2022 kill -USR1 18708 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 18708 killed at Wed Sep 28 04:25:24 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:25:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:25:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:24 UTC 2022 selfserv_9223 with PID 19970 started at Wed Sep 28 04:25:24 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:25 UTC 2022 ssl.sh: #1004: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:26 UTC 2022 ssl.sh: #1005: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:26 UTC 2022 ssl.sh: #1006: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:27 UTC 2022 ssl.sh: #1007: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:27 UTC 2022 ssl.sh: #1008: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:28 UTC 2022 ssl.sh: #1009: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:28 UTC 2022 ssl.sh: #1010: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:29 UTC 2022 ssl.sh: #1011: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:29 UTC 2022 ssl.sh: #1012: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:30 UTC 2022 ssl.sh: #1013: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:31 UTC 2022 ssl.sh: #1014: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:31 UTC 2022 ssl.sh: #1015: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:32 UTC 2022 ssl.sh: #1016: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:32 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #1017: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:33 UTC 2022 ssl.sh: #1018: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:33 UTC 2022 ssl.sh: #1019: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:34 UTC 2022 ssl.sh: #1020: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:34 UTC 2022 ssl.sh: #1021: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:35 UTC 2022 ssl.sh: #1022: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:35 UTC 2022 ssl.sh: #1023: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:36 UTC 2022 ssl.sh: #1024: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:36 UTC 2022 ssl.sh: #1025: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:37 UTC 2022 ssl.sh: #1026: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:38 UTC 2022 ssl.sh: #1027: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:38 UTC 2022 ssl.sh: #1028: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:39 UTC 2022 ssl.sh: #1029: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:39 UTC 2022 ssl.sh: #1030: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:40 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #1031: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:40 UTC 2022 ssl.sh: #1032: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:41 UTC 2022 ssl.sh: #1033: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:41 UTC 2022 ssl.sh: #1034: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:42 UTC 2022 ssl.sh: #1035: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:42 UTC 2022 ssl.sh: #1036: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:43 UTC 2022 ssl.sh: #1037: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:44 UTC 2022 ssl.sh: #1038: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:44 UTC 2022 ssl.sh: #1039: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:45 UTC 2022 ssl.sh: #1040: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:45 UTC 2022 ssl.sh: #1041: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:46 UTC 2022 ssl.sh: #1042: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:46 UTC 2022 ssl.sh: #1043: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 19970 found at Wed Sep 28 04:25:47 UTC 2022 ssl.sh: #1044: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 19970 at Wed Sep 28 04:25:47 UTC 2022 kill -USR1 19970 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 19970 killed at Wed Sep 28 04:25:47 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:25:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:25:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:25:47 UTC 2022 selfserv_9223 with PID 21245 started at Wed Sep 28 04:25:47 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:25:48 UTC 2022 ssl.sh: #1045: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:25:48 UTC 2022 ssl.sh: #1046: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:25:49 UTC 2022 ssl.sh: #1047: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:25:50 UTC 2022 ssl.sh: #1048: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:25:50 UTC 2022 ssl.sh: #1049: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:25:51 UTC 2022 ssl.sh: #1050: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:25:51 UTC 2022 ssl.sh: #1051: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:25:52 UTC 2022 ssl.sh: #1052: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:25:53 UTC 2022 ssl.sh: #1053: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:25:53 UTC 2022 ssl.sh: #1054: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:25:54 UTC 2022 ssl.sh: #1055: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:25:54 UTC 2022 ssl.sh: #1056: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:25:55 UTC 2022 ssl.sh: #1057: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:25:56 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #1058: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:25:56 UTC 2022 ssl.sh: #1059: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:25:57 UTC 2022 ssl.sh: #1060: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:25:57 UTC 2022 ssl.sh: #1061: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:25:58 UTC 2022 ssl.sh: #1062: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:25:58 UTC 2022 ssl.sh: #1063: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:25:59 UTC 2022 ssl.sh: #1064: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:26:00 UTC 2022 ssl.sh: #1065: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:26:00 UTC 2022 ssl.sh: #1066: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:26:01 UTC 2022 ssl.sh: #1067: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:26:01 UTC 2022 ssl.sh: #1068: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:26:02 UTC 2022 ssl.sh: #1069: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:26:03 UTC 2022 ssl.sh: #1070: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:26:03 UTC 2022 ssl.sh: #1071: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:26:04 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #1072: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:26:04 UTC 2022 ssl.sh: #1073: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:26:05 UTC 2022 ssl.sh: #1074: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:26:06 UTC 2022 ssl.sh: #1075: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:26:06 UTC 2022 ssl.sh: #1076: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:26:07 UTC 2022 ssl.sh: #1077: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:26:07 UTC 2022 ssl.sh: #1078: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:26:08 UTC 2022 ssl.sh: #1079: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:26:08 UTC 2022 ssl.sh: #1080: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:26:09 UTC 2022 ssl.sh: #1081: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:26:10 UTC 2022 ssl.sh: #1082: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:26:10 UTC 2022 ssl.sh: #1083: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:26:11 UTC 2022 ssl.sh: #1084: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 21245 found at Wed Sep 28 04:26:11 UTC 2022 ssl.sh: #1085: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 21245 at Wed Sep 28 04:26:11 UTC 2022 kill -USR1 21245 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 21245 killed at Wed Sep 28 04:26:12 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:26:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:26:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:12 UTC 2022 selfserv_9223 with PID 22503 started at Wed Sep 28 04:26:12 UTC 2022 Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:12 UTC 2022 ssl.sh: #1086: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:13 UTC 2022 ssl.sh: #1087: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:13 UTC 2022 ssl.sh: #1088: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:14 UTC 2022 ssl.sh: #1089: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:14 UTC 2022 ssl.sh: #1090: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:15 UTC 2022 ssl.sh: #1091: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:15 UTC 2022 ssl.sh: #1092: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:16 UTC 2022 ssl.sh: #1093: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:16 UTC 2022 ssl.sh: #1094: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:16 UTC 2022 ssl.sh: #1095: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:17 UTC 2022 ssl.sh: #1096: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:17 UTC 2022 ssl.sh: #1097: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:18 UTC 2022 ssl.sh: #1098: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:18 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #1099: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:19 UTC 2022 ssl.sh: #1100: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:19 UTC 2022 ssl.sh: #1101: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:20 UTC 2022 ssl.sh: #1102: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:20 UTC 2022 ssl.sh: #1103: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:21 UTC 2022 ssl.sh: #1104: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:21 UTC 2022 ssl.sh: #1105: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:22 UTC 2022 ssl.sh: #1106: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:22 UTC 2022 ssl.sh: #1107: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:22 UTC 2022 ssl.sh: #1108: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:23 UTC 2022 ssl.sh: #1109: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:23 UTC 2022 ssl.sh: #1110: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:24 UTC 2022 ssl.sh: #1111: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:24 UTC 2022 ssl.sh: #1112: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:25 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #1113: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:25 UTC 2022 ssl.sh: #1114: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:26 UTC 2022 ssl.sh: #1115: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:26 UTC 2022 ssl.sh: #1116: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:27 UTC 2022 ssl.sh: #1117: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:27 UTC 2022 ssl.sh: #1118: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:27 UTC 2022 ssl.sh: #1119: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:28 UTC 2022 ssl.sh: #1120: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:28 UTC 2022 ssl.sh: #1121: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:29 UTC 2022 ssl.sh: #1122: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:29 UTC 2022 ssl.sh: #1123: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:30 UTC 2022 ssl.sh: #1124: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:30 UTC 2022 ssl.sh: #1125: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 22503 found at Wed Sep 28 04:26:31 UTC 2022 ssl.sh: #1126: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 22503 at Wed Sep 28 04:26:31 UTC 2022 kill -USR1 22503 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 22503 killed at Wed Sep 28 04:26:31 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:26:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:26:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23761 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23761 found at Wed Sep 28 04:26:31 UTC 2022 selfserv_9223 with PID 23761 started at Wed Sep 28 04:26:31 UTC 2022 trying to kill selfserv_9223 with PID 23761 at Wed Sep 28 04:26:31 UTC 2022 kill -USR1 23761 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23761 killed at Wed Sep 28 04:26:31 UTC 2022 selfserv_9223 starting at Wed Sep 28 04:26:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:26:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:32 UTC 2022 selfserv_9223 with PID 23803 started at Wed Sep 28 04:26:32 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:32 UTC 2022 ssl.sh: #1127: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:33 UTC 2022 ssl.sh: #1128: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:33 UTC 2022 ssl.sh: #1129: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:34 UTC 2022 ssl.sh: #1130: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:34 UTC 2022 ssl.sh: #1131: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:35 UTC 2022 ssl.sh: #1132: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:35 UTC 2022 ssl.sh: #1133: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:36 UTC 2022 ssl.sh: #1134: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:37 UTC 2022 ssl.sh: #1135: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:37 UTC 2022 ssl.sh: #1136: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:38 UTC 2022 ssl.sh: #1137: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:38 UTC 2022 ssl.sh: #1138: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:39 UTC 2022 ssl.sh: #1139: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:39 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #1140: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:40 UTC 2022 ssl.sh: #1141: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:40 UTC 2022 ssl.sh: #1142: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:41 UTC 2022 ssl.sh: #1143: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:41 UTC 2022 ssl.sh: #1144: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:42 UTC 2022 ssl.sh: #1145: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:42 UTC 2022 ssl.sh: #1146: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:43 UTC 2022 ssl.sh: #1147: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:43 UTC 2022 ssl.sh: #1148: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:44 UTC 2022 ssl.sh: #1149: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:45 UTC 2022 ssl.sh: #1150: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:45 UTC 2022 ssl.sh: #1151: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:46 UTC 2022 ssl.sh: #1152: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:46 UTC 2022 ssl.sh: #1153: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:47 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #1154: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:47 UTC 2022 ssl.sh: #1155: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:48 UTC 2022 ssl.sh: #1156: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:48 UTC 2022 ssl.sh: #1157: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:49 UTC 2022 ssl.sh: #1158: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:49 UTC 2022 ssl.sh: #1159: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:50 UTC 2022 ssl.sh: #1160: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:50 UTC 2022 ssl.sh: #1161: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:51 UTC 2022 ssl.sh: #1162: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:52 UTC 2022 ssl.sh: #1163: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:52 UTC 2022 ssl.sh: #1164: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:53 UTC 2022 ssl.sh: #1165: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:53 UTC 2022 ssl.sh: #1166: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 23803 found at Wed Sep 28 04:26:54 UTC 2022 ssl.sh: #1167: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 23803 at Wed Sep 28 04:26:54 UTC 2022 kill -USR1 23803 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 23803 killed at Wed Sep 28 04:26:54 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:26:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:26:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:26:54 UTC 2022 selfserv_9223 with PID 25076 started at Wed Sep 28 04:26:54 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:26:55 UTC 2022 ssl.sh: #1168: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:26:55 UTC 2022 ssl.sh: #1169: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:26:56 UTC 2022 ssl.sh: #1170: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:26:57 UTC 2022 ssl.sh: #1171: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:26:57 UTC 2022 ssl.sh: #1172: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:26:58 UTC 2022 ssl.sh: #1173: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:26:58 UTC 2022 ssl.sh: #1174: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:26:59 UTC 2022 ssl.sh: #1175: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:26:59 UTC 2022 ssl.sh: #1176: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:00 UTC 2022 ssl.sh: #1177: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:01 UTC 2022 ssl.sh: #1178: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:01 UTC 2022 ssl.sh: #1179: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:02 UTC 2022 ssl.sh: #1180: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:02 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #1181: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:03 UTC 2022 ssl.sh: #1182: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:04 UTC 2022 ssl.sh: #1183: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:04 UTC 2022 ssl.sh: #1184: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:05 UTC 2022 ssl.sh: #1185: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:05 UTC 2022 ssl.sh: #1186: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:06 UTC 2022 ssl.sh: #1187: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:06 UTC 2022 ssl.sh: #1188: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:07 UTC 2022 ssl.sh: #1189: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:08 UTC 2022 ssl.sh: #1190: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:08 UTC 2022 ssl.sh: #1191: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:09 UTC 2022 ssl.sh: #1192: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:09 UTC 2022 ssl.sh: #1193: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:10 UTC 2022 ssl.sh: #1194: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:10 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #1195: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:11 UTC 2022 ssl.sh: #1196: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:12 UTC 2022 ssl.sh: #1197: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:12 UTC 2022 ssl.sh: #1198: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:13 UTC 2022 ssl.sh: #1199: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:13 UTC 2022 ssl.sh: #1200: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:14 UTC 2022 ssl.sh: #1201: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:14 UTC 2022 ssl.sh: #1202: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:15 UTC 2022 ssl.sh: #1203: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:16 UTC 2022 ssl.sh: #1204: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:16 UTC 2022 ssl.sh: #1205: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:17 UTC 2022 ssl.sh: #1206: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:17 UTC 2022 ssl.sh: #1207: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25076 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 25076 found at Wed Sep 28 04:27:18 UTC 2022 ssl.sh: #1208: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 25076 at Wed Sep 28 04:27:18 UTC 2022 kill -USR1 25076 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 25076 killed at Wed Sep 28 04:27:18 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:27:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:27:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:18 UTC 2022 selfserv_9223 with PID 26334 started at Wed Sep 28 04:27:18 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:19 UTC 2022 ssl.sh: #1209: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:19 UTC 2022 ssl.sh: #1210: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:20 UTC 2022 ssl.sh: #1211: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:20 UTC 2022 ssl.sh: #1212: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:21 UTC 2022 ssl.sh: #1213: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:21 UTC 2022 ssl.sh: #1214: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:22 UTC 2022 ssl.sh: #1215: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:22 UTC 2022 ssl.sh: #1216: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:23 UTC 2022 ssl.sh: #1217: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:23 UTC 2022 ssl.sh: #1218: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:23 UTC 2022 ssl.sh: #1219: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:24 UTC 2022 ssl.sh: #1220: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:24 UTC 2022 ssl.sh: #1221: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:25 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #1222: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:25 UTC 2022 ssl.sh: #1223: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:26 UTC 2022 ssl.sh: #1224: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:26 UTC 2022 ssl.sh: #1225: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:27 UTC 2022 ssl.sh: #1226: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:27 UTC 2022 ssl.sh: #1227: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:28 UTC 2022 ssl.sh: #1228: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:28 UTC 2022 ssl.sh: #1229: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:28 UTC 2022 ssl.sh: #1230: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:29 UTC 2022 ssl.sh: #1231: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:29 UTC 2022 ssl.sh: #1232: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:30 UTC 2022 ssl.sh: #1233: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:30 UTC 2022 ssl.sh: #1234: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:31 UTC 2022 ssl.sh: #1235: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:31 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #1236: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:32 UTC 2022 ssl.sh: #1237: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:32 UTC 2022 ssl.sh: #1238: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:33 UTC 2022 ssl.sh: #1239: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:33 UTC 2022 ssl.sh: #1240: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:33 UTC 2022 ssl.sh: #1241: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:34 UTC 2022 ssl.sh: #1242: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:34 UTC 2022 ssl.sh: #1243: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:35 UTC 2022 ssl.sh: #1244: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:35 UTC 2022 ssl.sh: #1245: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:36 UTC 2022 ssl.sh: #1246: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:36 UTC 2022 ssl.sh: #1247: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:37 UTC 2022 ssl.sh: #1248: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 26334 found at Wed Sep 28 04:27:37 UTC 2022 ssl.sh: #1249: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 26334 at Wed Sep 28 04:27:37 UTC 2022 kill -USR1 26334 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 26334 killed at Wed Sep 28 04:27:37 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:27:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:27:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:38 UTC 2022 selfserv_9223 with PID 27613 started at Wed Sep 28 04:27:38 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:38 UTC 2022 ssl.sh: #1250: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:39 UTC 2022 ssl.sh: #1251: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:39 UTC 2022 ssl.sh: #1252: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:40 UTC 2022 ssl.sh: #1253: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:40 UTC 2022 ssl.sh: #1254: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:41 UTC 2022 ssl.sh: #1255: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:41 UTC 2022 ssl.sh: #1256: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:42 UTC 2022 ssl.sh: #1257: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:43 UTC 2022 ssl.sh: #1258: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:43 UTC 2022 ssl.sh: #1259: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:44 UTC 2022 ssl.sh: #1260: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:44 UTC 2022 ssl.sh: #1261: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:45 UTC 2022 ssl.sh: #1262: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:45 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #1263: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:46 UTC 2022 ssl.sh: #1264: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:46 UTC 2022 ssl.sh: #1265: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:47 UTC 2022 ssl.sh: #1266: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:47 UTC 2022 ssl.sh: #1267: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:48 UTC 2022 ssl.sh: #1268: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:49 UTC 2022 ssl.sh: #1269: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:49 UTC 2022 ssl.sh: #1270: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:50 UTC 2022 ssl.sh: #1271: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:50 UTC 2022 ssl.sh: #1272: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:51 UTC 2022 ssl.sh: #1273: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:51 UTC 2022 ssl.sh: #1274: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:52 UTC 2022 ssl.sh: #1275: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:52 UTC 2022 ssl.sh: #1276: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:53 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #1277: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:53 UTC 2022 ssl.sh: #1278: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:54 UTC 2022 ssl.sh: #1279: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:55 UTC 2022 ssl.sh: #1280: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:55 UTC 2022 ssl.sh: #1281: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:56 UTC 2022 ssl.sh: #1282: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:56 UTC 2022 ssl.sh: #1283: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:57 UTC 2022 ssl.sh: #1284: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:57 UTC 2022 ssl.sh: #1285: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:58 UTC 2022 ssl.sh: #1286: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:58 UTC 2022 ssl.sh: #1287: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:59 UTC 2022 ssl.sh: #1288: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:27:59 UTC 2022 ssl.sh: #1289: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27613 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 27613 found at Wed Sep 28 04:28:00 UTC 2022 ssl.sh: #1290: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 27613 at Wed Sep 28 04:28:00 UTC 2022 kill -USR1 27613 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 27613 killed at Wed Sep 28 04:28:00 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:28:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:28:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:00 UTC 2022 selfserv_9223 with PID 28873 started at Wed Sep 28 04:28:00 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:01 UTC 2022 ssl.sh: #1291: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:02 UTC 2022 ssl.sh: #1292: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:02 UTC 2022 ssl.sh: #1293: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:03 UTC 2022 ssl.sh: #1294: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:03 UTC 2022 ssl.sh: #1295: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:04 UTC 2022 ssl.sh: #1296: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:05 UTC 2022 ssl.sh: #1297: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:05 UTC 2022 ssl.sh: #1298: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:06 UTC 2022 ssl.sh: #1299: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:06 UTC 2022 ssl.sh: #1300: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:07 UTC 2022 ssl.sh: #1301: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:08 UTC 2022 ssl.sh: #1302: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:08 UTC 2022 ssl.sh: #1303: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:09 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #1304: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:09 UTC 2022 ssl.sh: #1305: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:10 UTC 2022 ssl.sh: #1306: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:11 UTC 2022 ssl.sh: #1307: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:11 UTC 2022 ssl.sh: #1308: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:12 UTC 2022 ssl.sh: #1309: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:12 UTC 2022 ssl.sh: #1310: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:13 UTC 2022 ssl.sh: #1311: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:13 UTC 2022 ssl.sh: #1312: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:14 UTC 2022 ssl.sh: #1313: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:15 UTC 2022 ssl.sh: #1314: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:15 UTC 2022 ssl.sh: #1315: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:16 UTC 2022 ssl.sh: #1316: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:16 UTC 2022 ssl.sh: #1317: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:17 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #1318: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:18 UTC 2022 ssl.sh: #1319: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:18 UTC 2022 ssl.sh: #1320: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:19 UTC 2022 ssl.sh: #1321: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:19 UTC 2022 ssl.sh: #1322: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:20 UTC 2022 ssl.sh: #1323: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:20 UTC 2022 ssl.sh: #1324: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:21 UTC 2022 ssl.sh: #1325: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:22 UTC 2022 ssl.sh: #1326: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:22 UTC 2022 ssl.sh: #1327: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:23 UTC 2022 ssl.sh: #1328: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:23 UTC 2022 ssl.sh: #1329: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:24 UTC 2022 ssl.sh: #1330: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 28873 found at Wed Sep 28 04:28:24 UTC 2022 ssl.sh: #1331: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 28873 at Wed Sep 28 04:28:24 UTC 2022 kill -USR1 28873 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 28873 killed at Wed Sep 28 04:28:25 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:28:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:28:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:25 UTC 2022 selfserv_9223 with PID 30138 started at Wed Sep 28 04:28:25 UTC 2022 Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:26 UTC 2022 ssl.sh: #1332: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:26 UTC 2022 ssl.sh: #1333: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:26 UTC 2022 ssl.sh: #1334: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:27 UTC 2022 ssl.sh: #1335: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:27 UTC 2022 ssl.sh: #1336: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:28 UTC 2022 ssl.sh: #1337: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:28 UTC 2022 ssl.sh: #1338: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:29 UTC 2022 ssl.sh: #1339: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:29 UTC 2022 ssl.sh: #1340: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:30 UTC 2022 ssl.sh: #1341: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:30 UTC 2022 ssl.sh: #1342: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:31 UTC 2022 ssl.sh: #1343: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:31 UTC 2022 ssl.sh: #1344: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:32 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #1345: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:32 UTC 2022 ssl.sh: #1346: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:33 UTC 2022 ssl.sh: #1347: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:33 UTC 2022 ssl.sh: #1348: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:33 UTC 2022 ssl.sh: #1349: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:34 UTC 2022 ssl.sh: #1350: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:34 UTC 2022 ssl.sh: #1351: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:35 UTC 2022 ssl.sh: #1352: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:35 UTC 2022 ssl.sh: #1353: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:36 UTC 2022 ssl.sh: #1354: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:36 UTC 2022 ssl.sh: #1355: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:36 UTC 2022 ssl.sh: #1356: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:37 UTC 2022 ssl.sh: #1357: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:37 UTC 2022 ssl.sh: #1358: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:38 UTC 2022 ================= CRL Reloaded ============= ssl.sh: #1359: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:38 UTC 2022 ssl.sh: #1360: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:39 UTC 2022 ssl.sh: #1361: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:39 UTC 2022 ssl.sh: #1362: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:40 UTC 2022 ssl.sh: #1363: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:40 UTC 2022 ssl.sh: #1364: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:41 UTC 2022 ssl.sh: #1365: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:41 UTC 2022 ssl.sh: #1366: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:41 UTC 2022 ssl.sh: #1367: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:42 UTC 2022 ssl.sh: #1368: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:42 UTC 2022 ssl.sh: #1369: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:43 UTC 2022 ssl.sh: #1370: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:43 UTC 2022 ssl.sh: #1371: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 30138 found at Wed Sep 28 04:28:44 UTC 2022 ssl.sh: #1372: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 30138 at Wed Sep 28 04:28:44 UTC 2022 kill -USR1 30138 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 30138 killed at Wed Sep 28 04:28:44 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:28:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:28:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 31413 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31413 found at Wed Sep 28 04:28:44 UTC 2022 selfserv_9223 with PID 31413 started at Wed Sep 28 04:28:44 UTC 2022 trying to kill selfserv_9223 with PID 31413 at Wed Sep 28 04:28:44 UTC 2022 kill -USR1 31413 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 31413 killed at Wed Sep 28 04:28:44 UTC 2022 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9223 starting at Wed Sep 28 04:28:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:28:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 31459 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 31459 found at Wed Sep 28 04:28:45 UTC 2022 selfserv_9223 with PID 31459 started at Wed Sep 28 04:28:45 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1373: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1374: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1402: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1403: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1404: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1405: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1406: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1407: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1408: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1409: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1410: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1411: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1412: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1413: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1414: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1415: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1416: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1417: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1418: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1419: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1420: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1421: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1422: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1423: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 31459 at Wed Sep 28 04:28:58 UTC 2022 kill -USR1 31459 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 31459 killed at Wed Sep 28 04:28:58 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Wed Sep 28 04:28:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:28:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 32009 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32009 found at Wed Sep 28 04:28:59 UTC 2022 selfserv_9223 with PID 32009 started at Wed Sep 28 04:28:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1424: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1425: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1426: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1427: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1428: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1429: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1430: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1431: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1432: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1433: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1434: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1435: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 32009 at Wed Sep 28 04:29:21 UTC 2022 kill -USR1 32009 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32009 killed at Wed Sep 28 04:29:21 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9223 starting at Wed Sep 28 04:29:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32808 found at Wed Sep 28 04:29:21 UTC 2022 selfserv_9223 with PID 32808 started at Wed Sep 28 04:29:21 UTC 2022 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1500: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1501: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 32808 at Wed Sep 28 04:29:22 UTC 2022 kill -USR1 32808 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32808 killed at Wed Sep 28 04:29:22 UTC 2022 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32874 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32874 found at Wed Sep 28 04:29:22 UTC 2022 selfserv_9223 with PID 32874 started at Wed Sep 28 04:29:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1500: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 32874 at Wed Sep 28 04:29:23 UTC 2022 kill -USR1 32874 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32874 killed at Wed Sep 28 04:29:23 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:29:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32926 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32926 found at Wed Sep 28 04:29:24 UTC 2022 selfserv_9223 with PID 32926 started at Wed Sep 28 04:29:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1501: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 32926 at Wed Sep 28 04:29:24 UTC 2022 kill -USR1 32926 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32926 killed at Wed Sep 28 04:29:24 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 32978 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 32978 found at Wed Sep 28 04:29:25 UTC 2022 selfserv_9223 with PID 32978 started at Wed Sep 28 04:29:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1502: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 32978 at Wed Sep 28 04:29:25 UTC 2022 kill -USR1 32978 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 32978 killed at Wed Sep 28 04:29:25 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33030 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33030 found at Wed Sep 28 04:29:26 UTC 2022 selfserv_9223 with PID 33030 started at Wed Sep 28 04:29:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1503: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 33030 at Wed Sep 28 04:29:26 UTC 2022 kill -USR1 33030 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33030 killed at Wed Sep 28 04:29:27 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:29:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33082 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33082 found at Wed Sep 28 04:29:27 UTC 2022 selfserv_9223 with PID 33082 started at Wed Sep 28 04:29:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1504: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 33082 at Wed Sep 28 04:29:27 UTC 2022 kill -USR1 33082 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33082 killed at Wed Sep 28 04:29:27 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33137 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33137 found at Wed Sep 28 04:29:28 UTC 2022 selfserv_9223 with PID 33137 started at Wed Sep 28 04:29:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1505: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33137 at Wed Sep 28 04:29:28 UTC 2022 kill -USR1 33137 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33137 killed at Wed Sep 28 04:29:28 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33189 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33189 found at Wed Sep 28 04:29:29 UTC 2022 selfserv_9223 with PID 33189 started at Wed Sep 28 04:29:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1506: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33189 at Wed Sep 28 04:29:29 UTC 2022 kill -USR1 33189 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33189 killed at Wed Sep 28 04:29:30 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:29:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33242 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33242 found at Wed Sep 28 04:29:30 UTC 2022 selfserv_9223 with PID 33242 started at Wed Sep 28 04:29:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1507: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33242 at Wed Sep 28 04:29:30 UTC 2022 kill -USR1 33242 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33242 killed at Wed Sep 28 04:29:31 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33294 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33294 found at Wed Sep 28 04:29:31 UTC 2022 selfserv_9223 with PID 33294 started at Wed Sep 28 04:29:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1508: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33294 at Wed Sep 28 04:29:31 UTC 2022 kill -USR1 33294 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33294 killed at Wed Sep 28 04:29:31 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33346 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33346 found at Wed Sep 28 04:29:32 UTC 2022 selfserv_9223 with PID 33346 started at Wed Sep 28 04:29:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1509: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 33346 at Wed Sep 28 04:29:32 UTC 2022 kill -USR1 33346 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33346 killed at Wed Sep 28 04:29:33 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:29:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33398 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33398 found at Wed Sep 28 04:29:33 UTC 2022 selfserv_9223 with PID 33398 started at Wed Sep 28 04:29:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1510: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 33398 at Wed Sep 28 04:29:33 UTC 2022 kill -USR1 33398 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33398 killed at Wed Sep 28 04:29:33 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33450 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33450 found at Wed Sep 28 04:29:34 UTC 2022 selfserv_9223 with PID 33450 started at Wed Sep 28 04:29:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1511: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33450 at Wed Sep 28 04:29:34 UTC 2022 kill -USR1 33450 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33450 killed at Wed Sep 28 04:29:34 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33502 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33502 found at Wed Sep 28 04:29:35 UTC 2022 selfserv_9223 with PID 33502 started at Wed Sep 28 04:29:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1512: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33502 at Wed Sep 28 04:29:36 UTC 2022 kill -USR1 33502 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33502 killed at Wed Sep 28 04:29:36 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:29:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33554 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33554 found at Wed Sep 28 04:29:36 UTC 2022 selfserv_9223 with PID 33554 started at Wed Sep 28 04:29:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1513: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33554 at Wed Sep 28 04:29:37 UTC 2022 kill -USR1 33554 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33554 killed at Wed Sep 28 04:29:37 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33606 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33606 found at Wed Sep 28 04:29:37 UTC 2022 selfserv_9223 with PID 33606 started at Wed Sep 28 04:29:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1514: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33606 at Wed Sep 28 04:29:38 UTC 2022 kill -USR1 33606 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33606 killed at Wed Sep 28 04:29:38 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33673 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33673 found at Wed Sep 28 04:29:38 UTC 2022 selfserv_9223 with PID 33673 started at Wed Sep 28 04:29:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1515: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 33673 at Wed Sep 28 04:29:39 UTC 2022 kill -USR1 33673 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33673 killed at Wed Sep 28 04:29:39 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:29:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33725 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33725 found at Wed Sep 28 04:29:40 UTC 2022 selfserv_9223 with PID 33725 started at Wed Sep 28 04:29:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1516: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 33725 at Wed Sep 28 04:29:40 UTC 2022 kill -USR1 33725 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33725 killed at Wed Sep 28 04:29:40 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33777 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33777 found at Wed Sep 28 04:29:41 UTC 2022 selfserv_9223 with PID 33777 started at Wed Sep 28 04:29:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1517: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33777 at Wed Sep 28 04:29:41 UTC 2022 kill -USR1 33777 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33777 killed at Wed Sep 28 04:29:42 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33829 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33829 found at Wed Sep 28 04:29:42 UTC 2022 selfserv_9223 with PID 33829 started at Wed Sep 28 04:29:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1518: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33829 at Wed Sep 28 04:29:43 UTC 2022 kill -USR1 33829 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33829 killed at Wed Sep 28 04:29:43 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:29:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33881 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33881 found at Wed Sep 28 04:29:43 UTC 2022 selfserv_9223 with PID 33881 started at Wed Sep 28 04:29:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1519: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33881 at Wed Sep 28 04:29:44 UTC 2022 kill -USR1 33881 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33881 killed at Wed Sep 28 04:29:44 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33933 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33933 found at Wed Sep 28 04:29:44 UTC 2022 selfserv_9223 with PID 33933 started at Wed Sep 28 04:29:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1520: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 33933 at Wed Sep 28 04:29:45 UTC 2022 kill -USR1 33933 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33933 killed at Wed Sep 28 04:29:45 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 33985 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 33985 found at Wed Sep 28 04:29:45 UTC 2022 selfserv_9223 with PID 33985 started at Wed Sep 28 04:29:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1521: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 33985 at Wed Sep 28 04:29:46 UTC 2022 kill -USR1 33985 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 33985 killed at Wed Sep 28 04:29:46 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:29:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34037 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34037 found at Wed Sep 28 04:29:47 UTC 2022 selfserv_9223 with PID 34037 started at Wed Sep 28 04:29:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1522: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 34037 at Wed Sep 28 04:29:47 UTC 2022 kill -USR1 34037 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34037 killed at Wed Sep 28 04:29:48 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34095 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34095 found at Wed Sep 28 04:29:48 UTC 2022 selfserv_9223 with PID 34095 started at Wed Sep 28 04:29:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1523: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34095 at Wed Sep 28 04:29:49 UTC 2022 kill -USR1 34095 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34095 killed at Wed Sep 28 04:29:49 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34147 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34147 found at Wed Sep 28 04:29:49 UTC 2022 selfserv_9223 with PID 34147 started at Wed Sep 28 04:29:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1524: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34147 at Wed Sep 28 04:29:50 UTC 2022 kill -USR1 34147 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34147 killed at Wed Sep 28 04:29:50 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:29:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34199 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34199 found at Wed Sep 28 04:29:50 UTC 2022 selfserv_9223 with PID 34199 started at Wed Sep 28 04:29:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1525: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34199 at Wed Sep 28 04:29:51 UTC 2022 kill -USR1 34199 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34199 killed at Wed Sep 28 04:29:51 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34251 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34251 found at Wed Sep 28 04:29:51 UTC 2022 selfserv_9223 with PID 34251 started at Wed Sep 28 04:29:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1526: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34251 at Wed Sep 28 04:29:52 UTC 2022 kill -USR1 34251 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34251 killed at Wed Sep 28 04:29:52 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34303 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34303 found at Wed Sep 28 04:29:52 UTC 2022 selfserv_9223 with PID 34303 started at Wed Sep 28 04:29:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1527: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 34303 at Wed Sep 28 04:29:53 UTC 2022 kill -USR1 34303 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34303 killed at Wed Sep 28 04:29:53 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:29:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34355 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34355 found at Wed Sep 28 04:29:53 UTC 2022 selfserv_9223 with PID 34355 started at Wed Sep 28 04:29:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1528: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 34355 at Wed Sep 28 04:29:54 UTC 2022 kill -USR1 34355 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34355 killed at Wed Sep 28 04:29:54 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34407 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34407 found at Wed Sep 28 04:29:54 UTC 2022 selfserv_9223 with PID 34407 started at Wed Sep 28 04:29:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1529: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34407 at Wed Sep 28 04:29:55 UTC 2022 kill -USR1 34407 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34407 killed at Wed Sep 28 04:29:55 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34459 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34459 found at Wed Sep 28 04:29:55 UTC 2022 selfserv_9223 with PID 34459 started at Wed Sep 28 04:29:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1530: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34459 at Wed Sep 28 04:29:56 UTC 2022 kill -USR1 34459 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34459 killed at Wed Sep 28 04:29:56 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34511 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34511 found at Wed Sep 28 04:29:56 UTC 2022 selfserv_9223 with PID 34511 started at Wed Sep 28 04:29:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1531: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34511 at Wed Sep 28 04:29:57 UTC 2022 kill -USR1 34511 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34511 killed at Wed Sep 28 04:29:57 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34563 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34563 found at Wed Sep 28 04:29:57 UTC 2022 selfserv_9223 with PID 34563 started at Wed Sep 28 04:29:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1532: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34563 at Wed Sep 28 04:29:58 UTC 2022 kill -USR1 34563 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34563 killed at Wed Sep 28 04:29:58 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34615 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34615 found at Wed Sep 28 04:29:58 UTC 2022 selfserv_9223 with PID 34615 started at Wed Sep 28 04:29:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1533: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 34615 at Wed Sep 28 04:29:59 UTC 2022 kill -USR1 34615 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34615 killed at Wed Sep 28 04:29:59 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:29:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:29:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34667 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34667 found at Wed Sep 28 04:30:00 UTC 2022 selfserv_9223 with PID 34667 started at Wed Sep 28 04:30:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1534: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34667 at Wed Sep 28 04:30:00 UTC 2022 kill -USR1 34667 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34667 killed at Wed Sep 28 04:30:00 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:30:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34719 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34719 found at Wed Sep 28 04:30:00 UTC 2022 selfserv_9223 with PID 34719 started at Wed Sep 28 04:30:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1535: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34719 at Wed Sep 28 04:30:01 UTC 2022 kill -USR1 34719 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34719 killed at Wed Sep 28 04:30:01 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:30:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34848 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34848 found at Wed Sep 28 04:30:02 UTC 2022 selfserv_9223 with PID 34848 started at Wed Sep 28 04:30:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1536: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34848 at Wed Sep 28 04:30:02 UTC 2022 kill -USR1 34848 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34848 killed at Wed Sep 28 04:30:02 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:30:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34900 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34900 found at Wed Sep 28 04:30:03 UTC 2022 selfserv_9223 with PID 34900 started at Wed Sep 28 04:30:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1537: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 34900 at Wed Sep 28 04:30:03 UTC 2022 kill -USR1 34900 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34900 killed at Wed Sep 28 04:30:03 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:30:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 34952 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 34952 found at Wed Sep 28 04:30:04 UTC 2022 selfserv_9223 with PID 34952 started at Wed Sep 28 04:30:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1538: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 34952 at Wed Sep 28 04:30:04 UTC 2022 kill -USR1 34952 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 34952 killed at Wed Sep 28 04:30:04 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:30:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35004 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35004 found at Wed Sep 28 04:30:05 UTC 2022 selfserv_9223 with PID 35004 started at Wed Sep 28 04:30:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1539: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35004 at Wed Sep 28 04:30:05 UTC 2022 kill -USR1 35004 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35004 killed at Wed Sep 28 04:30:05 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:30:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35056 found at Wed Sep 28 04:30:06 UTC 2022 selfserv_9223 with PID 35056 started at Wed Sep 28 04:30:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1540: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35056 at Wed Sep 28 04:30:06 UTC 2022 kill -USR1 35056 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35056 killed at Wed Sep 28 04:30:06 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:30:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35108 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35108 found at Wed Sep 28 04:30:06 UTC 2022 selfserv_9223 with PID 35108 started at Wed Sep 28 04:30:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1541: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35108 at Wed Sep 28 04:30:07 UTC 2022 kill -USR1 35108 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35108 killed at Wed Sep 28 04:30:07 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:30:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35160 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35160 found at Wed Sep 28 04:30:07 UTC 2022 selfserv_9223 with PID 35160 started at Wed Sep 28 04:30:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1542: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 35160 at Wed Sep 28 04:30:08 UTC 2022 kill -USR1 35160 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35160 killed at Wed Sep 28 04:30:08 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:30:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35212 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35212 found at Wed Sep 28 04:30:08 UTC 2022 selfserv_9223 with PID 35212 started at Wed Sep 28 04:30:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1543: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35212 at Wed Sep 28 04:30:09 UTC 2022 kill -USR1 35212 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35212 killed at Wed Sep 28 04:30:09 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:30:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35264 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35264 found at Wed Sep 28 04:30:09 UTC 2022 selfserv_9223 with PID 35264 started at Wed Sep 28 04:30:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1544: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35264 at Wed Sep 28 04:30:10 UTC 2022 kill -USR1 35264 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35264 killed at Wed Sep 28 04:30:10 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:30:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35316 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35316 found at Wed Sep 28 04:30:10 UTC 2022 selfserv_9223 with PID 35316 started at Wed Sep 28 04:30:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1545: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35316 at Wed Sep 28 04:30:11 UTC 2022 kill -USR1 35316 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35316 killed at Wed Sep 28 04:30:11 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:30:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35368 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35368 found at Wed Sep 28 04:30:11 UTC 2022 selfserv_9223 with PID 35368 started at Wed Sep 28 04:30:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1546: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 35368 at Wed Sep 28 04:30:12 UTC 2022 kill -USR1 35368 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35368 killed at Wed Sep 28 04:30:12 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:30:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35420 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35420 found at Wed Sep 28 04:30:13 UTC 2022 selfserv_9223 with PID 35420 started at Wed Sep 28 04:30:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1547: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35420 at Wed Sep 28 04:30:13 UTC 2022 kill -USR1 35420 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35420 killed at Wed Sep 28 04:30:13 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:30:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35472 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35472 found at Wed Sep 28 04:30:14 UTC 2022 selfserv_9223 with PID 35472 started at Wed Sep 28 04:30:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1548: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35472 at Wed Sep 28 04:30:14 UTC 2022 kill -USR1 35472 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35472 killed at Wed Sep 28 04:30:15 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:30:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35524 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35524 found at Wed Sep 28 04:30:15 UTC 2022 selfserv_9223 with PID 35524 started at Wed Sep 28 04:30:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1549: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35524 at Wed Sep 28 04:30:16 UTC 2022 kill -USR1 35524 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35524 killed at Wed Sep 28 04:30:16 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:30:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35576 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35576 found at Wed Sep 28 04:30:16 UTC 2022 selfserv_9223 with PID 35576 started at Wed Sep 28 04:30:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1550: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 35576 at Wed Sep 28 04:30:17 UTC 2022 kill -USR1 35576 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35576 killed at Wed Sep 28 04:30:17 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:30:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35628 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35628 found at Wed Sep 28 04:30:17 UTC 2022 selfserv_9223 with PID 35628 started at Wed Sep 28 04:30:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1551: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35628 at Wed Sep 28 04:30:18 UTC 2022 kill -USR1 35628 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35628 killed at Wed Sep 28 04:30:18 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:30:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35680 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35680 found at Wed Sep 28 04:30:18 UTC 2022 selfserv_9223 with PID 35680 started at Wed Sep 28 04:30:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1552: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35680 at Wed Sep 28 04:30:19 UTC 2022 kill -USR1 35680 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35680 killed at Wed Sep 28 04:30:19 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:30:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35732 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35732 found at Wed Sep 28 04:30:19 UTC 2022 selfserv_9223 with PID 35732 started at Wed Sep 28 04:30:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1553: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35732 at Wed Sep 28 04:30:20 UTC 2022 kill -USR1 35732 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35732 killed at Wed Sep 28 04:30:20 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:30:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35784 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35784 found at Wed Sep 28 04:30:20 UTC 2022 selfserv_9223 with PID 35784 started at Wed Sep 28 04:30:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1554: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 35784 at Wed Sep 28 04:30:21 UTC 2022 kill -USR1 35784 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35784 killed at Wed Sep 28 04:30:21 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:30:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35836 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35836 found at Wed Sep 28 04:30:21 UTC 2022 selfserv_9223 with PID 35836 started at Wed Sep 28 04:30:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1555: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35836 at Wed Sep 28 04:30:22 UTC 2022 kill -USR1 35836 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35836 killed at Wed Sep 28 04:30:22 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:30:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35888 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35888 found at Wed Sep 28 04:30:22 UTC 2022 selfserv_9223 with PID 35888 started at Wed Sep 28 04:30:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1556: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35888 at Wed Sep 28 04:30:23 UTC 2022 kill -USR1 35888 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35888 killed at Wed Sep 28 04:30:23 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:30:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35940 found at Wed Sep 28 04:30:24 UTC 2022 selfserv_9223 with PID 35940 started at Wed Sep 28 04:30:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1557: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35940 at Wed Sep 28 04:30:24 UTC 2022 kill -USR1 35940 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35940 killed at Wed Sep 28 04:30:24 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 04:30:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 35998 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 35998 found at Wed Sep 28 04:30:25 UTC 2022 selfserv_9223 with PID 35998 started at Wed Sep 28 04:30:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1558: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 35998 at Wed Sep 28 04:30:25 UTC 2022 kill -USR1 35998 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 35998 killed at Wed Sep 28 04:30:25 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Wed Sep 28 04:30:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36056 found at Wed Sep 28 04:30:26 UTC 2022 selfserv_9223 with PID 36056 started at Wed Sep 28 04:30:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1559: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 36056 at Wed Sep 28 04:30:26 UTC 2022 kill -USR1 36056 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36056 killed at Wed Sep 28 04:30:26 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Wed Sep 28 04:30:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36114 found at Wed Sep 28 04:30:26 UTC 2022 selfserv_9223 with PID 36114 started at Wed Sep 28 04:30:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1560: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 36114 at Wed Sep 28 04:30:27 UTC 2022 kill -USR1 36114 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36114 killed at Wed Sep 28 04:30:27 UTC 2022 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 04:30:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36172 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36172 found at Wed Sep 28 04:30:27 UTC 2022 selfserv_9223 with PID 36172 started at Wed Sep 28 04:30:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 36172 at Wed Sep 28 04:30:28 UTC 2022 kill -USR1 36172 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36172 killed at Wed Sep 28 04:30:28 UTC 2022 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9223 starting at Wed Sep 28 04:30:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36230 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36230 found at Wed Sep 28 04:30:28 UTC 2022 selfserv_9223 with PID 36230 started at Wed Sep 28 04:30:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1562: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 36230 at Wed Sep 28 04:30:28 UTC 2022 kill -USR1 36230 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36230 killed at Wed Sep 28 04:30:29 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 04:30:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36288 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36288 found at Wed Sep 28 04:30:29 UTC 2022 selfserv_9223 with PID 36288 started at Wed Sep 28 04:30:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 36288 at Wed Sep 28 04:30:29 UTC 2022 kill -USR1 36288 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36288 killed at Wed Sep 28 04:30:29 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Wed Sep 28 04:30:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36346 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36346 found at Wed Sep 28 04:30:30 UTC 2022 selfserv_9223 with PID 36346 started at Wed Sep 28 04:30:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 36346 at Wed Sep 28 04:30:30 UTC 2022 kill -USR1 36346 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36346 killed at Wed Sep 28 04:30:30 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9223 starting at Wed Sep 28 04:30:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36404 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36404 found at Wed Sep 28 04:30:31 UTC 2022 selfserv_9223 with PID 36404 started at Wed Sep 28 04:30:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1565: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 36404 at Wed Sep 28 04:30:31 UTC 2022 kill -USR1 36404 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36404 killed at Wed Sep 28 04:30:31 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9223 starting at Wed Sep 28 04:30:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36462 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36462 found at Wed Sep 28 04:30:32 UTC 2022 selfserv_9223 with PID 36462 started at Wed Sep 28 04:30:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1566: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 36462 at Wed Sep 28 04:30:32 UTC 2022 kill -USR1 36462 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36462 killed at Wed Sep 28 04:30:32 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Wed Sep 28 04:30:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36520 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36520 found at Wed Sep 28 04:30:32 UTC 2022 selfserv_9223 with PID 36520 started at Wed Sep 28 04:30:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1567: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 36520 at Wed Sep 28 04:30:33 UTC 2022 kill -USR1 36520 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36520 killed at Wed Sep 28 04:30:33 UTC 2022 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9223 starting at Wed Sep 28 04:30:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36562 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36562 found at Wed Sep 28 04:30:33 UTC 2022 selfserv_9223 with PID 36562 started at Wed Sep 28 04:30:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1500: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 36562 at Wed Sep 28 04:30:33 UTC 2022 kill -USR1 36562 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36562 killed at Wed Sep 28 04:30:33 UTC 2022 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9223 starting at Wed Sep 28 04:30:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36604 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36604 found at Wed Sep 28 04:30:34 UTC 2022 selfserv_9223 with PID 36604 started at Wed Sep 28 04:30:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1501: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9223 with PID 36604 at Wed Sep 28 04:30:34 UTC 2022 kill -USR1 36604 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36604 killed at Wed Sep 28 04:30:34 UTC 2022 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9223 starting at Wed Sep 28 04:30:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36646 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36646 found at Wed Sep 28 04:30:35 UTC 2022 selfserv_9223 with PID 36646 started at Wed Sep 28 04:30:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1502: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 36646 at Wed Sep 28 04:30:35 UTC 2022 kill -USR1 36646 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36646 killed at Wed Sep 28 04:30:35 UTC 2022 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9223 starting at Wed Sep 28 04:30:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36688 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36688 found at Wed Sep 28 04:30:35 UTC 2022 selfserv_9223 with PID 36688 started at Wed Sep 28 04:30:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1503: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 36688 at Wed Sep 28 04:30:36 UTC 2022 kill -USR1 36688 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36688 killed at Wed Sep 28 04:30:36 UTC 2022 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9223 starting at Wed Sep 28 04:30:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36730 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36730 found at Wed Sep 28 04:30:36 UTC 2022 selfserv_9223 with PID 36730 started at Wed Sep 28 04:30:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1504: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 36730 at Wed Sep 28 04:30:36 UTC 2022 kill -USR1 36730 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36730 killed at Wed Sep 28 04:30:37 UTC 2022 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9223 starting at Wed Sep 28 04:30:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36772 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36772 found at Wed Sep 28 04:30:37 UTC 2022 selfserv_9223 with PID 36772 started at Wed Sep 28 04:30:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1505: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 36772 at Wed Sep 28 04:30:37 UTC 2022 kill -USR1 36772 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36772 killed at Wed Sep 28 04:30:37 UTC 2022 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9223 starting at Wed Sep 28 04:30:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36829 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36829 found at Wed Sep 28 04:30:38 UTC 2022 selfserv_9223 with PID 36829 started at Wed Sep 28 04:30:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1506: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 36829 at Wed Sep 28 04:30:38 UTC 2022 kill -USR1 36829 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36829 killed at Wed Sep 28 04:30:38 UTC 2022 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9223 starting at Wed Sep 28 04:30:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:30:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36871 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36871 found at Wed Sep 28 04:30:38 UTC 2022 selfserv_9223 with PID 36871 started at Wed Sep 28 04:30:38 UTC 2022 strsclnt -q -p 9223 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Sep 28 04:30:38 UTC 2022 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Sep 28 04:32:13 UTC 2022 ssl.sh: #1507: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9223 with PID 36871 at Wed Sep 28 04:32:13 UTC 2022 kill -USR1 36871 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36871 killed at Wed Sep 28 04:32:13 UTC 2022 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Wed Sep 28 04:32:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:32:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36937 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36937 found at Wed Sep 28 04:32:13 UTC 2022 selfserv_9223 with PID 36937 started at Wed Sep 28 04:32:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1508: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 36937 at Wed Sep 28 04:32:14 UTC 2022 kill -USR1 36937 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36937 killed at Wed Sep 28 04:32:14 UTC 2022 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:32:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:32:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 36979 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 36979 found at Wed Sep 28 04:32:14 UTC 2022 selfserv_9223 with PID 36979 started at Wed Sep 28 04:32:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1509: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 36979 at Wed Sep 28 04:32:15 UTC 2022 kill -USR1 36979 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 36979 killed at Wed Sep 28 04:32:15 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:32:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:32:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37018 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37018 found at Wed Sep 28 04:32:15 UTC 2022 selfserv_9223 with PID 37018 started at Wed Sep 28 04:32:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1510: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 37018 at Wed Sep 28 04:32:15 UTC 2022 kill -USR1 37018 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37018 killed at Wed Sep 28 04:32:15 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:32:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:32:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37057 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37057 found at Wed Sep 28 04:32:16 UTC 2022 selfserv_9223 with PID 37057 started at Wed Sep 28 04:32:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1511: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37057 at Wed Sep 28 04:32:16 UTC 2022 kill -USR1 37057 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37057 killed at Wed Sep 28 04:32:16 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:32:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:32:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37096 found at Wed Sep 28 04:32:17 UTC 2022 selfserv_9223 with PID 37096 started at Wed Sep 28 04:32:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1512: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 37096 at Wed Sep 28 04:32:17 UTC 2022 kill -USR1 37096 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37096 killed at Wed Sep 28 04:32:17 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:32:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:32:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37135 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37135 found at Wed Sep 28 04:32:17 UTC 2022 selfserv_9223 with PID 37135 started at Wed Sep 28 04:32:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1513: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37135 at Wed Sep 28 04:32:18 UTC 2022 kill -USR1 37135 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37135 killed at Wed Sep 28 04:32:18 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:32:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:32:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37174 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37174 found at Wed Sep 28 04:32:18 UTC 2022 selfserv_9223 with PID 37174 started at Wed Sep 28 04:32:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1514: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37174 at Wed Sep 28 04:32:18 UTC 2022 kill -USR1 37174 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37174 killed at Wed Sep 28 04:32:18 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:32:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:32:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37213 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37213 found at Wed Sep 28 04:32:19 UTC 2022 selfserv_9223 with PID 37213 started at Wed Sep 28 04:32:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1515: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37213 at Wed Sep 28 04:32:19 UTC 2022 kill -USR1 37213 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37213 killed at Wed Sep 28 04:32:19 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:32:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:32:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37252 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37252 found at Wed Sep 28 04:32:20 UTC 2022 selfserv_9223 with PID 37252 started at Wed Sep 28 04:32:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1516: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37252 at Wed Sep 28 04:32:20 UTC 2022 kill -USR1 37252 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37252 killed at Wed Sep 28 04:32:20 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:32:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:32:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37291 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37291 found at Wed Sep 28 04:32:20 UTC 2022 selfserv_9223 with PID 37291 started at Wed Sep 28 04:32:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1517: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37291 at Wed Sep 28 04:32:21 UTC 2022 kill -USR1 37291 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37291 killed at Wed Sep 28 04:32:21 UTC 2022 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:32:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:32:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37330 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37330 found at Wed Sep 28 04:32:21 UTC 2022 selfserv_9223 with PID 37330 started at Wed Sep 28 04:32:21 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1518: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37330 at Wed Sep 28 04:32:21 UTC 2022 kill -USR1 37330 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37330 killed at Wed Sep 28 04:32:21 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:32:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:32:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37370 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37370 found at Wed Sep 28 04:32:22 UTC 2022 selfserv_9223 with PID 37370 started at Wed Sep 28 04:32:22 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1519: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 37370 at Wed Sep 28 04:32:22 UTC 2022 kill -USR1 37370 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37370 killed at Wed Sep 28 04:32:22 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:32:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:32:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37410 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37410 found at Wed Sep 28 04:32:22 UTC 2022 selfserv_9223 with PID 37410 started at Wed Sep 28 04:32:22 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1520: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37410 at Wed Sep 28 04:32:23 UTC 2022 kill -USR1 37410 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37410 killed at Wed Sep 28 04:32:23 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:32:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:32:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37450 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37450 found at Wed Sep 28 04:32:23 UTC 2022 selfserv_9223 with PID 37450 started at Wed Sep 28 04:32:23 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1521: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 37450 at Wed Sep 28 04:32:23 UTC 2022 kill -USR1 37450 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37450 killed at Wed Sep 28 04:32:24 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:32:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:32:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37490 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37490 found at Wed Sep 28 04:32:24 UTC 2022 selfserv_9223 with PID 37490 started at Wed Sep 28 04:32:24 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1522: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37490 at Wed Sep 28 04:32:24 UTC 2022 kill -USR1 37490 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37490 killed at Wed Sep 28 04:32:24 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:32:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:32:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37530 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37530 found at Wed Sep 28 04:32:25 UTC 2022 selfserv_9223 with PID 37530 started at Wed Sep 28 04:32:25 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1523: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37530 at Wed Sep 28 04:32:25 UTC 2022 kill -USR1 37530 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37530 killed at Wed Sep 28 04:32:25 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:32:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:32:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37570 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37570 found at Wed Sep 28 04:32:25 UTC 2022 selfserv_9223 with PID 37570 started at Wed Sep 28 04:32:25 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1524: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37570 at Wed Sep 28 04:32:26 UTC 2022 kill -USR1 37570 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37570 killed at Wed Sep 28 04:32:26 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:32:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:32:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37610 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37610 found at Wed Sep 28 04:32:26 UTC 2022 selfserv_9223 with PID 37610 started at Wed Sep 28 04:32:26 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1525: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37610 at Wed Sep 28 04:32:27 UTC 2022 kill -USR1 37610 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37610 killed at Wed Sep 28 04:32:27 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:32:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:32:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 37650 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37650 found at Wed Sep 28 04:32:27 UTC 2022 selfserv_9223 with PID 37650 started at Wed Sep 28 04:32:27 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1526: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 37650 at Wed Sep 28 04:32:27 UTC 2022 kill -USR1 37650 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37650 killed at Wed Sep 28 04:32:27 UTC 2022 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9223 starting at Wed Sep 28 04:32:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:32:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 37690 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 37690 found at Wed Sep 28 04:32:28 UTC 2022 selfserv_9223 with PID 37690 started at Wed Sep 28 04:32:28 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1527: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1528: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1556: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1557: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1558: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1559: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1560: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1561: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1562: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1563: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1564: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1565: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1566: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1567: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1568: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1569: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1570: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1571: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1572: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1573: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1574: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1575: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1576: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1577: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 37690 at Wed Sep 28 04:32:41 UTC 2022 kill -USR1 37690 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 37690 killed at Wed Sep 28 04:32:42 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Wed Sep 28 04:32:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:32:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 38254 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 38254 found at Wed Sep 28 04:32:42 UTC 2022 selfserv_9223 with PID 38254 started at Wed Sep 28 04:32:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1578: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1579: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1580: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1581: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1582: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1583: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1584: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1585: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1586: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1587: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1588: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1589: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1590: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1591: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1592: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1593: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1594: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1595: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1596: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1597: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1598: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1599: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1600: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1601: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1602: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1603: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1604: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1605: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1606: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1607: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1608: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1609: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1610: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1611: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1612: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1613: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1614: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1615: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1616: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1617: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1618: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1619: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1620: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1621: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1622: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1623: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1624: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1625: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1626: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1627: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1628: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1629: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1630: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1631: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1632: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1633: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1634: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1635: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1636: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1637: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1638: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1639: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1640: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1641: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1642: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1643: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1644: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1645: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1646: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1647: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1648: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1649: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1650: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1651: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1652: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1653: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 38254 at Wed Sep 28 04:33:04 UTC 2022 kill -USR1 38254 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 38254 killed at Wed Sep 28 04:33:04 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39066 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39066 found at Wed Sep 28 04:33:04 UTC 2022 selfserv_9223 with PID 39066 started at Wed Sep 28 04:33:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1654: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 39066 at Wed Sep 28 04:33:05 UTC 2022 kill -USR1 39066 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39066 killed at Wed Sep 28 04:33:05 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:33:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39118 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39118 found at Wed Sep 28 04:33:05 UTC 2022 selfserv_9223 with PID 39118 started at Wed Sep 28 04:33:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1655: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 39118 at Wed Sep 28 04:33:06 UTC 2022 kill -USR1 39118 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39118 killed at Wed Sep 28 04:33:06 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39170 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39170 found at Wed Sep 28 04:33:06 UTC 2022 selfserv_9223 with PID 39170 started at Wed Sep 28 04:33:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1656: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 39170 at Wed Sep 28 04:33:07 UTC 2022 kill -USR1 39170 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39170 killed at Wed Sep 28 04:33:07 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39223 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39223 found at Wed Sep 28 04:33:07 UTC 2022 selfserv_9223 with PID 39223 started at Wed Sep 28 04:33:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1657: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 39223 at Wed Sep 28 04:33:08 UTC 2022 kill -USR1 39223 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39223 killed at Wed Sep 28 04:33:08 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:33:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39276 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39276 found at Wed Sep 28 04:33:08 UTC 2022 selfserv_9223 with PID 39276 started at Wed Sep 28 04:33:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1658: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 39276 at Wed Sep 28 04:33:08 UTC 2022 kill -USR1 39276 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39276 killed at Wed Sep 28 04:33:09 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39328 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39328 found at Wed Sep 28 04:33:09 UTC 2022 selfserv_9223 with PID 39328 started at Wed Sep 28 04:33:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1659: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 39328 at Wed Sep 28 04:33:09 UTC 2022 kill -USR1 39328 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39328 killed at Wed Sep 28 04:33:10 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39380 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39380 found at Wed Sep 28 04:33:10 UTC 2022 selfserv_9223 with PID 39380 started at Wed Sep 28 04:33:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1660: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 39380 at Wed Sep 28 04:33:10 UTC 2022 kill -USR1 39380 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39380 killed at Wed Sep 28 04:33:11 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:33:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39432 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39432 found at Wed Sep 28 04:33:11 UTC 2022 selfserv_9223 with PID 39432 started at Wed Sep 28 04:33:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1661: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 39432 at Wed Sep 28 04:33:11 UTC 2022 kill -USR1 39432 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39432 killed at Wed Sep 28 04:33:11 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39484 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39484 found at Wed Sep 28 04:33:12 UTC 2022 selfserv_9223 with PID 39484 started at Wed Sep 28 04:33:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1662: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 39484 at Wed Sep 28 04:33:12 UTC 2022 kill -USR1 39484 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39484 killed at Wed Sep 28 04:33:12 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39536 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39536 found at Wed Sep 28 04:33:13 UTC 2022 selfserv_9223 with PID 39536 started at Wed Sep 28 04:33:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1663: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 39536 at Wed Sep 28 04:33:13 UTC 2022 kill -USR1 39536 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39536 killed at Wed Sep 28 04:33:13 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:33:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39588 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39588 found at Wed Sep 28 04:33:14 UTC 2022 selfserv_9223 with PID 39588 started at Wed Sep 28 04:33:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1664: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 39588 at Wed Sep 28 04:33:14 UTC 2022 kill -USR1 39588 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39588 killed at Wed Sep 28 04:33:14 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39640 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39640 found at Wed Sep 28 04:33:15 UTC 2022 selfserv_9223 with PID 39640 started at Wed Sep 28 04:33:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1665: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 39640 at Wed Sep 28 04:33:15 UTC 2022 kill -USR1 39640 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39640 killed at Wed Sep 28 04:33:15 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39692 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39692 found at Wed Sep 28 04:33:15 UTC 2022 selfserv_9223 with PID 39692 started at Wed Sep 28 04:33:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1666: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 39692 at Wed Sep 28 04:33:16 UTC 2022 kill -USR1 39692 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39692 killed at Wed Sep 28 04:33:16 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:33:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39744 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39744 found at Wed Sep 28 04:33:17 UTC 2022 selfserv_9223 with PID 39744 started at Wed Sep 28 04:33:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1667: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 39744 at Wed Sep 28 04:33:17 UTC 2022 kill -USR1 39744 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39744 killed at Wed Sep 28 04:33:17 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39796 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39796 found at Wed Sep 28 04:33:18 UTC 2022 selfserv_9223 with PID 39796 started at Wed Sep 28 04:33:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1668: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 39796 at Wed Sep 28 04:33:18 UTC 2022 kill -USR1 39796 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39796 killed at Wed Sep 28 04:33:18 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39849 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39849 found at Wed Sep 28 04:33:19 UTC 2022 selfserv_9223 with PID 39849 started at Wed Sep 28 04:33:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1669: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 39849 at Wed Sep 28 04:33:19 UTC 2022 kill -USR1 39849 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39849 killed at Wed Sep 28 04:33:19 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:33:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39901 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39901 found at Wed Sep 28 04:33:20 UTC 2022 selfserv_9223 with PID 39901 started at Wed Sep 28 04:33:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1670: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 39901 at Wed Sep 28 04:33:20 UTC 2022 kill -USR1 39901 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39901 killed at Wed Sep 28 04:33:20 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 39953 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 39953 found at Wed Sep 28 04:33:21 UTC 2022 selfserv_9223 with PID 39953 started at Wed Sep 28 04:33:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1671: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 39953 at Wed Sep 28 04:33:21 UTC 2022 kill -USR1 39953 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 39953 killed at Wed Sep 28 04:33:21 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40005 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40005 found at Wed Sep 28 04:33:22 UTC 2022 selfserv_9223 with PID 40005 started at Wed Sep 28 04:33:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1672: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40005 at Wed Sep 28 04:33:22 UTC 2022 kill -USR1 40005 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40005 killed at Wed Sep 28 04:33:22 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:33:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40058 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40058 found at Wed Sep 28 04:33:23 UTC 2022 selfserv_9223 with PID 40058 started at Wed Sep 28 04:33:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1673: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40058 at Wed Sep 28 04:33:23 UTC 2022 kill -USR1 40058 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40058 killed at Wed Sep 28 04:33:23 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40110 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40110 found at Wed Sep 28 04:33:24 UTC 2022 selfserv_9223 with PID 40110 started at Wed Sep 28 04:33:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1674: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40110 at Wed Sep 28 04:33:24 UTC 2022 kill -USR1 40110 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40110 killed at Wed Sep 28 04:33:24 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40162 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40162 found at Wed Sep 28 04:33:25 UTC 2022 selfserv_9223 with PID 40162 started at Wed Sep 28 04:33:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1675: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 40162 at Wed Sep 28 04:33:25 UTC 2022 kill -USR1 40162 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40162 killed at Wed Sep 28 04:33:26 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:33:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40214 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40214 found at Wed Sep 28 04:33:26 UTC 2022 selfserv_9223 with PID 40214 started at Wed Sep 28 04:33:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1676: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 40214 at Wed Sep 28 04:33:26 UTC 2022 kill -USR1 40214 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40214 killed at Wed Sep 28 04:33:27 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40266 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40266 found at Wed Sep 28 04:33:27 UTC 2022 selfserv_9223 with PID 40266 started at Wed Sep 28 04:33:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1677: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40266 at Wed Sep 28 04:33:27 UTC 2022 kill -USR1 40266 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40266 killed at Wed Sep 28 04:33:28 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40318 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40318 found at Wed Sep 28 04:33:28 UTC 2022 selfserv_9223 with PID 40318 started at Wed Sep 28 04:33:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1678: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40318 at Wed Sep 28 04:33:28 UTC 2022 kill -USR1 40318 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40318 killed at Wed Sep 28 04:33:29 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:33:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40370 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40370 found at Wed Sep 28 04:33:29 UTC 2022 selfserv_9223 with PID 40370 started at Wed Sep 28 04:33:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1679: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40370 at Wed Sep 28 04:33:29 UTC 2022 kill -USR1 40370 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40370 killed at Wed Sep 28 04:33:30 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40422 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40422 found at Wed Sep 28 04:33:30 UTC 2022 selfserv_9223 with PID 40422 started at Wed Sep 28 04:33:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1680: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40422 at Wed Sep 28 04:33:30 UTC 2022 kill -USR1 40422 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40422 killed at Wed Sep 28 04:33:31 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40474 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40474 found at Wed Sep 28 04:33:31 UTC 2022 selfserv_9223 with PID 40474 started at Wed Sep 28 04:33:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1681: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 40474 at Wed Sep 28 04:33:31 UTC 2022 kill -USR1 40474 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40474 killed at Wed Sep 28 04:33:32 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:33:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40526 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40526 found at Wed Sep 28 04:33:32 UTC 2022 selfserv_9223 with PID 40526 started at Wed Sep 28 04:33:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1682: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 40526 at Wed Sep 28 04:33:32 UTC 2022 kill -USR1 40526 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40526 killed at Wed Sep 28 04:33:33 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40578 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40578 found at Wed Sep 28 04:33:33 UTC 2022 selfserv_9223 with PID 40578 started at Wed Sep 28 04:33:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1683: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40578 at Wed Sep 28 04:33:33 UTC 2022 kill -USR1 40578 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40578 killed at Wed Sep 28 04:33:34 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40630 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40630 found at Wed Sep 28 04:33:34 UTC 2022 selfserv_9223 with PID 40630 started at Wed Sep 28 04:33:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1684: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40630 at Wed Sep 28 04:33:34 UTC 2022 kill -USR1 40630 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40630 killed at Wed Sep 28 04:33:35 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40682 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40682 found at Wed Sep 28 04:33:35 UTC 2022 selfserv_9223 with PID 40682 started at Wed Sep 28 04:33:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1685: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40682 at Wed Sep 28 04:33:35 UTC 2022 kill -USR1 40682 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40682 killed at Wed Sep 28 04:33:35 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40734 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40734 found at Wed Sep 28 04:33:36 UTC 2022 selfserv_9223 with PID 40734 started at Wed Sep 28 04:33:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1686: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40734 at Wed Sep 28 04:33:36 UTC 2022 kill -USR1 40734 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40734 killed at Wed Sep 28 04:33:36 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40786 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40786 found at Wed Sep 28 04:33:37 UTC 2022 selfserv_9223 with PID 40786 started at Wed Sep 28 04:33:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1687: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 40786 at Wed Sep 28 04:33:37 UTC 2022 kill -USR1 40786 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40786 killed at Wed Sep 28 04:33:37 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40853 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40853 found at Wed Sep 28 04:33:38 UTC 2022 selfserv_9223 with PID 40853 started at Wed Sep 28 04:33:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1688: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40853 at Wed Sep 28 04:33:38 UTC 2022 kill -USR1 40853 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40853 killed at Wed Sep 28 04:33:38 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40905 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40905 found at Wed Sep 28 04:33:39 UTC 2022 selfserv_9223 with PID 40905 started at Wed Sep 28 04:33:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1689: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40905 at Wed Sep 28 04:33:39 UTC 2022 kill -USR1 40905 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40905 killed at Wed Sep 28 04:33:39 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:33:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 40957 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 40957 found at Wed Sep 28 04:33:40 UTC 2022 selfserv_9223 with PID 40957 started at Wed Sep 28 04:33:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1690: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 40957 at Wed Sep 28 04:33:40 UTC 2022 kill -USR1 40957 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 40957 killed at Wed Sep 28 04:33:40 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41009 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41009 found at Wed Sep 28 04:33:40 UTC 2022 selfserv_9223 with PID 41009 started at Wed Sep 28 04:33:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1691: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41009 at Wed Sep 28 04:33:41 UTC 2022 kill -USR1 41009 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41009 killed at Wed Sep 28 04:33:41 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:33:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41061 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41061 found at Wed Sep 28 04:33:41 UTC 2022 selfserv_9223 with PID 41061 started at Wed Sep 28 04:33:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1692: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 41061 at Wed Sep 28 04:33:42 UTC 2022 kill -USR1 41061 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41061 killed at Wed Sep 28 04:33:42 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41114 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41114 found at Wed Sep 28 04:33:42 UTC 2022 selfserv_9223 with PID 41114 started at Wed Sep 28 04:33:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1693: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41114 at Wed Sep 28 04:33:43 UTC 2022 kill -USR1 41114 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41114 killed at Wed Sep 28 04:33:43 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:33:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41166 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41166 found at Wed Sep 28 04:33:43 UTC 2022 selfserv_9223 with PID 41166 started at Wed Sep 28 04:33:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1694: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41166 at Wed Sep 28 04:33:44 UTC 2022 kill -USR1 41166 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41166 killed at Wed Sep 28 04:33:44 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41218 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41218 found at Wed Sep 28 04:33:44 UTC 2022 selfserv_9223 with PID 41218 started at Wed Sep 28 04:33:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1695: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41218 at Wed Sep 28 04:33:45 UTC 2022 kill -USR1 41218 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41218 killed at Wed Sep 28 04:33:45 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:33:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41270 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41270 found at Wed Sep 28 04:33:45 UTC 2022 selfserv_9223 with PID 41270 started at Wed Sep 28 04:33:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1696: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 41270 at Wed Sep 28 04:33:46 UTC 2022 kill -USR1 41270 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41270 killed at Wed Sep 28 04:33:46 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41322 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41322 found at Wed Sep 28 04:33:46 UTC 2022 selfserv_9223 with PID 41322 started at Wed Sep 28 04:33:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1697: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41322 at Wed Sep 28 04:33:46 UTC 2022 kill -USR1 41322 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41322 killed at Wed Sep 28 04:33:47 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:33:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41374 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41374 found at Wed Sep 28 04:33:47 UTC 2022 selfserv_9223 with PID 41374 started at Wed Sep 28 04:33:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1698: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41374 at Wed Sep 28 04:33:47 UTC 2022 kill -USR1 41374 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41374 killed at Wed Sep 28 04:33:48 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41426 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41426 found at Wed Sep 28 04:33:48 UTC 2022 selfserv_9223 with PID 41426 started at Wed Sep 28 04:33:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1699: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41426 at Wed Sep 28 04:33:49 UTC 2022 kill -USR1 41426 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41426 killed at Wed Sep 28 04:33:49 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:33:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41478 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41478 found at Wed Sep 28 04:33:49 UTC 2022 selfserv_9223 with PID 41478 started at Wed Sep 28 04:33:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1700: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 41478 at Wed Sep 28 04:33:49 UTC 2022 kill -USR1 41478 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41478 killed at Wed Sep 28 04:33:50 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41530 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41530 found at Wed Sep 28 04:33:50 UTC 2022 selfserv_9223 with PID 41530 started at Wed Sep 28 04:33:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1701: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41530 at Wed Sep 28 04:33:51 UTC 2022 kill -USR1 41530 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41530 killed at Wed Sep 28 04:33:51 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:33:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41582 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41582 found at Wed Sep 28 04:33:51 UTC 2022 selfserv_9223 with PID 41582 started at Wed Sep 28 04:33:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1702: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41582 at Wed Sep 28 04:33:52 UTC 2022 kill -USR1 41582 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41582 killed at Wed Sep 28 04:33:52 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41634 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41634 found at Wed Sep 28 04:33:52 UTC 2022 selfserv_9223 with PID 41634 started at Wed Sep 28 04:33:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1703: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41634 at Wed Sep 28 04:33:53 UTC 2022 kill -USR1 41634 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41634 killed at Wed Sep 28 04:33:53 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:33:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41686 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41686 found at Wed Sep 28 04:33:53 UTC 2022 selfserv_9223 with PID 41686 started at Wed Sep 28 04:33:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1704: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 41686 at Wed Sep 28 04:33:54 UTC 2022 kill -USR1 41686 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41686 killed at Wed Sep 28 04:33:54 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41738 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41738 found at Wed Sep 28 04:33:54 UTC 2022 selfserv_9223 with PID 41738 started at Wed Sep 28 04:33:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1705: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41738 at Wed Sep 28 04:33:55 UTC 2022 kill -USR1 41738 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41738 killed at Wed Sep 28 04:33:55 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:33:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41790 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41790 found at Wed Sep 28 04:33:55 UTC 2022 selfserv_9223 with PID 41790 started at Wed Sep 28 04:33:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1706: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41790 at Wed Sep 28 04:33:56 UTC 2022 kill -USR1 41790 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41790 killed at Wed Sep 28 04:33:56 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41842 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41842 found at Wed Sep 28 04:33:56 UTC 2022 selfserv_9223 with PID 41842 started at Wed Sep 28 04:33:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1707: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41842 at Wed Sep 28 04:33:57 UTC 2022 kill -USR1 41842 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41842 killed at Wed Sep 28 04:33:57 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:33:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41894 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41894 found at Wed Sep 28 04:33:57 UTC 2022 selfserv_9223 with PID 41894 started at Wed Sep 28 04:33:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1708: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 41894 at Wed Sep 28 04:33:58 UTC 2022 kill -USR1 41894 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41894 killed at Wed Sep 28 04:33:58 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 41947 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 41947 found at Wed Sep 28 04:33:58 UTC 2022 selfserv_9223 with PID 41947 started at Wed Sep 28 04:33:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1709: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 41947 at Wed Sep 28 04:33:59 UTC 2022 kill -USR1 41947 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 41947 killed at Wed Sep 28 04:33:59 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:33:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:33:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42003 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42003 found at Wed Sep 28 04:33:59 UTC 2022 selfserv_9223 with PID 42003 started at Wed Sep 28 04:33:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1710: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42003 at Wed Sep 28 04:34:00 UTC 2022 kill -USR1 42003 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42003 killed at Wed Sep 28 04:34:00 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:34:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42056 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42056 found at Wed Sep 28 04:34:00 UTC 2022 selfserv_9223 with PID 42056 started at Wed Sep 28 04:34:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1711: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42056 at Wed Sep 28 04:34:01 UTC 2022 kill -USR1 42056 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42056 killed at Wed Sep 28 04:34:01 UTC 2022 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Wed Sep 28 04:34:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42138 found at Wed Sep 28 04:34:01 UTC 2022 selfserv_9223 with PID 42138 started at Wed Sep 28 04:34:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1654: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42138 at Wed Sep 28 04:34:02 UTC 2022 kill -USR1 42138 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42138 killed at Wed Sep 28 04:34:02 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:34:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42180 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42180 found at Wed Sep 28 04:34:02 UTC 2022 selfserv_9223 with PID 42180 started at Wed Sep 28 04:34:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1655: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42180 at Wed Sep 28 04:34:03 UTC 2022 kill -USR1 42180 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42180 killed at Wed Sep 28 04:34:03 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:34:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42219 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42219 found at Wed Sep 28 04:34:03 UTC 2022 selfserv_9223 with PID 42219 started at Wed Sep 28 04:34:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1656: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 42219 at Wed Sep 28 04:34:03 UTC 2022 kill -USR1 42219 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42219 killed at Wed Sep 28 04:34:03 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:34:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42258 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42258 found at Wed Sep 28 04:34:04 UTC 2022 selfserv_9223 with PID 42258 started at Wed Sep 28 04:34:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1657: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42258 at Wed Sep 28 04:34:04 UTC 2022 kill -USR1 42258 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42258 killed at Wed Sep 28 04:34:04 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:34:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42297 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42297 found at Wed Sep 28 04:34:04 UTC 2022 selfserv_9223 with PID 42297 started at Wed Sep 28 04:34:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1658: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 42297 at Wed Sep 28 04:34:05 UTC 2022 kill -USR1 42297 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42297 killed at Wed Sep 28 04:34:05 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:34:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42340 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42340 found at Wed Sep 28 04:34:05 UTC 2022 selfserv_9223 with PID 42340 started at Wed Sep 28 04:34:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1659: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42340 at Wed Sep 28 04:34:05 UTC 2022 kill -USR1 42340 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42340 killed at Wed Sep 28 04:34:06 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:34:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42379 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42379 found at Wed Sep 28 04:34:06 UTC 2022 selfserv_9223 with PID 42379 started at Wed Sep 28 04:34:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1660: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42379 at Wed Sep 28 04:34:06 UTC 2022 kill -USR1 42379 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42379 killed at Wed Sep 28 04:34:06 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:34:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42418 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42418 found at Wed Sep 28 04:34:07 UTC 2022 selfserv_9223 with PID 42418 started at Wed Sep 28 04:34:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1661: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42418 at Wed Sep 28 04:34:07 UTC 2022 kill -USR1 42418 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42418 killed at Wed Sep 28 04:34:07 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:34:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42458 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42458 found at Wed Sep 28 04:34:07 UTC 2022 selfserv_9223 with PID 42458 started at Wed Sep 28 04:34:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1662: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42458 at Wed Sep 28 04:34:08 UTC 2022 kill -USR1 42458 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42458 killed at Wed Sep 28 04:34:08 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:34:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42499 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42499 found at Wed Sep 28 04:34:08 UTC 2022 selfserv_9223 with PID 42499 started at Wed Sep 28 04:34:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1663: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42499 at Wed Sep 28 04:34:08 UTC 2022 kill -USR1 42499 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42499 killed at Wed Sep 28 04:34:09 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:34:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42538 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42538 found at Wed Sep 28 04:34:09 UTC 2022 selfserv_9223 with PID 42538 started at Wed Sep 28 04:34:09 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1664: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42538 at Wed Sep 28 04:34:09 UTC 2022 kill -USR1 42538 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42538 killed at Wed Sep 28 04:34:09 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:34:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42578 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42578 found at Wed Sep 28 04:34:10 UTC 2022 selfserv_9223 with PID 42578 started at Wed Sep 28 04:34:10 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1665: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 42578 at Wed Sep 28 04:34:10 UTC 2022 kill -USR1 42578 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42578 killed at Wed Sep 28 04:34:10 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:34:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42618 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42618 found at Wed Sep 28 04:34:10 UTC 2022 selfserv_9223 with PID 42618 started at Wed Sep 28 04:34:10 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1666: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42618 at Wed Sep 28 04:34:11 UTC 2022 kill -USR1 42618 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42618 killed at Wed Sep 28 04:34:11 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:34:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42658 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42658 found at Wed Sep 28 04:34:11 UTC 2022 selfserv_9223 with PID 42658 started at Wed Sep 28 04:34:11 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1667: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 42658 at Wed Sep 28 04:34:11 UTC 2022 kill -USR1 42658 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42658 killed at Wed Sep 28 04:34:12 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:34:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42700 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42700 found at Wed Sep 28 04:34:12 UTC 2022 selfserv_9223 with PID 42700 started at Wed Sep 28 04:34:12 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1668: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42700 at Wed Sep 28 04:34:12 UTC 2022 kill -USR1 42700 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42700 killed at Wed Sep 28 04:34:12 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:34:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42741 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42741 found at Wed Sep 28 04:34:13 UTC 2022 selfserv_9223 with PID 42741 started at Wed Sep 28 04:34:13 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1669: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42741 at Wed Sep 28 04:34:13 UTC 2022 kill -USR1 42741 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42741 killed at Wed Sep 28 04:34:13 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:34:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42781 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42781 found at Wed Sep 28 04:34:13 UTC 2022 selfserv_9223 with PID 42781 started at Wed Sep 28 04:34:13 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1670: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42781 at Wed Sep 28 04:34:14 UTC 2022 kill -USR1 42781 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42781 killed at Wed Sep 28 04:34:14 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:34:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42822 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42822 found at Wed Sep 28 04:34:14 UTC 2022 selfserv_9223 with PID 42822 started at Wed Sep 28 04:34:14 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1671: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42822 at Wed Sep 28 04:34:14 UTC 2022 kill -USR1 42822 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42822 killed at Wed Sep 28 04:34:15 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:34:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 42862 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42862 found at Wed Sep 28 04:34:15 UTC 2022 selfserv_9223 with PID 42862 started at Wed Sep 28 04:34:15 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1672: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 42862 at Wed Sep 28 04:34:15 UTC 2022 kill -USR1 42862 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42862 killed at Wed Sep 28 04:34:15 UTC 2022 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -fips true -force FIPS mode enabled. ssl.sh: #1673: expect failure to list cert, because we deleted it (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -list ssl.sh: #1674: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1675: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -fips true -force FIPS mode enabled. ssl.sh: #1676: expect failure to list cert, because we deleted it (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -list ssl.sh: #1677: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1678: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9223 starting at Wed Sep 28 04:34:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 42946 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 42946 found at Wed Sep 28 04:34:17 UTC 2022 selfserv_9223 with PID 42946 started at Wed Sep 28 04:34:17 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1679: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1680: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1681: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1682: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1683: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1684: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1685: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1686: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1687: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1688: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1689: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1690: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1691: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1692: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1693: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1694: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1695: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1696: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1697: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1698: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1699: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1700: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1701: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1702: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1703: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1704: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1705: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1706: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1707: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1708: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1709: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1710: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1711: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1712: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1713: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1714: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1715: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1716: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1717: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1718: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1719: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1720: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1721: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1722: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1723: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1724: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1725: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1726: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1727: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1728: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1729: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 42946 at Wed Sep 28 04:34:31 UTC 2022 kill -USR1 42946 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 42946 killed at Wed Sep 28 04:34:31 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Wed Sep 28 04:34:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 43495 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 43495 found at Wed Sep 28 04:34:31 UTC 2022 selfserv_9223 with PID 43495 started at Wed Sep 28 04:34:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1730: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1731: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1732: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1733: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1734: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1735: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1736: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1737: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1738: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1739: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1740: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1741: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1742: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1743: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1744: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1745: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1746: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1747: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1748: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1749: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1750: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1751: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1752: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1753: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1754: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1755: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1756: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1757: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1758: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1759: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1760: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1761: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1762: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1763: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1764: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1765: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1766: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1767: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1768: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1769: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1770: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1771: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1772: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1773: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1774: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1775: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1776: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1777: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1778: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1779: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1780: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1781: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1782: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1783: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1784: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1785: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1786: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1787: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1788: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1789: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1790: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1791: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1792: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1793: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1794: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1795: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1796: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1797: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1798: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1799: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1800: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1801: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1802: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1803: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1804: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1805: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 43495 at Wed Sep 28 04:34:54 UTC 2022 kill -USR1 43495 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 43495 killed at Wed Sep 28 04:34:54 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9223 starting at Wed Sep 28 04:34:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 44310 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44310 found at Wed Sep 28 04:34:55 UTC 2022 selfserv_9223 with PID 44310 started at Wed Sep 28 04:34:55 UTC 2022 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1806: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1807: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 44310 at Wed Sep 28 04:34:55 UTC 2022 kill -USR1 44310 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 44310 killed at Wed Sep 28 04:34:55 UTC 2022 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:34:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 44376 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44376 found at Wed Sep 28 04:34:56 UTC 2022 selfserv_9223 with PID 44376 started at Wed Sep 28 04:34:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1806: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 44376 at Wed Sep 28 04:34:56 UTC 2022 kill -USR1 44376 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 44376 killed at Wed Sep 28 04:34:57 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:34:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 44428 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44428 found at Wed Sep 28 04:34:57 UTC 2022 selfserv_9223 with PID 44428 started at Wed Sep 28 04:34:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1807: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 44428 at Wed Sep 28 04:34:57 UTC 2022 kill -USR1 44428 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 44428 killed at Wed Sep 28 04:34:58 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:34:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 44480 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44480 found at Wed Sep 28 04:34:58 UTC 2022 selfserv_9223 with PID 44480 started at Wed Sep 28 04:34:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1808: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 44480 at Wed Sep 28 04:34:58 UTC 2022 kill -USR1 44480 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 44480 killed at Wed Sep 28 04:34:59 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:34:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:34:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 44532 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44532 found at Wed Sep 28 04:34:59 UTC 2022 selfserv_9223 with PID 44532 started at Wed Sep 28 04:34:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1809: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 44532 at Wed Sep 28 04:35:00 UTC 2022 kill -USR1 44532 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 44532 killed at Wed Sep 28 04:35:00 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:35:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 44586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44586 found at Wed Sep 28 04:35:00 UTC 2022 selfserv_9223 with PID 44586 started at Wed Sep 28 04:35:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1810: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 44586 at Wed Sep 28 04:35:01 UTC 2022 kill -USR1 44586 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 44586 killed at Wed Sep 28 04:35:01 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 44638 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44638 found at Wed Sep 28 04:35:01 UTC 2022 selfserv_9223 with PID 44638 started at Wed Sep 28 04:35:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1811: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 44638 at Wed Sep 28 04:35:02 UTC 2022 kill -USR1 44638 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 44638 killed at Wed Sep 28 04:35:02 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 44702 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44702 found at Wed Sep 28 04:35:02 UTC 2022 selfserv_9223 with PID 44702 started at Wed Sep 28 04:35:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1812: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 44702 at Wed Sep 28 04:35:03 UTC 2022 kill -USR1 44702 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 44702 killed at Wed Sep 28 04:35:03 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:35:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 44754 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44754 found at Wed Sep 28 04:35:03 UTC 2022 selfserv_9223 with PID 44754 started at Wed Sep 28 04:35:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1813: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 44754 at Wed Sep 28 04:35:04 UTC 2022 kill -USR1 44754 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 44754 killed at Wed Sep 28 04:35:04 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 44806 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44806 found at Wed Sep 28 04:35:04 UTC 2022 selfserv_9223 with PID 44806 started at Wed Sep 28 04:35:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1814: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 44806 at Wed Sep 28 04:35:05 UTC 2022 kill -USR1 44806 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 44806 killed at Wed Sep 28 04:35:05 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 44858 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44858 found at Wed Sep 28 04:35:05 UTC 2022 selfserv_9223 with PID 44858 started at Wed Sep 28 04:35:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1815: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 44858 at Wed Sep 28 04:35:06 UTC 2022 kill -USR1 44858 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 44858 killed at Wed Sep 28 04:35:06 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:35:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 44910 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44910 found at Wed Sep 28 04:35:06 UTC 2022 selfserv_9223 with PID 44910 started at Wed Sep 28 04:35:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1816: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 44910 at Wed Sep 28 04:35:07 UTC 2022 kill -USR1 44910 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 44910 killed at Wed Sep 28 04:35:07 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 44962 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 44962 found at Wed Sep 28 04:35:07 UTC 2022 selfserv_9223 with PID 44962 started at Wed Sep 28 04:35:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1817: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 44962 at Wed Sep 28 04:35:08 UTC 2022 kill -USR1 44962 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 44962 killed at Wed Sep 28 04:35:08 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45014 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45014 found at Wed Sep 28 04:35:08 UTC 2022 selfserv_9223 with PID 45014 started at Wed Sep 28 04:35:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1818: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45014 at Wed Sep 28 04:35:09 UTC 2022 kill -USR1 45014 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45014 killed at Wed Sep 28 04:35:09 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:35:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45066 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45066 found at Wed Sep 28 04:35:10 UTC 2022 selfserv_9223 with PID 45066 started at Wed Sep 28 04:35:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1819: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45066 at Wed Sep 28 04:35:10 UTC 2022 kill -USR1 45066 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45066 killed at Wed Sep 28 04:35:10 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45118 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45118 found at Wed Sep 28 04:35:11 UTC 2022 selfserv_9223 with PID 45118 started at Wed Sep 28 04:35:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1820: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45118 at Wed Sep 28 04:35:11 UTC 2022 kill -USR1 45118 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45118 killed at Wed Sep 28 04:35:12 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45170 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45170 found at Wed Sep 28 04:35:12 UTC 2022 selfserv_9223 with PID 45170 started at Wed Sep 28 04:35:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1821: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 45170 at Wed Sep 28 04:35:13 UTC 2022 kill -USR1 45170 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45170 killed at Wed Sep 28 04:35:13 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:35:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45222 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45222 found at Wed Sep 28 04:35:13 UTC 2022 selfserv_9223 with PID 45222 started at Wed Sep 28 04:35:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1822: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 45222 at Wed Sep 28 04:35:14 UTC 2022 kill -USR1 45222 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45222 killed at Wed Sep 28 04:35:14 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45274 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45274 found at Wed Sep 28 04:35:14 UTC 2022 selfserv_9223 with PID 45274 started at Wed Sep 28 04:35:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1823: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45274 at Wed Sep 28 04:35:15 UTC 2022 kill -USR1 45274 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45274 killed at Wed Sep 28 04:35:15 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45326 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45326 found at Wed Sep 28 04:35:15 UTC 2022 selfserv_9223 with PID 45326 started at Wed Sep 28 04:35:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1824: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45326 at Wed Sep 28 04:35:16 UTC 2022 kill -USR1 45326 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45326 killed at Wed Sep 28 04:35:16 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:35:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45378 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45378 found at Wed Sep 28 04:35:17 UTC 2022 selfserv_9223 with PID 45378 started at Wed Sep 28 04:35:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1825: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45378 at Wed Sep 28 04:35:17 UTC 2022 kill -USR1 45378 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45378 killed at Wed Sep 28 04:35:18 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45430 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45430 found at Wed Sep 28 04:35:18 UTC 2022 selfserv_9223 with PID 45430 started at Wed Sep 28 04:35:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1826: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45430 at Wed Sep 28 04:35:19 UTC 2022 kill -USR1 45430 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45430 killed at Wed Sep 28 04:35:19 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45482 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45482 found at Wed Sep 28 04:35:19 UTC 2022 selfserv_9223 with PID 45482 started at Wed Sep 28 04:35:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1827: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 45482 at Wed Sep 28 04:35:20 UTC 2022 kill -USR1 45482 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45482 killed at Wed Sep 28 04:35:20 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:35:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45534 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45534 found at Wed Sep 28 04:35:20 UTC 2022 selfserv_9223 with PID 45534 started at Wed Sep 28 04:35:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1828: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 45534 at Wed Sep 28 04:35:21 UTC 2022 kill -USR1 45534 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45534 killed at Wed Sep 28 04:35:21 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45586 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45586 found at Wed Sep 28 04:35:21 UTC 2022 selfserv_9223 with PID 45586 started at Wed Sep 28 04:35:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1829: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45586 at Wed Sep 28 04:35:22 UTC 2022 kill -USR1 45586 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45586 killed at Wed Sep 28 04:35:22 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45638 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45638 found at Wed Sep 28 04:35:23 UTC 2022 selfserv_9223 with PID 45638 started at Wed Sep 28 04:35:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1830: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45638 at Wed Sep 28 04:35:23 UTC 2022 kill -USR1 45638 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45638 killed at Wed Sep 28 04:35:24 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:35:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45690 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45690 found at Wed Sep 28 04:35:24 UTC 2022 selfserv_9223 with PID 45690 started at Wed Sep 28 04:35:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1831: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45690 at Wed Sep 28 04:35:24 UTC 2022 kill -USR1 45690 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45690 killed at Wed Sep 28 04:35:25 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45742 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45742 found at Wed Sep 28 04:35:25 UTC 2022 selfserv_9223 with PID 45742 started at Wed Sep 28 04:35:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1832: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45742 at Wed Sep 28 04:35:26 UTC 2022 kill -USR1 45742 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45742 killed at Wed Sep 28 04:35:26 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45794 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45794 found at Wed Sep 28 04:35:26 UTC 2022 selfserv_9223 with PID 45794 started at Wed Sep 28 04:35:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1833: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 45794 at Wed Sep 28 04:35:27 UTC 2022 kill -USR1 45794 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45794 killed at Wed Sep 28 04:35:27 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:35:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45846 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45846 found at Wed Sep 28 04:35:27 UTC 2022 selfserv_9223 with PID 45846 started at Wed Sep 28 04:35:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1834: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 45846 at Wed Sep 28 04:35:28 UTC 2022 kill -USR1 45846 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45846 killed at Wed Sep 28 04:35:28 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45901 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45901 found at Wed Sep 28 04:35:29 UTC 2022 selfserv_9223 with PID 45901 started at Wed Sep 28 04:35:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1835: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45901 at Wed Sep 28 04:35:29 UTC 2022 kill -USR1 45901 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45901 killed at Wed Sep 28 04:35:29 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 45953 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 45953 found at Wed Sep 28 04:35:30 UTC 2022 selfserv_9223 with PID 45953 started at Wed Sep 28 04:35:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1836: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 45953 at Wed Sep 28 04:35:30 UTC 2022 kill -USR1 45953 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 45953 killed at Wed Sep 28 04:35:30 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46005 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46005 found at Wed Sep 28 04:35:31 UTC 2022 selfserv_9223 with PID 46005 started at Wed Sep 28 04:35:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1837: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46005 at Wed Sep 28 04:35:31 UTC 2022 kill -USR1 46005 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46005 killed at Wed Sep 28 04:35:31 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46057 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46057 found at Wed Sep 28 04:35:31 UTC 2022 selfserv_9223 with PID 46057 started at Wed Sep 28 04:35:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1838: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46057 at Wed Sep 28 04:35:32 UTC 2022 kill -USR1 46057 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46057 killed at Wed Sep 28 04:35:32 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46109 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46109 found at Wed Sep 28 04:35:33 UTC 2022 selfserv_9223 with PID 46109 started at Wed Sep 28 04:35:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1839: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 46109 at Wed Sep 28 04:35:33 UTC 2022 kill -USR1 46109 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46109 killed at Wed Sep 28 04:35:33 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46161 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46161 found at Wed Sep 28 04:35:34 UTC 2022 selfserv_9223 with PID 46161 started at Wed Sep 28 04:35:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1840: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46161 at Wed Sep 28 04:35:34 UTC 2022 kill -USR1 46161 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46161 killed at Wed Sep 28 04:35:34 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46213 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46213 found at Wed Sep 28 04:35:35 UTC 2022 selfserv_9223 with PID 46213 started at Wed Sep 28 04:35:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1841: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46213 at Wed Sep 28 04:35:35 UTC 2022 kill -USR1 46213 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46213 killed at Wed Sep 28 04:35:35 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:35:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46266 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46266 found at Wed Sep 28 04:35:36 UTC 2022 selfserv_9223 with PID 46266 started at Wed Sep 28 04:35:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1842: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46266 at Wed Sep 28 04:35:36 UTC 2022 kill -USR1 46266 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46266 killed at Wed Sep 28 04:35:36 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46318 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46318 found at Wed Sep 28 04:35:37 UTC 2022 selfserv_9223 with PID 46318 started at Wed Sep 28 04:35:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1843: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46318 at Wed Sep 28 04:35:37 UTC 2022 kill -USR1 46318 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46318 killed at Wed Sep 28 04:35:37 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:35:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46385 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46385 found at Wed Sep 28 04:35:38 UTC 2022 selfserv_9223 with PID 46385 started at Wed Sep 28 04:35:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1844: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 46385 at Wed Sep 28 04:35:38 UTC 2022 kill -USR1 46385 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46385 killed at Wed Sep 28 04:35:38 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46437 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46437 found at Wed Sep 28 04:35:39 UTC 2022 selfserv_9223 with PID 46437 started at Wed Sep 28 04:35:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1845: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46437 at Wed Sep 28 04:35:39 UTC 2022 kill -USR1 46437 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46437 killed at Wed Sep 28 04:35:39 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:35:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46489 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46489 found at Wed Sep 28 04:35:40 UTC 2022 selfserv_9223 with PID 46489 started at Wed Sep 28 04:35:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1846: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46489 at Wed Sep 28 04:35:40 UTC 2022 kill -USR1 46489 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46489 killed at Wed Sep 28 04:35:40 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46541 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46541 found at Wed Sep 28 04:35:41 UTC 2022 selfserv_9223 with PID 46541 started at Wed Sep 28 04:35:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1847: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46541 at Wed Sep 28 04:35:41 UTC 2022 kill -USR1 46541 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46541 killed at Wed Sep 28 04:35:41 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:35:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46594 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46594 found at Wed Sep 28 04:35:42 UTC 2022 selfserv_9223 with PID 46594 started at Wed Sep 28 04:35:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1848: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 46594 at Wed Sep 28 04:35:42 UTC 2022 kill -USR1 46594 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46594 killed at Wed Sep 28 04:35:42 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46646 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46646 found at Wed Sep 28 04:35:43 UTC 2022 selfserv_9223 with PID 46646 started at Wed Sep 28 04:35:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1849: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46646 at Wed Sep 28 04:35:43 UTC 2022 kill -USR1 46646 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46646 killed at Wed Sep 28 04:35:43 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:35:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46698 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46698 found at Wed Sep 28 04:35:44 UTC 2022 selfserv_9223 with PID 46698 started at Wed Sep 28 04:35:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1850: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46698 at Wed Sep 28 04:35:44 UTC 2022 kill -USR1 46698 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46698 killed at Wed Sep 28 04:35:44 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46750 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46750 found at Wed Sep 28 04:35:45 UTC 2022 selfserv_9223 with PID 46750 started at Wed Sep 28 04:35:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1851: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46750 at Wed Sep 28 04:35:45 UTC 2022 kill -USR1 46750 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46750 killed at Wed Sep 28 04:35:46 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:35:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46803 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46803 found at Wed Sep 28 04:35:46 UTC 2022 selfserv_9223 with PID 46803 started at Wed Sep 28 04:35:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1852: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 46803 at Wed Sep 28 04:35:46 UTC 2022 kill -USR1 46803 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46803 killed at Wed Sep 28 04:35:47 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46855 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46855 found at Wed Sep 28 04:35:47 UTC 2022 selfserv_9223 with PID 46855 started at Wed Sep 28 04:35:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1853: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46855 at Wed Sep 28 04:35:48 UTC 2022 kill -USR1 46855 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46855 killed at Wed Sep 28 04:35:48 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:35:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46907 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46907 found at Wed Sep 28 04:35:48 UTC 2022 selfserv_9223 with PID 46907 started at Wed Sep 28 04:35:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1854: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46907 at Wed Sep 28 04:35:49 UTC 2022 kill -USR1 46907 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46907 killed at Wed Sep 28 04:35:49 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 46959 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 46959 found at Wed Sep 28 04:35:49 UTC 2022 selfserv_9223 with PID 46959 started at Wed Sep 28 04:35:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1855: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 46959 at Wed Sep 28 04:35:50 UTC 2022 kill -USR1 46959 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 46959 killed at Wed Sep 28 04:35:50 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:35:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47011 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47011 found at Wed Sep 28 04:35:50 UTC 2022 selfserv_9223 with PID 47011 started at Wed Sep 28 04:35:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1856: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 47011 at Wed Sep 28 04:35:51 UTC 2022 kill -USR1 47011 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47011 killed at Wed Sep 28 04:35:51 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47064 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47064 found at Wed Sep 28 04:35:51 UTC 2022 selfserv_9223 with PID 47064 started at Wed Sep 28 04:35:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1857: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47064 at Wed Sep 28 04:35:52 UTC 2022 kill -USR1 47064 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47064 killed at Wed Sep 28 04:35:52 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:35:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47116 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47116 found at Wed Sep 28 04:35:53 UTC 2022 selfserv_9223 with PID 47116 started at Wed Sep 28 04:35:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1858: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47116 at Wed Sep 28 04:35:53 UTC 2022 kill -USR1 47116 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47116 killed at Wed Sep 28 04:35:53 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47168 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47168 found at Wed Sep 28 04:35:54 UTC 2022 selfserv_9223 with PID 47168 started at Wed Sep 28 04:35:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1859: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47168 at Wed Sep 28 04:35:54 UTC 2022 kill -USR1 47168 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47168 killed at Wed Sep 28 04:35:55 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:35:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47220 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47220 found at Wed Sep 28 04:35:55 UTC 2022 selfserv_9223 with PID 47220 started at Wed Sep 28 04:35:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1860: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 47220 at Wed Sep 28 04:35:55 UTC 2022 kill -USR1 47220 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47220 killed at Wed Sep 28 04:35:56 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47272 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47272 found at Wed Sep 28 04:35:56 UTC 2022 selfserv_9223 with PID 47272 started at Wed Sep 28 04:35:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1861: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47272 at Wed Sep 28 04:35:57 UTC 2022 kill -USR1 47272 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47272 killed at Wed Sep 28 04:35:57 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47324 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47324 found at Wed Sep 28 04:35:57 UTC 2022 selfserv_9223 with PID 47324 started at Wed Sep 28 04:35:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1862: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47324 at Wed Sep 28 04:35:58 UTC 2022 kill -USR1 47324 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47324 killed at Wed Sep 28 04:35:58 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:35:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47376 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47376 found at Wed Sep 28 04:35:58 UTC 2022 selfserv_9223 with PID 47376 started at Wed Sep 28 04:35:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1863: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47376 at Wed Sep 28 04:35:59 UTC 2022 kill -USR1 47376 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47376 killed at Wed Sep 28 04:35:59 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 04:35:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:35:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47434 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47434 found at Wed Sep 28 04:35:59 UTC 2022 selfserv_9223 with PID 47434 started at Wed Sep 28 04:35:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1864: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47434 at Wed Sep 28 04:36:00 UTC 2022 kill -USR1 47434 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47434 killed at Wed Sep 28 04:36:00 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Wed Sep 28 04:36:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:36:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47492 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47492 found at Wed Sep 28 04:36:00 UTC 2022 selfserv_9223 with PID 47492 started at Wed Sep 28 04:36:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1865: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47492 at Wed Sep 28 04:36:01 UTC 2022 kill -USR1 47492 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47492 killed at Wed Sep 28 04:36:01 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Wed Sep 28 04:36:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:36:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47550 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47550 found at Wed Sep 28 04:36:01 UTC 2022 selfserv_9223 with PID 47550 started at Wed Sep 28 04:36:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1866: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 47550 at Wed Sep 28 04:36:01 UTC 2022 kill -USR1 47550 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47550 killed at Wed Sep 28 04:36:02 UTC 2022 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 04:36:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:36:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47608 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47608 found at Wed Sep 28 04:36:02 UTC 2022 selfserv_9223 with PID 47608 started at Wed Sep 28 04:36:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1867: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47608 at Wed Sep 28 04:36:02 UTC 2022 kill -USR1 47608 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47608 killed at Wed Sep 28 04:36:03 UTC 2022 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9223 starting at Wed Sep 28 04:36:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:36:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47666 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47666 found at Wed Sep 28 04:36:03 UTC 2022 selfserv_9223 with PID 47666 started at Wed Sep 28 04:36:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1868: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 47666 at Wed Sep 28 04:36:03 UTC 2022 kill -USR1 47666 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47666 killed at Wed Sep 28 04:36:03 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 04:36:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:36:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47724 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47724 found at Wed Sep 28 04:36:04 UTC 2022 selfserv_9223 with PID 47724 started at Wed Sep 28 04:36:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1869: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47724 at Wed Sep 28 04:36:04 UTC 2022 kill -USR1 47724 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47724 killed at Wed Sep 28 04:36:04 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Wed Sep 28 04:36:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:36:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47782 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47782 found at Wed Sep 28 04:36:05 UTC 2022 selfserv_9223 with PID 47782 started at Wed Sep 28 04:36:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1870: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47782 at Wed Sep 28 04:36:05 UTC 2022 kill -USR1 47782 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47782 killed at Wed Sep 28 04:36:05 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9223 starting at Wed Sep 28 04:36:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:36:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47840 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47840 found at Wed Sep 28 04:36:06 UTC 2022 selfserv_9223 with PID 47840 started at Wed Sep 28 04:36:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1871: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 47840 at Wed Sep 28 04:36:06 UTC 2022 kill -USR1 47840 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47840 killed at Wed Sep 28 04:36:06 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9223 starting at Wed Sep 28 04:36:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:36:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47898 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47898 found at Wed Sep 28 04:36:06 UTC 2022 selfserv_9223 with PID 47898 started at Wed Sep 28 04:36:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1872: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 47898 at Wed Sep 28 04:36:07 UTC 2022 kill -USR1 47898 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47898 killed at Wed Sep 28 04:36:07 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Wed Sep 28 04:36:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:36:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47956 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47956 found at Wed Sep 28 04:36:07 UTC 2022 selfserv_9223 with PID 47956 started at Wed Sep 28 04:36:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1873: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 47956 at Wed Sep 28 04:36:07 UTC 2022 kill -USR1 47956 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47956 killed at Wed Sep 28 04:36:08 UTC 2022 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9223 starting at Wed Sep 28 04:36:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:36:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 47998 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 47998 found at Wed Sep 28 04:36:08 UTC 2022 selfserv_9223 with PID 47998 started at Wed Sep 28 04:36:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1806: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 47998 at Wed Sep 28 04:36:08 UTC 2022 kill -USR1 47998 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 47998 killed at Wed Sep 28 04:36:08 UTC 2022 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9223 starting at Wed Sep 28 04:36:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:36:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48040 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48040 found at Wed Sep 28 04:36:09 UTC 2022 selfserv_9223 with PID 48040 started at Wed Sep 28 04:36:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1807: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9223 with PID 48040 at Wed Sep 28 04:36:09 UTC 2022 kill -USR1 48040 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48040 killed at Wed Sep 28 04:36:09 UTC 2022 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9223 starting at Wed Sep 28 04:36:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:36:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48082 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48082 found at Wed Sep 28 04:36:09 UTC 2022 selfserv_9223 with PID 48082 started at Wed Sep 28 04:36:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1808: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 48082 at Wed Sep 28 04:36:10 UTC 2022 kill -USR1 48082 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48082 killed at Wed Sep 28 04:36:10 UTC 2022 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9223 starting at Wed Sep 28 04:36:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:36:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48124 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48124 found at Wed Sep 28 04:36:10 UTC 2022 selfserv_9223 with PID 48124 started at Wed Sep 28 04:36:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1809: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 48124 at Wed Sep 28 04:36:10 UTC 2022 kill -USR1 48124 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48124 killed at Wed Sep 28 04:36:11 UTC 2022 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9223 starting at Wed Sep 28 04:36:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:36:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48166 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48166 found at Wed Sep 28 04:36:11 UTC 2022 selfserv_9223 with PID 48166 started at Wed Sep 28 04:36:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1810: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 48166 at Wed Sep 28 04:36:11 UTC 2022 kill -USR1 48166 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48166 killed at Wed Sep 28 04:36:11 UTC 2022 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9223 starting at Wed Sep 28 04:36:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:36:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48208 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48208 found at Wed Sep 28 04:36:12 UTC 2022 selfserv_9223 with PID 48208 started at Wed Sep 28 04:36:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1811: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 48208 at Wed Sep 28 04:36:12 UTC 2022 kill -USR1 48208 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48208 killed at Wed Sep 28 04:36:12 UTC 2022 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9223 starting at Wed Sep 28 04:36:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:36:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48250 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48250 found at Wed Sep 28 04:36:12 UTC 2022 selfserv_9223 with PID 48250 started at Wed Sep 28 04:36:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1812: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 48250 at Wed Sep 28 04:36:13 UTC 2022 kill -USR1 48250 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48250 killed at Wed Sep 28 04:36:13 UTC 2022 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9223 starting at Wed Sep 28 04:36:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:36:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48292 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48292 found at Wed Sep 28 04:36:13 UTC 2022 selfserv_9223 with PID 48292 started at Wed Sep 28 04:36:13 UTC 2022 strsclnt -q -p 9223 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Sep 28 04:36:13 UTC 2022 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Sep 28 04:37:48 UTC 2022 ssl.sh: #1813: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9223 with PID 48292 at Wed Sep 28 04:37:48 UTC 2022 kill -USR1 48292 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48292 killed at Wed Sep 28 04:37:48 UTC 2022 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Wed Sep 28 04:37:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:37:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48373 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48373 found at Wed Sep 28 04:37:48 UTC 2022 selfserv_9223 with PID 48373 started at Wed Sep 28 04:37:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1814: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48373 at Wed Sep 28 04:37:49 UTC 2022 kill -USR1 48373 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48373 killed at Wed Sep 28 04:37:49 UTC 2022 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:37:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:37:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48415 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48415 found at Wed Sep 28 04:37:49 UTC 2022 selfserv_9223 with PID 48415 started at Wed Sep 28 04:37:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1815: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48415 at Wed Sep 28 04:37:50 UTC 2022 kill -USR1 48415 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48415 killed at Wed Sep 28 04:37:50 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:37:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:37:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48454 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48454 found at Wed Sep 28 04:37:50 UTC 2022 selfserv_9223 with PID 48454 started at Wed Sep 28 04:37:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1816: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 48454 at Wed Sep 28 04:37:50 UTC 2022 kill -USR1 48454 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48454 killed at Wed Sep 28 04:37:50 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:37:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:37:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48493 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48493 found at Wed Sep 28 04:37:51 UTC 2022 selfserv_9223 with PID 48493 started at Wed Sep 28 04:37:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1817: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48493 at Wed Sep 28 04:37:51 UTC 2022 kill -USR1 48493 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48493 killed at Wed Sep 28 04:37:51 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:37:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:37:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48532 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48532 found at Wed Sep 28 04:37:52 UTC 2022 selfserv_9223 with PID 48532 started at Wed Sep 28 04:37:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1818: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 48532 at Wed Sep 28 04:37:52 UTC 2022 kill -USR1 48532 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48532 killed at Wed Sep 28 04:37:52 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:37:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:37:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48571 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48571 found at Wed Sep 28 04:37:52 UTC 2022 selfserv_9223 with PID 48571 started at Wed Sep 28 04:37:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1819: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48571 at Wed Sep 28 04:37:53 UTC 2022 kill -USR1 48571 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48571 killed at Wed Sep 28 04:37:53 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:37:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:37:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48610 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48610 found at Wed Sep 28 04:37:53 UTC 2022 selfserv_9223 with PID 48610 started at Wed Sep 28 04:37:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1820: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48610 at Wed Sep 28 04:37:53 UTC 2022 kill -USR1 48610 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48610 killed at Wed Sep 28 04:37:53 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:37:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:37:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48649 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48649 found at Wed Sep 28 04:37:54 UTC 2022 selfserv_9223 with PID 48649 started at Wed Sep 28 04:37:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1821: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48649 at Wed Sep 28 04:37:54 UTC 2022 kill -USR1 48649 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48649 killed at Wed Sep 28 04:37:54 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:37:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:37:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48688 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48688 found at Wed Sep 28 04:37:55 UTC 2022 selfserv_9223 with PID 48688 started at Wed Sep 28 04:37:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1822: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48688 at Wed Sep 28 04:37:55 UTC 2022 kill -USR1 48688 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48688 killed at Wed Sep 28 04:37:55 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:37:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:37:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48727 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48727 found at Wed Sep 28 04:37:55 UTC 2022 selfserv_9223 with PID 48727 started at Wed Sep 28 04:37:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1823: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48727 at Wed Sep 28 04:37:56 UTC 2022 kill -USR1 48727 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48727 killed at Wed Sep 28 04:37:56 UTC 2022 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:37:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:37:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48766 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48766 found at Wed Sep 28 04:37:56 UTC 2022 selfserv_9223 with PID 48766 started at Wed Sep 28 04:37:56 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1824: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48766 at Wed Sep 28 04:37:56 UTC 2022 kill -USR1 48766 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48766 killed at Wed Sep 28 04:37:56 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:37:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:37:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48806 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48806 found at Wed Sep 28 04:37:57 UTC 2022 selfserv_9223 with PID 48806 started at Wed Sep 28 04:37:57 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1825: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 48806 at Wed Sep 28 04:37:57 UTC 2022 kill -USR1 48806 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48806 killed at Wed Sep 28 04:37:57 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:37:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:37:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48846 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48846 found at Wed Sep 28 04:37:57 UTC 2022 selfserv_9223 with PID 48846 started at Wed Sep 28 04:37:57 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1826: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48846 at Wed Sep 28 04:37:58 UTC 2022 kill -USR1 48846 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48846 killed at Wed Sep 28 04:37:58 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:37:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:37:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48886 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48886 found at Wed Sep 28 04:37:58 UTC 2022 selfserv_9223 with PID 48886 started at Wed Sep 28 04:37:58 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1827: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 48886 at Wed Sep 28 04:37:58 UTC 2022 kill -USR1 48886 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48886 killed at Wed Sep 28 04:37:59 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:37:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:37:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48926 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48926 found at Wed Sep 28 04:37:59 UTC 2022 selfserv_9223 with PID 48926 started at Wed Sep 28 04:37:59 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1828: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48926 at Wed Sep 28 04:37:59 UTC 2022 kill -USR1 48926 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48926 killed at Wed Sep 28 04:37:59 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:37:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:37:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 48966 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 48966 found at Wed Sep 28 04:38:00 UTC 2022 selfserv_9223 with PID 48966 started at Wed Sep 28 04:38:00 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1829: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 48966 at Wed Sep 28 04:38:00 UTC 2022 kill -USR1 48966 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 48966 killed at Wed Sep 28 04:38:00 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:38:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 49006 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 49006 found at Wed Sep 28 04:38:00 UTC 2022 selfserv_9223 with PID 49006 started at Wed Sep 28 04:38:00 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1830: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 49006 at Wed Sep 28 04:38:01 UTC 2022 kill -USR1 49006 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 49006 killed at Wed Sep 28 04:38:01 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:38:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 49046 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 49046 found at Wed Sep 28 04:38:01 UTC 2022 selfserv_9223 with PID 49046 started at Wed Sep 28 04:38:01 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1831: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 49046 at Wed Sep 28 04:38:02 UTC 2022 kill -USR1 49046 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 49046 killed at Wed Sep 28 04:38:02 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:38:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 49086 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 49086 found at Wed Sep 28 04:38:02 UTC 2022 selfserv_9223 with PID 49086 started at Wed Sep 28 04:38:02 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1832: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 49086 at Wed Sep 28 04:38:02 UTC 2022 kill -USR1 49086 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 49086 killed at Wed Sep 28 04:38:02 UTC 2022 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9223 starting at Wed Sep 28 04:38:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 49126 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 49126 found at Wed Sep 28 04:38:03 UTC 2022 selfserv_9223 with PID 49126 started at Wed Sep 28 04:38:03 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1833: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1834: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1835: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1836: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1837: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1838: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1839: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1840: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1841: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1842: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1843: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1844: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1845: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1846: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1847: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1848: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1849: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1850: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1851: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1852: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1853: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1854: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1855: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1856: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1857: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1858: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1859: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1860: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1861: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1862: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1863: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1864: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1865: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1866: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1867: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1868: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1869: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1870: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1871: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1872: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1873: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1874: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1875: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1876: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1877: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1878: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1879: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1880: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1881: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1882: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1883: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 49126 at Wed Sep 28 04:38:17 UTC 2022 kill -USR1 49126 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 49126 killed at Wed Sep 28 04:38:17 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Wed Sep 28 04:38:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 892 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 892 found at Wed Sep 28 04:38:18 UTC 2022 selfserv_9223 with PID 892 started at Wed Sep 28 04:38:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1884: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1885: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1886: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1887: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1888: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1889: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1890: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1891: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1892: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1893: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1894: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1895: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1896: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1897: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1898: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1899: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1900: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1901: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1902: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1903: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1904: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1905: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1906: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1907: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1908: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1909: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1910: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1911: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1912: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1913: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1914: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1915: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1916: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1917: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1918: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1919: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1920: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1921: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1922: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1923: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1924: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1925: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1926: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1927: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1928: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1929: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1930: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1931: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1932: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1933: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1934: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1935: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1936: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1937: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1938: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1939: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1940: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1941: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1942: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1943: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1944: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1945: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1946: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1947: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1948: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1949: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1950: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1951: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1952: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1953: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1954: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1955: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1956: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1957: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1958: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1959: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 892 at Wed Sep 28 04:38:40 UTC 2022 kill -USR1 892 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 892 killed at Wed Sep 28 04:38:40 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:38:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1811 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1811 found at Wed Sep 28 04:38:41 UTC 2022 selfserv_9223 with PID 1811 started at Wed Sep 28 04:38:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1960: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1811 at Wed Sep 28 04:38:41 UTC 2022 kill -USR1 1811 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1811 killed at Wed Sep 28 04:38:41 UTC 2022 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:38:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1876 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1876 found at Wed Sep 28 04:38:42 UTC 2022 selfserv_9223 with PID 1876 started at Wed Sep 28 04:38:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1961: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1876 at Wed Sep 28 04:38:42 UTC 2022 kill -USR1 1876 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1876 killed at Wed Sep 28 04:38:42 UTC 2022 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:38:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1928 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1928 found at Wed Sep 28 04:38:43 UTC 2022 selfserv_9223 with PID 1928 started at Wed Sep 28 04:38:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1962: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 1928 at Wed Sep 28 04:38:43 UTC 2022 kill -USR1 1928 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1928 killed at Wed Sep 28 04:38:43 UTC 2022 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:38:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 1982 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 1982 found at Wed Sep 28 04:38:44 UTC 2022 selfserv_9223 with PID 1982 started at Wed Sep 28 04:38:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1963: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 1982 at Wed Sep 28 04:38:44 UTC 2022 kill -USR1 1982 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 1982 killed at Wed Sep 28 04:38:44 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:38:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2034 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2034 found at Wed Sep 28 04:38:44 UTC 2022 selfserv_9223 with PID 2034 started at Wed Sep 28 04:38:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1964: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2034 at Wed Sep 28 04:38:45 UTC 2022 kill -USR1 2034 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2034 killed at Wed Sep 28 04:38:45 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:38:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2086 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2086 found at Wed Sep 28 04:38:45 UTC 2022 selfserv_9223 with PID 2086 started at Wed Sep 28 04:38:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1965: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2086 at Wed Sep 28 04:38:46 UTC 2022 kill -USR1 2086 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2086 killed at Wed Sep 28 04:38:46 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:38:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2138 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2138 found at Wed Sep 28 04:38:46 UTC 2022 selfserv_9223 with PID 2138 started at Wed Sep 28 04:38:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1966: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2138 at Wed Sep 28 04:38:47 UTC 2022 kill -USR1 2138 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2138 killed at Wed Sep 28 04:38:47 UTC 2022 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:38:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2190 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2190 found at Wed Sep 28 04:38:47 UTC 2022 selfserv_9223 with PID 2190 started at Wed Sep 28 04:38:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1967: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2190 at Wed Sep 28 04:38:48 UTC 2022 kill -USR1 2190 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2190 killed at Wed Sep 28 04:38:48 UTC 2022 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:38:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2242 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2242 found at Wed Sep 28 04:38:48 UTC 2022 selfserv_9223 with PID 2242 started at Wed Sep 28 04:38:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1968: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2242 at Wed Sep 28 04:38:49 UTC 2022 kill -USR1 2242 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2242 killed at Wed Sep 28 04:38:49 UTC 2022 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:38:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2294 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2294 found at Wed Sep 28 04:38:49 UTC 2022 selfserv_9223 with PID 2294 started at Wed Sep 28 04:38:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1969: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2294 at Wed Sep 28 04:38:50 UTC 2022 kill -USR1 2294 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2294 killed at Wed Sep 28 04:38:50 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:38:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2347 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2347 found at Wed Sep 28 04:38:50 UTC 2022 selfserv_9223 with PID 2347 started at Wed Sep 28 04:38:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1970: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2347 at Wed Sep 28 04:38:51 UTC 2022 kill -USR1 2347 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2347 killed at Wed Sep 28 04:38:51 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:38:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2399 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2399 found at Wed Sep 28 04:38:51 UTC 2022 selfserv_9223 with PID 2399 started at Wed Sep 28 04:38:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1971: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2399 at Wed Sep 28 04:38:52 UTC 2022 kill -USR1 2399 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2399 killed at Wed Sep 28 04:38:52 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:38:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2451 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2451 found at Wed Sep 28 04:38:52 UTC 2022 selfserv_9223 with PID 2451 started at Wed Sep 28 04:38:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1972: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2451 at Wed Sep 28 04:38:53 UTC 2022 kill -USR1 2451 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2451 killed at Wed Sep 28 04:38:53 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:38:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2503 found at Wed Sep 28 04:38:53 UTC 2022 selfserv_9223 with PID 2503 started at Wed Sep 28 04:38:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1973: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2503 at Wed Sep 28 04:38:54 UTC 2022 kill -USR1 2503 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2503 killed at Wed Sep 28 04:38:54 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:38:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2555 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2555 found at Wed Sep 28 04:38:54 UTC 2022 selfserv_9223 with PID 2555 started at Wed Sep 28 04:38:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1974: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2555 at Wed Sep 28 04:38:55 UTC 2022 kill -USR1 2555 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2555 killed at Wed Sep 28 04:38:55 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:38:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2607 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2607 found at Wed Sep 28 04:38:55 UTC 2022 selfserv_9223 with PID 2607 started at Wed Sep 28 04:38:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1975: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2607 at Wed Sep 28 04:38:56 UTC 2022 kill -USR1 2607 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2607 killed at Wed Sep 28 04:38:56 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:38:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2659 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2659 found at Wed Sep 28 04:38:56 UTC 2022 selfserv_9223 with PID 2659 started at Wed Sep 28 04:38:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1976: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2659 at Wed Sep 28 04:38:57 UTC 2022 kill -USR1 2659 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2659 killed at Wed Sep 28 04:38:57 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:38:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2711 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2711 found at Wed Sep 28 04:38:57 UTC 2022 selfserv_9223 with PID 2711 started at Wed Sep 28 04:38:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1977: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2711 at Wed Sep 28 04:38:58 UTC 2022 kill -USR1 2711 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2711 killed at Wed Sep 28 04:38:58 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:38:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2763 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2763 found at Wed Sep 28 04:38:58 UTC 2022 selfserv_9223 with PID 2763 started at Wed Sep 28 04:38:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1978: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2763 at Wed Sep 28 04:38:59 UTC 2022 kill -USR1 2763 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2763 killed at Wed Sep 28 04:38:59 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:38:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:38:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2815 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2815 found at Wed Sep 28 04:38:59 UTC 2022 selfserv_9223 with PID 2815 started at Wed Sep 28 04:38:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1979: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2815 at Wed Sep 28 04:39:00 UTC 2022 kill -USR1 2815 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2815 killed at Wed Sep 28 04:39:00 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2867 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2867 found at Wed Sep 28 04:39:00 UTC 2022 selfserv_9223 with PID 2867 started at Wed Sep 28 04:39:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1980: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 2867 at Wed Sep 28 04:39:01 UTC 2022 kill -USR1 2867 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2867 killed at Wed Sep 28 04:39:01 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2919 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2919 found at Wed Sep 28 04:39:01 UTC 2022 selfserv_9223 with PID 2919 started at Wed Sep 28 04:39:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1981: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2919 at Wed Sep 28 04:39:02 UTC 2022 kill -USR1 2919 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2919 killed at Wed Sep 28 04:39:02 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:39:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 2971 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 2971 found at Wed Sep 28 04:39:03 UTC 2022 selfserv_9223 with PID 2971 started at Wed Sep 28 04:39:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1982: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 2971 at Wed Sep 28 04:39:03 UTC 2022 kill -USR1 2971 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 2971 killed at Wed Sep 28 04:39:03 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3023 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3023 found at Wed Sep 28 04:39:04 UTC 2022 selfserv_9223 with PID 3023 started at Wed Sep 28 04:39:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1983: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3023 at Wed Sep 28 04:39:04 UTC 2022 kill -USR1 3023 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3023 killed at Wed Sep 28 04:39:04 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3075 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3075 found at Wed Sep 28 04:39:05 UTC 2022 selfserv_9223 with PID 3075 started at Wed Sep 28 04:39:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1984: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3075 at Wed Sep 28 04:39:05 UTC 2022 kill -USR1 3075 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3075 killed at Wed Sep 28 04:39:06 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:39:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3129 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3129 found at Wed Sep 28 04:39:06 UTC 2022 selfserv_9223 with PID 3129 started at Wed Sep 28 04:39:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1985: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3129 at Wed Sep 28 04:39:06 UTC 2022 kill -USR1 3129 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3129 killed at Wed Sep 28 04:39:07 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3181 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3181 found at Wed Sep 28 04:39:07 UTC 2022 selfserv_9223 with PID 3181 started at Wed Sep 28 04:39:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1986: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3181 at Wed Sep 28 04:39:08 UTC 2022 kill -USR1 3181 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3181 killed at Wed Sep 28 04:39:08 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3234 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3234 found at Wed Sep 28 04:39:08 UTC 2022 selfserv_9223 with PID 3234 started at Wed Sep 28 04:39:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1987: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3234 at Wed Sep 28 04:39:09 UTC 2022 kill -USR1 3234 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3234 killed at Wed Sep 28 04:39:09 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:39:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3288 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3288 found at Wed Sep 28 04:39:09 UTC 2022 selfserv_9223 with PID 3288 started at Wed Sep 28 04:39:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1988: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3288 at Wed Sep 28 04:39:10 UTC 2022 kill -USR1 3288 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3288 killed at Wed Sep 28 04:39:10 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3340 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3340 found at Wed Sep 28 04:39:10 UTC 2022 selfserv_9223 with PID 3340 started at Wed Sep 28 04:39:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1989: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3340 at Wed Sep 28 04:39:11 UTC 2022 kill -USR1 3340 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3340 killed at Wed Sep 28 04:39:11 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3392 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3392 found at Wed Sep 28 04:39:11 UTC 2022 selfserv_9223 with PID 3392 started at Wed Sep 28 04:39:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1990: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3392 at Wed Sep 28 04:39:12 UTC 2022 kill -USR1 3392 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3392 killed at Wed Sep 28 04:39:12 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3444 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3444 found at Wed Sep 28 04:39:12 UTC 2022 selfserv_9223 with PID 3444 started at Wed Sep 28 04:39:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1991: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3444 at Wed Sep 28 04:39:13 UTC 2022 kill -USR1 3444 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3444 killed at Wed Sep 28 04:39:13 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3496 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3496 found at Wed Sep 28 04:39:13 UTC 2022 selfserv_9223 with PID 3496 started at Wed Sep 28 04:39:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1992: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3496 at Wed Sep 28 04:39:14 UTC 2022 kill -USR1 3496 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3496 killed at Wed Sep 28 04:39:14 UTC 2022 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3548 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3548 found at Wed Sep 28 04:39:14 UTC 2022 selfserv_9223 with PID 3548 started at Wed Sep 28 04:39:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1993: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3548 at Wed Sep 28 04:39:15 UTC 2022 kill -USR1 3548 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3548 killed at Wed Sep 28 04:39:15 UTC 2022 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3600 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3600 found at Wed Sep 28 04:39:15 UTC 2022 selfserv_9223 with PID 3600 started at Wed Sep 28 04:39:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1994: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3600 at Wed Sep 28 04:39:15 UTC 2022 kill -USR1 3600 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3600 killed at Wed Sep 28 04:39:16 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3652 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3652 found at Wed Sep 28 04:39:16 UTC 2022 selfserv_9223 with PID 3652 started at Wed Sep 28 04:39:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1995: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3652 at Wed Sep 28 04:39:16 UTC 2022 kill -USR1 3652 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3652 killed at Wed Sep 28 04:39:17 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:39:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3704 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3704 found at Wed Sep 28 04:39:17 UTC 2022 selfserv_9223 with PID 3704 started at Wed Sep 28 04:39:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1996: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3704 at Wed Sep 28 04:39:17 UTC 2022 kill -USR1 3704 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3704 killed at Wed Sep 28 04:39:18 UTC 2022 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3756 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3756 found at Wed Sep 28 04:39:18 UTC 2022 selfserv_9223 with PID 3756 started at Wed Sep 28 04:39:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1997: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3756 at Wed Sep 28 04:39:18 UTC 2022 kill -USR1 3756 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3756 killed at Wed Sep 28 04:39:18 UTC 2022 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:39:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3808 found at Wed Sep 28 04:39:19 UTC 2022 selfserv_9223 with PID 3808 started at Wed Sep 28 04:39:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1998: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 3808 at Wed Sep 28 04:39:19 UTC 2022 kill -USR1 3808 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3808 killed at Wed Sep 28 04:39:19 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3860 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3860 found at Wed Sep 28 04:39:20 UTC 2022 selfserv_9223 with PID 3860 started at Wed Sep 28 04:39:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1999: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3860 at Wed Sep 28 04:39:20 UTC 2022 kill -USR1 3860 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3860 killed at Wed Sep 28 04:39:20 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:39:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3912 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3912 found at Wed Sep 28 04:39:21 UTC 2022 selfserv_9223 with PID 3912 started at Wed Sep 28 04:39:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2000: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3912 at Wed Sep 28 04:39:21 UTC 2022 kill -USR1 3912 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3912 killed at Wed Sep 28 04:39:21 UTC 2022 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 3964 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 3964 found at Wed Sep 28 04:39:22 UTC 2022 selfserv_9223 with PID 3964 started at Wed Sep 28 04:39:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2001: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 3964 at Wed Sep 28 04:39:22 UTC 2022 kill -USR1 3964 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 3964 killed at Wed Sep 28 04:39:22 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:39:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4017 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4017 found at Wed Sep 28 04:39:23 UTC 2022 selfserv_9223 with PID 4017 started at Wed Sep 28 04:39:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2002: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4017 at Wed Sep 28 04:39:23 UTC 2022 kill -USR1 4017 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4017 killed at Wed Sep 28 04:39:23 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4069 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4069 found at Wed Sep 28 04:39:24 UTC 2022 selfserv_9223 with PID 4069 started at Wed Sep 28 04:39:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2003: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4069 at Wed Sep 28 04:39:24 UTC 2022 kill -USR1 4069 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4069 killed at Wed Sep 28 04:39:24 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:39:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4121 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4121 found at Wed Sep 28 04:39:25 UTC 2022 selfserv_9223 with PID 4121 started at Wed Sep 28 04:39:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2004: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4121 at Wed Sep 28 04:39:25 UTC 2022 kill -USR1 4121 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4121 killed at Wed Sep 28 04:39:25 UTC 2022 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4173 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4173 found at Wed Sep 28 04:39:26 UTC 2022 selfserv_9223 with PID 4173 started at Wed Sep 28 04:39:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2005: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4173 at Wed Sep 28 04:39:26 UTC 2022 kill -USR1 4173 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4173 killed at Wed Sep 28 04:39:26 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:39:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4225 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4225 found at Wed Sep 28 04:39:27 UTC 2022 selfserv_9223 with PID 4225 started at Wed Sep 28 04:39:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2006: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4225 at Wed Sep 28 04:39:27 UTC 2022 kill -USR1 4225 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4225 killed at Wed Sep 28 04:39:27 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4277 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4277 found at Wed Sep 28 04:39:28 UTC 2022 selfserv_9223 with PID 4277 started at Wed Sep 28 04:39:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2007: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4277 at Wed Sep 28 04:39:28 UTC 2022 kill -USR1 4277 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4277 killed at Wed Sep 28 04:39:28 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:39:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4329 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4329 found at Wed Sep 28 04:39:29 UTC 2022 selfserv_9223 with PID 4329 started at Wed Sep 28 04:39:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2008: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4329 at Wed Sep 28 04:39:29 UTC 2022 kill -USR1 4329 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4329 killed at Wed Sep 28 04:39:29 UTC 2022 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4381 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4381 found at Wed Sep 28 04:39:30 UTC 2022 selfserv_9223 with PID 4381 started at Wed Sep 28 04:39:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2009: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4381 at Wed Sep 28 04:39:30 UTC 2022 kill -USR1 4381 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4381 killed at Wed Sep 28 04:39:30 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:39:30 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:30 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4433 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4433 found at Wed Sep 28 04:39:31 UTC 2022 selfserv_9223 with PID 4433 started at Wed Sep 28 04:39:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2010: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4433 at Wed Sep 28 04:39:31 UTC 2022 kill -USR1 4433 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4433 killed at Wed Sep 28 04:39:31 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:31 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:31 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4485 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4485 found at Wed Sep 28 04:39:32 UTC 2022 selfserv_9223 with PID 4485 started at Wed Sep 28 04:39:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2011: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4485 at Wed Sep 28 04:39:32 UTC 2022 kill -USR1 4485 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4485 killed at Wed Sep 28 04:39:33 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:39:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4537 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4537 found at Wed Sep 28 04:39:33 UTC 2022 selfserv_9223 with PID 4537 started at Wed Sep 28 04:39:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2012: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4537 at Wed Sep 28 04:39:33 UTC 2022 kill -USR1 4537 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4537 killed at Wed Sep 28 04:39:34 UTC 2022 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4589 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4589 found at Wed Sep 28 04:39:34 UTC 2022 selfserv_9223 with PID 4589 started at Wed Sep 28 04:39:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2013: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4589 at Wed Sep 28 04:39:35 UTC 2022 kill -USR1 4589 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4589 killed at Wed Sep 28 04:39:35 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:39:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4641 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4641 found at Wed Sep 28 04:39:35 UTC 2022 selfserv_9223 with PID 4641 started at Wed Sep 28 04:39:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2014: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 4641 at Wed Sep 28 04:39:36 UTC 2022 kill -USR1 4641 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4641 killed at Wed Sep 28 04:39:36 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4693 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4693 found at Wed Sep 28 04:39:36 UTC 2022 selfserv_9223 with PID 4693 started at Wed Sep 28 04:39:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2015: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4693 at Wed Sep 28 04:39:37 UTC 2022 kill -USR1 4693 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4693 killed at Wed Sep 28 04:39:37 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4760 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4760 found at Wed Sep 28 04:39:37 UTC 2022 selfserv_9223 with PID 4760 started at Wed Sep 28 04:39:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2016: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4760 at Wed Sep 28 04:39:38 UTC 2022 kill -USR1 4760 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4760 killed at Wed Sep 28 04:39:38 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:39:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4812 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4812 found at Wed Sep 28 04:39:38 UTC 2022 selfserv_9223 with PID 4812 started at Wed Sep 28 04:39:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2017: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4812 at Wed Sep 28 04:39:39 UTC 2022 kill -USR1 4812 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4812 killed at Wed Sep 28 04:39:39 UTC 2022 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Wed Sep 28 04:39:39 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4894 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4894 found at Wed Sep 28 04:39:39 UTC 2022 selfserv_9223 with PID 4894 started at Wed Sep 28 04:39:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1960: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4894 at Wed Sep 28 04:39:40 UTC 2022 kill -USR1 4894 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4894 killed at Wed Sep 28 04:39:40 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:39:40 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4936 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4936 found at Wed Sep 28 04:39:40 UTC 2022 selfserv_9223 with PID 4936 started at Wed Sep 28 04:39:40 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1961: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 4936 at Wed Sep 28 04:39:41 UTC 2022 kill -USR1 4936 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4936 killed at Wed Sep 28 04:39:41 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:39:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 4975 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 4975 found at Wed Sep 28 04:39:41 UTC 2022 selfserv_9223 with PID 4975 started at Wed Sep 28 04:39:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1962: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 4975 at Wed Sep 28 04:39:41 UTC 2022 kill -USR1 4975 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 4975 killed at Wed Sep 28 04:39:41 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:39:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5014 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5014 found at Wed Sep 28 04:39:42 UTC 2022 selfserv_9223 with PID 5014 started at Wed Sep 28 04:39:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1963: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5014 at Wed Sep 28 04:39:42 UTC 2022 kill -USR1 5014 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5014 killed at Wed Sep 28 04:39:42 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:39:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5053 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5053 found at Wed Sep 28 04:39:42 UTC 2022 selfserv_9223 with PID 5053 started at Wed Sep 28 04:39:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1964: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 5053 at Wed Sep 28 04:39:43 UTC 2022 kill -USR1 5053 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5053 killed at Wed Sep 28 04:39:43 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:39:43 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5093 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5093 found at Wed Sep 28 04:39:43 UTC 2022 selfserv_9223 with PID 5093 started at Wed Sep 28 04:39:43 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1965: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5093 at Wed Sep 28 04:39:43 UTC 2022 kill -USR1 5093 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5093 killed at Wed Sep 28 04:39:44 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:39:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5132 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5132 found at Wed Sep 28 04:39:44 UTC 2022 selfserv_9223 with PID 5132 started at Wed Sep 28 04:39:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1966: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5132 at Wed Sep 28 04:39:44 UTC 2022 kill -USR1 5132 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5132 killed at Wed Sep 28 04:39:44 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:39:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5171 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5171 found at Wed Sep 28 04:39:45 UTC 2022 selfserv_9223 with PID 5171 started at Wed Sep 28 04:39:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1967: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5171 at Wed Sep 28 04:39:45 UTC 2022 kill -USR1 5171 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5171 killed at Wed Sep 28 04:39:45 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:39:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5210 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5210 found at Wed Sep 28 04:39:45 UTC 2022 selfserv_9223 with PID 5210 started at Wed Sep 28 04:39:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1968: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5210 at Wed Sep 28 04:39:46 UTC 2022 kill -USR1 5210 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5210 killed at Wed Sep 28 04:39:46 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:39:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5250 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5250 found at Wed Sep 28 04:39:46 UTC 2022 selfserv_9223 with PID 5250 started at Wed Sep 28 04:39:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1969: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5250 at Wed Sep 28 04:39:46 UTC 2022 kill -USR1 5250 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5250 killed at Wed Sep 28 04:39:47 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:39:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5289 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5289 found at Wed Sep 28 04:39:47 UTC 2022 selfserv_9223 with PID 5289 started at Wed Sep 28 04:39:47 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1970: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5289 at Wed Sep 28 04:39:47 UTC 2022 kill -USR1 5289 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5289 killed at Wed Sep 28 04:39:47 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:39:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5329 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5329 found at Wed Sep 28 04:39:48 UTC 2022 selfserv_9223 with PID 5329 started at Wed Sep 28 04:39:48 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1971: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5329 at Wed Sep 28 04:39:48 UTC 2022 kill -USR1 5329 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5329 killed at Wed Sep 28 04:39:48 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:39:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5369 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5369 found at Wed Sep 28 04:39:48 UTC 2022 selfserv_9223 with PID 5369 started at Wed Sep 28 04:39:48 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1972: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5369 at Wed Sep 28 04:39:49 UTC 2022 kill -USR1 5369 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5369 killed at Wed Sep 28 04:39:49 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:39:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5409 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5409 found at Wed Sep 28 04:39:49 UTC 2022 selfserv_9223 with PID 5409 started at Wed Sep 28 04:39:49 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1973: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 5409 at Wed Sep 28 04:39:49 UTC 2022 kill -USR1 5409 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5409 killed at Wed Sep 28 04:39:50 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:39:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5449 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5449 found at Wed Sep 28 04:39:50 UTC 2022 selfserv_9223 with PID 5449 started at Wed Sep 28 04:39:50 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1974: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5449 at Wed Sep 28 04:39:50 UTC 2022 kill -USR1 5449 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5449 killed at Wed Sep 28 04:39:50 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:39:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5489 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5489 found at Wed Sep 28 04:39:51 UTC 2022 selfserv_9223 with PID 5489 started at Wed Sep 28 04:39:51 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1975: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5489 at Wed Sep 28 04:39:51 UTC 2022 kill -USR1 5489 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5489 killed at Wed Sep 28 04:39:51 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:39:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5529 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5529 found at Wed Sep 28 04:39:51 UTC 2022 selfserv_9223 with PID 5529 started at Wed Sep 28 04:39:51 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1976: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5529 at Wed Sep 28 04:39:52 UTC 2022 kill -USR1 5529 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5529 killed at Wed Sep 28 04:39:52 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:39:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5569 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5569 found at Wed Sep 28 04:39:52 UTC 2022 selfserv_9223 with PID 5569 started at Wed Sep 28 04:39:52 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1977: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5569 at Wed Sep 28 04:39:52 UTC 2022 kill -USR1 5569 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5569 killed at Wed Sep 28 04:39:53 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:39:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 5609 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5609 found at Wed Sep 28 04:39:53 UTC 2022 selfserv_9223 with PID 5609 started at Wed Sep 28 04:39:53 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1978: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 5609 at Wed Sep 28 04:39:53 UTC 2022 kill -USR1 5609 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5609 killed at Wed Sep 28 04:39:53 UTC 2022 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -fips false -force FIPS mode disabled. ssl.sh: #1979: expect failure to list cert, because we deleted it (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/server -list ssl.sh: #1980: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1981: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1982: expect failure to list cert, because we deleted it (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_server -list ssl.sh: #1983: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1984: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -fips true -force FIPS mode enabled. ssl.sh: #1985: expect failure to list cert, because we deleted it (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -list ssl.sh: #1986: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1987: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1988: expect failure to list cert, because we deleted it (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -list ssl.sh: #1989: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1990: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9223 starting at Wed Sep 28 04:39:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:39:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 5739 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 5739 found at Wed Sep 28 04:39:56 UTC 2022 selfserv_9223 with PID 5739 started at Wed Sep 28 04:39:56 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1991: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1992: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1993: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1994: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1995: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1996: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1997: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1998: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1999: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2000: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2001: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2002: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2003: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2004: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2005: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2006: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2007: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2008: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2009: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2010: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2011: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2012: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2013: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2014: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2015: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2016: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2017: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2018: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2019: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2020: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2021: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2022: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2023: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2024: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2025: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2026: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2027: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2028: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2029: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2030: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2031: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2032: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2033: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2034: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2035: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2036: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2037: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2038: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2039: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2040: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2041: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 5739 at Wed Sep 28 04:40:10 UTC 2022 kill -USR1 5739 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 5739 killed at Wed Sep 28 04:40:10 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Wed Sep 28 04:40:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:40:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 6289 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 6289 found at Wed Sep 28 04:40:10 UTC 2022 selfserv_9223 with PID 6289 started at Wed Sep 28 04:40:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2042: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2043: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2044: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2045: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2046: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2047: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2048: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2049: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2050: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2051: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2052: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2053: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2054: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2055: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2056: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2057: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2058: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2059: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2060: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2061: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2062: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2063: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2064: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2065: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2066: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2067: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2068: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2069: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2070: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2071: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2072: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2073: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2074: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2075: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2076: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2077: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2078: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2079: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2080: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2081: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2082: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2083: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2084: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2085: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2086: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2087: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2088: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2089: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2090: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2091: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2092: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2093: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2094: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2095: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2096: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2097: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2098: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2099: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2100: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2101: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2102: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2103: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2104: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2105: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2106: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2107: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2108: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2109: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2110: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2111: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2112: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2113: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2114: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2115: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2116: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2117: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 6289 at Wed Sep 28 04:40:33 UTC 2022 kill -USR1 6289 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 6289 killed at Wed Sep 28 04:40:33 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9223 starting at Wed Sep 28 04:40:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:40:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7089 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7089 found at Wed Sep 28 04:40:33 UTC 2022 selfserv_9223 with PID 7089 started at Wed Sep 28 04:40:33 UTC 2022 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2118: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2119: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7089 at Wed Sep 28 04:40:34 UTC 2022 kill -USR1 7089 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7089 killed at Wed Sep 28 04:40:34 UTC 2022 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:40:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:40:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7167 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7167 found at Wed Sep 28 04:40:34 UTC 2022 selfserv_9223 with PID 7167 started at Wed Sep 28 04:40:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2118: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7167 at Wed Sep 28 04:40:35 UTC 2022 kill -USR1 7167 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7167 killed at Wed Sep 28 04:40:35 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:40:35 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:40:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7219 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7219 found at Wed Sep 28 04:40:36 UTC 2022 selfserv_9223 with PID 7219 started at Wed Sep 28 04:40:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2119: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7219 at Wed Sep 28 04:41:00 UTC 2022 kill -USR1 7219 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7219 killed at Wed Sep 28 04:41:00 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:41:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:41:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7286 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7286 found at Wed Sep 28 04:41:00 UTC 2022 selfserv_9223 with PID 7286 started at Wed Sep 28 04:41:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2120: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7286 at Wed Sep 28 04:41:01 UTC 2022 kill -USR1 7286 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7286 killed at Wed Sep 28 04:41:01 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:41:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:41:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7350 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7350 found at Wed Sep 28 04:41:01 UTC 2022 selfserv_9223 with PID 7350 started at Wed Sep 28 04:41:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2121: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7350 at Wed Sep 28 04:41:02 UTC 2022 kill -USR1 7350 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7350 killed at Wed Sep 28 04:41:02 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:41:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:41:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7402 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7402 found at Wed Sep 28 04:41:03 UTC 2022 selfserv_9223 with PID 7402 started at Wed Sep 28 04:41:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2122: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7402 at Wed Sep 28 04:41:26 UTC 2022 kill -USR1 7402 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7402 killed at Wed Sep 28 04:41:26 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:41:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:41:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7454 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7454 found at Wed Sep 28 04:41:26 UTC 2022 selfserv_9223 with PID 7454 started at Wed Sep 28 04:41:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2123: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7454 at Wed Sep 28 04:41:27 UTC 2022 kill -USR1 7454 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7454 killed at Wed Sep 28 04:41:27 UTC 2022 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:41:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:41:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7519 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7519 found at Wed Sep 28 04:41:27 UTC 2022 selfserv_9223 with PID 7519 started at Wed Sep 28 04:41:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2124: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7519 at Wed Sep 28 04:41:28 UTC 2022 kill -USR1 7519 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7519 killed at Wed Sep 28 04:41:29 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:41:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:41:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7571 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7571 found at Wed Sep 28 04:41:29 UTC 2022 selfserv_9223 with PID 7571 started at Wed Sep 28 04:41:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2125: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7571 at Wed Sep 28 04:41:53 UTC 2022 kill -USR1 7571 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7571 killed at Wed Sep 28 04:41:53 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:41:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:41:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7662 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7662 found at Wed Sep 28 04:41:54 UTC 2022 selfserv_9223 with PID 7662 started at Wed Sep 28 04:41:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2126: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7662 at Wed Sep 28 04:41:54 UTC 2022 kill -USR1 7662 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7662 killed at Wed Sep 28 04:41:54 UTC 2022 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:41:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:41:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7726 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7726 found at Wed Sep 28 04:41:55 UTC 2022 selfserv_9223 with PID 7726 started at Wed Sep 28 04:41:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2127: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7726 at Wed Sep 28 04:41:56 UTC 2022 kill -USR1 7726 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7726 killed at Wed Sep 28 04:41:56 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:41:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:41:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7778 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7778 found at Wed Sep 28 04:41:56 UTC 2022 selfserv_9223 with PID 7778 started at Wed Sep 28 04:41:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2128: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7778 at Wed Sep 28 04:42:20 UTC 2022 kill -USR1 7778 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7778 killed at Wed Sep 28 04:42:21 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:42:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:42:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7830 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7830 found at Wed Sep 28 04:42:21 UTC 2022 selfserv_9223 with PID 7830 started at Wed Sep 28 04:42:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2129: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 7830 at Wed Sep 28 04:42:21 UTC 2022 kill -USR1 7830 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7830 killed at Wed Sep 28 04:42:22 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:42:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:42:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7894 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7894 found at Wed Sep 28 04:42:22 UTC 2022 selfserv_9223 with PID 7894 started at Wed Sep 28 04:42:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2130: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7894 at Wed Sep 28 04:42:23 UTC 2022 kill -USR1 7894 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7894 killed at Wed Sep 28 04:42:23 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:42:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:42:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 7946 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 7946 found at Wed Sep 28 04:42:23 UTC 2022 selfserv_9223 with PID 7946 started at Wed Sep 28 04:42:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2131: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 7946 at Wed Sep 28 04:42:47 UTC 2022 kill -USR1 7946 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 7946 killed at Wed Sep 28 04:42:47 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:42:47 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:42:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8015 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8015 found at Wed Sep 28 04:42:47 UTC 2022 selfserv_9223 with PID 8015 started at Wed Sep 28 04:42:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2132: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8015 at Wed Sep 28 04:42:48 UTC 2022 kill -USR1 8015 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8015 killed at Wed Sep 28 04:42:48 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:42:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:42:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8071 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8071 found at Wed Sep 28 04:42:48 UTC 2022 selfserv_9223 with PID 8071 started at Wed Sep 28 04:42:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2133: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8071 at Wed Sep 28 04:42:49 UTC 2022 kill -USR1 8071 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8071 killed at Wed Sep 28 04:42:49 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:42:49 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:42:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8128 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8128 found at Wed Sep 28 04:42:49 UTC 2022 selfserv_9223 with PID 8128 started at Wed Sep 28 04:42:49 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #2134: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8128 at Wed Sep 28 04:42:50 UTC 2022 kill -USR1 8128 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8128 killed at Wed Sep 28 04:42:50 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:42:50 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:42:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8184 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8184 found at Wed Sep 28 04:42:50 UTC 2022 selfserv_9223 with PID 8184 started at Wed Sep 28 04:42:50 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2135: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8184 at Wed Sep 28 04:42:51 UTC 2022 kill -USR1 8184 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8184 killed at Wed Sep 28 04:42:51 UTC 2022 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:42:51 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:42:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8244 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8244 found at Wed Sep 28 04:42:51 UTC 2022 selfserv_9223 with PID 8244 started at Wed Sep 28 04:42:51 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2136: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8244 at Wed Sep 28 04:43:16 UTC 2022 kill -USR1 8244 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8244 killed at Wed Sep 28 04:43:16 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:43:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:43:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8296 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8296 found at Wed Sep 28 04:43:16 UTC 2022 selfserv_9223 with PID 8296 started at Wed Sep 28 04:43:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2137: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8296 at Wed Sep 28 04:43:17 UTC 2022 kill -USR1 8296 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8296 killed at Wed Sep 28 04:43:17 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:43:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:43:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8356 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8356 found at Wed Sep 28 04:43:17 UTC 2022 selfserv_9223 with PID 8356 started at Wed Sep 28 04:43:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2138: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8356 at Wed Sep 28 04:43:41 UTC 2022 kill -USR1 8356 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8356 killed at Wed Sep 28 04:43:41 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:43:41 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:43:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8427 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8427 found at Wed Sep 28 04:43:41 UTC 2022 selfserv_9223 with PID 8427 started at Wed Sep 28 04:43:41 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2139: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8427 at Wed Sep 28 04:43:42 UTC 2022 kill -USR1 8427 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8427 killed at Wed Sep 28 04:43:42 UTC 2022 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:43:42 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:43:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8487 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8487 found at Wed Sep 28 04:43:42 UTC 2022 selfserv_9223 with PID 8487 started at Wed Sep 28 04:43:42 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2140: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8487 at Wed Sep 28 04:44:06 UTC 2022 kill -USR1 8487 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8487 killed at Wed Sep 28 04:44:07 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:44:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:44:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8543 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8543 found at Wed Sep 28 04:44:07 UTC 2022 selfserv_9223 with PID 8543 started at Wed Sep 28 04:44:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2141: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8543 at Wed Sep 28 04:44:08 UTC 2022 kill -USR1 8543 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8543 killed at Wed Sep 28 04:44:08 UTC 2022 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:44:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:44:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8603 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8603 found at Wed Sep 28 04:44:08 UTC 2022 selfserv_9223 with PID 8603 started at Wed Sep 28 04:44:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2142: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8603 at Wed Sep 28 04:44:32 UTC 2022 kill -USR1 8603 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8603 killed at Wed Sep 28 04:44:32 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:44:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:44:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8663 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8663 found at Wed Sep 28 04:44:33 UTC 2022 selfserv_9223 with PID 8663 started at Wed Sep 28 04:44:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2143: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8663 at Wed Sep 28 04:44:33 UTC 2022 kill -USR1 8663 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8663 killed at Wed Sep 28 04:44:34 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:44:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:44:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8723 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8723 found at Wed Sep 28 04:44:34 UTC 2022 selfserv_9223 with PID 8723 started at Wed Sep 28 04:44:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2144: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 8723 at Wed Sep 28 04:44:57 UTC 2022 kill -USR1 8723 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8723 killed at Wed Sep 28 04:44:57 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:44:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:44:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8791 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8791 found at Wed Sep 28 04:44:58 UTC 2022 selfserv_9223 with PID 8791 started at Wed Sep 28 04:44:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2145: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8791 at Wed Sep 28 04:44:58 UTC 2022 kill -USR1 8791 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8791 killed at Wed Sep 28 04:44:59 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:44:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:44:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8843 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8843 found at Wed Sep 28 04:44:59 UTC 2022 selfserv_9223 with PID 8843 started at Wed Sep 28 04:44:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2146: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8843 at Wed Sep 28 04:45:00 UTC 2022 kill -USR1 8843 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8843 killed at Wed Sep 28 04:45:00 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:45:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:45:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8895 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8895 found at Wed Sep 28 04:45:00 UTC 2022 selfserv_9223 with PID 8895 started at Wed Sep 28 04:45:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2147: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8895 at Wed Sep 28 04:45:01 UTC 2022 kill -USR1 8895 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8895 killed at Wed Sep 28 04:45:01 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 04:45:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:45:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 8953 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 8953 found at Wed Sep 28 04:45:01 UTC 2022 selfserv_9223 with PID 8953 started at Wed Sep 28 04:45:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2148: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 8953 at Wed Sep 28 04:45:02 UTC 2022 kill -USR1 8953 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 8953 killed at Wed Sep 28 04:45:02 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Wed Sep 28 04:45:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:45:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9011 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9011 found at Wed Sep 28 04:45:02 UTC 2022 selfserv_9223 with PID 9011 started at Wed Sep 28 04:45:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2149: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9011 at Wed Sep 28 04:45:03 UTC 2022 kill -USR1 9011 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9011 killed at Wed Sep 28 04:45:03 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Wed Sep 28 04:45:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:45:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9069 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9069 found at Wed Sep 28 04:45:03 UTC 2022 selfserv_9223 with PID 9069 started at Wed Sep 28 04:45:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #2150: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9069 at Wed Sep 28 04:45:03 UTC 2022 kill -USR1 9069 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9069 killed at Wed Sep 28 04:45:04 UTC 2022 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 04:45:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:45:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9127 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9127 found at Wed Sep 28 04:45:04 UTC 2022 selfserv_9223 with PID 9127 started at Wed Sep 28 04:45:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2151: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9127 at Wed Sep 28 04:45:04 UTC 2022 kill -USR1 9127 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9127 killed at Wed Sep 28 04:45:04 UTC 2022 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9223 starting at Wed Sep 28 04:45:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:45:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9185 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9185 found at Wed Sep 28 04:45:05 UTC 2022 selfserv_9223 with PID 9185 started at Wed Sep 28 04:45:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #2152: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9185 at Wed Sep 28 04:45:05 UTC 2022 kill -USR1 9185 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9185 killed at Wed Sep 28 04:45:05 UTC 2022 ssl.sh: TLS Server hello response without SNI ---- selfserv_9223 starting at Wed Sep 28 04:45:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:45:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9243 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9243 found at Wed Sep 28 04:45:06 UTC 2022 selfserv_9223 with PID 9243 started at Wed Sep 28 04:45:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2153: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9243 at Wed Sep 28 04:45:06 UTC 2022 kill -USR1 9243 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9243 killed at Wed Sep 28 04:45:06 UTC 2022 ssl.sh: TLS Server hello response with SNI ---- selfserv_9223 starting at Wed Sep 28 04:45:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:45:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9301 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9301 found at Wed Sep 28 04:45:06 UTC 2022 selfserv_9223 with PID 9301 started at Wed Sep 28 04:45:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2154: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9301 at Wed Sep 28 04:45:07 UTC 2022 kill -USR1 9301 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9301 killed at Wed Sep 28 04:45:07 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9223 starting at Wed Sep 28 04:45:07 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:45:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9359 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9359 found at Wed Sep 28 04:45:07 UTC 2022 selfserv_9223 with PID 9359 started at Wed Sep 28 04:45:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2155: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9359 at Wed Sep 28 04:45:08 UTC 2022 kill -USR1 9359 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9359 killed at Wed Sep 28 04:45:08 UTC 2022 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9223 starting at Wed Sep 28 04:45:08 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:45:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9417 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9417 found at Wed Sep 28 04:45:08 UTC 2022 selfserv_9223 with PID 9417 started at Wed Sep 28 04:45:08 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #2156: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9417 at Wed Sep 28 04:45:08 UTC 2022 kill -USR1 9417 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9417 killed at Wed Sep 28 04:45:09 UTC 2022 ssl.sh: TLS Server response with alert ---- selfserv_9223 starting at Wed Sep 28 04:45:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:45:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9475 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9475 found at Wed Sep 28 04:45:09 UTC 2022 selfserv_9223 with PID 9475 started at Wed Sep 28 04:45:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #2157: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 9475 at Wed Sep 28 04:45:09 UTC 2022 kill -USR1 9475 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9475 killed at Wed Sep 28 04:45:09 UTC 2022 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9223 starting at Wed Sep 28 04:45:09 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:45:09 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9517 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9517 found at Wed Sep 28 04:45:10 UTC 2022 selfserv_9223 with PID 9517 started at Wed Sep 28 04:45:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2118: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9517 at Wed Sep 28 04:45:10 UTC 2022 kill -USR1 9517 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9517 killed at Wed Sep 28 04:45:10 UTC 2022 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9223 starting at Wed Sep 28 04:45:10 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:45:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9559 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9559 found at Wed Sep 28 04:45:10 UTC 2022 selfserv_9223 with PID 9559 started at Wed Sep 28 04:45:10 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2119: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9223 with PID 9559 at Wed Sep 28 04:45:11 UTC 2022 kill -USR1 9559 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9559 killed at Wed Sep 28 04:45:11 UTC 2022 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9223 starting at Wed Sep 28 04:45:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:45:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9601 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9601 found at Wed Sep 28 04:45:11 UTC 2022 selfserv_9223 with PID 9601 started at Wed Sep 28 04:45:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2120: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 9601 at Wed Sep 28 04:45:11 UTC 2022 kill -USR1 9601 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9601 killed at Wed Sep 28 04:45:12 UTC 2022 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9223 starting at Wed Sep 28 04:45:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:45:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9643 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9643 found at Wed Sep 28 04:45:12 UTC 2022 selfserv_9223 with PID 9643 started at Wed Sep 28 04:45:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2121: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 9643 at Wed Sep 28 04:45:12 UTC 2022 kill -USR1 9643 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9643 killed at Wed Sep 28 04:45:12 UTC 2022 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9223 starting at Wed Sep 28 04:45:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:45:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9685 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9685 found at Wed Sep 28 04:45:13 UTC 2022 selfserv_9223 with PID 9685 started at Wed Sep 28 04:45:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2122: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 9685 at Wed Sep 28 04:45:13 UTC 2022 kill -USR1 9685 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9685 killed at Wed Sep 28 04:45:13 UTC 2022 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9223 starting at Wed Sep 28 04:45:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:45:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9727 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9727 found at Wed Sep 28 04:45:13 UTC 2022 selfserv_9223 with PID 9727 started at Wed Sep 28 04:45:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2123: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 9727 at Wed Sep 28 04:45:14 UTC 2022 kill -USR1 9727 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9727 killed at Wed Sep 28 04:45:14 UTC 2022 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9223 starting at Wed Sep 28 04:45:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:45:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9769 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9769 found at Wed Sep 28 04:45:14 UTC 2022 selfserv_9223 with PID 9769 started at Wed Sep 28 04:45:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #2124: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9223 with PID 9769 at Wed Sep 28 04:45:15 UTC 2022 kill -USR1 9769 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9769 killed at Wed Sep 28 04:45:15 UTC 2022 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9223 starting at Wed Sep 28 04:45:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:45:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9811 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9811 found at Wed Sep 28 04:45:15 UTC 2022 selfserv_9223 with PID 9811 started at Wed Sep 28 04:45:15 UTC 2022 strsclnt -q -p 9223 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Sep 28 04:45:15 UTC 2022 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Sep 28 04:46:51 UTC 2022 ssl.sh: #2125: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9223 with PID 9811 at Wed Sep 28 04:46:51 UTC 2022 kill -USR1 9811 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9811 killed at Wed Sep 28 04:46:52 UTC 2022 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Wed Sep 28 04:46:52 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:46:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9898 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9898 found at Wed Sep 28 04:46:52 UTC 2022 selfserv_9223 with PID 9898 started at Wed Sep 28 04:46:52 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2126: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9898 at Wed Sep 28 04:46:52 UTC 2022 kill -USR1 9898 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9898 killed at Wed Sep 28 04:46:53 UTC 2022 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:46:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:46:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9940 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9940 found at Wed Sep 28 04:46:53 UTC 2022 selfserv_9223 with PID 9940 started at Wed Sep 28 04:46:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2127: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 9940 at Wed Sep 28 04:46:53 UTC 2022 kill -USR1 9940 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9940 killed at Wed Sep 28 04:46:53 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:46:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:46:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 9979 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 9979 found at Wed Sep 28 04:46:54 UTC 2022 selfserv_9223 with PID 9979 started at Wed Sep 28 04:46:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2128: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 9979 at Wed Sep 28 04:46:54 UTC 2022 kill -USR1 9979 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 9979 killed at Wed Sep 28 04:46:54 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:46:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:46:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10018 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10018 found at Wed Sep 28 04:46:54 UTC 2022 selfserv_9223 with PID 10018 started at Wed Sep 28 04:46:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2129: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10018 at Wed Sep 28 04:46:55 UTC 2022 kill -USR1 10018 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10018 killed at Wed Sep 28 04:46:55 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:46:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:46:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10057 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10057 found at Wed Sep 28 04:46:55 UTC 2022 selfserv_9223 with PID 10057 started at Wed Sep 28 04:46:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2130: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 10057 at Wed Sep 28 04:46:55 UTC 2022 kill -USR1 10057 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10057 killed at Wed Sep 28 04:46:55 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:46:55 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:46:55 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10096 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10096 found at Wed Sep 28 04:46:56 UTC 2022 selfserv_9223 with PID 10096 started at Wed Sep 28 04:46:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2131: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10096 at Wed Sep 28 04:46:56 UTC 2022 kill -USR1 10096 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10096 killed at Wed Sep 28 04:46:56 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:46:56 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:46:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10135 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10135 found at Wed Sep 28 04:46:56 UTC 2022 selfserv_9223 with PID 10135 started at Wed Sep 28 04:46:56 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2132: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10135 at Wed Sep 28 04:46:57 UTC 2022 kill -USR1 10135 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10135 killed at Wed Sep 28 04:46:57 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:46:57 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:46:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10174 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10174 found at Wed Sep 28 04:46:57 UTC 2022 selfserv_9223 with PID 10174 started at Wed Sep 28 04:46:57 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2133: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10174 at Wed Sep 28 04:46:58 UTC 2022 kill -USR1 10174 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10174 killed at Wed Sep 28 04:46:58 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:46:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:46:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10213 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10213 found at Wed Sep 28 04:46:58 UTC 2022 selfserv_9223 with PID 10213 started at Wed Sep 28 04:46:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2134: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10213 at Wed Sep 28 04:46:58 UTC 2022 kill -USR1 10213 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10213 killed at Wed Sep 28 04:46:58 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:46:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:46:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10252 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10252 found at Wed Sep 28 04:46:59 UTC 2022 selfserv_9223 with PID 10252 started at Wed Sep 28 04:46:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2135: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10252 at Wed Sep 28 04:46:59 UTC 2022 kill -USR1 10252 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10252 killed at Wed Sep 28 04:46:59 UTC 2022 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:46:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:46:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10291 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10291 found at Wed Sep 28 04:47:00 UTC 2022 selfserv_9223 with PID 10291 started at Wed Sep 28 04:47:00 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2136: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10291 at Wed Sep 28 04:47:00 UTC 2022 kill -USR1 10291 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10291 killed at Wed Sep 28 04:47:00 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:47:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:47:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10331 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10331 found at Wed Sep 28 04:47:00 UTC 2022 selfserv_9223 with PID 10331 started at Wed Sep 28 04:47:00 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2137: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10331 at Wed Sep 28 04:47:00 UTC 2022 kill -USR1 10331 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10331 killed at Wed Sep 28 04:47:01 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:47:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:47:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10371 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10371 found at Wed Sep 28 04:47:01 UTC 2022 selfserv_9223 with PID 10371 started at Wed Sep 28 04:47:01 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2138: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10371 at Wed Sep 28 04:47:01 UTC 2022 kill -USR1 10371 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10371 killed at Wed Sep 28 04:47:01 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:47:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:47:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10411 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10411 found at Wed Sep 28 04:47:02 UTC 2022 selfserv_9223 with PID 10411 started at Wed Sep 28 04:47:02 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2139: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 10411 at Wed Sep 28 04:47:02 UTC 2022 kill -USR1 10411 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10411 killed at Wed Sep 28 04:47:02 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:47:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:47:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10452 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10452 found at Wed Sep 28 04:47:02 UTC 2022 selfserv_9223 with PID 10452 started at Wed Sep 28 04:47:02 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2140: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10452 at Wed Sep 28 04:47:03 UTC 2022 kill -USR1 10452 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10452 killed at Wed Sep 28 04:47:03 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:47:03 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:47:03 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10492 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10492 found at Wed Sep 28 04:47:03 UTC 2022 selfserv_9223 with PID 10492 started at Wed Sep 28 04:47:03 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2141: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10492 at Wed Sep 28 04:47:03 UTC 2022 kill -USR1 10492 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10492 killed at Wed Sep 28 04:47:04 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:47:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:47:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10532 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10532 found at Wed Sep 28 04:47:04 UTC 2022 selfserv_9223 with PID 10532 started at Wed Sep 28 04:47:04 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2142: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10532 at Wed Sep 28 04:47:04 UTC 2022 kill -USR1 10532 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10532 killed at Wed Sep 28 04:47:04 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:47:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:47:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10572 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10572 found at Wed Sep 28 04:47:05 UTC 2022 selfserv_9223 with PID 10572 started at Wed Sep 28 04:47:05 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2143: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10572 at Wed Sep 28 04:47:05 UTC 2022 kill -USR1 10572 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10572 killed at Wed Sep 28 04:47:05 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:47:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:47:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 10612 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10612 found at Wed Sep 28 04:47:05 UTC 2022 selfserv_9223 with PID 10612 started at Wed Sep 28 04:47:05 UTC 2022 strsclnt -q -p 9223 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2144: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 10612 at Wed Sep 28 04:47:06 UTC 2022 kill -USR1 10612 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10612 killed at Wed Sep 28 04:47:06 UTC 2022 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9223 starting at Wed Sep 28 04:47:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:47:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 10652 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 10652 found at Wed Sep 28 04:47:06 UTC 2022 selfserv_9223 with PID 10652 started at Wed Sep 28 04:47:06 UTC 2022 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2145: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2146: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2147: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2148: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2149: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2150: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2151: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2152: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2153: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2154: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2155: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2156: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2157: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2158: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2159: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2160: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2161: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2162: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2163: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2164: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2165: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2166: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2167: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2168: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2169: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2170: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2171: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2172: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2173: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2174: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2175: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2176: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2177: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2178: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2179: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2180: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2181: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2182: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2183: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2184: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2185: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2186: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2187: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2188: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2189: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2190: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2191: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2192: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2193: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2194: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2195: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9223 with PID 10652 at Wed Sep 28 04:47:21 UTC 2022 kill -USR1 10652 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 10652 killed at Wed Sep 28 04:47:21 UTC 2022 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9223 starting at Wed Sep 28 04:47:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.3122\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:47:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9223 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 11205 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 11205 found at Wed Sep 28 04:47:21 UTC 2022 selfserv_9223 with PID 11205 started at Wed Sep 28 04:47:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2196: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2197: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2198: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2199: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2200: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2201: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2202: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2203: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2204: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2205: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2206: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2207: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2208: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2209: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2210: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2211: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2212: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2213: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2214: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2215: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2216: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2217: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2218: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2219: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2220: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2221: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2222: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2223: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2224: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2225: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2226: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2227: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2228: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2229: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2230: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2231: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2232: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2233: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2234: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2235: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2236: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2237: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2238: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2239: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2240: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2241: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2242: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2243: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2244: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2245: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2246: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2247: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2248: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2249: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2250: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2251: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2252: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2253: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2254: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2255: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2256: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2257: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2258: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2259: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2260: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2261: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2262: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2263: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2264: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2265: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2266: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2267: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2268: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2269: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2270: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9223 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9223 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2271: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 11205 at Wed Sep 28 04:47:44 UTC 2022 kill -USR1 11205 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 11205 killed at Wed Sep 28 04:47:44 UTC 2022 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:47:44 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:47:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12045 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12045 found at Wed Sep 28 04:47:44 UTC 2022 selfserv_9223 with PID 12045 started at Wed Sep 28 04:47:44 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2272: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12045 at Wed Sep 28 04:47:45 UTC 2022 kill -USR1 12045 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12045 killed at Wed Sep 28 04:47:45 UTC 2022 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:47:45 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:47:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12097 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12097 found at Wed Sep 28 04:47:45 UTC 2022 selfserv_9223 with PID 12097 started at Wed Sep 28 04:47:45 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2273: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12097 at Wed Sep 28 04:48:10 UTC 2022 kill -USR1 12097 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12097 killed at Wed Sep 28 04:48:11 UTC 2022 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:48:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:48:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12149 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12149 found at Wed Sep 28 04:48:11 UTC 2022 selfserv_9223 with PID 12149 started at Wed Sep 28 04:48:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2274: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12149 at Wed Sep 28 04:48:11 UTC 2022 kill -USR1 12149 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12149 killed at Wed Sep 28 04:48:12 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:48:12 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:48:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12213 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12213 found at Wed Sep 28 04:48:12 UTC 2022 selfserv_9223 with PID 12213 started at Wed Sep 28 04:48:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2275: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12213 at Wed Sep 28 04:48:12 UTC 2022 kill -USR1 12213 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12213 killed at Wed Sep 28 04:48:13 UTC 2022 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:48:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:48:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12265 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12265 found at Wed Sep 28 04:48:13 UTC 2022 selfserv_9223 with PID 12265 started at Wed Sep 28 04:48:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2276: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12265 at Wed Sep 28 04:48:36 UTC 2022 kill -USR1 12265 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12265 killed at Wed Sep 28 04:48:36 UTC 2022 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:48:36 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:48:36 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12317 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12317 found at Wed Sep 28 04:48:37 UTC 2022 selfserv_9223 with PID 12317 started at Wed Sep 28 04:48:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2277: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12317 at Wed Sep 28 04:48:37 UTC 2022 kill -USR1 12317 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12317 killed at Wed Sep 28 04:48:37 UTC 2022 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:48:37 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:48:37 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12396 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12396 found at Wed Sep 28 04:48:38 UTC 2022 selfserv_9223 with PID 12396 started at Wed Sep 28 04:48:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2278: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12396 at Wed Sep 28 04:48:38 UTC 2022 kill -USR1 12396 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12396 killed at Wed Sep 28 04:48:38 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:48:38 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:48:38 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12448 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12448 found at Wed Sep 28 04:48:39 UTC 2022 selfserv_9223 with PID 12448 started at Wed Sep 28 04:48:39 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2279: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12448 at Wed Sep 28 04:49:04 UTC 2022 kill -USR1 12448 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12448 killed at Wed Sep 28 04:49:04 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:49:04 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:49:04 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12500 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12500 found at Wed Sep 28 04:49:05 UTC 2022 selfserv_9223 with PID 12500 started at Wed Sep 28 04:49:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2280: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12500 at Wed Sep 28 04:49:05 UTC 2022 kill -USR1 12500 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12500 killed at Wed Sep 28 04:49:05 UTC 2022 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:49:05 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:49:05 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12564 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12564 found at Wed Sep 28 04:49:06 UTC 2022 selfserv_9223 with PID 12564 started at Wed Sep 28 04:49:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2281: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12564 at Wed Sep 28 04:49:06 UTC 2022 kill -USR1 12564 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12564 killed at Wed Sep 28 04:49:06 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:49:06 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:49:06 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12616 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12616 found at Wed Sep 28 04:49:07 UTC 2022 selfserv_9223 with PID 12616 started at Wed Sep 28 04:49:07 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2282: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12616 at Wed Sep 28 04:49:32 UTC 2022 kill -USR1 12616 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12616 killed at Wed Sep 28 04:49:32 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:49:32 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:49:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12672 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12672 found at Wed Sep 28 04:49:32 UTC 2022 selfserv_9223 with PID 12672 started at Wed Sep 28 04:49:32 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2283: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12672 at Wed Sep 28 04:49:33 UTC 2022 kill -USR1 12672 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12672 killed at Wed Sep 28 04:49:33 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:49:33 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:49:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12736 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12736 found at Wed Sep 28 04:49:33 UTC 2022 selfserv_9223 with PID 12736 started at Wed Sep 28 04:49:33 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2284: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12736 at Wed Sep 28 04:49:34 UTC 2022 kill -USR1 12736 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12736 killed at Wed Sep 28 04:49:34 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:49:34 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:49:34 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12788 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12788 found at Wed Sep 28 04:49:35 UTC 2022 selfserv_9223 with PID 12788 started at Wed Sep 28 04:49:35 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2285: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12788 at Wed Sep 28 04:49:58 UTC 2022 kill -USR1 12788 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12788 killed at Wed Sep 28 04:49:58 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:49:58 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:49:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12855 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12855 found at Wed Sep 28 04:49:58 UTC 2022 selfserv_9223 with PID 12855 started at Wed Sep 28 04:49:58 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2286: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12855 at Wed Sep 28 04:49:59 UTC 2022 kill -USR1 12855 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12855 killed at Wed Sep 28 04:49:59 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:49:59 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:49:59 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12911 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12911 found at Wed Sep 28 04:50:00 UTC 2022 selfserv_9223 with PID 12911 started at Wed Sep 28 04:50:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2287: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 12911 at Wed Sep 28 04:50:00 UTC 2022 kill -USR1 12911 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12911 killed at Wed Sep 28 04:50:00 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9223 starting at Wed Sep 28 04:50:00 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:50:00 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 12967 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 12967 found at Wed Sep 28 04:50:01 UTC 2022 selfserv_9223 with PID 12967 started at Wed Sep 28 04:50:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #2288: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 12967 at Wed Sep 28 04:50:01 UTC 2022 kill -USR1 12967 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 12967 killed at Wed Sep 28 04:50:01 UTC 2022 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:50:01 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:50:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13023 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13023 found at Wed Sep 28 04:50:01 UTC 2022 selfserv_9223 with PID 13023 started at Wed Sep 28 04:50:01 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2289: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13023 at Wed Sep 28 04:50:02 UTC 2022 kill -USR1 13023 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13023 killed at Wed Sep 28 04:50:02 UTC 2022 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:50:02 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:50:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13083 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13083 found at Wed Sep 28 04:50:02 UTC 2022 selfserv_9223 with PID 13083 started at Wed Sep 28 04:50:02 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2290: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 13083 at Wed Sep 28 04:50:28 UTC 2022 kill -USR1 13083 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13083 killed at Wed Sep 28 04:50:28 UTC 2022 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:50:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:50:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13137 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13137 found at Wed Sep 28 04:50:28 UTC 2022 selfserv_9223 with PID 13137 started at Wed Sep 28 04:50:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2291: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13137 at Wed Sep 28 04:50:29 UTC 2022 kill -USR1 13137 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13137 killed at Wed Sep 28 04:50:29 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:50:29 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:50:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13197 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13197 found at Wed Sep 28 04:50:29 UTC 2022 selfserv_9223 with PID 13197 started at Wed Sep 28 04:50:29 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2292: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 13197 at Wed Sep 28 04:50:53 UTC 2022 kill -USR1 13197 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13197 killed at Wed Sep 28 04:50:53 UTC 2022 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:50:53 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:50:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13264 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13264 found at Wed Sep 28 04:50:53 UTC 2022 selfserv_9223 with PID 13264 started at Wed Sep 28 04:50:53 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2293: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13264 at Wed Sep 28 04:50:54 UTC 2022 kill -USR1 13264 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13264 killed at Wed Sep 28 04:50:54 UTC 2022 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:50:54 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:50:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13324 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13324 found at Wed Sep 28 04:50:54 UTC 2022 selfserv_9223 with PID 13324 started at Wed Sep 28 04:50:54 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2294: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 13324 at Wed Sep 28 04:51:19 UTC 2022 kill -USR1 13324 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13324 killed at Wed Sep 28 04:51:20 UTC 2022 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:51:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:51:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13376 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13376 found at Wed Sep 28 04:51:20 UTC 2022 selfserv_9223 with PID 13376 started at Wed Sep 28 04:51:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2295: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13376 at Wed Sep 28 04:51:20 UTC 2022 kill -USR1 13376 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13376 killed at Wed Sep 28 04:51:21 UTC 2022 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:51:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:51:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13436 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13436 found at Wed Sep 28 04:51:21 UTC 2022 selfserv_9223 with PID 13436 started at Wed Sep 28 04:51:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2296: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 13436 at Wed Sep 28 04:51:46 UTC 2022 kill -USR1 13436 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13436 killed at Wed Sep 28 04:51:46 UTC 2022 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:51:46 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:51:46 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13503 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13503 found at Wed Sep 28 04:51:47 UTC 2022 selfserv_9223 with PID 13503 started at Wed Sep 28 04:51:47 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2297: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13503 at Wed Sep 28 04:51:47 UTC 2022 kill -USR1 13503 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13503 killed at Wed Sep 28 04:51:48 UTC 2022 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9223 starting at Wed Sep 28 04:51:48 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:51:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13568 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13568 found at Wed Sep 28 04:51:48 UTC 2022 selfserv_9223 with PID 13568 started at Wed Sep 28 04:51:48 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2298: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 13568 at Wed Sep 28 04:52:11 UTC 2022 kill -USR1 13568 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13568 killed at Wed Sep 28 04:52:11 UTC 2022 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:52:11 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:52:11 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13620 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13620 found at Wed Sep 28 04:52:12 UTC 2022 selfserv_9223 with PID 13620 started at Wed Sep 28 04:52:12 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2299: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13620 at Wed Sep 28 04:52:12 UTC 2022 kill -USR1 13620 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13620 killed at Wed Sep 28 04:52:13 UTC 2022 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:52:13 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:52:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13673 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13673 found at Wed Sep 28 04:52:13 UTC 2022 selfserv_9223 with PID 13673 started at Wed Sep 28 04:52:13 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2300: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13673 at Wed Sep 28 04:52:13 UTC 2022 kill -USR1 13673 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13673 killed at Wed Sep 28 04:52:14 UTC 2022 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9223 starting at Wed Sep 28 04:52:14 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.3122\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:52:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13725 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13725 found at Wed Sep 28 04:52:14 UTC 2022 selfserv_9223 with PID 13725 started at Wed Sep 28 04:52:14 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2301: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13725 at Wed Sep 28 04:52:14 UTC 2022 kill -USR1 13725 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13725 killed at Wed Sep 28 04:52:15 UTC 2022 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9223 starting at Wed Sep 28 04:52:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:52:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13808 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13808 found at Wed Sep 28 04:52:15 UTC 2022 selfserv_9223 with PID 13808 started at Wed Sep 28 04:52:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2272: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13808 at Wed Sep 28 04:52:15 UTC 2022 kill -USR1 13808 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13808 killed at Wed Sep 28 04:52:15 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:52:15 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:52:15 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13850 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13850 found at Wed Sep 28 04:52:16 UTC 2022 selfserv_9223 with PID 13850 started at Wed Sep 28 04:52:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2273: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13850 at Wed Sep 28 04:52:16 UTC 2022 kill -USR1 13850 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13850 killed at Wed Sep 28 04:52:16 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:52:16 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:52:16 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13889 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13889 found at Wed Sep 28 04:52:16 UTC 2022 selfserv_9223 with PID 13889 started at Wed Sep 28 04:52:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2274: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 13889 at Wed Sep 28 04:52:17 UTC 2022 kill -USR1 13889 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13889 killed at Wed Sep 28 04:52:17 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:52:17 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:52:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13931 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13931 found at Wed Sep 28 04:52:17 UTC 2022 selfserv_9223 with PID 13931 started at Wed Sep 28 04:52:17 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2275: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 13931 at Wed Sep 28 04:52:17 UTC 2022 kill -USR1 13931 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13931 killed at Wed Sep 28 04:52:18 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:52:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:52:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 13970 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 13970 found at Wed Sep 28 04:52:18 UTC 2022 selfserv_9223 with PID 13970 started at Wed Sep 28 04:52:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2276: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9223 with PID 13970 at Wed Sep 28 04:52:18 UTC 2022 kill -USR1 13970 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 13970 killed at Wed Sep 28 04:52:18 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:52:18 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:52:18 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14010 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14010 found at Wed Sep 28 04:52:19 UTC 2022 selfserv_9223 with PID 14010 started at Wed Sep 28 04:52:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2277: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14010 at Wed Sep 28 04:52:19 UTC 2022 kill -USR1 14010 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14010 killed at Wed Sep 28 04:52:19 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:52:19 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:52:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14049 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14049 found at Wed Sep 28 04:52:19 UTC 2022 selfserv_9223 with PID 14049 started at Wed Sep 28 04:52:19 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2278: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14049 at Wed Sep 28 04:52:20 UTC 2022 kill -USR1 14049 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14049 killed at Wed Sep 28 04:52:20 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:52:20 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:52:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14088 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14088 found at Wed Sep 28 04:52:20 UTC 2022 selfserv_9223 with PID 14088 started at Wed Sep 28 04:52:20 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2279: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14088 at Wed Sep 28 04:52:20 UTC 2022 kill -USR1 14088 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14088 killed at Wed Sep 28 04:52:21 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:52:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:52:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14127 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14127 found at Wed Sep 28 04:52:21 UTC 2022 selfserv_9223 with PID 14127 started at Wed Sep 28 04:52:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2280: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14127 at Wed Sep 28 04:52:21 UTC 2022 kill -USR1 14127 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14127 killed at Wed Sep 28 04:52:21 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:52:21 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:52:21 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14166 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14166 found at Wed Sep 28 04:52:22 UTC 2022 selfserv_9223 with PID 14166 started at Wed Sep 28 04:52:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2281: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14166 at Wed Sep 28 04:52:22 UTC 2022 kill -USR1 14166 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14166 killed at Wed Sep 28 04:52:22 UTC 2022 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:52:22 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:52:22 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14205 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14205 found at Wed Sep 28 04:52:22 UTC 2022 selfserv_9223 with PID 14205 started at Wed Sep 28 04:52:22 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2282: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14205 at Wed Sep 28 04:52:23 UTC 2022 kill -USR1 14205 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14205 killed at Wed Sep 28 04:52:23 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:52:23 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:52:23 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14245 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14245 found at Wed Sep 28 04:52:23 UTC 2022 selfserv_9223 with PID 14245 started at Wed Sep 28 04:52:23 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2283: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 14245 at Wed Sep 28 04:52:23 UTC 2022 kill -USR1 14245 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14245 killed at Wed Sep 28 04:52:24 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:52:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:52:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14285 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14285 found at Wed Sep 28 04:52:24 UTC 2022 selfserv_9223 with PID 14285 started at Wed Sep 28 04:52:24 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2284: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14285 at Wed Sep 28 04:52:24 UTC 2022 kill -USR1 14285 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14285 killed at Wed Sep 28 04:52:24 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:52:24 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:52:24 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14325 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14325 found at Wed Sep 28 04:52:25 UTC 2022 selfserv_9223 with PID 14325 started at Wed Sep 28 04:52:25 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2285: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9223 with PID 14325 at Wed Sep 28 04:52:25 UTC 2022 kill -USR1 14325 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14325 killed at Wed Sep 28 04:52:25 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:52:25 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:52:25 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14365 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14365 found at Wed Sep 28 04:52:25 UTC 2022 selfserv_9223 with PID 14365 started at Wed Sep 28 04:52:25 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2286: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14365 at Wed Sep 28 04:52:26 UTC 2022 kill -USR1 14365 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14365 killed at Wed Sep 28 04:52:26 UTC 2022 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:52:26 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:52:26 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14405 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14405 found at Wed Sep 28 04:52:26 UTC 2022 selfserv_9223 with PID 14405 started at Wed Sep 28 04:52:26 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2287: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14405 at Wed Sep 28 04:52:26 UTC 2022 kill -USR1 14405 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14405 killed at Wed Sep 28 04:52:27 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:52:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:52:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14445 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14445 found at Wed Sep 28 04:52:27 UTC 2022 selfserv_9223 with PID 14445 started at Wed Sep 28 04:52:27 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2288: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14445 at Wed Sep 28 04:52:27 UTC 2022 kill -USR1 14445 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14445 killed at Wed Sep 28 04:52:27 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:52:27 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:52:27 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14485 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14485 found at Wed Sep 28 04:52:28 UTC 2022 selfserv_9223 with PID 14485 started at Wed Sep 28 04:52:28 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2289: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14485 at Wed Sep 28 04:52:28 UTC 2022 kill -USR1 14485 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14485 killed at Wed Sep 28 04:52:28 UTC 2022 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9223 starting at Wed Sep 28 04:52:28 UTC 2022 selfserv_9223 -D -p 9223 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.3122\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9223 at Wed Sep 28 04:52:28 UTC 2022 tstclnt -p 9223 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat kill -0 14525 >/dev/null 2>/dev/null No server to kill selfserv_9223 with PID 14525 found at Wed Sep 28 04:52:28 UTC 2022 selfserv_9223 with PID 14525 started at Wed Sep 28 04:52:28 UTC 2022 strsclnt -q -p 9223 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.79/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2290: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9223 with PID 14525 at Wed Sep 28 04:52:29 UTC 2022 kill -USR1 14525 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9223 -b -p 9223 2>/dev/null; selfserv_9223 with PID 14525 killed at Wed Sep 28 04:52:29 UTC 2022 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -fips false -force FIPS mode disabled. ssl.sh: #2291: expect failure to list cert, because we deleted it (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/client -list ssl.sh: #2292: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #2293: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -fips false -force FIPS mode disabled. ssl.sh: #2294: expect failure to list cert, because we deleted it (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.79/tests_results/security/localhost.1/threadunsafe/ext_client -list ssl.sh: #2295: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #2296: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Wed Sep 28 04:52:30 UTC 2022 SUMMARY: ======== NSS variables: -------------- HOST=localhost DOMSUF=localdomain BUILD_OPT=1 USE_X32= USE_64=1 NSS_CYCLES="standard pkix upgradedb sharedb threadunsafe" NSS_TESTS="libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec" NSS_SSL_TESTS="crl iopr policy normal_normal fips_normal normal_fips" NSS_SSL_RUN="cov auth stapling signed_cert_timestamps scheme" NSS_AIA_PATH= NSS_AIA_HTTP= NSS_AIA_OCSP= IOPR_HOSTADDR_LIST= PKITS_DATA= NSS_DISABLE_HW_AES= NSS_DISABLE_HW_SHA1= NSS_DISABLE_HW_SHA2= NSS_DISABLE_PCLMUL= NSS_DISABLE_AVX= NSS_DISABLE_ARM_NEON= NSS_DISABLE_SSSE3= Tests summary: -------------- Passed: 22261 Failed: 0 Failed with core: 0 ASan failures: 0 Unknown status: 0 + popd ~/build/BUILD/nss-3.79 + killall selfserv_9223 selfserv_9223: no process found + : ++ grep -c -- '- FAILED$' ./tests_results/security/localhost.1/output.log + TEST_FAILURES=0 + GREP_EXIT_STATUS=1 okay: test suite detected no failures test suite completed + '[' 1 -eq 1 ']' + echo 'okay: test suite detected no failures' + echo 'test suite completed' + exit 0 Processing files: nss-3.79.0-4.el7_9.aarch64 Provides: config(nss) = 3.79.0-4.el7_9 libnss3.so()(64bit) libnss3.so(NSS_3.10)(64bit) libnss3.so(NSS_3.10.2)(64bit) libnss3.so(NSS_3.11)(64bit) libnss3.so(NSS_3.11.1)(64bit) libnss3.so(NSS_3.11.2)(64bit) libnss3.so(NSS_3.11.7)(64bit) libnss3.so(NSS_3.11.9)(64bit) libnss3.so(NSS_3.12)(64bit) libnss3.so(NSS_3.12.1)(64bit) libnss3.so(NSS_3.12.10)(64bit) libnss3.so(NSS_3.12.3)(64bit) libnss3.so(NSS_3.12.4)(64bit) libnss3.so(NSS_3.12.5)(64bit) libnss3.so(NSS_3.12.6)(64bit) libnss3.so(NSS_3.12.7)(64bit) libnss3.so(NSS_3.12.9)(64bit) libnss3.so(NSS_3.13)(64bit) libnss3.so(NSS_3.13.2)(64bit) libnss3.so(NSS_3.14)(64bit) libnss3.so(NSS_3.14.1)(64bit) libnss3.so(NSS_3.14.3)(64bit) libnss3.so(NSS_3.15)(64bit) libnss3.so(NSS_3.15.4)(64bit) libnss3.so(NSS_3.16.1)(64bit) libnss3.so(NSS_3.16.2)(64bit) libnss3.so(NSS_3.18)(64bit) libnss3.so(NSS_3.19)(64bit) libnss3.so(NSS_3.19.1)(64bit) libnss3.so(NSS_3.2)(64bit) libnss3.so(NSS_3.2.1)(64bit) libnss3.so(NSS_3.21)(64bit) libnss3.so(NSS_3.22)(64bit) libnss3.so(NSS_3.3)(64bit) libnss3.so(NSS_3.3.1)(64bit) libnss3.so(NSS_3.30)(64bit) libnss3.so(NSS_3.31)(64bit) libnss3.so(NSS_3.33)(64bit) libnss3.so(NSS_3.34)(64bit) libnss3.so(NSS_3.39)(64bit) libnss3.so(NSS_3.4)(64bit) libnss3.so(NSS_3.43)(64bit) libnss3.so(NSS_3.44)(64bit) libnss3.so(NSS_3.45)(64bit) libnss3.so(NSS_3.47)(64bit) libnss3.so(NSS_3.5)(64bit) libnss3.so(NSS_3.52)(64bit) libnss3.so(NSS_3.53)(64bit) libnss3.so(NSS_3.55)(64bit) libnss3.so(NSS_3.58)(64bit) libnss3.so(NSS_3.59)(64bit) libnss3.so(NSS_3.6)(64bit) libnss3.so(NSS_3.62)(64bit) libnss3.so(NSS_3.65)(64bit) libnss3.so(NSS_3.66)(64bit) libnss3.so(NSS_3.7)(64bit) libnss3.so(NSS_3.7.1)(64bit) libnss3.so(NSS_3.77)(64bit) libnss3.so(NSS_3.79)(64bit) libnss3.so(NSS_3.8)(64bit) libnss3.so(NSS_3.9)(64bit) libnss3.so(NSS_3.9.2)(64bit) libnss3.so(NSS_3.9.3)(64bit) libnssckbi.so()(64bit) libnssckbi.so(NSS_3.1)(64bit) libsmime3.so()(64bit) libsmime3.so(NSS_3.10)(64bit) libsmime3.so(NSS_3.12.10)(64bit) libsmime3.so(NSS_3.12.2)(64bit) libsmime3.so(NSS_3.13)(64bit) libsmime3.so(NSS_3.15)(64bit) libsmime3.so(NSS_3.16)(64bit) libsmime3.so(NSS_3.18)(64bit) libsmime3.so(NSS_3.2)(64bit) libsmime3.so(NSS_3.2.1)(64bit) libsmime3.so(NSS_3.3)(64bit) libsmime3.so(NSS_3.4)(64bit) libsmime3.so(NSS_3.4.1)(64bit) libsmime3.so(NSS_3.6)(64bit) libsmime3.so(NSS_3.7)(64bit) libsmime3.so(NSS_3.7.2)(64bit) libsmime3.so(NSS_3.8)(64bit) libsmime3.so(NSS_3.9)(64bit) libsmime3.so(NSS_3.9.3)(64bit) libssl3.so()(64bit) libssl3.so(NSS_3.11.4)(64bit) libssl3.so(NSS_3.11.8)(64bit) libssl3.so(NSS_3.12.10)(64bit) libssl3.so(NSS_3.12.6)(64bit) libssl3.so(NSS_3.13)(64bit) libssl3.so(NSS_3.13.2)(64bit) libssl3.so(NSS_3.14)(64bit) libssl3.so(NSS_3.15)(64bit) libssl3.so(NSS_3.15.4)(64bit) libssl3.so(NSS_3.2)(64bit) libssl3.so(NSS_3.2.1)(64bit) libssl3.so(NSS_3.20)(64bit) libssl3.so(NSS_3.21)(64bit) libssl3.so(NSS_3.22)(64bit) libssl3.so(NSS_3.23)(64bit) libssl3.so(NSS_3.24)(64bit) libssl3.so(NSS_3.27)(64bit) libssl3.so(NSS_3.28)(64bit) libssl3.so(NSS_3.30)(64bit) libssl3.so(NSS_3.30.0.1)(64bit) libssl3.so(NSS_3.33)(64bit) libssl3.so(NSS_3.4)(64bit) libssl3.so(NSS_3.7.4)(64bit) libssl3.so(NSS_3.77)(64bit) nss = 3.79.0-4.el7_9 nss(aarch-64) = 3.79.0-4.el7_9 Requires(interp): /bin/sh /bin/sh Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires(post): /bin/sh /usr/sbin/update-alternatives Requires(postun): /bin/sh /usr/sbin/update-alternatives Requires: ld-linux-aarch64.so.1()(64bit) ld-linux-aarch64.so.1(GLIBC_2.17)(64bit) libc.so.6()(64bit) libc.so.6(GLIBC_2.17)(64bit) libdl.so.2()(64bit) libnspr4.so()(64bit) libnss3.so()(64bit) libnss3.so(NSS_3.10)(64bit) libnss3.so(NSS_3.11)(64bit) libnss3.so(NSS_3.11.1)(64bit) libnss3.so(NSS_3.11.2)(64bit) libnss3.so(NSS_3.12)(64bit) libnss3.so(NSS_3.12.3)(64bit) libnss3.so(NSS_3.12.6)(64bit) libnss3.so(NSS_3.13)(64bit) libnss3.so(NSS_3.14)(64bit) libnss3.so(NSS_3.14.3)(64bit) libnss3.so(NSS_3.15)(64bit) libnss3.so(NSS_3.19.1)(64bit) libnss3.so(NSS_3.2)(64bit) libnss3.so(NSS_3.21)(64bit) libnss3.so(NSS_3.22)(64bit) libnss3.so(NSS_3.3)(64bit) libnss3.so(NSS_3.3.1)(64bit) libnss3.so(NSS_3.4)(64bit) libnss3.so(NSS_3.52)(64bit) libnss3.so(NSS_3.58)(64bit) libnss3.so(NSS_3.6)(64bit) libnss3.so(NSS_3.62)(64bit) libnss3.so(NSS_3.65)(64bit) libnss3.so(NSS_3.66)(64bit) libnss3.so(NSS_3.7)(64bit) libnss3.so(NSS_3.77)(64bit) libnss3.so(NSS_3.8)(64bit) libnss3.so(NSS_3.9)(64bit) libnssutil3.so()(64bit) libnssutil3.so(NSSUTIL_3.12)(64bit) libnssutil3.so(NSSUTIL_3.12.3)(64bit) libnssutil3.so(NSSUTIL_3.12.5)(64bit) libnssutil3.so(NSSUTIL_3.13)(64bit) libnssutil3.so(NSSUTIL_3.14)(64bit) libnssutil3.so(NSSUTIL_3.15)(64bit) libnssutil3.so(NSSUTIL_3.17.1)(64bit) libnssutil3.so(NSSUTIL_3.21)(64bit) libnssutil3.so(NSSUTIL_3.24)(64bit) libnssutil3.so(NSSUTIL_3.31)(64bit) libnssutil3.so(NSSUTIL_3.38)(64bit) libnssutil3.so(NSSUTIL_3.39)(64bit) libnssutil3.so(NSSUTIL_3.59)(64bit) libplc4.so()(64bit) libplds4.so()(64bit) libpthread.so.0()(64bit) libpthread.so.0(GLIBC_2.17)(64bit) rtld(GNU_HASH) Processing files: nss-tools-3.79.0-4.el7_9.aarch64 Provides: nss-tools = 3.79.0-4.el7_9 nss-tools(aarch-64) = 3.79.0-4.el7_9 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires: ld-linux-aarch64.so.1()(64bit) ld-linux-aarch64.so.1(GLIBC_2.17)(64bit) libc.so.6()(64bit) libc.so.6(GLIBC_2.17)(64bit) libdl.so.2()(64bit) libnspr4.so()(64bit) libnss3.so()(64bit) libnss3.so(NSS_3.10)(64bit) libnss3.so(NSS_3.11)(64bit) libnss3.so(NSS_3.11.7)(64bit) libnss3.so(NSS_3.12)(64bit) libnss3.so(NSS_3.12.1)(64bit) libnss3.so(NSS_3.12.3)(64bit) libnss3.so(NSS_3.12.6)(64bit) libnss3.so(NSS_3.12.9)(64bit) libnss3.so(NSS_3.13)(64bit) libnss3.so(NSS_3.14)(64bit) libnss3.so(NSS_3.14.1)(64bit) libnss3.so(NSS_3.15)(64bit) libnss3.so(NSS_3.16.1)(64bit) libnss3.so(NSS_3.16.2)(64bit) libnss3.so(NSS_3.18)(64bit) libnss3.so(NSS_3.2)(64bit) libnss3.so(NSS_3.21)(64bit) libnss3.so(NSS_3.3)(64bit) libnss3.so(NSS_3.30)(64bit) libnss3.so(NSS_3.31)(64bit) libnss3.so(NSS_3.33)(64bit) libnss3.so(NSS_3.34)(64bit) libnss3.so(NSS_3.39)(64bit) libnss3.so(NSS_3.4)(64bit) libnss3.so(NSS_3.5)(64bit) libnss3.so(NSS_3.52)(64bit) libnss3.so(NSS_3.6)(64bit) libnss3.so(NSS_3.7)(64bit) libnss3.so(NSS_3.8)(64bit) libnss3.so(NSS_3.9)(64bit) libnss3.so(NSS_3.9.2)(64bit) libnss3.so(NSS_3.9.3)(64bit) libnssutil3.so()(64bit) libnssutil3.so(NSSUTIL_3.12)(64bit) libnssutil3.so(NSSUTIL_3.12.3)(64bit) libnssutil3.so(NSSUTIL_3.12.7)(64bit) libnssutil3.so(NSSUTIL_3.15)(64bit) libnssutil3.so(NSSUTIL_3.24)(64bit) libplc4.so()(64bit) libplds4.so()(64bit) libpthread.so.0()(64bit) libpthread.so.0(GLIBC_2.17)(64bit) libsmime3.so()(64bit) libsmime3.so(NSS_3.10)(64bit) libsmime3.so(NSS_3.2)(64bit) libsmime3.so(NSS_3.3)(64bit) libsmime3.so(NSS_3.4)(64bit) libsmime3.so(NSS_3.6)(64bit) libsmime3.so(NSS_3.9.3)(64bit) libsoftokn3.so()(64bit) libssl3.so()(64bit) libssl3.so(NSS_3.12.6)(64bit) libssl3.so(NSS_3.13.2)(64bit) libssl3.so(NSS_3.14)(64bit) libssl3.so(NSS_3.15)(64bit) libssl3.so(NSS_3.15.4)(64bit) libssl3.so(NSS_3.2)(64bit) libssl3.so(NSS_3.20)(64bit) libssl3.so(NSS_3.22)(64bit) libssl3.so(NSS_3.24)(64bit) libssl3.so(NSS_3.27)(64bit) libssl3.so(NSS_3.28)(64bit) libssl3.so(NSS_3.33)(64bit) libssl3.so(NSS_3.4)(64bit) libssl3.so(NSS_3.7.4)(64bit) libz.so.1()(64bit) rtld(GNU_HASH) Processing files: nss-sysinit-3.79.0-4.el7_9.aarch64 Provides: libnsssysinit.so()(64bit) libnsssysinit.so(NSS_3.15)(64bit) nss-sysinit = 3.79.0-4.el7_9 nss-sysinit(aarch-64) = 3.79.0-4.el7_9 nss-system-init Requires(interp): /bin/sh Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires(post): coreutils sed Requires: /bin/sh ld-linux-aarch64.so.1()(64bit) ld-linux-aarch64.so.1(GLIBC_2.17)(64bit) libc.so.6()(64bit) libc.so.6(GLIBC_2.17)(64bit) libdl.so.2()(64bit) libnspr4.so()(64bit) libnssutil3.so()(64bit) libnssutil3.so(NSSUTIL_3.12)(64bit) libnssutil3.so(NSSUTIL_3.14)(64bit) libplc4.so()(64bit) libplds4.so()(64bit) libpthread.so.0()(64bit) rtld(GNU_HASH) Processing files: nss-devel-3.79.0-4.el7_9.aarch64 Provides: nss-devel = 3.79.0-4.el7_9 nss-devel(aarch-64) = 3.79.0-4.el7_9 nss-static = 3.79.0-4.el7_9 pkgconfig(nss) = 3.79.0 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires: /bin/sh /usr/bin/pkg-config pkgconfig(nspr) >= 4.34.0 pkgconfig(nss-util) >= 3.79.0 Processing files: nss-pkcs11-devel-3.79.0-4.el7_9.aarch64 Provides: nss-pkcs11-devel = 3.79.0-4.el7_9 nss-pkcs11-devel(aarch-64) = 3.79.0-4.el7_9 nss-pkcs11-devel-static = 3.79.0-4.el7_9 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Processing files: nss-debuginfo-3.79.0-4.el7_9.aarch64 Provides: nss-debuginfo = 3.79.0-4.el7_9 nss-debuginfo(aarch-64) = 3.79.0-4.el7_9 Requires(rpmlib): rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 rpmlib(CompressedFileNames) <= 3.0.4-1 Checking for unpackaged file(s): /usr/lib/rpm/check-files /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64 Wrote: /builddir/build/RPMS/nss-3.79.0-4.el7_9.aarch64.rpm Wrote: /builddir/build/RPMS/nss-tools-3.79.0-4.el7_9.aarch64.rpm Wrote: /builddir/build/RPMS/nss-sysinit-3.79.0-4.el7_9.aarch64.rpm Wrote: /builddir/build/RPMS/nss-devel-3.79.0-4.el7_9.aarch64.rpm Wrote: /builddir/build/RPMS/nss-pkcs11-devel-3.79.0-4.el7_9.aarch64.rpm Wrote: /builddir/build/RPMS/nss-debuginfo-3.79.0-4.el7_9.aarch64.rpm Executing(%clean): /bin/sh -e /var/tmp/rpm-tmp.BgYXzB + umask 022 + cd /builddir/build/BUILD + cd nss-3.79 + /usr/bin/rm -rf /builddir/build/BUILDROOT/nss-3.79.0-4.el7_9.aarch64 + exit 0 Child return code was: 0